Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/j.anaszewski...
[linux-2.6-block.git] / drivers / firmware / efi / libstub / efi-stub-helper.c
CommitLineData
7721da4c
RF
1/*
2 * Helper functions used by the EFI stub on multiple
3 * architectures. This should be #included by the EFI stub
4 * implementation files.
5 *
6 * Copyright 2011 Intel Corporation; author Matt Fleming
7 *
8 * This file is part of the Linux kernel, and is made available
9 * under the terms of the GNU General Public License version 2.
10 *
11 */
7721da4c 12
bd669475
AB
13#include <linux/efi.h>
14#include <asm/efi.h>
15
16#include "efistub.h"
9bb40191 17
5a17dae4
MF
18/*
19 * Some firmware implementations have problems reading files in one go.
20 * A read chunk size of 1MB seems to work for most platforms.
21 *
22 * Unfortunately, reading files in chunks triggers *other* bugs on some
23 * platforms, so we provide a way to disable this workaround, which can
24 * be done by passing "efi=nochunk" on the EFI boot stub command line.
25 *
26 * If you experience issues with initrd images being corrupt it's worth
27 * trying efi=nochunk, but chunking is enabled by default because there
28 * are far more machines that require the workaround than those that
29 * break with it enabled.
30 */
bd669475 31#define EFI_READ_CHUNK_SIZE (1024 * 1024)
9bb40191 32
5a17dae4
MF
33static unsigned long __chunk_size = EFI_READ_CHUNK_SIZE;
34
cf2b0f10
AB
35/*
36 * Allow the platform to override the allocation granularity: this allows
37 * systems that have the capability to run with a larger page size to deal
38 * with the allocations for initrd and fdt more efficiently.
39 */
40#ifndef EFI_ALLOC_ALIGN
41#define EFI_ALLOC_ALIGN EFI_PAGE_SIZE
42#endif
43
36f8961c 44struct file_info {
7721da4c
RF
45 efi_file_handle_t *handle;
46 u64 size;
47};
48
bd669475 49void efi_printk(efi_system_table_t *sys_table_arg, char *str)
7721da4c
RF
50{
51 char *s8;
52
53 for (s8 = str; *s8; s8++) {
54 efi_char16_t ch[2] = { 0 };
55
56 ch[0] = *s8;
57 if (*s8 == '\n') {
58 efi_char16_t nl[2] = { '\r', 0 };
876dc36a 59 efi_char16_printk(sys_table_arg, nl);
7721da4c
RF
60 }
61
876dc36a 62 efi_char16_printk(sys_table_arg, ch);
7721da4c
RF
63 }
64}
65
bd669475
AB
66efi_status_t efi_get_memory_map(efi_system_table_t *sys_table_arg,
67 efi_memory_desc_t **map,
68 unsigned long *map_size,
69 unsigned long *desc_size,
70 u32 *desc_ver,
71 unsigned long *key_ptr)
7721da4c
RF
72{
73 efi_memory_desc_t *m = NULL;
74 efi_status_t status;
75 unsigned long key;
76 u32 desc_version;
77
43a9f696
MF
78 *map_size = sizeof(*m) * 32;
79again:
7721da4c
RF
80 /*
81 * Add an additional efi_memory_desc_t because we're doing an
82 * allocation which may be in a new descriptor region.
