-/*++\r
-\r
-Copyright (c) 2006 - 2007, Intel Corporation \r
+/** @file\r
+ Pei Core Load Image Support\r
+ \r
+Copyright (c) 2006 - 2010, Intel Corporation \r
All rights reserved. This program and the accompanying materials \r
are licensed and made available under the terms and conditions of the BSD License \r
which accompanies this distribution. The full text of the license may be found at \r
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
\r
-Module Name:\r
+**/\r
\r
- Image.c\r
+#include "PeiMain.h"\r
\r
-Abstract:\r
\r
- Pei Core Load Image Support\r
+EFI_PEI_LOAD_FILE_PPI mPeiLoadImagePpi = {\r
+ PeiLoadImageLoadImageWrapper\r
+};\r
\r
---*/\r
\r
-//\r
-// Include common header file for this module.\r
-//\r
-#include "CommonHeader.h"\r
+EFI_PEI_PPI_DESCRIPTOR gPpiLoadFilePpiList = {\r
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+ &gEfiPeiLoadFilePpiGuid,\r
+ &mPeiLoadImagePpi\r
+};\r
\r
-#include <PeiMain.h>\r
+/**\r
\r
+ Support routine for the PE/COFF Loader that reads a buffer from a PE/COFF file\r
\r
\r
+ @param FileHandle - The handle to the PE/COFF file\r
+ @param FileOffset - The offset, in bytes, into the file to read\r
+ @param ReadSize - The number of bytes to read from the file starting at FileOffset\r
+ @param Buffer - A pointer to the buffer to read the data into.\r
+\r
+ @return EFI_SUCCESS - ReadSize bytes of data were read into Buffer from the PE/COFF file starting at FileOffset\r
+\r
+**/\r
EFI_STATUS\r
-PeiLoadImage (\r
- IN EFI_PEI_SERVICES **PeiServices,\r
- IN EFI_FFS_FILE_HEADER *PeimFileHeader,\r
- OUT VOID **EntryPoint\r
+EFIAPI\r
+PeiImageRead (\r
+ IN VOID *FileHandle,\r
+ IN UINTN FileOffset,\r
+ IN UINTN *ReadSize,\r
+ OUT VOID *Buffer\r
+ )\r
+{\r
+ CHAR8 *Destination8;\r
+ CHAR8 *Source8;\r
+ UINTN Length;\r
+\r
+ Destination8 = Buffer;\r
+ Source8 = (CHAR8 *) ((UINTN) FileHandle + FileOffset);\r
+ if (Destination8 != Source8) {\r
+ Length = *ReadSize;\r
+ while ((Length--) > 0) {\r
+ *(Destination8++) = *(Source8++);\r
+ }\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+\r
+ Support routine to get the Image read file function.\r
+\r
+ @param ImageContext - The context of the image being loaded\r
+\r
+ @retval EFI_SUCCESS - If Image function location is found\r
+\r
+**/\r
+EFI_STATUS\r
+GetImageReadFunction (\r
+ IN PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext\r
+ )\r
+{\r
+ PEI_CORE_INSTANCE *Private;\r
+ VOID* MemoryBuffer;\r
+\r
+ Private = PEI_CORE_INSTANCE_FROM_PS_THIS (GetPeiServicesTablePointer ());\r
+\r
+ if (!Private->PeiMemoryInstalled || (Private->HobList.HandoffInformationTable->BootMode == BOOT_ON_S3_RESUME)) {\r
+ ImageContext->ImageRead = PeiImageRead;\r
+ } else {\r
+ MemoryBuffer = AllocatePages (0x400 / EFI_PAGE_SIZE + 1);\r
+ ASSERT (MemoryBuffer != NULL);\r
+\r
+ CopyMem (MemoryBuffer, (CONST VOID *) (UINTN) PeiImageRead, 0x400);\r
+\r
+ ImageContext->ImageRead = (PE_COFF_LOADER_READ_FILE) (UINTN) MemoryBuffer;\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+\r
