]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/Library/QemuBootOrderLib/QemuBootOrderLib.c
Add dual FSP binaries support.
[mirror_edk2.git] / OvmfPkg / Library / QemuBootOrderLib / QemuBootOrderLib.c
CommitLineData
2cd086a6 1/** @file\r
2 Rewrite the BootOrder NvVar based on QEMU's "bootorder" fw_cfg file.\r
3\r
cca7475b 4 Copyright (C) 2012 - 2014, Red Hat, Inc.\r
32a22f09 5 Copyright (c) 2013, Intel Corporation. All rights reserved.<BR>\r
2cd086a6 6\r
7 This program and the accompanying materials are licensed and made available\r
8 under the terms and conditions of the BSD License which accompanies this\r
9 distribution. The full text of the license may be found at\r
10 http://opensource.org/licenses/bsd-license.php\r
11\r
12 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT\r
13 WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14**/\r
15\r
16#include <Library/QemuFwCfgLib.h>\r
17#include <Library/DebugLib.h>\r
18#include <Library/MemoryAllocationLib.h>\r
19#include <Library/GenericBdsLib.h>\r
20#include <Library/UefiBootServicesTableLib.h>\r
21#include <Library/UefiRuntimeServicesTableLib.h>\r
22#include <Library/BaseLib.h>\r
23#include <Library/PrintLib.h>\r
863986b3 24#include <Library/DevicePathLib.h>\r
cca7475b 25#include <Library/QemuBootOrderLib.h>\r
43336916 26#include <Library/BaseMemoryLib.h>\r
2cd086a6 27#include <Guid/GlobalVariable.h>\r
43336916 28#include <Guid/VirtioMmioTransport.h>\r
2cd086a6 29\r
30\r
31/**\r
32 OpenFirmware to UEFI device path translation output buffer size in CHAR16's.\r
33**/\r
34#define TRANSLATION_OUTPUT_SIZE 0x100\r
35\r
36\r
37/**\r
ec01afdb 38 Numbers of nodes in OpenFirmware device paths that are required and examined.\r
2cd086a6 39**/\r
2f9c55cc 40#define REQUIRED_PCI_OFW_NODES 2\r
43336916 41#define REQUIRED_MMIO_OFW_NODES 1\r
2f9c55cc 42#define EXAMINED_OFW_NODES 4\r
2cd086a6 43\r
44\r
45/**\r
46 Simple character classification routines, corresponding to POSIX class names\r
47 and ASCII encoding.\r
48**/\r
49STATIC\r
50BOOLEAN\r
51IsAlnum (\r
52 IN CHAR8 Chr\r
53 )\r
54{\r
55 return (('0' <= Chr && Chr <= '9') ||\r
56 ('A' <= Chr && Chr <= 'Z') ||\r
57 ('a' <= Chr && Chr <= 'z')\r
58 );\r
59}\r
60\r
61\r
62STATIC\r
63BOOLEAN\r
64IsDriverNamePunct (\r
65 IN CHAR8 Chr\r
66 )\r
67{\r
68 return (Chr == ',' || Chr == '.' || Chr == '_' ||\r
69 Chr == '+' || Chr == '-'\r
70 );\r
71}\r
72\r
73\r
74STATIC\r
75BOOLEAN\r
76IsPrintNotDelim (\r
77 IN CHAR8 Chr\r
78 )\r
79{\r
80 return (32 <= Chr && Chr <= 126 &&\r
81 Chr != '/' && Chr != '@' && Chr != ':');\r
82}\r
83\r
84\r
85/**\r
86 Utility types and functions.\r
87**/\r
88typedef struct {\r
89 CONST CHAR8 *Ptr; // not necessarily NUL-terminated\r
90 UINTN Len; // number of non-NUL characters\r
91} SUBSTRING;\r
92\r
93\r
94/**\r
95\r
96 Check if Substring and String have identical contents.\r
97\r
98 The function relies on the restriction that a SUBSTRING cannot have embedded\r
99 NULs either.\r
100\r
101 @param[in] Substring The SUBSTRING input to the comparison.\r
102\r
103 @param[in] String The ASCII string input to the comparison.\r
104\r
105\r
106 @return Whether the inputs have identical contents.\r
107\r
108**/\r
109STATIC\r
110BOOLEAN\r
111SubstringEq (\r
112 IN SUBSTRING Substring,\r
113 IN CONST CHAR8 *String\r
114 )\r
115{\r
116 UINTN Pos;\r
117 CONST CHAR8 *Chr;\r
118\r
119 Pos = 0;\r
120 Chr = String;\r
121\r
122 while (Pos < Substring.Len && Substring.Ptr[Pos] == *Chr) {\r
123 ++Pos;\r
124 ++Chr;\r
125 }\r
126\r
dccf7678 127 return (BOOLEAN)(Pos == Substring.Len && *Chr == '\0');\r
2cd086a6 128}\r
129\r
130\r
131/**\r
132\r
133 Parse a comma-separated list of hexadecimal integers into the elements of an\r
ca0d7c98 134 UINT64 array.\r
2cd086a6 135\r
136 Whitespace, "0x" prefixes, leading or trailing commas, sequences of commas,\r
137 or an empty string are not allowed; they are rejected.\r
138\r
139 The function relies on ASCII encoding.\r
140\r
141 @param[in] UnitAddress The substring to parse.\r
142\r
143 @param[out] Result The array, allocated by the caller, to receive\r
144 the parsed values. This parameter may be NULL if\r
145 NumResults is zero on input.\r
146\r
147 @param[in out] NumResults On input, the number of elements allocated for\r
148 Result. On output, the number of elements it has\r
149 taken (or would have taken) to parse the string\r
150 fully.\r
151\r
152\r
153 @retval RETURN_SUCCESS UnitAddress has been fully parsed.\r
154 NumResults is set to the number of parsed\r
155 values; the corresponding elements have\r
156 been set in Result. The rest of Result's\r
157 elements are unchanged.\r
158\r
159 @retval RETURN_BUFFER_TOO_SMALL UnitAddress has been fully parsed.\r
160 NumResults is set to the number of parsed\r
161 values, but elements have been stored only\r
162 up to the input value of NumResults, which\r
163 is less than what has been parsed.\r
164\r
165 @retval RETURN_INVALID_PARAMETER Parse error. The contents of Results is\r
166 indeterminate. NumResults has not been\r
167 changed.\r
168\r
169**/\r
170STATIC\r
171RETURN_STATUS\r
172ParseUnitAddressHexList (\r
173 IN SUBSTRING UnitAddress,\r
ca0d7c98 174 OUT UINT64 *Result,\r
2cd086a6 175 IN OUT UINTN *NumResults\r
176 )\r
177{\r
178 UINTN Entry; // number of entry currently being parsed\r
ca0d7c98 179 UINT64 EntryVal; // value being constructed for current entry\r
2cd086a6 180 CHAR8 PrevChr; // UnitAddress character previously checked\r
181 UINTN Pos; // current position within UnitAddress\r
182 RETURN_STATUS Status;\r
183\r
184 Entry = 0;\r
185 EntryVal = 0;\r
186 PrevChr = ',';\r
187\r
188 for (Pos = 0; Pos < UnitAddress.Len; ++Pos) {\r
189 CHAR8 Chr;\r
190 INT8 Val;\r
191\r
192 Chr = UnitAddress.Ptr[Pos];\r
193 Val = ('a' <= Chr && Chr <= 'f') ? (Chr - 'a' + 10) :\r
194 ('A' <= Chr && Chr <= 'F') ? (Chr - 'A' + 10) :\r
195 ('0' <= Chr && Chr <= '9') ? (Chr - '0' ) :\r
196 -1;\r
197\r
198 if (Val >= 0) {\r
ca0d7c98 199 if (EntryVal > 0xFFFFFFFFFFFFFFFull) {\r
2cd086a6 200 return RETURN_INVALID_PARAMETER;\r
201 }\r
ca0d7c98 202 EntryVal = LShiftU64 (EntryVal, 4) | Val;\r
2cd086a6 203 } else if (Chr == ',') {\r
204 if (PrevChr == ',') {\r
205 return RETURN_INVALID_PARAMETER;\r
