mirror of
				https://github.com/smaeul/u-boot.git
				synced 2025-10-31 03:58:17 +00:00 
			
		
		
		
	Make sure that the cache flushes correctly by ensuring that the end address is correctly aligned. Signed-off-by: Simon Glass <sjg@chromium.org> Signed-off-by: Alexander Graf <agraf@suse.de>
		
			
				
	
	
		
			187 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			187 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  *  EFI image loader
 | |
|  *
 | |
|  *  based partly on wine code
 | |
|  *
 | |
|  *  Copyright (c) 2016 Alexander Graf
 | |
|  *
 | |
|  *  SPDX-License-Identifier:     GPL-2.0+
 | |
|  */
 | |
| 
 | |
| #include <common.h>
 | |
| #include <efi_loader.h>
 | |
| #include <pe.h>
 | |
| #include <asm/global_data.h>
 | |
| 
 | |
| DECLARE_GLOBAL_DATA_PTR;
 | |
| 
 | |
| const efi_guid_t efi_guid_device_path = DEVICE_PATH_GUID;
 | |
| const efi_guid_t efi_guid_loaded_image = LOADED_IMAGE_GUID;
 | |
| 
 | |
| efi_status_t EFIAPI efi_return_handle(void *handle, efi_guid_t *protocol,
 | |
| 			void **protocol_interface, void *agent_handle,
 | |
| 			void *controller_handle, uint32_t attributes)
 | |
| {
 | |
| 	*protocol_interface = handle;
 | |
| 	return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| static void efi_loader_relocate(const IMAGE_BASE_RELOCATION *rel,
 | |
| 			unsigned long rel_size, void *efi_reloc)
 | |
| {
 | |
| 	const IMAGE_BASE_RELOCATION *end;
 | |
| 	int i;
 | |
| 
 | |
| 	end = (const IMAGE_BASE_RELOCATION *)((const char *)rel + rel_size);
 | |
| 	while (rel < end - 1 && rel->SizeOfBlock) {
 | |
| 		const uint16_t *relocs = (const uint16_t *)(rel + 1);
 | |
| 		i = (rel->SizeOfBlock - sizeof(*rel)) / sizeof(uint16_t);
 | |
| 		while (i--) {
 | |
| 			uint32_t offset = (uint32_t)(*relocs & 0xfff) +
 | |
| 					  rel->VirtualAddress;
 | |
| 			int type = *relocs >> EFI_PAGE_SHIFT;
 | |
| 			unsigned long delta = (unsigned long)efi_reloc;
 | |
| 			uint64_t *x64 = efi_reloc + offset;
 | |
| 			uint32_t *x32 = efi_reloc + offset;
 | |
| 			uint16_t *x16 = efi_reloc + offset;
 | |
| 
 | |
| 			switch (type) {
 | |
| 			case IMAGE_REL_BASED_ABSOLUTE:
 | |
| 				break;
 | |
| 			case IMAGE_REL_BASED_HIGH:
 | |
| 				*x16 += ((uint32_t)delta) >> 16;
 | |
| 				break;
 | |
| 			case IMAGE_REL_BASED_LOW:
 | |
| 				*x16 += (uint16_t)delta;
 | |
| 				break;
 | |
| 			case IMAGE_REL_BASED_HIGHLOW:
 | |
| 				*x32 += (uint32_t)delta;
 | |
| 				break;
 | |
| 			case IMAGE_REL_BASED_DIR64:
 | |
| 				*x64 += (uint64_t)delta;
 | |
| 				break;
 | |
| 			default:
 | |
| 				printf("Unknown Relocation off %x type %x\n",
 | |
| 				       offset, type);
 | |
| 			}
 | |
| 			relocs++;
 | |
| 		}
 | |
| 		rel = (const IMAGE_BASE_RELOCATION *)relocs;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void __weak invalidate_icache_all(void)
 | |
| {
 | |
| 	/* If the system doesn't support icache_all flush, cross our fingers */
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This function loads all sections from a PE binary into a newly reserved
 | |
|  * piece of memory. On successful load it then returns the entry point for
 | |
|  * the binary. Otherwise NULL.
 | |
|  */
 | |
| void *efi_load_pe(void *efi, struct efi_loaded_image *loaded_image_info)
 | |
| {
 | |
| 	IMAGE_NT_HEADERS32 *nt;
 | |
| 	IMAGE_DOS_HEADER *dos;
 | |
| 	IMAGE_SECTION_HEADER *sections;
 | |
| 	int num_sections;
 | |
| 	void *efi_reloc;
 | |
| 	int i;
 | |
| 	const IMAGE_BASE_RELOCATION *rel;
 | |
| 	unsigned long rel_size;