+ Loads and relocates a PE/COFF image into memory.\r
+ If the image is not relocatable, it will not be loaded into memory and be loaded as XIP image.\r
+\r
+ @param Pe32Data - The base address of the PE/COFF file that is to be loaded and relocated\r
+ @param ImageAddress - The base address of the relocated PE/COFF image\r
+ @param ImageSize - The size of the relocated PE/COFF image\r
+ @param EntryPoint - The entry point of the relocated PE/COFF image\r
+\r
+ @retval EFI_SUCCESS The file was loaded and relocated\r
+ @retval EFI_OUT_OF_RESOURCES There was not enough memory to load and relocate the PE/COFF file\r
+\r
+**/\r
+EFI_STATUS\r
+LoadAndRelocatePeCoffImage (\r
+ IN VOID *Pe32Data,\r
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddress,\r
+ OUT UINT64 *ImageSize,\r
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint\r
)\r
-/*++\r
+{\r
+ EFI_STATUS Status;\r
+ PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;\r
+ PEI_CORE_INSTANCE *Private;\r
+\r
+ Private = PEI_CORE_INSTANCE_FROM_PS_THIS (GetPeiServicesTablePointer ());\r
+\r
+ ZeroMem (&ImageContext, sizeof (ImageContext));\r
+ ImageContext.Handle = Pe32Data;\r
+ Status = GetImageReadFunction (&ImageContext);\r
+\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ Status = PeCoffLoaderGetImageInfo (&ImageContext);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+ //\r
+ // When Image has no reloc section, it can't be relocated into memory.\r
+ //\r
+ if (ImageContext.RelocationsStripped && (Private->PeiMemoryInstalled) && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME)) {\r
+ DEBUG ((EFI_D_INFO, "The image at 0x%08x without reloc section can't be loaded into memory\n", (UINTN) Pe32Data));\r
+ }\r
+\r
+ //\r
+ // Set default base address to current image address.\r
+ //\r
+ ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) Pe32Data;\r
+ \r
+ //\r
+ // Allocate Memory for the image when memory is ready, boot mode is not S3, and image is relocatable.\r
+ //\r
+ if ((!ImageContext.RelocationsStripped) && (Private->PeiMemoryInstalled) && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME)) {\r
+ ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) AllocatePages (EFI_SIZE_TO_PAGES ((UINT32) ImageContext.ImageSize));\r
+ ASSERT (ImageContext.ImageAddress != 0);\r
+ if (ImageContext.ImageAddress == 0) {\r
+ return EFI_OUT_OF_RESOURCES;\r
+ }\r
+ \r
+ //\r
+ // Skip the reserved space for the stripped PeHeader when load TeImage into memory.\r
+ //\r
+ if (ImageContext.IsTeImage) {\r
+ ImageContext.ImageAddress = ImageContext.ImageAddress + \r
+ ((EFI_TE_IMAGE_HEADER *) Pe32Data)->StrippedSize -\r
+ sizeof (EFI_TE_IMAGE_HEADER);\r
+ }\r
+ }\r
\r
-Routine Description:\r
+ //\r
+ // Load the image to our new buffer\r
+ //\r
+ Status = PeCoffLoaderLoadImage (&ImageContext);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+ //\r
+ // Relocate the image in our new buffer\r
+ //\r
+ Status = PeCoffLoaderRelocateImage (&ImageContext);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+\r