206 }\r
207 if (Entry < *NumResults) {\r
208 Result[Entry] = EntryVal;\r
209 }\r
210 ++Entry;\r
211 EntryVal = 0;\r
212 } else {\r
213 return RETURN_INVALID_PARAMETER;\r
214 }\r
215\r
216 PrevChr = Chr;\r
217 }\r
218\r
219 if (PrevChr == ',') {\r
220 return RETURN_INVALID_PARAMETER;\r
221 }\r
222 if (Entry < *NumResults) {\r
223 Result[Entry] = EntryVal;\r
224 Status = RETURN_SUCCESS;\r
225 } else {\r
226 Status = RETURN_BUFFER_TOO_SMALL;\r
227 }\r
228 ++Entry;\r
229\r
230 *NumResults = Entry;\r
231 return Status;\r
232}\r
233\r
234\r
235/**\r
236 A simple array of Boot Option ID's.\r
237**/\r
238typedef struct {\r
239 UINT16 *Data;\r
240 UINTN Allocated;\r
241 UINTN Produced;\r
242} BOOT_ORDER;\r
243\r
244\r
32a22f09
LE
245/**\r
246 Array element tracking an enumerated boot option that has the\r
247 LOAD_OPTION_ACTIVE attribute.\r
248**/\r
249typedef struct {\r
250 CONST BDS_COMMON_OPTION *BootOption; // reference only, no ownership\r
e13be08e 251 BOOLEAN Appended; // has been added to a BOOT_ORDER?\r
32a22f09
LE
252} ACTIVE_OPTION;\r
253\r
254\r
2cd086a6 255/**\r
256\r
e13be08e 257 Append an active boot option to BootOrder, reallocating the latter if needed.\r
2cd086a6 258\r
259 @param[in out] BootOrder The structure pointing to the array and holding\r
260 allocation and usage counters.\r
261\r
e13be08e
LE
262 @param[in] ActiveOption The active boot option whose ID should be\r
263 appended to the array.\r
2cd086a6 264\r
265\r
e13be08e 266 @retval RETURN_SUCCESS ID of ActiveOption appended.\r
2cd086a6 267\r
268 @retval RETURN_OUT_OF_RESOURCES Memory reallocation failed.\r
269\r
270**/\r
271STATIC\r
272RETURN_STATUS\r
273BootOrderAppend (\r
e13be08e
LE
274 IN OUT BOOT_ORDER *BootOrder,\r
275 IN OUT ACTIVE_OPTION *ActiveOption\r
2cd086a6 276 )\r
277{\r
278 if (BootOrder->Produced == BootOrder->Allocated) {\r
279 UINTN AllocatedNew;\r
280 UINT16 *DataNew;\r
281\r
282 ASSERT (BootOrder->Allocated > 0);\r
283 AllocatedNew = BootOrder->Allocated * 2;\r
284 DataNew = ReallocatePool (\r
285 BootOrder->Allocated * sizeof (*BootOrder->Data),\r
286 AllocatedNew * sizeof (*DataNew),\r
287 BootOrder->Data\r
288 );\r
289 if (DataNew == NULL) {\r
290 return RETURN_OUT_OF_RESOURCES;\r
291 }\r
292 BootOrder->Allocated = AllocatedNew;\r
293 BootOrder->Data = DataNew;\r
294 }\r
295\r
e13be08e
LE
296 BootOrder->Data[BootOrder->Produced++] =\r
297 ActiveOption->BootOption->BootCurrent;\r
298 ActiveOption->Appended = TRUE;\r
2cd086a6 299 return RETURN_SUCCESS;\r
300}\r
301\r
302\r
32a22f09
LE
303/**\r
304\r
305 Create an array of ACTIVE_OPTION elements for a boot option list.\r
306\r
307 @param[in] BootOptionList A boot option list, created with\r
308 BdsLibEnumerateAllBootOption().\r
309\r
310 @param[out] ActiveOption Pointer to the first element in the new array.\r
311 The caller is responsible for freeing the array\r
312 with FreePool() after use.\r
313\r
314 @param[out] Count Number of elements in the new array.\r
315\r
316\r
317 @retval RETURN_SUCCESS The ActiveOption array has been created.\r
318\r
319 @retval RETURN_NOT_FOUND No active entry has been found in\r
320 BootOptionList.\r
321\r
322 @retval RETURN_OUT_OF_RESOURCES Memory allocation failed.\r
323\r
324**/\r
325STATIC\r
326RETURN_STATUS\r
327CollectActiveOptions (\r
328 IN CONST LIST_ENTRY *BootOptionList,\r
329 OUT ACTIVE_OPTION **ActiveOption,\r
330 OUT UINTN *Count\r
331 )\r
332{\r
333 UINTN ScanMode;\r
334\r
335 *ActiveOption = NULL;\r
336\r
337 //\r
338 // Scan the list twice:\r
339 // - count active entries,\r
340 // - store links to active entries.\r
341 //\r
342 for (ScanMode = 0; ScanMode < 2; ++ScanMode) {\r
343 CONST LIST_ENTRY *Link;\r
344\r
345 Link = BootOptionList->ForwardLink;\r
346 *Count = 0;\r
347 while (Link != BootOptionList) {\r
348 CONST BDS_COMMON_OPTION *Current;\r
349\r
350 Current = CR (Link, BDS_COMMON_OPTION, Link, BDS_LOAD_OPTION_SIGNATURE);\r
351 if (IS_LOAD_OPTION_TYPE (Current->Attribute, LOAD_OPTION_ACTIVE)) {\r
352 if (ScanMode == 1) {\r
353 (*ActiveOption)[*Count].BootOption = Current;\r
e13be08e 354 (*ActiveOption)[*Count].Appended = FALSE;\r
32a22f09
LE
355 }\r
356 ++*Count;\r
357 }\r
358 Link = Link->ForwardLink;\r
359 }\r
360\r
361 if (ScanMode == 0) {\r
362 if (*Count == 0) {\r
363 return RETURN_NOT_FOUND;\r
364 }\r
365 *ActiveOption = AllocatePool (*Count * sizeof **ActiveOption);\r
366 if (*ActiveOption == NULL) {\r
367 return RETURN_OUT_OF_RESOURCES;\r
368 }\r
369 }\r
370 }\r
371 return RETURN_SUCCESS;\r
372}\r
373\r
374\r
2cd086a6 375/**\r
376 OpenFirmware device path node\r
377**/\r
378typedef struct {\r
379 SUBSTRING DriverName;\r
380 SUBSTRING UnitAddress;\r
381 SUBSTRING DeviceArguments;\r
382} OFW_NODE;\r
383\r
384\r
385/**\r
386\r
387 Parse an OpenFirmware device path node into the caller-allocated OFW_NODE\r
388 structure, and advance in the input string.\r
389\r
390 The node format is mostly parsed after IEEE 1275-1994, 3.2.1.1 "Node names"\r
391 (a leading slash is expected and not returned):\r
392\r
393 /driver-name@unit-address[:device-arguments][<LF>]\r
394\r
395 A single trailing <LF> character is consumed but not returned. A trailing\r
396 <LF> or NUL character terminates the device path.\r
397\r
398 The function relies on ASCII encoding.\r
399\r
400 @param[in out] Ptr Address of the pointer pointing to the start of the\r
401 node string. After successful parsing *Ptr is set to\r
402 the byte immediately following the consumed\r
403 characters. On error it points to the byte that\r
404 caused the error. The input string is never modified.\r
405\r
406 @param[out] OfwNode The members of this structure point into the input\r
407 string, designating components of the node.\r
408 Separators are never included. If "device-arguments"\r
409 is missing, then DeviceArguments.Ptr is set to NULL.\r
410 All components that are present have nonzero length.\r
411\r
412 If the call doesn't succeed, the contents of this\r
413 structure is indeterminate.\r
414\r
415 @param[out] IsFinal In case of successul parsing, this parameter signals\r
416 whether the node just parsed is the final node in the\r
417 device path. The call after a final node will attempt\r