83 */
43a9f696 84 *map_size += sizeof(*m);
204b0a1a
MF
85 status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
86 *map_size, (void **)&m);
7721da4c
RF
87 if (status != EFI_SUCCESS)
88 goto fail;
89
43a9f696
MF
90 *desc_size = 0;
91 key = 0;
204b0a1a
MF
92 status = efi_call_early(get_memory_map, map_size, m,
93 &key, desc_size, &desc_version);
7721da4c 94 if (status == EFI_BUFFER_TOO_SMALL) {
204b0a1a 95 efi_call_early(free_pool, m);
43a9f696 96 goto again;
7721da4c
RF
97 }
98
99 if (status != EFI_SUCCESS)
204b0a1a 100 efi_call_early(free_pool, m);
54b52d87 101
1c089c65
RF
102 if (key_ptr && status == EFI_SUCCESS)
103 *key_ptr = key;
104 if (desc_ver && status == EFI_SUCCESS)
105 *desc_ver = desc_version;
7721da4c
RF
106
107fail:
108 *map = m;
109 return status;
110}
111
9bb40191 112
ddeeefe2 113unsigned long get_dram_base(efi_system_table_t *sys_table_arg)
9bb40191
RF
114{
115 efi_status_t status;
116 unsigned long map_size;
117 unsigned long membase = EFI_ERROR;
118 struct efi_memory_map map;
119 efi_memory_desc_t *md;
120
121 status = efi_get_memory_map(sys_table_arg, (efi_memory_desc_t **)&map.map,
122 &map_size, &map.desc_size, NULL, NULL);
123 if (status != EFI_SUCCESS)
124 return membase;
125
126 map.map_end = map.map + map_size;
127
78ce248f
MF
128 for_each_efi_memory_desc_in_map(&map, md) {
129 if (md->attribute & EFI_MEMORY_WB) {
9bb40191
RF
130 if (membase > md->phys_addr)
131 membase = md->phys_addr;
78ce248f
MF
132 }
133 }
9bb40191
RF
134
135 efi_call_early(free_pool, map.map);
136
137 return membase;
138}
139
7721da4c
RF
140/*
141 * Allocate at the highest possible address that is not above 'max'.
142 */
bd669475
AB
143efi_status_t efi_high_alloc(efi_system_table_t *sys_table_arg,
144 unsigned long size, unsigned long align,
145 unsigned long *addr, unsigned long max)
7721da4c
RF
146{
147 unsigned long map_size, desc_size;
148 efi_memory_desc_t *map;
149 efi_status_t status;
150 unsigned long nr_pages;
151 u64 max_addr = 0;
152 int i;
153
1c089c65
RF
154 status = efi_get_memory_map(sys_table_arg, &map, &map_size, &desc_size,
155 NULL, NULL);
7721da4c
RF
156 if (status != EFI_SUCCESS)
157 goto fail;
158
38dd9c02
RF
159 /*
160 * Enforce minimum alignment that EFI requires when requesting
161 * a specific address. We are doing page-based allocations,
162 * so we must be aligned to a page.
163 */
cf2b0f10
AB
164 if (align < EFI_ALLOC_ALIGN)
165 align = EFI_ALLOC_ALIGN;
38dd9c02 166
cf2b0f10 167 nr_pages = round_up(size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
7721da4c
RF
168again:
169 for (i = 0; i < map_size / desc_size; i++) {
170 efi_memory_desc_t *desc;
171 unsigned long m = (unsigned long)map;
172 u64 start, end;
173
174 desc = (efi_memory_desc_t *)(m + (i * desc_size));
175 if (desc->type != EFI_CONVENTIONAL_MEMORY)
176 continue;
177
178 if (desc->num_pages < nr_pages)
179 continue;
180
181 start = desc->phys_addr;
182 end = start + desc->num_pages * (1UL << EFI_PAGE_SHIFT);
183
7ed620bb 184 if (end > max)
7721da4c
RF
185 end = max;
186
7ed620bb
YL
187 if ((start + size) > end)
188 continue;
189
7721da4c
RF
190 if (round_down(end - size, align) < start)
191 continue;
192
193 start = round_down(end - size, align);
194
195 /*
196 * Don't allocate at 0x0. It will confuse code that
197 * checks pointers against NULL.
198 */
199 if (start == 0x0)
200 continue;
201
202 if (start > max_addr)
203 max_addr = start;
204 }
205
206 if (!max_addr)
207 status = EFI_NOT_FOUND;
208 else {
204b0a1a
MF
209 status = efi_call_early(allocate_pages,
210 EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
211 nr_pages, &max_addr);
7721da4c
RF
212 if (status != EFI_SUCCESS) {
213 max = max_addr;
214 max_addr = 0;
215 goto again;
216 }
217
218 *addr = max_addr;
219 }
220
204b0a1a 221 efi_call_early(free_pool, map);
7721da4c
RF
222fail:
223 return status;
224}
225
226/*
227 * Allocate at the lowest possible address.