+ //\r
+ // Flush the instruction cache so the image data is written before we execute it\r
+ //\r
+ if ((!ImageContext.RelocationsStripped) && (Private->PeiMemoryInstalled) && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME)) {\r
+ InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);\r
+ }\r
\r
- Routine for loading file image.\r
+ *ImageAddress = ImageContext.ImageAddress;\r
+ *ImageSize = ImageContext.ImageSize;\r
+ *EntryPoint = ImageContext.EntryPoint;\r
\r
-Arguments:\r
+ return EFI_SUCCESS;\r
+}\r
\r
- PeiServices - The PEI core services table.\r
- PeimFileHeader - Pointer to the FFS file header of the image.\r
- EntryPoint - Pointer to entry point of specified image file for output.\r
+/**\r
+ Loads a PEIM into memory for subsequent execution. If there are compressed \r
+ images or images that need to be relocated into memory for performance reasons, \r
+ this service performs that transformation.\r
\r
-Returns:\r
+ @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation\r
+ @param FileHandle Pointer to the FFS file header of the image.\r
+ @param ImageAddressArg Pointer to PE/TE image.\r
+ @param ImageSizeArg Size of PE/TE image.\r
+ @param EntryPoint Pointer to entry point of specified image file for output.\r
+ @param AuthenticationState - Pointer to attestation authentication state of image.\r
\r
- Status - EFI_SUCCESS - Image is successfully loaded.\r
- EFI_NOT_FOUND - Fail to locate necessary PPI\r
- Others - Fail to load file.\r
+ @retval EFI_SUCCESS Image is successfully loaded.\r
+ @retval EFI_NOT_FOUND Fail to locate necessary PPI.\r
+ @retval EFI_UNSUPPORTED Image Machine Type is not supported.\r
\r
---*/\r
+**/\r
+EFI_STATUS\r
+PeiLoadImageLoadImage (\r
+ IN CONST EFI_PEI_SERVICES **PeiServices,\r
+ IN EFI_PEI_FILE_HANDLE FileHandle,\r
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL\r
+ OUT UINT64 *ImageSizeArg, OPTIONAL\r
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
+ OUT UINT32 *AuthenticationState\r
+ )\r
{\r
EFI_STATUS Status;\r
VOID *Pe32Data;\r
- EFI_PEI_FV_FILE_LOADER_PPI *FvLoadFilePpi;\r
EFI_PHYSICAL_ADDRESS ImageAddress;\r
UINT64 ImageSize;\r
EFI_PHYSICAL_ADDRESS ImageEntryPoint;\r
- EFI_TE_IMAGE_HEADER *TEImageHeader;\r
UINT16 Machine;\r
+ EFI_SECTION_TYPE SearchType1;\r
+ EFI_SECTION_TYPE SearchType2;\r
\r
- *EntryPoint = NULL;\r
- TEImageHeader = NULL;\r
+ *EntryPoint = 0;\r
+ ImageSize = 0;\r
+ *AuthenticationState = 0;\r
+\r
+ if (FeaturePcdGet (PcdPeiCoreImageLoaderSearchTeSectionFirst)) {\r
+ SearchType1 = EFI_SECTION_TE;\r
+ SearchType2 = EFI_SECTION_PE32;\r
+ } else {\r
+ SearchType1 = EFI_SECTION_PE32;\r
+ SearchType2 = EFI_SECTION_TE;\r
+ }\r
\r
//\r
- // Try to find a PE32 section.\r
+ // Try to find a first exe section (if PcdPeiCoreImageLoaderSearchTeSectionFirst \r
+ // is true, TE will be searched first).\r
//\r
Status = PeiServicesFfsFindSectionData (\r
- EFI_SECTION_PE32,\r
- PeimFileHeader,\r
+ SearchType1,\r
+ FileHandle,\r
&Pe32Data\r
);\r
//\r
- // If we didn't find a PE32 section, try to find a TE section.\r