418 to start parsing the next path. If the call doesn't\r
419 succeed, then this parameter is not changed.\r
420\r
421\r
422 @retval RETURN_SUCCESS Parsing successful.\r
423\r
424 @retval RETURN_NOT_FOUND Parsing terminated. *Ptr was (and is)\r
425 pointing to an empty string.\r
426\r
427 @retval RETURN_INVALID_PARAMETER Parse error.\r
428\r
429**/\r
430STATIC\r
431RETURN_STATUS\r
432ParseOfwNode (\r
433 IN OUT CONST CHAR8 **Ptr,\r
434 OUT OFW_NODE *OfwNode,\r
435 OUT BOOLEAN *IsFinal\r
436 )\r
437{\r
438 //\r
439 // A leading slash is expected. End of string is tolerated.\r
440 //\r
441 switch (**Ptr) {\r
442 case '\0':\r
443 return RETURN_NOT_FOUND;\r
444\r
445 case '/':\r
446 ++*Ptr;\r
447 break;\r
448\r
449 default:\r
450 return RETURN_INVALID_PARAMETER;\r
451 }\r
452\r
453 //\r
454 // driver-name\r
455 //\r
456 OfwNode->DriverName.Ptr = *Ptr;\r
457 OfwNode->DriverName.Len = 0;\r
458 while (OfwNode->DriverName.Len < 32 &&\r
459 (IsAlnum (**Ptr) || IsDriverNamePunct (**Ptr))\r
460 ) {\r
461 ++*Ptr;\r
462 ++OfwNode->DriverName.Len;\r
463 }\r
464\r
465 if (OfwNode->DriverName.Len == 0 || OfwNode->DriverName.Len == 32) {\r
466 return RETURN_INVALID_PARAMETER;\r
467 }\r
468\r
469\r
470 //\r
471 // unit-address\r
472 //\r
473 if (**Ptr != '@') {\r
474 return RETURN_INVALID_PARAMETER;\r
475 }\r
476 ++*Ptr;\r
477\r
478 OfwNode->UnitAddress.Ptr = *Ptr;\r
479 OfwNode->UnitAddress.Len = 0;\r
480 while (IsPrintNotDelim (**Ptr)) {\r
481 ++*Ptr;\r
482 ++OfwNode->UnitAddress.Len;\r
483 }\r
484\r
485 if (OfwNode->UnitAddress.Len == 0) {\r
486 return RETURN_INVALID_PARAMETER;\r
487 }\r
488\r
489\r
490 //\r
491 // device-arguments, may be omitted\r
492 //\r
493 OfwNode->DeviceArguments.Len = 0;\r
494 if (**Ptr == ':') {\r
495 ++*Ptr;\r
496 OfwNode->DeviceArguments.Ptr = *Ptr;\r
497\r
498 while (IsPrintNotDelim (**Ptr)) {\r
499 ++*Ptr;\r
500 ++OfwNode->DeviceArguments.Len;\r
501 }\r
502\r
503 if (OfwNode->DeviceArguments.Len == 0) {\r
504 return RETURN_INVALID_PARAMETER;\r
505 }\r
506 }\r
507 else {\r
508 OfwNode->DeviceArguments.Ptr = NULL;\r
509 }\r
510\r
511 switch (**Ptr) {\r
512 case '\n':\r
513 ++*Ptr;\r
514 //\r
515 // fall through\r
516 //\r
517\r
518 case '\0':\r
519 *IsFinal = TRUE;\r
520 break;\r
521\r
522 case '/':\r
523 *IsFinal = FALSE;\r
524 break;\r
525\r
526 default:\r
527 return RETURN_INVALID_PARAMETER;\r
528 }\r
529\r
530 DEBUG ((\r
531 DEBUG_VERBOSE,\r
532 "%a: DriverName=\"%.*a\" UnitAddress=\"%.*a\" DeviceArguments=\"%.*a\"\n",\r
533 __FUNCTION__,\r
534 OfwNode->DriverName.Len, OfwNode->DriverName.Ptr,\r
535 OfwNode->UnitAddress.Len, OfwNode->UnitAddress.Ptr,\r
536 OfwNode->DeviceArguments.Len,\r
537 OfwNode->DeviceArguments.Ptr == NULL ? "" : OfwNode->DeviceArguments.Ptr\r
538 ));\r
539 return RETURN_SUCCESS;\r
540}\r
541\r
542\r
543/**\r
544\r
2f9c55cc 545 Translate a PCI-like array of OpenFirmware device nodes to a UEFI device path\r
2cd086a6 546 fragment.\r
547\r
548 @param[in] OfwNode Array of OpenFirmware device nodes to\r
549 translate, constituting the beginning of an\r
550 OpenFirmware device path.\r
551\r
552 @param[in] NumNodes Number of elements in OfwNode.\r
553\r
554 @param[out] Translated Destination array receiving the UEFI path\r
555 fragment, allocated by the caller. If the\r
556 return value differs from RETURN_SUCCESS, its\r
557 contents is indeterminate.\r
558\r
559 @param[in out] TranslatedSize On input, the number of CHAR16's in\r
560 Translated. On RETURN_SUCCESS this parameter\r
561 is assigned the number of non-NUL CHAR16's\r
562 written to Translated. In case of other return\r
563 values, TranslatedSize is indeterminate.\r
564\r
565\r
566 @retval RETURN_SUCCESS Translation successful.\r
567\r
568 @retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number\r
569 of bytes provided.\r
570\r
571 @retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't\r
572 be translated in the current implementation.\r
573\r
574**/\r
575STATIC\r
576RETURN_STATUS\r
2f9c55cc 577TranslatePciOfwNodes (\r
2cd086a6 578 IN CONST OFW_NODE *OfwNode,\r
579 IN UINTN NumNodes,\r
580 OUT CHAR16 *Translated,\r
581 IN OUT UINTN *TranslatedSize\r
582 )\r
583{\r
ca0d7c98 584 UINT64 PciDevFun[2];\r
2cd086a6 585 UINTN NumEntries;\r
586 UINTN Written;\r
587\r
588 //\r
589 // Get PCI device and optional PCI function. Assume a single PCI root.\r
590 //\r
2f9c55cc 591 if (NumNodes < REQUIRED_PCI_OFW_NODES ||\r
2cd086a6 592 !SubstringEq (OfwNode[0].DriverName, "pci")\r
593 ) {\r
594 return RETURN_UNSUPPORTED;\r
595 }\r
596 PciDevFun[1] = 0;\r
597 NumEntries = sizeof (PciDevFun) / sizeof (PciDevFun[0]);\r
598 if (ParseUnitAddressHexList (\r
599 OfwNode[1].UnitAddress,\r
600 PciDevFun,\r
601 &NumEntries\r
602 ) != RETURN_SUCCESS\r
603 ) {\r
604 return RETURN_UNSUPPORTED;\r
605 }\r
606\r
ec01afdb 607 if (NumNodes >= 4 &&\r
608 SubstringEq (OfwNode[1].DriverName, "ide") &&\r
2cd086a6 609 SubstringEq (OfwNode[2].DriverName, "drive") &&\r
610 SubstringEq (OfwNode[3].DriverName, "disk")\r
611 ) {\r
612 //\r
613 // OpenFirmware device path (IDE disk, IDE CD-ROM):\r
614 //\r
615 // /pci@i0cf8/ide@1,1/drive@0/disk@0\r
616 // ^ ^ ^ ^ ^\r
617 // | | | | master or slave\r
618 // | | | primary or secondary\r
619 // | PCI slot & function holding IDE controller\r
620 // PCI root at system bus port, PIO\r
621 //\r
622 // UEFI device path:\r
623 //\r
624 // PciRoot(0x0)/Pci(0x1,0x1)/Ata(Primary,Master,0x0)\r
625 // ^\r
626 // fixed LUN\r
627 //\r
ca0d7c98
LE
628 UINT64 Secondary;\r
629 UINT64 Slave;\r
2cd086a6 630\r
631 NumEntries = 1;\r
632 if (ParseUnitAddressHexList (\r
633 OfwNode[2].UnitAddress,\r
634 &Secondary,\r
635 &NumEntries\r
636 ) != RETURN_SUCCESS ||\r
637 Secondary > 1 ||\r
638 ParseUnitAddressHexList (\r
639 OfwNode[3].UnitAddress,\r
640 &Slave,\r
641 &NumEntries // reuse after previous single-element call\r
642 ) != RETURN_SUCCESS ||\r
643 Slave > 1\r
644 ) {\r
645 return RETURN_UNSUPPORTED;\r
646 }\r
647\r
648 Written = UnicodeSPrintAsciiFormat (\r
649 Translated,\r
650 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
ca0d7c98 651 "PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Ata(%a,%a,0x0)",\r
2cd086a6 652 PciDevFun[0],\r
653 PciDevFun[1],\r
654 Secondary ? "Secondary" : "Primary",\r
