From patchwork Wed Jan 13 11:11:48 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ilias Apalodimas X-Patchwork-Id: 362078 Delivered-To: patch@linaro.org Received: by 2002:a02:ccad:0:0:0:0:0 with SMTP id t13csp427995jap; Wed, 13 Jan 2021 03:12:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJwfXZLrJMqvM9cywvsyRlGCzCuMrZxcCEOXHycl06N3b5q+QviSMZCE+qwomYa7KB8X/2U3 X-Received: by 2002:a17:907:546:: with SMTP id wk6mr1164598ejb.238.1610536354461; Wed, 13 Jan 2021 03:12:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610536354; cv=none; d=google.com; s=arc-20160816; b=BEsnbuIikEncqcfZG/jlvuT9cIsx1seYSKtIkrJDY4Xrxh1svTxSBF64esZ+Dmoh3/ GDm7NnQreb4tMXvuV60e7K5GnTuQ0kRg0OH+uNBhut2e9pUp9bCYjqi62bc/gzcPSDXD +swH4y6ozJpjFvESicG52JbNhtLEpjaHpGtG6QQluA+y6HM5vJMyyNVh7i2JrSu9EznA mgo7f3mnDl7nxikeZLVY9prHtbJfcm+47NCpaF2Po+9076Hsn2PmkQPKehOzg6z61PSK v5nLGBWVaGXtzBIhn+qO1+OAPgaM13MB4xX5k4vh3/bjt2NLEbNHLBz3OxYdi7IPRZsY IU5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MlWFyK7kR9qIzm1zkAYQ3ZukL55kyxRaumkmjaMu5O0=; b=XUyKbmRpH2WEm0vIzigfHWNQspMdhAw5TKdm81T9scV3SB6JInZAw6CpHRdDjO8B1d QQb+8rBBU3PK6cHJD5/FGzoYXPMNY2XHboR9jUn3pIMD9LAYl2F/2pbBKbUlfrz2ra3u mHvUKqcgwpBVF+3rqfkhVCmxR1cQ6YCymIXEbLwzdXBYryRJlI6AcpJrW7REZRLF3UKP do1EBUV0pBQcC0u9nQfkcnQbj7/3g3k/HfUgq+odOeC35NmVRkqjOM3vzPnqGG1GMoIr azlw1xOTtlaSKYUJSgCIoMzGN1P3HZ8mGqao0WNZoSMztXV/Dis7QM6XKoP6GksBjwMr yxWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=o4bUeYiJ; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from phobos.denx.de (phobos.denx.de. [2a01:238:438b:c500:173d:9f52:ddab:ee01]) by mx.google.com with ESMTPS id x26si845016edv.178.2021.01.13.03.12.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Jan 2021 03:12:34 -0800 (PST) Received-SPF: pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=o4bUeYiJ; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id D83E48263A; Wed, 13 Jan 2021 12:12:18 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="o4bUeYiJ"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id BA84F825D9; Wed, 13 Jan 2021 12:12:08 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id A9A87825D9 for ; Wed, 13 Jan 2021 12:11:55 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=ilias.apalodimas@linaro.org Received: by mail-wr1-x436.google.com with SMTP id t30so1698058wrb.0 for ; Wed, 13 Jan 2021 03:11:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=MlWFyK7kR9qIzm1zkAYQ3ZukL55kyxRaumkmjaMu5O0=; b=o4bUeYiJ3iSGjoBZxwGPLOT23TitXFhV0p8sb+E/fiFWLyHzKEK3GW14m9mE7lt5JV DE/64Tw7f+AgXSomBB46Tn0F4DNS+EbGSztuHStCt0lG69B6a4JGFLDkk5lM56m8MXSL 6dzfWkIECALFxKtWLP88T4lccWYAGbBG7su0dQCgVz41yDj27/bYrmR44I0fMm/myco+ QGCyLLSRBu9GQvhlt9FOZ4+YADWl4k2WPLDAnqQtM5QrVt9CV9JO3QLH9scZc2VSGqKM yoM35CmYTybuNuPPc9Il+drJS7djlMD6IAUtYMNBlFn0kIHdoVoEqQN/0T/jQm/khNMG 25Zw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=MlWFyK7kR9qIzm1zkAYQ3ZukL55kyxRaumkmjaMu5O0=; b=Qcg/enZQIVPy4Mmdh6YkvektKg6lmBSXnBcvArv6ULRQsQaOMpv5Nda3aqfxfIlUVk NWV1ObPutdmbB0wvhfOuj+CCl78PYeIkPoq8lJcGu+MVORNzImJmPLbKCMkwziOW/3Y4 Ei+Qt7evrmTAzzJuql5DcdaH9RomP5uUnYOLTowwi7EppkoJQqA0/g3JmNaHGqllvt2x RFprGh7+mSoPW29iNyEIfxLdRj5ucDmqUNn66ocToqQbgTES5KjO31LVAOuSYDjsxIJo a0CxgvXTTWtLCHth/3DBM6kmAMBuu8F8ekhfrjXQEGfSfeeTiB2aEbw9FTfoJsarLN4o cGkQ== X-Gm-Message-State: AOAM533jBaSy2X/nbIUJ7XsPLTwhjfQdTCGeDV2CL9lJNG3rKULok5PT isrqlO/oP140ESeoM23G81BcIw== X-Received: by 2002:a5d:4a4e:: with SMTP id v14mr2044140wrs.80.1610536315275; Wed, 13 Jan 2021 03:11:55 -0800 (PST) Received: from apalos.home ([2a02:587:4667:3e9:2e56:dcff:fe9a:8f06]) by smtp.gmail.com with ESMTPSA id r2sm2589869wrn.83.2021.01.13.03.11.