228 */
bd669475
AB
229efi_status_t efi_low_alloc(efi_system_table_t *sys_table_arg,
230 unsigned long size, unsigned long align,
231 unsigned long *addr)
7721da4c
RF
232{
233 unsigned long map_size, desc_size;
234 efi_memory_desc_t *map;
235 efi_status_t status;
236 unsigned long nr_pages;
237 int i;
238
1c089c65
RF
239 status = efi_get_memory_map(sys_table_arg, &map, &map_size, &desc_size,
240 NULL, NULL);
7721da4c
RF
241 if (status != EFI_SUCCESS)
242 goto fail;
243
38dd9c02
RF
244 /*
245 * Enforce minimum alignment that EFI requires when requesting
246 * a specific address. We are doing page-based allocations,
247 * so we must be aligned to a page.
248 */
cf2b0f10
AB
249 if (align < EFI_ALLOC_ALIGN)
250 align = EFI_ALLOC_ALIGN;
38dd9c02 251
cf2b0f10 252 nr_pages = round_up(size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
7721da4c
RF
253 for (i = 0; i < map_size / desc_size; i++) {
254 efi_memory_desc_t *desc;
255 unsigned long m = (unsigned long)map;
256 u64 start, end;
257
258 desc = (efi_memory_desc_t *)(m + (i * desc_size));
259
260 if (desc->type != EFI_CONVENTIONAL_MEMORY)
261 continue;
262
263 if (desc->num_pages < nr_pages)
264 continue;
265
266 start = desc->phys_addr;
267 end = start + desc->num_pages * (1UL << EFI_PAGE_SHIFT);
268
269 /*
270 * Don't allocate at 0x0. It will confuse code that
271 * checks pointers against NULL. Skip the first 8
272 * bytes so we start at a nice even number.
273 */
274 if (start == 0x0)
275 start += 8;
276
277 start = round_up(start, align);
278 if ((start + size) > end)
279 continue;
280
204b0a1a
MF
281 status = efi_call_early(allocate_pages,
282 EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
283 nr_pages, &start);
7721da4c
RF
284 if (status == EFI_SUCCESS) {
285 *addr = start;
286 break;
287 }
288 }
289
290 if (i == map_size / desc_size)
291 status = EFI_NOT_FOUND;
292
204b0a1a 293 efi_call_early(free_pool, map);
7721da4c
RF
294fail:
295 return status;
296}
297
bd669475
AB
298void efi_free(efi_system_table_t *sys_table_arg, unsigned long size,
299 unsigned long addr)
7721da4c
RF
300{
301 unsigned long nr_pages;
302
0e1cadb0
RF
303 if (!size)
304 return;
305
cf2b0f10 306 nr_pages = round_up(size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
204b0a1a 307 efi_call_early(free_pages, addr, nr_pages);
7721da4c
RF
308}
309
5a17dae4
MF
310/*
311 * Parse the ASCII string 'cmdline' for EFI options, denoted by the efi=
312 * option, e.g. efi=nochunk.
313 *
314 * It should be noted that efi= is parsed in two very different
315 * environments, first in the early boot environment of the EFI boot
316 * stub, and subsequently during the kernel boot.
317 */
318efi_status_t efi_parse_options(char *cmdline)
319{
320 char *str;
321
322 /*
323 * If no EFI parameters were specified on the cmdline we've got
324 * nothing to do.
325 */
326 str = strstr(cmdline, "efi=");
327 if (!str)
328 return EFI_SUCCESS;
329
330 /* Skip ahead to first argument */
331 str += strlen("efi=");
332
333 /*
334 * Remember, because efi= is also used by the kernel we need to
335 * skip over arguments we don't understand.
336 */
337 while (*str) {
338 if (!strncmp(str, "nochunk", 7)) {
339 str += strlen("nochunk");
340 __chunk_size = -1UL;
341 }
342
343 /* Group words together, delimited by "," */
344 while (*str && *str != ',')
345 str++;
346
347 if (*str == ',')
348 str++;
349 }
350
351 return EFI_SUCCESS;
352}
7721da4c
RF
353
354/*
36f8961c 355 * Check the cmdline for a LILO-style file= arguments.
7721da4c 356 *
36f8961c
RF
357 * We only support loading a file from the same filesystem as
358 * the kernel image.