+ // If we didn't find a first exe section, try to find the second exe section.\r
//\r
if (EFI_ERROR (Status)) {\r
Status = PeiServicesFfsFindSectionData (\r
- EFI_SECTION_TE,\r
- PeimFileHeader,\r
- (VOID **) &TEImageHeader\r
+ SearchType2,\r
+ FileHandle,\r
+ &Pe32Data\r
);\r
- if (EFI_ERROR (Status) || TEImageHeader == NULL) {\r
+ if (EFI_ERROR (Status)) {\r
//\r
- // There was not a PE32 or a TE section, so assume that it's a Compressed section\r
- // and use the LoadFile\r
+ // PEI core only carry the loader function fro TE and PE32 executables\r
+ // If this two section does not exist, just return.\r
//\r
- Status = PeiServicesLocatePpi (\r
- &gEfiPeiFvFileLoaderPpiGuid,\r
- 0,\r
- NULL,\r
- (VOID **)&FvLoadFilePpi\r
- );\r
- if (EFI_ERROR (Status)) {\r
- return EFI_NOT_FOUND;\r
- }\r
+ return Status;\r
+ }\r
+ }\r
+ \r
+ //\r
+ // If memory is installed, perform the shadow operations\r
+ //\r
+ Status = LoadAndRelocatePeCoffImage (\r
+ Pe32Data,\r
+ &ImageAddress,\r
+ &ImageSize,\r
+ &ImageEntryPoint\r
+ );\r
\r
- Status = FvLoadFilePpi->FvLoadFile (\r
- FvLoadFilePpi,\r
- PeimFileHeader,\r
- &ImageAddress,\r
- &ImageSize,\r
- &ImageEntryPoint\r
- );\r
+ ASSERT_EFI_ERROR (Status);\r
\r
- if (EFI_ERROR (Status)) {\r
- return EFI_NOT_FOUND;\r
- }\r
\r
- //\r
- // Got the entry point from ImageEntryPoint and ImageStartAddress\r
- //\r
- Pe32Data = (VOID *) ((UINTN) ImageAddress);\r
- *EntryPoint = (VOID *) ((UINTN) ImageEntryPoint);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+\r
+ //\r
+ // Got the entry point from the loaded Pe32Data\r
+ //\r
+ Pe32Data = (VOID *) ((UINTN) ImageAddress);\r
+ *EntryPoint = ImageEntryPoint;\r
+ \r
+ Machine = PeCoffLoaderGetMachineType (Pe32Data);\r
+ \r
+ if (!EFI_IMAGE_MACHINE_TYPE_SUPPORTED (Machine)) {\r
+ if (!EFI_IMAGE_MACHINE_CROSS_TYPE_SUPPORTED (Machine)) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ }\r
+\r
+ if (ImageAddressArg != NULL) {\r
+ *ImageAddressArg = ImageAddress;\r
+ }\r
+\r
+ if (ImageSizeArg != NULL) {\r
+ *ImageSizeArg = ImageSize;\r
+ }\r
+ \r
+ DEBUG_CODE_BEGIN ();\r
+ CHAR8 *AsciiString;\r
+ CHAR8 AsciiBuffer[512];\r
+ INT32 Index;\r
+ INT32 Index1;\r
+\r
+ //\r
+ // Print debug message: Loading PEIM at 0x12345678 EntryPoint=0x12345688 Driver.efi\r
+ //\r
+ if (Machine != EFI_IMAGE_MACHINE_IA64) {\r
+ DEBUG ((EFI_D_INFO | EFI_D_LOAD, "Loading PEIM at 0x%11p EntryPoint=0x%11p ", (VOID *)(UINTN)ImageAddress, (VOID *)(UINTN)*EntryPoint));\r
} else {\r
//\r
- // Retrieve the entry point from the TE image header\r
+ // For IPF Image, the real entry point should be print.\r
//\r
- ImageAddress = (EFI_PHYSICAL_ADDRESS) (UINTN) TEImageHeader;\r
- *EntryPoint = (VOID *)((UINTN) TEImageHeader + sizeof (EFI_TE_IMAGE_HEADER) +\r
- TEImageHeader->AddressOfEntryPoint - TEImageHeader->StrippedSize);\r
+ DEBUG ((EFI_D_INFO | EFI_D_LOAD, "Loading PEIM at 0x%11p EntryPoint=0x%11p ", (VOID *)(UINTN)ImageAddress, (VOID *)(UINTN)(*(UINT64 *)(UINTN)*EntryPoint)));\r
}\r