655 Slave ? "Slave" : "Master"\r
656 );\r
ec01afdb 657 } else if (NumNodes >= 4 &&\r
658 SubstringEq (OfwNode[1].DriverName, "isa") &&\r
2cd086a6 659 SubstringEq (OfwNode[2].DriverName, "fdc") &&\r
660 SubstringEq (OfwNode[3].DriverName, "floppy")\r
661 ) {\r
662 //\r
663 // OpenFirmware device path (floppy disk):\r
664 //\r
665 // /pci@i0cf8/isa@1/fdc@03f0/floppy@0\r
666 // ^ ^ ^ ^\r
667 // | | | A: or B:\r
668 // | | ISA controller io-port (hex)\r
669 // | PCI slot holding ISA controller\r
670 // PCI root at system bus port, PIO\r
671 //\r
672 // UEFI device path:\r
673 //\r
674 // PciRoot(0x0)/Pci(0x1,0x0)/Floppy(0x0)\r
675 // ^\r
676 // ACPI UID\r
677 //\r
ca0d7c98 678 UINT64 AcpiUid;\r
2cd086a6 679\r
680 NumEntries = 1;\r
681 if (ParseUnitAddressHexList (\r
682 OfwNode[3].UnitAddress,\r
683 &AcpiUid,\r
684 &NumEntries\r
685 ) != RETURN_SUCCESS ||\r
686 AcpiUid > 1\r
687 ) {\r
688 return RETURN_UNSUPPORTED;\r
689 }\r
690\r
691 Written = UnicodeSPrintAsciiFormat (\r
692 Translated,\r
693 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
ca0d7c98 694 "PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Floppy(0x%Lx)",\r
2cd086a6 695 PciDevFun[0],\r
696 PciDevFun[1],\r
697 AcpiUid\r
698 );\r
e06a4cd1 699 } else if (NumNodes >= 3 &&\r
700 SubstringEq (OfwNode[1].DriverName, "scsi") &&\r
701 SubstringEq (OfwNode[2].DriverName, "disk")\r
702 ) {\r
703 //\r
704 // OpenFirmware device path (virtio-blk disk):\r
705 //\r
706 // /pci@i0cf8/scsi@6[,3]/disk@0,0\r
707 // ^ ^ ^ ^ ^\r
708 // | | | fixed\r
709 // | | PCI function corresponding to disk (optional)\r
710 // | PCI slot holding disk\r
711 // PCI root at system bus port, PIO\r
712 //\r
713 // UEFI device path prefix:\r
714 //\r
715 // PciRoot(0x0)/Pci(0x6,0x0)/HD( -- if PCI function is 0 or absent\r
716 // PciRoot(0x0)/Pci(0x6,0x3)/HD( -- if PCI function is present and nonzero\r
717 //\r
718 Written = UnicodeSPrintAsciiFormat (\r
719 Translated,\r
720 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
ca0d7c98 721 "PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/HD(",\r
e06a4cd1 722 PciDevFun[0],\r
723 PciDevFun[1]\r
724 );\r
d2bf9913 725 } else if (NumNodes >= 4 &&\r
726 SubstringEq (OfwNode[1].DriverName, "scsi") &&\r
727 SubstringEq (OfwNode[2].DriverName, "channel") &&\r
728 SubstringEq (OfwNode[3].DriverName, "disk")\r
729 ) {\r
730 //\r
731 // OpenFirmware device path (virtio-scsi disk):\r
732 //\r
733 // /pci@i0cf8/scsi@7[,3]/channel@0/disk@2,3\r
734 // ^ ^ ^ ^ ^\r
735 // | | | | LUN\r
736 // | | | target\r
737 // | | channel (unused, fixed 0)\r
738 // | PCI slot[, function] holding SCSI controller\r
739 // PCI root at system bus port, PIO\r
740 //\r
741 // UEFI device path prefix:\r
742 //\r
743 // PciRoot(0x0)/Pci(0x7,0x0)/Scsi(0x2,0x3)\r
744 // -- if PCI function is 0 or absent\r
745 // PciRoot(0x0)/Pci(0x7,0x3)/Scsi(0x2,0x3)\r
746 // -- if PCI function is present and nonzero\r
747 //\r
ca0d7c98 748 UINT64 TargetLun[2];\r
d2bf9913 749\r
750 TargetLun[1] = 0;\r
751 NumEntries = sizeof (TargetLun) / sizeof (TargetLun[0]);\r
752 if (ParseUnitAddressHexList (\r
753 OfwNode[3].UnitAddress,\r
754 TargetLun,\r
755 &NumEntries\r
756 ) != RETURN_SUCCESS\r
757 ) {\r
758 return RETURN_UNSUPPORTED;\r
759 }\r
760\r
761 Written = UnicodeSPrintAsciiFormat (\r
762 Translated,\r
763 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
ca0d7c98 764 "PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Scsi(0x%Lx,0x%Lx)",\r
d2bf9913 765 PciDevFun[0],\r
766 PciDevFun[1],\r
767 TargetLun[0],\r
768 TargetLun[1]\r
769 );\r
3f4b1489 770 } else {\r
e7a7e480 771 //\r
3f4b1489 772 // Generic OpenFirmware device path for PCI devices:\r
e7a7e480 773 //\r
3f4b1489
PB
774 // /pci@i0cf8/ethernet@3[,2]\r
775 // ^ ^\r
e7a7e480 776 // | PCI slot[, function] holding Ethernet card\r
777 // PCI root at system bus port, PIO\r
778 //\r
779 // UEFI device path prefix (dependent on presence of nonzero PCI function):\r
780 //\r
3f4b1489
PB
781 // PciRoot(0x0)/Pci(0x3,0x0)\r
782 // PciRoot(0x0)/Pci(0x3,0x2)\r
e7a7e480 783 //\r
784 Written = UnicodeSPrintAsciiFormat (\r
785 Translated,\r
786 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
ca0d7c98 787 "PciRoot(0x0)/Pci(0x%Lx,0x%Lx)",\r
e7a7e480 788 PciDevFun[0],\r
789 PciDevFun[1]\r
790 );\r
cdde6ddf 791 }\r
2cd086a6 792\r
793 //\r
794 // There's no way to differentiate between "completely used up without\r
795 // truncation" and "truncated", so treat the former as the latter, and return\r
796 // success only for "some room left unused".\r
797 //\r
798 if (Written + 1 < *TranslatedSize) {\r
799 *TranslatedSize = Written;\r
800 return RETURN_SUCCESS;\r
801 }\r
802\r
803 return RETURN_BUFFER_TOO_SMALL;\r
804}\r
805\r
806\r
43336916
LE
807//\r
808// A type providing easy raw access to the base address of a virtio-mmio\r
809// transport.\r
810//\r
811typedef union {\r
812 UINT64 Uint64;\r
813 UINT8 Raw[8];\r
814} VIRTIO_MMIO_BASE_ADDRESS;\r
815\r
816\r
817/**\r
818\r
819 Translate an MMIO-like array of OpenFirmware device nodes to a UEFI device\r
820 path fragment.\r
821\r
822 @param[in] OfwNode Array of OpenFirmware device nodes to\r
823 translate, constituting the beginning of an\r
824 OpenFirmware device path.\r
825\r
826 @param[in] NumNodes Number of elements in OfwNode.\r
827\r
828 @param[out] Translated Destination array receiving the UEFI path\r
829 fragment, allocated by the caller. If the\r
830 return value differs from RETURN_SUCCESS, its\r
831 contents is indeterminate.\r
832\r
833 @param[in out] TranslatedSize On input, the number of CHAR16's in\r
834 Translated. On RETURN_SUCCESS this parameter\r
835 is assigned the number of non-NUL CHAR16's\r
836 written to Translated. In case of other return\r
837 values, TranslatedSize is indeterminate.\r
838\r
839\r
840 @retval RETURN_SUCCESS Translation successful.\r
841\r
842 @retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number\r
843 of bytes provided.\r
844\r
845 @retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't\r
846 be translated in the current implementation.\r
847\r
848**/\r
849STATIC\r
850RETURN_STATUS\r
851TranslateMmioOfwNodes (\r
852 IN CONST OFW_NODE *OfwNode,\r
853 IN UINTN NumNodes,\r