7721da4c 359 */
bd669475
AB
360efi_status_t handle_cmdline_files(efi_system_table_t *sys_table_arg,
361 efi_loaded_image_t *image,
362 char *cmd_line, char *option_string,
363 unsigned long max_addr,
364 unsigned long *load_addr,
365 unsigned long *load_size)
7721da4c 366{
36f8961c
RF
367 struct file_info *files;
368 unsigned long file_addr;
36f8961c 369 u64 file_size_total;
9403e462 370 efi_file_handle_t *fh = NULL;
7721da4c 371 efi_status_t status;
36f8961c 372 int nr_files;
7721da4c
RF
373 char *str;
374 int i, j, k;
375
36f8961c
RF
376 file_addr = 0;
377 file_size_total = 0;
7721da4c 378
46f4582e 379 str = cmd_line;
7721da4c
RF
380
381 j = 0; /* See close_handles */
382
46f4582e
RF
383 if (!load_addr || !load_size)
384 return EFI_INVALID_PARAMETER;
385
386 *load_addr = 0;
387 *load_size = 0;
388
7721da4c
RF
389 if (!str || !*str)
390 return EFI_SUCCESS;
391
36f8961c 392 for (nr_files = 0; *str; nr_files++) {
46f4582e 393 str = strstr(str, option_string);
7721da4c
RF
394 if (!str)
395 break;
396
46f4582e 397 str += strlen(option_string);
7721da4c
RF
398
399 /* Skip any leading slashes */
400 while (*str == '/' || *str == '\\')
401 str++;
402
403 while (*str && *str != ' ' && *str != '\n')
404 str++;
405 }
406
36f8961c 407 if (!nr_files)
7721da4c
RF
408 return EFI_SUCCESS;
409
204b0a1a
MF
410 status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
411 nr_files * sizeof(*files), (void **)&files);
7721da4c 412 if (status != EFI_SUCCESS) {
f966ea02 413 pr_efi_err(sys_table_arg, "Failed to alloc mem for file handle list\n");
7721da4c
RF
414 goto fail;
415 }
416
46f4582e 417 str = cmd_line;
36f8961c
RF
418 for (i = 0; i < nr_files; i++) {
419 struct file_info *file;
7721da4c 420 efi_char16_t filename_16[256];
7721da4c 421 efi_char16_t *p;
7721da4c 422
46f4582e 423 str = strstr(str, option_string);
7721da4c
RF
424 if (!str)
425 break;
426
46f4582e 427 str += strlen(option_string);
7721da4c 428
36f8961c 429 file = &files[i];
7721da4c
RF
430 p = filename_16;
431
432 /* Skip any leading slashes */
433 while (*str == '/' || *str == '\\')
434 str++;
435
436 while (*str && *str != ' ' && *str != '\n') {
437 if ((u8 *)p >= (u8 *)filename_16 + sizeof(filename_16))
438 break;
439
440 if (*str == '/') {
441 *p++ = '\\';
4e283088 442 str++;
7721da4c
RF
443 } else {
444 *p++ = *str++;
445 }
446 }
447
448 *p = '\0';
449
450 /* Only open the volume once. */
451 if (!i) {
54b52d87
MF
452 status = efi_open_volume(sys_table_arg, image,
453 (void **)&fh);
454 if (status != EFI_SUCCESS)
36f8961c 455 goto free_files;
7721da4c
RF
456 }
457
54b52d87
MF
458 status = efi_file_size(sys_table_arg, fh, filename_16,
459 (void **)&file->handle, &file->size);
460 if (status != EFI_SUCCESS)
7721da4c 461 goto close_handles;
7721da4c 462
54b52d87 463 file_size_total += file->size;
7721da4c
RF
464 }
465
36f8961c 466 if (file_size_total) {
7721da4c
RF
467 unsigned long addr;
468
469 /*
36f8961c
RF
470 * Multiple files need to be at consecutive addresses in memory,
471 * so allocate enough memory for all the files. This is used
472 * for loading multiple files.