- } else {\r
+ \r
//\r
- // Retrieve the entry point from the PE/COFF image header\r
+ // Print Module Name by PeImage PDB file name.\r
//\r
- ImageAddress = (EFI_PHYSICAL_ADDRESS) (UINTN) Pe32Data;\r
- Status = PeCoffLoaderGetEntryPoint (Pe32Data, EntryPoint);\r
- if (EFI_ERROR (Status)) {\r
- return EFI_NOT_FOUND;\r
+ AsciiString = PeCoffLoaderGetPdbPointer (Pe32Data);\r
+ \r
+ if (AsciiString != NULL) {\r
+ for (Index = (INT32) AsciiStrLen (AsciiString) - 1; Index >= 0; Index --) {\r
+ if (AsciiString[Index] == '\\') {\r
+ break;\r
+ }\r
+ }\r
+\r
+ if (Index != 0) {\r
+ for (Index1 = 0; AsciiString[Index + 1 + Index1] != '.'; Index1 ++) {\r
+ AsciiBuffer [Index1] = AsciiString[Index + 1 + Index1];\r
+ }\r
+ AsciiBuffer [Index1] = '\0';\r
+ DEBUG ((EFI_D_INFO | EFI_D_LOAD, "%a.efi", AsciiBuffer));\r
+ }\r
}\r
- }\r
\r
- if (((EFI_TE_IMAGE_HEADER *) (UINTN) ImageAddress)->Signature == EFI_TE_IMAGE_HEADER_SIGNATURE) {\r
- TEImageHeader = (EFI_TE_IMAGE_HEADER *) (UINTN) ImageAddress;\r
- Machine = TEImageHeader->Machine;\r
+ DEBUG_CODE_END ();\r
+\r
+ DEBUG ((EFI_D_INFO | EFI_D_LOAD, "\n"));\r
+\r
+ return EFI_SUCCESS;\r
+\r
+}\r
+\r
+\r
+/**\r
+ The wrapper function of PeiLoadImageLoadImage().\r
+\r
+ @param This - Pointer to EFI_PEI_LOAD_FILE_PPI.\r
+ @param FileHandle - Pointer to the FFS file header of the image.\r
+ @param ImageAddressArg - Pointer to PE/TE image.\r
+ @param ImageSizeArg - Size of PE/TE image.\r
+ @param EntryPoint - Pointer to entry point of specified image file for output.\r
+ @param AuthenticationState - Pointer to attestation authentication state of image.\r
+\r
+ @return Status of PeiLoadImageLoadImage().\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+PeiLoadImageLoadImageWrapper (\r
+ IN CONST EFI_PEI_LOAD_FILE_PPI *This,\r
+ IN EFI_PEI_FILE_HANDLE FileHandle,\r
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL\r
+ OUT UINT64 *ImageSizeArg, OPTIONAL\r
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
+ OUT UINT32 *AuthenticationState\r
+ )\r
+{\r
+ return PeiLoadImageLoadImage (\r
+ GetPeiServicesTablePointer (),\r
+ FileHandle,\r
+ ImageAddressArg,\r
+ ImageSizeArg,\r
+ EntryPoint,\r
+ AuthenticationState\r
+ );\r
+}\r
+\r
+/**\r
+ Check whether the input image has the relocation.\r
+\r
+ @param Pe32Data Pointer to the PE/COFF or TE image.\r
+\r
+ @retval TRUE Relocation is stripped.\r
+ @retval FALSE Relocation is not stripped.\r
+\r
+**/\r
+BOOLEAN\r
+RelocationIsStrip (\r
+ IN VOID *Pe32Data\r
+ )\r
+{\r
+ EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr;\r
+ EFI_IMAGE_DOS_HEADER *DosHdr;\r
+\r
+ ASSERT (Pe32Data != NULL);\r
+\r
+ DosHdr = (EFI_IMAGE_DOS_HEADER *)Pe32Data;\r
+ if (DosHdr->e_magic == EFI_IMAGE_DOS_SIGNATURE) {\r
+ //\r
+ // DOS image header is present, so read the PE header after the DOS image header.\r
+ //\r
+ Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)((UINTN) Pe32Data + (UINTN) ((DosHdr->e_lfanew) & 0x0ffff));\r
} else {\r
- Machine = PeCoffLoaderGetMachineType (Pe32Data);\r
- } \r