854 OUT CHAR16 *Translated,\r
855 IN OUT UINTN *TranslatedSize\r
856 )\r
857{\r
858 VIRTIO_MMIO_BASE_ADDRESS VirtioMmioBase;\r
859 CHAR16 VenHwString[60 + 1];\r
860 UINTN NumEntries;\r
861 UINTN Written;\r
862\r
863 //\r
864 // Get the base address of the virtio-mmio transport.\r
865 //\r
866 if (NumNodes < REQUIRED_MMIO_OFW_NODES ||\r
867 !SubstringEq (OfwNode[0].DriverName, "virtio-mmio")\r
868 ) {\r
869 return RETURN_UNSUPPORTED;\r
870 }\r
871 NumEntries = 1;\r
872 if (ParseUnitAddressHexList (\r
873 OfwNode[0].UnitAddress,\r
874 &VirtioMmioBase.Uint64,\r
875 &NumEntries\r
876 ) != RETURN_SUCCESS\r
877 ) {\r
878 return RETURN_UNSUPPORTED;\r
879 }\r
880\r
881 UnicodeSPrintAsciiFormat (VenHwString, sizeof VenHwString,\r
882 "VenHw(%g,%02X%02X%02X%02X%02X%02X%02X%02X)", &gVirtioMmioTransportGuid,\r
883 VirtioMmioBase.Raw[0], VirtioMmioBase.Raw[1], VirtioMmioBase.Raw[2],\r
884 VirtioMmioBase.Raw[3], VirtioMmioBase.Raw[4], VirtioMmioBase.Raw[5],\r
885 VirtioMmioBase.Raw[6], VirtioMmioBase.Raw[7]);\r
886\r
887 if (NumNodes >= 2 &&\r
888 SubstringEq (OfwNode[1].DriverName, "disk")) {\r
889 //\r
890 // OpenFirmware device path (virtio-blk disk):\r
891 //\r
892 // /virtio-mmio@000000000a003c00/disk@0,0\r
893 // ^ ^ ^\r
894 // | fixed\r
895 // base address of virtio-mmio register block\r
896 //\r
897 // UEFI device path prefix:\r
898 //\r
899 // <VenHwString>/HD(\r
900 //\r
901 Written = UnicodeSPrintAsciiFormat (\r
902 Translated,\r
903 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
904 "%s/HD(",\r
905 VenHwString\r
906 );\r
907 } else if (NumNodes >= 3 &&\r
908 SubstringEq (OfwNode[1].DriverName, "channel") &&\r
909 SubstringEq (OfwNode[2].DriverName, "disk")) {\r
910 //\r
911 // OpenFirmware device path (virtio-scsi disk):\r
912 //\r
913 // /virtio-mmio@000000000a003a00/channel@0/disk@2,3\r
914 // ^ ^ ^ ^\r
915 // | | | LUN\r
916 // | | target\r
917 // | channel (unused, fixed 0)\r
918 // base address of virtio-mmio register block\r
919 //\r
920 // UEFI device path prefix:\r
921 //\r
922 // <VenHwString>/Scsi(0x2,0x3)\r
923 //\r
924 UINT64 TargetLun[2];\r
925\r
926 TargetLun[1] = 0;\r
927 NumEntries = sizeof (TargetLun) / sizeof (TargetLun[0]);\r
928 if (ParseUnitAddressHexList (\r
929 OfwNode[2].UnitAddress,\r
930 TargetLun,\r
931 &NumEntries\r
932 ) != RETURN_SUCCESS\r
933 ) {\r
934 return RETURN_UNSUPPORTED;\r
935 }\r
936\r
937 Written = UnicodeSPrintAsciiFormat (\r
938 Translated,\r
939 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
940 "%s/Scsi(0x%Lx,0x%Lx)",\r
941 VenHwString,\r
942 TargetLun[0],\r
943 TargetLun[1]\r
944 );\r
945 } else if (NumNodes >= 2 &&\r
946 SubstringEq (OfwNode[1].DriverName, "ethernet-phy")) {\r
947 //\r
948 // OpenFirmware device path (virtio-net NIC):\r
949 //\r
950 // /virtio-mmio@000000000a003e00/ethernet-phy@0\r
951 // ^ ^\r
952 // | fixed\r
953 // base address of virtio-mmio register block\r
954 //\r
955 // UEFI device path prefix (dependent on presence of nonzero PCI function):\r
956 //\r
957 // <VenHwString>/MAC(\r
958 //\r
959 Written = UnicodeSPrintAsciiFormat (\r
960 Translated,\r
961 *TranslatedSize * sizeof (*Translated), // BufferSize in bytes\r
962 "%s/MAC(",\r
963 VenHwString\r
964 );\r
965 } else {\r
966 return RETURN_UNSUPPORTED;\r
967 }\r
968\r
969 //\r
970 // There's no way to differentiate between "completely used up without\r
971 // truncation" and "truncated", so treat the former as the latter, and return\r
972 // success only for "some room left unused".\r
973 //\r
974 if (Written + 1 < *TranslatedSize) {\r
975 *TranslatedSize = Written;\r
976 return RETURN_SUCCESS;\r
977 }\r
978\r
979 return RETURN_BUFFER_TOO_SMALL;\r
980}\r
981\r
982\r
2f9c55cc
LE
983/**\r
984\r
985 Translate an array of OpenFirmware device nodes to a UEFI device path\r
986 fragment.\r
987\r
988 @param[in] OfwNode Array of OpenFirmware device nodes to\r
989 translate, constituting the beginning of an\r
990 OpenFirmware device path.\r
991\r
992 @param[in] NumNodes Number of elements in OfwNode.\r
993\r
994 @param[out] Translated Destination array receiving the UEFI path\r
995 fragment, allocated by the caller. If the\r
996 return value differs from RETURN_SUCCESS, its\r
997 contents is indeterminate.\r
998\r
999 @param[in out] TranslatedSize On input, the number of CHAR16's in\r
1000 Translated. On RETURN_SUCCESS this parameter\r
1001 is assigned the number of non-NUL CHAR16's\r
1002 written to Translated. In case of other return\r
1003 values, TranslatedSize is indeterminate.\r
1004\r
1005\r
1006 @retval RETURN_SUCCESS Translation successful.\r
1007\r
1008 @retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number\r
1009 of bytes provided.\r
1010\r
1011 @retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't\r
1012 be translated in the current implementation.\r
1013\r
1014**/\r
1015STATIC\r
1016RETURN_STATUS\r
1017TranslateOfwNodes (\r
1018 IN CONST OFW_NODE *OfwNode,\r
1019 IN UINTN NumNodes,\r
1020 OUT CHAR16 *Translated,\r
1021 IN OUT UINTN *TranslatedSize\r
1022 )\r
1023{\r
1024 RETURN_STATUS Status;\r
1025\r
1026 Status = RETURN_UNSUPPORTED;\r
1027\r
1028 if (FeaturePcdGet (PcdQemuBootOrderPciTranslation)) {\r
1029 Status = TranslatePciOfwNodes (OfwNode, NumNodes, Translated,\r
1030 TranslatedSize);\r
1031 }\r
43336916
LE
1032 if (Status == RETURN_UNSUPPORTED &&\r
1033 FeaturePcdGet (PcdQemuBootOrderMmioTranslation)) {\r
1034 Status = TranslateMmioOfwNodes (OfwNode, NumNodes, Translated,\r
1035 TranslatedSize);\r
1036 }\r
2f9c55cc
LE
1037 return Status;\r
1038}\r
1039\r
2cd086a6 1040/**\r
1041\r
1042 Translate an OpenFirmware device path fragment to a UEFI device path\r
1043 fragment, and advance in the input string.\r
1044\r
1045 @param[in out] Ptr Address of the pointer pointing to the start\r
1046 of the path string. After successful\r
1047 translation (RETURN_SUCCESS) or at least\r
1048 successful parsing (RETURN_UNSUPPORTED,\r
1049 RETURN_BUFFER_TOO_SMALL), *Ptr is set to the\r
1050 byte immediately following the consumed\r
1051 characters. In other error cases, it points to\r
1052 the byte that caused the error.\r
1053\r
1054 @param[out] Translated Destination array receiving the UEFI path\r
1055 fragment, allocated by the caller. If the\r