7721da4c 473 */
36f8961c
RF
474 status = efi_high_alloc(sys_table_arg, file_size_total, 0x1000,
475 &file_addr, max_addr);
7721da4c 476 if (status != EFI_SUCCESS) {
f966ea02 477 pr_efi_err(sys_table_arg, "Failed to alloc highmem for files\n");
7721da4c
RF
478 goto close_handles;
479 }
480
481 /* We've run out of free low memory. */
36f8961c 482 if (file_addr > max_addr) {
f966ea02 483 pr_efi_err(sys_table_arg, "We've run out of free low memory\n");
7721da4c 484 status = EFI_INVALID_PARAMETER;
36f8961c 485 goto free_file_total;
7721da4c
RF
486 }
487
36f8961c
RF
488 addr = file_addr;
489 for (j = 0; j < nr_files; j++) {
6a5fe770 490 unsigned long size;
7721da4c 491
36f8961c 492 size = files[j].size;
7721da4c 493 while (size) {
6a5fe770 494 unsigned long chunksize;
5a17dae4
MF
495 if (size > __chunk_size)
496 chunksize = __chunk_size;
7721da4c
RF
497 else
498 chunksize = size;
54b52d87 499
47514c99 500 status = efi_file_read(files[j].handle,
54b52d87
MF
501 &chunksize,
502 (void *)addr);
7721da4c 503 if (status != EFI_SUCCESS) {
f966ea02 504 pr_efi_err(sys_table_arg, "Failed to read file\n");
36f8961c 505 goto free_file_total;
7721da4c
RF
506 }
507 addr += chunksize;
508 size -= chunksize;
509 }
510
47514c99 511 efi_file_close(files[j].handle);
7721da4c
RF
512 }
513
514 }
515
204b0a1a 516 efi_call_early(free_pool, files);
7721da4c 517
36f8961c
RF
518 *load_addr = file_addr;
519 *load_size = file_size_total;
7721da4c
RF
520
521 return status;
522
36f8961c
RF
523free_file_total:
524 efi_free(sys_table_arg, file_size_total, file_addr);
7721da4c
RF
525
526close_handles:
527 for (k = j; k < i; k++)
47514c99 528 efi_file_close(files[k].handle);
36f8961c 529free_files:
204b0a1a 530 efi_call_early(free_pool, files);
7721da4c 531fail:
46f4582e
RF
532 *load_addr = 0;
533 *load_size = 0;
7721da4c
RF
534
535 return status;
536}
4a9f3a7c
RF
537/*
538 * Relocate a kernel image, either compressed or uncompressed.
539 * In the ARM64 case, all kernel images are currently
540 * uncompressed, and as such when we relocate it we need to
541 * allocate additional space for the BSS segment. Any low
542 * memory that this function should avoid needs to be
543 * unavailable in the EFI memory map, as if the preferred
544 * address is not available the lowest available address will
545 * be used.
546 */
bd669475
AB
547efi_status_t efi_relocate_kernel(efi_system_table_t *sys_table_arg,
548 unsigned long *image_addr,
549 unsigned long image_size,
550 unsigned long alloc_size,
551 unsigned long preferred_addr,
552 unsigned long alignment)
c6866d72 553{
4a9f3a7c
RF
554 unsigned long cur_image_addr;
555 unsigned long new_addr = 0;
c6866d72 556 efi_status_t status;
4a9f3a7c
RF
557 unsigned long nr_pages;
558 efi_physical_addr_t efi_addr = preferred_addr;
559
560 if (!image_addr || !image_size || !alloc_size)
561 return EFI_INVALID_PARAMETER;
562 if (alloc_size < image_size)
563 return EFI_INVALID_PARAMETER;
564
565 cur_image_addr = *image_addr;
c6866d72
RF
566
567 /*
568 * The EFI firmware loader could have placed the kernel image
4a9f3a7c
RF
569 * anywhere in memory, but the kernel has restrictions on the
570 * max physical address it can run at. Some architectures
571 * also have a prefered address, so first try to relocate
572 * to the preferred address. If that fails, allocate as low
573 * as possible while respecting the required alignment.
c6866d72 574 */
cf2b0f10 575 nr_pages = round_up(alloc_size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
204b0a1a
MF
576 status = efi_call_early(allocate_pages,
577 EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
578 nr_pages, &efi_addr);
4a9f3a7c
RF
579 new_addr = efi_addr;
580 /*
581 * If preferred address allocation failed allocate as low as
582 * possible.
583 */
c6866d72 584 if (status != EFI_SUCCESS) {
4a9f3a7c
RF
585 status = efi_low_alloc(sys_table_arg, alloc_size, alignment,
586 &new_addr);
587 }
588 if (status != EFI_SUCCESS) {
f966ea02 589 pr_efi_err(sys_table_arg, "Failed to allocate usable memory for kernel.\n");
4a9f3a7c 590 return status;
c6866d72
RF
591 }
592
4a9f3a7c
RF
593 /*
594 * We know source/dest won't overlap since both memory ranges
595 * have been allocated by UEFI, so we can safely use memcpy.