- \r
- if (!EFI_IMAGE_MACHINE_TYPE_SUPPORTED (Machine)) {\r
- return EFI_UNSUPPORTED; \r
+ //\r
+ // DOS image header is not present, so PE header is at the image base.\r
+ //\r
+ Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)Pe32Data;\r
}\r
\r
//\r
- // Print debug message: Loading PEIM at 0x12345678 EntryPoint=0x12345688 Driver.efi\r
+ // Three cases with regards to relocations:\r
+ // - Image has base relocs, RELOCS_STRIPPED==0 => image is relocatable\r
+ // - Image has no base relocs, RELOCS_STRIPPED==1 => Image is not relocatable\r
+ // - Image has no base relocs, RELOCS_STRIPPED==0 => Image is relocatable but\r
+ // has no base relocs to apply\r
+ // Obviously having base relocations with RELOCS_STRIPPED==1 is invalid.\r
//\r
- DEBUG ((EFI_D_INFO | EFI_D_LOAD, "Loading PEIM at 0x%08x EntryPoint=0x%08x ", (UINTN) ImageAddress, *EntryPoint));\r
- DEBUG_CODE_BEGIN ();\r
- EFI_IMAGE_DATA_DIRECTORY *DirectoryEntry;\r
- EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *DebugEntry;\r
- UINTN DirCount;\r
- UINTN Index;\r
- UINTN Index1;\r
- BOOLEAN FileNameFound;\r
- CHAR8 *AsciiString;\r
- CHAR8 AsciiBuffer[512];\r
- VOID *CodeViewEntryPointer;\r
- INTN TEImageAdjust;\r
- EFI_IMAGE_DOS_HEADER *DosHeader;\r
- EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr;\r
- UINT32 NumberOfRvaAndSizes;\r
-\r
- Hdr.Pe32 = NULL;\r
- if (TEImageHeader == NULL) {\r
- DosHeader = (EFI_IMAGE_DOS_HEADER *)Pe32Data;\r
- if (DosHeader->e_magic == EFI_IMAGE_DOS_SIGNATURE) {\r
+ // Look at the file header to determine if relocations have been stripped, and\r
+ // save this info in the image context for later use.\r
+ //\r
+ if (Hdr.Te->Signature == EFI_TE_IMAGE_HEADER_SIGNATURE) {\r
+ if ((Hdr.Te->DataDirectory[0].Size == 0) && (Hdr.Te->DataDirectory[0].VirtualAddress == 0)) {\r
+ return TRUE;\r
+ } else {\r
+ return FALSE;\r
+ }\r
+ } else if (Hdr.Pe32->Signature == EFI_IMAGE_NT_SIGNATURE) {\r
+ if ((Hdr.Pe32->FileHeader.Characteristics & EFI_IMAGE_FILE_RELOCS_STRIPPED) != 0) {\r
+ return TRUE;\r
+ } else {\r
+ return FALSE;\r
+ }\r
+ }\r
+\r
+ return FALSE;\r
+}\r
+\r
+/**\r
+ Routine to load image file for subsequent execution by LoadFile Ppi.\r
+ If any LoadFile Ppi is not found, the build-in support function for the PE32+/TE \r
+ XIP image format is used.\r
+\r
+ @param PeiServices - An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation\r
+ @param FileHandle - Pointer to the FFS file header of the image.\r
+ @param PeimState - The dispatch state of the input PEIM handle.\r
+ @param EntryPoint - Pointer to entry point of specified image file for output.\r
+ @param AuthenticationState - Pointer to attestation authentication state of image.\r
+\r
+ @retval EFI_SUCCESS - Image is successfully loaded.\r
+ @retval EFI_NOT_FOUND - Fail to locate necessary PPI\r
+ @retval Others - Fail to load file.\r
+\r
+**/\r
+EFI_STATUS\r
+PeiLoadImage (\r
+ IN CONST EFI_PEI_SERVICES **PeiServices,\r
+ IN EFI_PEI_FILE_HANDLE FileHandle,\r
+ IN UINT8 PeimState,\r