1056 return value differs from RETURN_SUCCESS, its\r
1057 contents is indeterminate.\r
1058\r
1059 @param[in out] TranslatedSize On input, the number of CHAR16's in\r
1060 Translated. On RETURN_SUCCESS this parameter\r
1061 is assigned the number of non-NUL CHAR16's\r
1062 written to Translated. In case of other return\r
1063 values, TranslatedSize is indeterminate.\r
1064\r
1065\r
1066 @retval RETURN_SUCCESS Translation successful.\r
1067\r
1068 @retval RETURN_BUFFER_TOO_SMALL The OpenFirmware device path was parsed\r
1069 successfully, but its translation did not\r
1070 fit into the number of bytes provided.\r
1071 Further calls to this function are\r
1072 possible.\r
1073\r
1074 @retval RETURN_UNSUPPORTED The OpenFirmware device path was parsed\r
1075 successfully, but it can't be translated in\r
1076 the current implementation. Further calls\r
1077 to this function are possible.\r
1078\r
c3cf8daa
LE
1079 @retval RETURN_NOT_FOUND Translation terminated. On input, *Ptr was\r
1080 pointing to the empty string or "HALT". On\r
1081 output, *Ptr points to the empty string\r
1082 (ie. "HALT" is consumed transparently when\r
1083 present).\r
2cd086a6 1084\r
1085 @retval RETURN_INVALID_PARAMETER Parse error. This is a permanent error.\r
1086\r
1087**/\r
1088STATIC\r
1089RETURN_STATUS\r
1090TranslateOfwPath (\r
1091 IN OUT CONST CHAR8 **Ptr,\r
1092 OUT CHAR16 *Translated,\r
1093 IN OUT UINTN *TranslatedSize\r
1094 )\r
1095{\r
1096 UINTN NumNodes;\r
1097 RETURN_STATUS Status;\r
ec01afdb 1098 OFW_NODE Node[EXAMINED_OFW_NODES];\r
2cd086a6 1099 BOOLEAN IsFinal;\r
1100 OFW_NODE Skip;\r
1101\r
489c3142 1102 IsFinal = FALSE;\r
2cd086a6 1103 NumNodes = 0;\r
c3cf8daa
LE
1104 if (AsciiStrCmp (*Ptr, "HALT") == 0) {\r
1105 *Ptr += 4;\r
1106 Status = RETURN_NOT_FOUND;\r
1107 } else {\r
1108 Status = ParseOfwNode (Ptr, &Node[NumNodes], &IsFinal);\r
1109 }\r
2cd086a6 1110\r
1111 if (Status == RETURN_NOT_FOUND) {\r
1112 DEBUG ((DEBUG_VERBOSE, "%a: no more nodes\n", __FUNCTION__));\r
1113 return RETURN_NOT_FOUND;\r
1114 }\r
1115\r
1116 while (Status == RETURN_SUCCESS && !IsFinal) {\r
1117 ++NumNodes;\r
1118 Status = ParseOfwNode (\r
1119 Ptr,\r
ec01afdb 1120 (NumNodes < EXAMINED_OFW_NODES) ? &Node[NumNodes] : &Skip,\r
2cd086a6 1121 &IsFinal\r
1122 );\r
1123 }\r
1124\r
1125 switch (Status) {\r
1126 case RETURN_SUCCESS:\r
1127 ++NumNodes;\r
1128 break;\r
1129\r
1130 case RETURN_INVALID_PARAMETER:\r
1131 DEBUG ((DEBUG_VERBOSE, "%a: parse error\n", __FUNCTION__));\r
1132 return RETURN_INVALID_PARAMETER;\r
1133\r
1134 default:\r
1135 ASSERT (0);\r
1136 }\r
1137\r
1138 Status = TranslateOfwNodes (\r
1139 Node,\r
ec01afdb 1140 NumNodes < EXAMINED_OFW_NODES ? NumNodes : EXAMINED_OFW_NODES,\r
2cd086a6 1141 Translated,\r
1142 TranslatedSize);\r
1143 switch (Status) {\r
1144 case RETURN_SUCCESS:\r
1145 DEBUG ((DEBUG_VERBOSE, "%a: success: \"%s\"\n", __FUNCTION__, Translated));\r
1146 break;\r
1147\r
1148 case RETURN_BUFFER_TOO_SMALL:\r
1149 DEBUG ((DEBUG_VERBOSE, "%a: buffer too small\n", __FUNCTION__));\r
1150 break;\r
1151\r
1152 case RETURN_UNSUPPORTED:\r
1153 DEBUG ((DEBUG_VERBOSE, "%a: unsupported\n", __FUNCTION__));\r
1154 break;\r
1155\r
1156 default:\r
1157 ASSERT (0);\r
1158 }\r
1159 return Status;\r
1160}\r
1161\r
1162\r
1163/**\r
1164\r
1165 Convert the UEFI DevicePath to full text representation with DevPathToText,\r
1166 then match the UEFI device path fragment in Translated against it.\r
1167\r
1168 @param[in] Translated UEFI device path fragment, translated from\r
1169 OpenFirmware format, to search for.\r
1170\r
1171 @param[in] TranslatedLength The length of Translated in CHAR16's.\r
1172\r
1173 @param[in] DevicePath Boot option device path whose textual rendering\r
1174 to search in.\r
1175\r
1176 @param[in] DevPathToText Binary-to-text conversion protocol for DevicePath.\r
1177\r
1178\r
1179 @retval TRUE If Translated was found at the beginning of DevicePath after\r
1180 converting the latter to text.\r
1181\r
1182 @retval FALSE If DevicePath was NULL, or it could not be converted, or there\r
1183 was no match.\r
1184\r
1185**/\r
1186STATIC\r
1187BOOLEAN\r
1188Match (\r
1189 IN CONST CHAR16 *Translated,\r
1190 IN UINTN TranslatedLength,\r
863986b3 1191 IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath\r
2cd086a6 1192 )\r
1193{\r
1194 CHAR16 *Converted;\r
1195 BOOLEAN Result;\r
1196\r
863986b3
RN
1197 Converted = ConvertDevicePathToText (\r
1198 DevicePath,\r
1199 FALSE, // DisplayOnly\r
1200 FALSE // AllowShortcuts\r
1201 );\r
2cd086a6 1202 if (Converted == NULL) {\r
1203 return FALSE;\r
1204 }\r
1205\r
64378ce1
LE
1206 //\r
1207 // Attempt to expand any relative UEFI device path starting with HD() to an\r
1208 // absolute device path first. The logic imitates BdsLibBootViaBootOption().\r
1209 // We don't have to free the absolute device path,\r
1210 // BdsExpandPartitionPartialDevicePathToFull() has internal caching.\r
1211 //\r
1212 Result = FALSE;\r
1213 if (DevicePathType (DevicePath) == MEDIA_DEVICE_PATH &&\r
1214 DevicePathSubType (DevicePath) == MEDIA_HARDDRIVE_DP) {\r
1215 EFI_DEVICE_PATH_PROTOCOL *AbsDevicePath;\r
1216 CHAR16 *AbsConverted;\r
1217\r
1218 AbsDevicePath = BdsExpandPartitionPartialDevicePathToFull (\r
1219 (HARDDRIVE_DEVICE_PATH *) DevicePath);\r
1220 if (AbsDevicePath == NULL) {\r
1221 goto Exit;\r
1222 }\r
1223 AbsConverted = ConvertDevicePathToText (AbsDevicePath, FALSE, FALSE);\r
1224 if (AbsConverted == NULL) {\r
1225 goto Exit;\r
1226 }\r
1227 DEBUG ((DEBUG_VERBOSE,\r
1228 "%a: expanded relative device path \"%s\" for prefix matching\n",\r
1229 __FUNCTION__, Converted));\r
1230 FreePool (Converted);\r
1231 Converted = AbsConverted;\r
1232 }\r
1233\r
2cd086a6 1234 //\r
1235 // Is Translated a prefix of Converted?\r
1236 //\r
dccf7678 1237 Result = (BOOLEAN)(StrnCmp (Converted, Translated, TranslatedLength) == 0);\r
2cd086a6 1238 DEBUG ((\r
1239 DEBUG_VERBOSE,\r
1240 "%a: against \"%s\": %a\n",\r
1241 __FUNCTION__,\r
1242 Converted,\r
1243 Result ? "match" : "no match"\r
1244 ));\r
64378ce1 1245Exit:\r
2cd086a6 1246 FreePool (Converted);\r
1247 return Result;\r
1248}\r
1249\r
1250\r
838b5b00
LE
1251/**\r