 | |
| 	int rel_idx = IMAGE_DIRECTORY_ENTRY_BASERELOC;
 | |
| 	void *entry;
 | |
| 	uint64_t image_size;
 | |
| 	unsigned long virt_size = 0;
 | |
| 	bool can_run_nt64 = true;
 | |
| 	bool can_run_nt32 = true;
 | |
| 
 | |
| #if defined(CONFIG_ARM64)
 | |
| 	can_run_nt32 = false;
 | |
| #elif defined(CONFIG_ARM)
 | |
| 	can_run_nt64 = false;
 | |
| #endif
 | |
| 
 | |
| 	dos = efi;
 | |
| 	if (dos->e_magic != IMAGE_DOS_SIGNATURE) {
 | |
| 		printf("%s: Invalid DOS Signature\n", __func__);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	nt = (void *) ((char *)efi + dos->e_lfanew);
 | |
| 	if (nt->Signature != IMAGE_NT_SIGNATURE) {
 | |
| 		printf("%s: Invalid NT Signature\n", __func__);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	/* Calculate upper virtual address boundary */
 | |
| 	num_sections = nt->FileHeader.NumberOfSections;
 | |
| 	sections = (void *)&nt->OptionalHeader +
 | |
| 			    nt->FileHeader.SizeOfOptionalHeader;
 | |
| 
 | |
| 	for (i = num_sections - 1; i >= 0; i--) {
 | |
| 		IMAGE_SECTION_HEADER *sec = §ions[i];
 | |
| 		virt_size = max_t(unsigned long, virt_size,
 | |
| 				  sec->VirtualAddress + sec->Misc.VirtualSize);
 | |
| 	}
 | |
| 
 | |
| 	/* Read 32/64bit specific header bits */
 | |
| 	if (can_run_nt64 &&
 | |
| 	    (nt->OptionalHeader.Magic == IMAGE_NT_OPTIONAL_HDR64_MAGIC)) {
 | |
| 		IMAGE_NT_HEADERS64 *nt64 = (void *)nt;
 | |
| 		IMAGE_OPTIONAL_HEADER64 *opt = &nt64->OptionalHeader;
 | |
| 		image_size = opt->SizeOfImage;
 | |
| 		efi_reloc = efi_alloc(virt_size, EFI_LOADER_DATA);
 | |
| 		if (!efi_reloc) {
 | |
| 			printf("%s: Could not allocate %ld bytes\n",
 | |
| 				__func__, virt_size);
 | |
| 			return NULL;
 | |
| 		}
 | |
| 		entry = efi_reloc + opt->AddressOfEntryPoint;
 | |
| 		rel_size = opt->DataDirectory[rel_idx].Size;
 | |
| 		rel = efi_reloc + opt->DataDirectory[rel_idx].VirtualAddress;
 | |
| 	} else if (can_run_nt32 &&
 | |
| 		   (nt->OptionalHeader.Magic == IMAGE_NT_OPTIONAL_HDR32_MAGIC)) {
 | |
| 		IMAGE_OPTIONAL_HEADER32 *opt = &nt->OptionalHeader;
 | |
| 		image_size = opt->SizeOfImage;
 | |
| 		efi_reloc = efi_alloc(virt_size, EFI_LOADER_DATA);
 | |
| 		if (!efi_reloc) {
 | |
| 			printf("%s: Could not allocate %ld bytes\n",
 | |
| 				__func__, virt_size);
 | |
| 			return NULL;
 | |
| 		}
 | |
| 		entry = efi_reloc + opt->AddressOfEntryPoint;
 | |
| 		rel_size = opt->DataDirectory[rel_idx].Size;
 | |
| 		rel = efi_reloc + opt->DataDirectory[rel_idx].VirtualAddress;
 | |
| 	} else {
 | |
| 		printf("%s: Invalid optional header magic %x\n", __func__,
 | |
| 		       nt->OptionalHeader.Magic);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| 	/* Load sections into RAM */
 | |
| 	for (i = num_sections - 1; i >= 0; i--) {
 | |
| 		IMAGE_SECTION_HEADER *sec = §ions[i];
 | |
| 		memset(efi_reloc + sec->VirtualAddress, 0,
 | |
| 		       sec->Misc.VirtualSize);
 | |
| 		memcpy(efi_reloc + sec->VirtualAddress,
 | |
| 		       efi + sec->PointerToRawData,
 | |
| 		       sec->SizeOfRawData);
 | |
| 	}
 | |
| 
 | |
| 	/* Run through relocations */
 | |
| 	efi_loader_relocate(rel, rel_size, efi_reloc);
 | |
| 
 | |
| 	/* Flush cache */
 | |
| 	flush_cache((ulong)efi_reloc,
 | |
| 		    ALIGN(virt_size, CONFIG_SYS_CACHELINE_SIZE));
 | |
| 	invalidate_icache_all();
 | |
| 
 | |
| 	/* Populate the loaded image interface bits */
 | |
| 	loaded_image_info->image_base = efi;
 | |
| 	loaded_image_info->image_size = image_size;
 | |
| 
 | |
| 	return entry;
 | |
| }
 |