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
+ OUT UINT32 *AuthenticationState\r
+ )\r
+{\r
+ EFI_STATUS PpiStatus;\r
+ EFI_STATUS Status;\r
+ UINTN Index;\r
+ EFI_PEI_LOAD_FILE_PPI *LoadFile;\r
+ EFI_PHYSICAL_ADDRESS ImageAddress;\r
+ UINT64 ImageSize;\r
+ BOOLEAN IsStrip;\r
+\r
+ IsStrip = FALSE;\r
+ //\r
+ // If any instances of PEI_LOAD_FILE_PPI are installed, they are called.\r
+ // one at a time, until one reports EFI_SUCCESS.\r
+ //\r
+ Index = 0;\r
+ do {\r
+ PpiStatus = PeiServicesLocatePpi (\r
+ &gEfiPeiLoadFilePpiGuid,\r
+ Index,\r
+ NULL,\r
+ (VOID **)&LoadFile\r
+ );\r
+ if (!EFI_ERROR (PpiStatus)) {\r
+ Status = LoadFile->LoadFile (\r
+ LoadFile, \r
+ FileHandle, \r
+ &ImageAddress, \r
+ &ImageSize,\r
+ EntryPoint,\r
+ AuthenticationState\r
+ );\r
+ if (!EFI_ERROR (Status)) {\r
//\r
- // DOS image header is present, so read the PE header after the DOS image header\r
+ // The shadowed PEIM must be relocatable.\r
//\r
- Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)((UINTN)Pe32Data + (UINTN)((DosHeader->e_lfanew) & 0x0ffff));\r
- } else {\r
+ if (PeimState == PEIM_STATE_REGISITER_FOR_SHADOW) {\r
+ IsStrip = RelocationIsStrip ((VOID *) (UINTN) ImageAddress);\r
+ ASSERT (!IsStrip);\r
+ if (IsStrip) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ }\r
+\r
//\r
- // DOS image header is not present, so PE header is at the image base\r
+ // The image to be started must have the machine type supported by PeiCore.\r
//\r
- Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)Pe32Data;\r
+ ASSERT (EFI_IMAGE_MACHINE_TYPE_SUPPORTED (PeCoffLoaderGetMachineType ((VOID *) (UINTN) ImageAddress)));\r
+ if (!EFI_IMAGE_MACHINE_TYPE_SUPPORTED (PeCoffLoaderGetMachineType ((VOID *) (UINTN) ImageAddress))) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ return Status;\r
}\r
}\r
+ Index++;\r
+ } while (!EFI_ERROR (PpiStatus));\r
+\r
+ return PpiStatus;\r
+}\r
+\r
+\r
+/**\r
+\r
+ Install Pei Load File PPI.\r
\r
+\r
+ @param PrivateData - Pointer to PEI_CORE_INSTANCE.\r
+ @param OldCoreData - Pointer to PEI_CORE_INSTANCE.\r
+\r
+**/\r
+VOID\r
+InitializeImageServices (\r
+ IN PEI_CORE_INSTANCE *PrivateData,\r
+ IN PEI_CORE_INSTANCE *OldCoreData\r
+ )\r
+{\r
+ if (OldCoreData == NULL) {\r
//\r
- // Find the codeview info in the image and display the file name\r
- // being loaded.\r
+ // The first time we are XIP (running from FLASH). We need to remember the\r
+ // FLASH address so we can reinstall the memory version that runs faster\r
//\r
- // Per the PE/COFF spec, you can't assume that a given data directory\r
- // is present in the image. You have to check the NumberOfRvaAndSizes in\r
- // the optional header to verify a desired directory entry is there.\r
+ PrivateData->XipLoadFile = &gPpiLoadFilePpiList;\r
+ PeiServicesInstallPpi (PrivateData->XipLoadFile);\r
+ } else {\r
//\r
- DebugEntry = NULL;\r
- DirectoryEntry = NULL;\r
- NumberOfRvaAndSizes = 0;\r
- TEImageAdjust = 0;\r
- \r
- if (TEImageHeader == NULL) {\r
- if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) {\r