1252 Append some of the unselected active boot options to the boot order.\r
1253\r
1254 This function should accommodate any further policy changes in "boot option\r
1255 survival". Currently we're adding back everything that starts with neither\r
43336916 1256 PciRoot() nor HD() nor a virtio-mmio VenHw() node.\r
838b5b00
LE
1257\r
1258 @param[in,out] BootOrder The structure holding the boot order to\r
1259 complete. The caller is responsible for\r
1260 initializing (and potentially populating) it\r
1261 before calling this function.\r
1262\r
1263 @param[in,out] ActiveOption The array of active boot options to scan.\r
1264 Entries marked as Appended will be skipped.\r
1265 Those of the rest that satisfy the survival\r
1266 policy will be added to BootOrder with\r
1267 BootOrderAppend().\r
1268\r
1269 @param[in] ActiveCount Number of elements in ActiveOption.\r
1270\r
1271\r
1272 @retval RETURN_SUCCESS BootOrder has been extended with any eligible boot\r
1273 options.\r
1274\r
1275 @return Error codes returned by BootOrderAppend().\r
1276**/\r
1277STATIC\r
1278RETURN_STATUS\r
1279BootOrderComplete (\r
1280 IN OUT BOOT_ORDER *BootOrder,\r
1281 IN OUT ACTIVE_OPTION *ActiveOption,\r
1282 IN UINTN ActiveCount\r
1283 )\r
1284{\r
1285 RETURN_STATUS Status;\r
1286 UINTN Idx;\r
1287\r
1288 Status = RETURN_SUCCESS;\r
1289 Idx = 0;\r
1290 while (!RETURN_ERROR (Status) && Idx < ActiveCount) {\r
1291 if (!ActiveOption[Idx].Appended) {\r
1292 CONST BDS_COMMON_OPTION *Current;\r
1293 CONST EFI_DEVICE_PATH_PROTOCOL *FirstNode;\r
1294\r
1295 Current = ActiveOption[Idx].BootOption;\r
1296 FirstNode = Current->DevicePath;\r
1297 if (FirstNode != NULL) {\r
1298 CHAR16 *Converted;\r
1299 STATIC CHAR16 ConvFallBack[] = L"<unable to convert>";\r
1300 BOOLEAN Keep;\r
1301\r
1302 Converted = ConvertDevicePathToText (FirstNode, FALSE, FALSE);\r
1303 if (Converted == NULL) {\r
1304 Converted = ConvFallBack;\r
1305 }\r
1306\r
1307 Keep = TRUE;\r
1308 if (DevicePathType(FirstNode) == MEDIA_DEVICE_PATH &&\r
1309 DevicePathSubType(FirstNode) == MEDIA_HARDDRIVE_DP) {\r
1310 //\r
1311 // drop HD()\r
1312 //\r
1313 Keep = FALSE;\r
1314 } else if (DevicePathType(FirstNode) == ACPI_DEVICE_PATH &&\r
1315 DevicePathSubType(FirstNode) == ACPI_DP) {\r
1316 ACPI_HID_DEVICE_PATH *Acpi;\r
1317\r
1318 Acpi = (ACPI_HID_DEVICE_PATH *) FirstNode;\r
1319 if ((Acpi->HID & PNP_EISA_ID_MASK) == PNP_EISA_ID_CONST &&\r
1320 EISA_ID_TO_NUM (Acpi->HID) == 0x0a03) {\r
1321 //\r
2f9c55cc
LE
1322 // drop PciRoot() if we enabled the user to select PCI-like boot\r
1323 // options, by providing translation for such OFW device path\r
1324 // fragments\r
838b5b00 1325 //\r
2f9c55cc 1326 Keep = !FeaturePcdGet (PcdQemuBootOrderPciTranslation);\r
838b5b00 1327 }\r
43336916
LE
1328 } else if (DevicePathType(FirstNode) == HARDWARE_DEVICE_PATH &&\r
1329 DevicePathSubType(FirstNode) == HW_VENDOR_DP) {\r
1330 VENDOR_DEVICE_PATH *VenHw;\r
1331\r
1332 VenHw = (VENDOR_DEVICE_PATH *)FirstNode;\r
1333 if (CompareGuid (&VenHw->Guid, &gVirtioMmioTransportGuid)) {\r
1334 //\r
1335 // drop virtio-mmio if we enabled the user to select boot options\r
1336 // referencing such device paths\r
1337 //\r
1338 Keep = !FeaturePcdGet (PcdQemuBootOrderMmioTranslation);\r
1339 }\r
838b5b00
LE
1340 }\r
1341\r
1342 if (Keep) {\r
1343 Status = BootOrderAppend (BootOrder, &ActiveOption[Idx]);\r
1344 if (!RETURN_ERROR (Status)) {\r
1345 DEBUG ((DEBUG_VERBOSE, "%a: keeping \"%s\"\n", __FUNCTION__,\r
1346 Converted));\r
1347 }\r
1348 } else {\r
1349 DEBUG ((DEBUG_VERBOSE, "%a: dropping \"%s\"\n", __FUNCTION__,\r
1350 Converted));\r
1351 }\r
1352\r
1353 if (Converted != ConvFallBack) {\r
1354 FreePool (Converted);\r
1355 }\r
1356 }\r
1357 }\r
1358 ++Idx;\r
1359 }\r
1360 return Status;\r
1361}\r
1362\r
1363\r
1c9135a2
LE
1364/**\r
1365 Delete Boot#### variables that stand for such active boot options that have\r
1366 been dropped (ie. have not been selected by either matching or "survival\r
1367 policy").\r
1368\r
1369 @param[in] ActiveOption The array of active boot options to scan. Each\r
1370 entry not marked as appended will trigger the\r
1371 deletion of the matching Boot#### variable.\r
1372\r
1373 @param[in] ActiveCount Number of elements in ActiveOption.\r
1374**/\r
1375STATIC\r
1376VOID\r
1377PruneBootVariables (\r
1378 IN CONST ACTIVE_OPTION *ActiveOption,\r
1379 IN UINTN ActiveCount\r
1380 )\r
1381{\r
1382 UINTN Idx;\r
1383\r
1384 for (Idx = 0; Idx < ActiveCount; ++Idx) {\r
1385 if (!ActiveOption[Idx].Appended) {\r
1386 CHAR16 VariableName[9];\r
1387\r
1388 UnicodeSPrintAsciiFormat (VariableName, sizeof VariableName, "Boot%04x",\r
1389 ActiveOption[Idx].BootOption->BootCurrent);\r
1390\r
1391 //\r
1392 // "The space consumed by the deleted variable may not be available until\r
1393 // the next power cycle", but that's good enough.\r
1394 //\r
1395 gRT->SetVariable (VariableName, &gEfiGlobalVariableGuid,\r
1396 0, // Attributes, 0 means deletion\r
1397 0, // DataSize, 0 means deletion\r
1398 NULL // Data\r
1399 );\r
1400 }\r
1401 }\r
1402}\r
1403\r
1404\r
2cd086a6 1405/**\r
1406\r
1407 Set the boot order based on configuration retrieved from QEMU.\r
1408\r
1409 Attempt to retrieve the "bootorder" fw_cfg file from QEMU. Translate the\r
1410 OpenFirmware device paths therein to UEFI device path fragments. Match the\r
1411 translated fragments against BootOptionList, and rewrite the BootOrder NvVar\r
1412 so that it corresponds to the order described in fw_cfg.\r
1413\r
1414 @param[in] BootOptionList A boot option list, created with\r
1415 BdsLibEnumerateAllBootOption ().\r
1416\r
1417\r
1418 @retval RETURN_SUCCESS BootOrder NvVar rewritten.\r
1419\r
1420 @retval RETURN_UNSUPPORTED QEMU's fw_cfg is not supported.\r
1421\r
1422 @retval RETURN_NOT_FOUND Empty or nonexistent "bootorder" fw_cfg\r
1423 file, or no match found between the\r
1424 "bootorder" fw_cfg file and BootOptionList.\r
1425\r
1426 @retval RETURN_INVALID_PARAMETER Parse error in the "bootorder" fw_cfg file.\r
1427\r
1428 @retval RETURN_OUT_OF_RESOURCES Memory allocation failed.\r
1429\r
1430 @return Values returned by gBS->LocateProtocol ()\r
1431 or gRT->SetVariable ().\r
1432\r
1433**/\r
1434RETURN_STATUS\r
1435SetBootOrderFromQemu (\r