596 */
597 memcpy((void *)new_addr, (void *)cur_image_addr, image_size);
c6866d72 598
4a9f3a7c
RF
599 /* Return the new address of the relocated image. */
600 *image_addr = new_addr;
c6866d72
RF
601
602 return status;
603}
5fef3870 604
c625d1c2
PA
605/*
606 * Get the number of UTF-8 bytes corresponding to an UTF-16 character.
607 * This overestimates for surrogates, but that is okay.
608 */
609static int efi_utf8_bytes(u16 c)
610{
611 return 1 + (c >= 0x80) + (c >= 0x800);
612}
613
614/*
615 * Convert an UTF-16 string, not necessarily null terminated, to UTF-8.
616 */
617static u8 *efi_utf16_to_utf8(u8 *dst, const u16 *src, int n)
618{
619 unsigned int c;
620
621 while (n--) {
622 c = *src++;
623 if (n && c >= 0xd800 && c <= 0xdbff &&
624 *src >= 0xdc00 && *src <= 0xdfff) {
625 c = 0x10000 + ((c & 0x3ff) << 10) + (*src & 0x3ff);
626 src++;
627 n--;
628 }
629 if (c >= 0xd800 && c <= 0xdfff)
630 c = 0xfffd; /* Unmatched surrogate */
631 if (c < 0x80) {
632 *dst++ = c;
633 continue;
634 }
635 if (c < 0x800) {
636 *dst++ = 0xc0 + (c >> 6);
637 goto t1;
638 }
639 if (c < 0x10000) {
640 *dst++ = 0xe0 + (c >> 12);
641 goto t2;
642 }
643 *dst++ = 0xf0 + (c >> 18);
644 *dst++ = 0x80 + ((c >> 12) & 0x3f);
645 t2:
646 *dst++ = 0x80 + ((c >> 6) & 0x3f);
647 t1:
648 *dst++ = 0x80 + (c & 0x3f);
649 }
650
651 return dst;
652}
653
48fcb2d0
AB
654#ifndef MAX_CMDLINE_ADDRESS
655#define MAX_CMDLINE_ADDRESS ULONG_MAX
656#endif
657
5fef3870
RF
658/*
659 * Convert the unicode UEFI command line to ASCII to pass to kernel.
660 * Size of memory allocated return in *cmd_line_len.
661 * Returns NULL on error.
662 */
bd669475
AB
663char *efi_convert_cmdline(efi_system_table_t *sys_table_arg,
664 efi_loaded_image_t *image,
665 int *cmd_line_len)
5fef3870 666{
c625d1c2 667 const u16 *s2;
5fef3870
RF
668 u8 *s1 = NULL;
669 unsigned long cmdline_addr = 0;
c625d1c2
PA
670 int load_options_chars = image->load_options_size / 2; /* UTF-16 */
671 const u16 *options = image->load_options;
672 int options_bytes = 0; /* UTF-8 bytes */
673 int options_chars = 0; /* UTF-16 chars */
5fef3870 674 efi_status_t status;
5fef3870
RF
675 u16 zero = 0;
676
677 if (options) {
678 s2 = options;
c625d1c2
PA
679 while (*s2 && *s2 != '\n'
680 && options_chars < load_options_chars) {
681 options_bytes += efi_utf8_bytes(*s2++);
682 options_chars++;
5fef3870
RF
683 }
684 }
685
c625d1c2 686 if (!options_chars) {
5fef3870 687 /* No command line options, so return empty string*/
5fef3870
RF
688 options = &zero;
689 }
690
c625d1c2 691 options_bytes++; /* NUL termination */
9403e462 692
48fcb2d0
AB
693 status = efi_high_alloc(sys_table_arg, options_bytes, 0,
694 &cmdline_addr, MAX_CMDLINE_ADDRESS);
5fef3870
RF
695 if (status != EFI_SUCCESS)
696 return NULL;
697
698 s1 = (u8 *)cmdline_addr;
c625d1c2 699 s2 = (const u16 *)options;
5fef3870 700
c625d1c2 701 s1 = efi_utf16_to_utf8(s1, s2, options_chars);
5fef3870
RF
702 *s1 = '\0';
703
c625d1c2 704 *cmd_line_len = options_bytes;
5fef3870
RF
705 return (char *)cmdline_addr;
706}