- // \r
- // Use PE32 offset get Debug Directory Entry\r
- //\r
- NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes;\r
- DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_DEBUG]);\r
- DebugEntry = (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *) ((UINTN) Pe32Data + DirectoryEntry->VirtualAddress);\r
- } else if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC) {\r
- // \r
- // Use PE32+ offset get Debug Directory Entry\r
- //\r
- NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes;\r
- DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_DEBUG]);\r
- DebugEntry = (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *) ((UINTN) Pe32Data + DirectoryEntry->VirtualAddress);\r
- }\r
+ // 2nd time we are running from memory so replace the XIP version with the \r
+ // new memory version. \r
+ //\r
+ PeiServicesReInstallPpi (PrivateData->XipLoadFile, &gPpiLoadFilePpiList); \r
+ }\r
+}\r
\r
- if (NumberOfRvaAndSizes <= EFI_IMAGE_DIRECTORY_ENTRY_DEBUG) {\r
- DirectoryEntry = NULL;\r
- DebugEntry = NULL;\r
- }\r
- } else {\r
- if (TEImageHeader->DataDirectory[EFI_TE_IMAGE_DIRECTORY_ENTRY_DEBUG].VirtualAddress != 0) {\r
- DirectoryEntry = &TEImageHeader->DataDirectory[EFI_TE_IMAGE_DIRECTORY_ENTRY_DEBUG];\r
- TEImageAdjust = sizeof (EFI_TE_IMAGE_HEADER) - TEImageHeader->StrippedSize;\r
- DebugEntry = (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *)((UINTN) TEImageHeader +\r
- TEImageHeader->DataDirectory[EFI_TE_IMAGE_DIRECTORY_ENTRY_DEBUG].VirtualAddress +\r
- TEImageAdjust);\r
- }\r
- }\r
\r
- if (DebugEntry != NULL && DirectoryEntry != NULL) {\r
- for (DirCount = 0; DirCount < DirectoryEntry->Size; DirCount += sizeof(EFI_IMAGE_DEBUG_DIRECTORY_ENTRY), DebugEntry++) {\r
- if (DebugEntry->Type == EFI_IMAGE_DEBUG_TYPE_CODEVIEW) {\r
- if (DebugEntry->SizeOfData > 0) {\r
- CodeViewEntryPointer = (VOID *) ((UINTN) DebugEntry->RVA + (UINTN) ImageAddress + (UINTN)TEImageAdjust);\r
- switch (* (UINT32 *) CodeViewEntryPointer) {\r
- case CODEVIEW_SIGNATURE_NB10:\r
- AsciiString = (CHAR8 *)CodeViewEntryPointer + sizeof (EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY);\r
- break;\r
-\r
- case CODEVIEW_SIGNATURE_RSDS:\r
- AsciiString = (CHAR8 *)CodeViewEntryPointer + sizeof (EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY);\r
- break;\r
-\r
- default:\r
- AsciiString = NULL;\r
- break;\r
- }\r
- if (AsciiString != NULL) {\r
- FileNameFound = FALSE;\r
- for (Index = 0, Index1 = 0; AsciiString[Index] != '\0'; Index++) {\r
- if (AsciiString[Index] == '\\') {\r
- Index1 = Index;\r
- FileNameFound = TRUE;\r
- }\r
- }\r
-\r
- if (FileNameFound) {\r
- for (Index = Index1 + 1; AsciiString[Index] != '.'; Index++) {\r
- AsciiBuffer[Index - (Index1 + 1)] = AsciiString[Index];\r
- }\r
- AsciiBuffer[Index - (Index1 + 1)] = 0;\r
- DEBUG ((EFI_D_INFO | EFI_D_LOAD, "%a.efi", AsciiBuffer));\r
- break;\r
- }\r
- }\r
- }\r
- }\r
- }\r
- }\r
- DEBUG_CODE_END ();\r
\r
- DEBUG ((EFI_D_INFO | EFI_D_LOAD, "\n"));\r
\r
- return EFI_SUCCESS;\r
-}\r