1436 IN CONST LIST_ENTRY *BootOptionList\r
1437 )\r
1438{\r
1439 RETURN_STATUS Status;\r
2cd086a6 1440 FIRMWARE_CONFIG_ITEM FwCfgItem;\r
1441 UINTN FwCfgSize;\r
1442 CHAR8 *FwCfg;\r
1443 CONST CHAR8 *FwCfgPtr;\r
1444\r
1445 BOOT_ORDER BootOrder;\r
32a22f09
LE
1446 ACTIVE_OPTION *ActiveOption;\r
1447 UINTN ActiveCount;\r
2cd086a6 1448\r
1449 UINTN TranslatedSize;\r
1450 CHAR16 Translated[TRANSLATION_OUTPUT_SIZE];\r
1451\r
2cd086a6 1452 Status = QemuFwCfgFindFile ("bootorder", &FwCfgItem, &FwCfgSize);\r
1453 if (Status != RETURN_SUCCESS) {\r
1454 return Status;\r
1455 }\r
1456\r
1457 if (FwCfgSize == 0) {\r
1458 return RETURN_NOT_FOUND;\r
1459 }\r
1460\r
1461 FwCfg = AllocatePool (FwCfgSize);\r
1462 if (FwCfg == NULL) {\r
1463 return RETURN_OUT_OF_RESOURCES;\r
1464 }\r
1465\r
1466 QemuFwCfgSelectItem (FwCfgItem);\r
1467 QemuFwCfgReadBytes (FwCfgSize, FwCfg);\r
1468 if (FwCfg[FwCfgSize - 1] != '\0') {\r
1469 Status = RETURN_INVALID_PARAMETER;\r
1470 goto ErrorFreeFwCfg;\r
1471 }\r
1472\r
1473 DEBUG ((DEBUG_VERBOSE, "%a: FwCfg:\n", __FUNCTION__));\r
1474 DEBUG ((DEBUG_VERBOSE, "%a\n", FwCfg));\r
1475 DEBUG ((DEBUG_VERBOSE, "%a: FwCfg: <end>\n", __FUNCTION__));\r
1476 FwCfgPtr = FwCfg;\r
1477\r
1478 BootOrder.Produced = 0;\r
1479 BootOrder.Allocated = 1;\r
1480 BootOrder.Data = AllocatePool (\r
1481 BootOrder.Allocated * sizeof (*BootOrder.Data)\r
1482 );\r
1483 if (BootOrder.Data == NULL) {\r
1484 Status = RETURN_OUT_OF_RESOURCES;\r
1485 goto ErrorFreeFwCfg;\r
1486 }\r
1487\r
32a22f09
LE
1488 Status = CollectActiveOptions (BootOptionList, &ActiveOption, &ActiveCount);\r
1489 if (RETURN_ERROR (Status)) {\r
1490 goto ErrorFreeBootOrder;\r
1491 }\r
1492\r
2cd086a6 1493 //\r
1494 // translate each OpenFirmware path\r
1495 //\r
1496 TranslatedSize = sizeof (Translated) / sizeof (Translated[0]);\r
1497 Status = TranslateOfwPath (&FwCfgPtr, Translated, &TranslatedSize);\r
1498 while (Status == RETURN_SUCCESS ||\r
1499 Status == RETURN_UNSUPPORTED ||\r
1500 Status == RETURN_BUFFER_TOO_SMALL) {\r
1501 if (Status == RETURN_SUCCESS) {\r
32a22f09 1502 UINTN Idx;\r
2cd086a6 1503\r
1504 //\r
32a22f09 1505 // match translated OpenFirmware path against all active boot options\r
2cd086a6 1506 //\r
32a22f09
LE
1507 for (Idx = 0; Idx < ActiveCount; ++Idx) {\r
1508 if (Match (\r
2cd086a6 1509 Translated,\r
1510 TranslatedSize, // contains length, not size, in CHAR16's here\r
32a22f09 1511 ActiveOption[Idx].BootOption->DevicePath\r
2cd086a6 1512 )\r
1513 ) {\r
1514 //\r
1515 // match found, store ID and continue with next OpenFirmware path\r
1516 //\r
e13be08e 1517 Status = BootOrderAppend (&BootOrder, &ActiveOption[Idx]);\r
2cd086a6 1518 if (Status != RETURN_SUCCESS) {\r
32a22f09 1519 goto ErrorFreeActiveOption;\r
2cd086a6 1520 }\r
1521 break;\r
1522 }\r
32a22f09 1523 } // scanned all active boot options\r
2cd086a6 1524 } // translation successful\r
1525\r
1526 TranslatedSize = sizeof (Translated) / sizeof (Translated[0]);\r
1527 Status = TranslateOfwPath (&FwCfgPtr, Translated, &TranslatedSize);\r
1528 } // scanning of OpenFirmware paths done\r
1529\r
1530 if (Status == RETURN_NOT_FOUND && BootOrder.Produced > 0) {\r
1531 //\r
1532 // No more OpenFirmware paths, some matches found: rewrite BootOrder NvVar.\r
838b5b00
LE
1533 // Some of the active boot options that have not been selected over fw_cfg\r
1534 // should be preserved at the end of the boot order.\r
1535 //\r
1536 Status = BootOrderComplete (&BootOrder, ActiveOption, ActiveCount);\r
1537 if (RETURN_ERROR (Status)) {\r
1538 goto ErrorFreeActiveOption;\r
1539 }\r
1540\r
1541 //\r
2cd086a6 1542 // See Table 10 in the UEFI Spec 2.3.1 with Errata C for the required\r
1543 // attributes.\r
1544 //\r
1545 Status = gRT->SetVariable (\r
1546 L"BootOrder",\r
1547 &gEfiGlobalVariableGuid,\r
1548 EFI_VARIABLE_NON_VOLATILE |\r
1549 EFI_VARIABLE_BOOTSERVICE_ACCESS |\r
1550 EFI_VARIABLE_RUNTIME_ACCESS,\r
1551 BootOrder.Produced * sizeof (*BootOrder.Data),\r
1552 BootOrder.Data\r
1553 );\r
1c9135a2
LE
1554 if (EFI_ERROR (Status)) {\r
1555 DEBUG ((DEBUG_ERROR, "%a: setting BootOrder: %r\n", __FUNCTION__, Status));\r
1556 goto ErrorFreeActiveOption;\r
1557 }\r
1558\r
1559 DEBUG ((DEBUG_INFO, "%a: setting BootOrder: success\n", __FUNCTION__));\r
1560 PruneBootVariables (ActiveOption, ActiveCount);\r
2cd086a6 1561 }\r
1562\r
32a22f09
LE
1563ErrorFreeActiveOption:\r
1564 FreePool (ActiveOption);\r
1565\r
2cd086a6 1566ErrorFreeBootOrder:\r
1567 FreePool (BootOrder.Data);\r
1568\r
1569ErrorFreeFwCfg:\r
1570 FreePool (FwCfg);\r
1571\r
1572 return Status;\r
1573}\r
9253c14d
LE
1574\r
1575\r
1576/**\r
1577 Calculate the number of seconds we should be showing the FrontPage progress\r
1578 bar for.\r
1579\r
1580 @return The TimeoutDefault argument for PlatformBdsEnterFrontPage().\r
1581**/\r
1582UINT16\r
1583GetFrontPageTimeoutFromQemu (\r
1584 VOID\r
1585 )\r
1586{\r
1587 FIRMWARE_CONFIG_ITEM BootMenuWaitItem;\r
1588 UINTN BootMenuWaitSize;\r
1589\r
1590 QemuFwCfgSelectItem (QemuFwCfgItemBootMenu);\r
1591 if (QemuFwCfgRead16 () == 0) {\r
1592 //\r
1593 // The user specified "-boot menu=off", or didn't specify "-boot\r
1594 // menu=(on|off)" at all. Return the platform default.\r
1595 //\r
1596 return PcdGet16 (PcdPlatformBootTimeOut);\r
1597 }\r
1598\r
1599 if (RETURN_ERROR (QemuFwCfgFindFile ("etc/boot-menu-wait", &BootMenuWaitItem,\r
1600 &BootMenuWaitSize)) ||\r
1601 BootMenuWaitSize != sizeof (UINT16)) {\r
1602 //\r
1603 // "-boot menu=on" was specified without "splash-time=N". In this case,\r
1604 // return three seconds if the platform default would cause us to skip the\r
1605 // front page, and return the platform default otherwise.\r
1606 //\r
1607 UINT16 Timeout;\r
1608\r
1609 Timeout = PcdGet16 (PcdPlatformBootTimeOut);\r
1610 if (Timeout == 0) {\r
1611 Timeout = 3;\r
1612 }\r
1613 return Timeout;\r
1614 }\r
1615\r
1616 //\r
1617 // "-boot menu=on,splash-time=N" was specified, where N is in units of\r
1618 // milliseconds. The Intel BDS Front Page progress bar only supports whole\r
1619 // seconds, round N up.\r
1620 //\r
1621 QemuFwCfgSelectItem (BootMenuWaitItem);\r
1622 return (UINT16)((QemuFwCfgRead16 () + 999) / 1000);\r
1623}\r