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Jan 2021 03:11:54 -0800 (PST) From: Ilias Apalodimas To: xypron.glpk@gmx.de Cc: takahiro.akashi@linaro.org, Ilias Apalodimas , Alexander Graf , u-boot@lists.denx.de Subject: [RFC PATCH 2/3] efi_loader: efi_loader: Replace config option for initrd loading Date: Wed, 13 Jan 2021 13:11:48 +0200 Message-Id: <20210113111149.64567-3-ilias.apalodimas@linaro.org> X-Mailer: git-send-email 2.30.0.rc2 In-Reply-To: <20210113111149.64567-1-ilias.apalodimas@linaro.org> References: <20210113111149.64567-1-ilias.apalodimas@linaro.org> MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean Up to now we install EFI_LOAD_FILE2_PROTOCOL to load an initrd unconditionally. Although we correctly return various EFI exit codes depending on the file status (i.e EFI_NO_MEDIA, EFI_NOT_FOUND etc), the kernel loader, only falls back to the cmdline interpreted initrd if the protocol is not installed. This creates a problem for EFI installers, since they won't be able to load their own initrd and continue the installation. It also makes the feature hard to use, since we can either have a single initrd or we have to recompile u-boot if the filename changes. So let's introduce a different logic that will decouple the initrd path from the config option we currently have. When defining a UEFI BootXXXX we can use the filepathlist and store a file path pointing to our initrd. Specifically the EFI spec describes: "The first element of the array is a device path that describes the device and location of the Image for this load option. Other device paths may optionally exist in the FilePathList, but their usage is OSV specific" When the EFI application is launched through the bootmgr, we'll try to interpret the extra device path. If that points to a file that exists on our disk, we'll now install the load_file2 and the efi-stub will be able to use it. This opens up another path using U-Boot and defines a new boot flow. A user will be able to control the kernel/initrd pairs without explicit cmdline args or GRUB. Signed-off-by: Ilias Apalodimas --- cmd/bootefi.c | 3 + include/efi_loader.h | 1 + lib/efi_loader/Kconfig | 13 +-- lib/efi_loader/efi_bootmgr.c | 3 + lib/efi_loader/efi_load_initrd.c | 154 ++++++++++++++++--------------- 5 files changed, 91 insertions(+), 83 deletions(-) -- 2.30.0.rc2 diff --git a/cmd/bootefi.c b/cmd/bootefi.c index fdf909f8da2c..053927d5d986 100644 --- a/cmd/bootefi.c +++ b/cmd/bootefi.c @@ -357,6 +357,9 @@ static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options) free(load_options); + if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) + efi_initrd_deregister(); + return ret; } diff --git a/include/efi_loader.h b/include/efi_loader.h index 4719fa93f06d..5d2e161963c3 100644 --- a/include/efi_loader.h +++ b/include/efi_loader.h @@ -432,6 +432,7 @@ efi_status_t efi_net_register(void); /* Called by bootefi to make the watchdog available */ efi_status_t efi_watchdog_register(void); efi_status_t efi_initrd_register(void); +void efi_initrd_deregister(void); /* Called by bootefi to make SMBIOS tables available */ /** * efi_acpi_register() - write out ACPI tables diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig index fdf245dea30b..597a3ee86c88 100644 --- a/lib/efi_loader/Kconfig +++ b/lib/efi_loader/Kconfig @@ -307,14 +307,11 @@ config EFI_LOAD_FILE2_INITRD help Expose a EFI_FILE_LOAD2_PROTOCOL that the Linux UEFI stub can use to load the initial ramdisk. Once this is enabled using - initrd= will stop working. - -config EFI_INITRD_FILESPEC - string "initramfs path" - default "host 0:1 initrd" - depends on EFI_LOAD_FILE2_INITRD - help - Full path of the initramfs file, e.g. mmc 0:2 initramfs.cpio.gz. + initrd= will stop working. The protocol will only be + installed if bootmgr is used and the file is found on the defined + path. A boot entry of Boot0001 will try to match Initrd0001 and use + it. Initrd EFI variable format should be ' ' + i.e 'mmc 0:1 boot/initrd' config EFI_SECURE_BOOT bool "Enable EFI secure boot support" diff --git a/lib/efi_loader/efi_bootmgr.c b/lib/efi_loader/efi_bootmgr.c index 0fe503a7f376..aa5d521535ee 100644 --- a/lib/efi_loader/efi_bootmgr.c +++ b/lib/efi_loader/efi_bootmgr.c @@ -222,6 +222,9 @@ static efi_status_t try_load_entry(u16 n, efi_handle_t *handle, ret = efi_set_variable_int(L"BootCurrent", &efi_global_variable_guid, attributes, sizeof(n), &n, false); + /* try to register load file2 for initrd's */ + if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) + ret |= efi_initrd_register(); if (ret != EFI_SUCCESS) { if (EFI_CALL(efi_unload_image(*handle)) != EFI_SUCCESS) diff --git a/lib/efi_loader/efi_load_initrd.c b/lib/efi_loader/efi_load_initrd.c index b9ee8839054f..bb0c5e63b65c 100644 --- a/lib/efi_loader/efi_load_initrd.c +++ b/lib/efi_loader/efi_load_initrd.c @@ -5,7 +5,9 @@ #include #include +#include #include +#include #include #include #include @@ -39,41 +41,10 @@ static const struct efi_initrd_dp dp = { } }; -/** - * get_file_size() - retrieve the size of initramfs, set efi status on error - * - * @dev: device to read from, e.g. "mmc" - * @part: device partition, e.g. "0:1" - * @file: name of file - * @status: EFI exit code in case of failure - * - * Return: size of file - */ -static loff_t get_file_size(const char *dev, const char *part, const char *file, - efi_status_t *status) -{ - loff_t sz = 0; - int ret; - - ret = fs_set_blk_dev(dev, part, FS_TYPE_ANY); - if (ret) { - *status = EFI_NO_MEDIA; - goto out; - } - - ret = fs_size(file, &sz); - if (ret) { - sz = 0; - *status = EFI_NOT_FOUND; - goto out; - } - -out: - return sz; -} +static efi_handle_t efi_initrd_handle; /** - * efi_load_file2initrd() - load initial RAM disk + * efi_load_file2_initrd() - load initial RAM disk * * This function implements the LoadFile service of the EFI_LOAD_FILE2_PROTOCOL * in order to load an initial RAM disk requested by the Linux kernel stub. @@ -93,21 +64,15 @@ efi_load_file2_initrd(struct efi_load_file_protocol *this, struct efi_device_path *file_path, bool boot_policy, efi_uintn_t *buffer_size, void *buffer) { - char *filespec; efi_status_t status = EFI_NOT_FOUND; - loff_t file_sz = 0, read_sz = 0; - char *dev, *part, *file; - char *pos; - int ret; + struct efi_device_path *initrd_path = NULL; + struct efi_file_info *info = NULL; + struct efi_file_handle *f; + efi_uintn_t bs; EFI_ENTRY("%p, %p, %d, %p, %p", this, file_path, boot_policy, buffer_size, buffer); - filespec = strdup(CONFIG_EFI_INITRD_FILESPEC); - if (!filespec) - goto out; - pos = filespec; - if (!this || this != &efi_lf2_protocol || !buffer_size) { status = EFI_INVALID_PARAMETER; @@ -125,51 +90,82 @@ efi_load_file2_initrd(struct efi_load_file_protocol *this, goto out; } - /* - * expect a string with three space separated parts: - * - * * a block device type, e.g. "mmc" - * * a device and partition identifier, e.g. "0:1" - * * a file path on the block device, e.g. "/boot/initrd.cpio.gz" - */ - dev = strsep(&pos, " "); - if (!dev) + initrd_path = efi_get_fp_from_boot(INITRD_DP); + if (!initrd_path) { + status = EFI_NOT_FOUND; goto out; - part = strsep(&pos, " "); - if (!part) + } + + /* Open file */ + f = efi_file_from_path(initrd_path); + if (!f) { + status = EFI_NOT_FOUND; goto out; - file = strsep(&pos, " "); - if (!file) + } + + /* Get file size */ + bs = 0; + EFI_CALL(status = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, + &bs, info)); + if (status != EFI_BUFFER_TOO_SMALL) { + status = EFI_DEVICE_ERROR; goto out; + } - file_sz = get_file_size(dev, part, file, &status); - if (!file_sz) + info = malloc(bs); + EFI_CALL(status = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs, + info)); + if (status != EFI_SUCCESS) goto out; - if (!buffer || *buffer_size < file_sz) { + bs = info->file_size; + //efi_load_image_from_file + if (!buffer || *buffer_size < bs) { status = EFI_BUFFER_TOO_SMALL; - *buffer_size = file_sz; + *buffer_size = bs; } else { - ret = fs_set_blk_dev(dev, part, FS_TYPE_ANY); - if (ret) { - status = EFI_NO_MEDIA; - goto out; - } - - ret = fs_read(file, map_to_sysmem(buffer), 0, *buffer_size, - &read_sz); - if (ret || read_sz != file_sz) - goto out; - *buffer_size = read_sz; - - status = EFI_SUCCESS; + EFI_CALL(status = f->read(f, &bs, (void *)(uintptr_t)buffer)); + *buffer_size = bs; } out: - free(filespec); + free(info); + efi_free_pool(initrd_path); + EFI_CALL(f->close(f)); return EFI_EXIT(status); } +/** + * check_initrd() - Determine if the file defined as an initrd in Boot#### + * load_options device path is present + * + * Return: status code + */ +static efi_status_t check_initrd(void) +{ + struct efi_device_path *file_path; + struct efi_file_handle *f; + + /* + * if bootmgr is setup with and initrd, that will be the second + * device path instance in our load options located in Boot#### + */ + file_path = efi_get_fp_from_boot(INITRD_DP); + if (!file_path) + return EFI_NOT_FOUND; + + f = efi_file_from_path(file_path); + if (!f) { + efi_free_pool(file_path); + return EFI_NOT_FOUND; + } + + EFI_CALL(f->close(f)); + efi_free_pool(file_path); + + return EFI_SUCCESS; +} + /** * efi_initrd_register() - create handle for loading initial RAM disk * @@ -182,9 +178,12 @@ out: */ efi_status_t efi_initrd_register(void) { - efi_handle_t efi_initrd_handle = NULL; efi_status_t ret; + ret = check_initrd(); + if (ret != EFI_SUCCESS) + return ret; + ret = EFI_CALL(efi_install_multiple_protocol_interfaces (&efi_initrd_handle, /* initramfs */ @@ -196,3 +195,8 @@ efi_status_t efi_initrd_register(void) return ret; } + +void efi_initrd_deregister(void) +{ + efi_delete_handle(efi_initrd_handle); +}