1 // SPDX-License-Identifier: BSD-2-Clause-Patent
4 * netboot - trivial UEFI first-stage bootloader netboot support
6 * Copyright Red Hat, Inc
7 * Author: Matthew Garrett
9 * Significant portions of this code are derived from Tianocore
10 * (http://tianocore.sf.net) and are Copyright 2009-2012 Intel
18 #define ntohs(x) __builtin_bswap16(x) /* supported both by GCC and clang */
19 #define htons(x) ntohs(x)
21 static EFI_PXE_BASE_CODE
*pxe
;
22 static EFI_IP_ADDRESS tftp_addr
;
23 static CHAR8
*full_path
;
30 } EFI_DHCP6_PACKET_OPTION
;
34 * Returns TRUE if we identify a protocol that is enabled and Providing us with
35 * the needed information to fetch a grubx64.efi image
37 BOOLEAN
findNetboot(EFI_HANDLE device
)
39 EFI_STATUS efi_status
;
41 efi_status
= gBS
->HandleProtocol(device
, &PxeBaseCodeProtocol
,
43 if (EFI_ERROR(efi_status
)) {
48 if (!pxe
|| !pxe
->Mode
) {
53 if (!pxe
->Mode
->Started
|| !pxe
->Mode
->DhcpAckReceived
) {
59 * We've located a pxe protocol handle thats been started and has
60 * received an ACK, meaning its something we'll be able to get
61 * tftp server info out of
66 static CHAR8
*get_v6_bootfile_url(EFI_PXE_BASE_CODE_DHCPV6_PACKET
*pkt
)
68 void *optr
= NULL
, *end
= NULL
;
69 EFI_DHCP6_PACKET_OPTION
*option
= NULL
;
73 optr
= pkt
->DhcpOptions
;
74 end
= optr
+ sizeof(pkt
->DhcpOptions
);
77 option
= (EFI_DHCP6_PACKET_OPTION
*)optr
;
79 if (ntohs(option
->OpCode
) == 0)
82 if (ntohs(option
->OpCode
) == 59) {
83 /* This is the bootfile url option */
84 urllen
= ntohs(option
->Length
);
85 if ((void *)(option
->Data
+ urllen
) > end
)
87 url
= AllocateZeroPool(urllen
+ 1);
90 memcpy(url
, option
->Data
, urllen
);
93 optr
+= 4 + ntohs(option
->Length
);
94 if (optr
+ sizeof(EFI_DHCP6_PACKET_OPTION
) > end
)
101 static CHAR16
str2ns(CHAR8
*str
)
106 if ('0' <= *str
&& *str
<= '9')
108 else if ('A' <= *str
&& *str
<= 'F')
110 else if ('a' <= *str
&& *str
<= 'f')
114 ret
= (ret
<< 4) + v
;
119 static CHAR8
*str2ip6(CHAR8
*str
)
121 UINT8 i
= 0, j
= 0, p
= 0;
122 size_t len
= 0, dotcount
= 0;
123 enum { MAX_IP6_DOTS
= 7 };
124 CHAR8
*a
= NULL
, *b
= NULL
, t
= 0;
127 memset(ip
, 0, sizeof(ip
));
129 /* Count amount of ':' to prevent overflows.
130 * max. count = 7. Returns an invalid ip6 that
131 * can be checked against
133 for (a
= str
; *a
!= 0; ++a
) {
137 if (dotcount
> MAX_IP6_DOTS
)
142 for (i
= p
= 0; i
< len
; i
++, b
++) {
153 for (j
= len
, p
= 7; j
> i
; j
--, a
--) {
158 ip
[p
--] = str2ns(a
+1);
165 static BOOLEAN
extract_tftp_info(CHAR8
*url
)
170 CHAR8
template[sizeof DEFAULT_LOADER_CHAR
];
172 translate_slashes(template, DEFAULT_LOADER_CHAR
);
174 // to check against str2ip6() errors
175 memset(ip6inv
, 0, sizeof(ip6inv
));
177 if (strncmp((UINT8
*)url
, (UINT8
*)"tftp://", 7)) {
178 console_print(L
"URLS MUST START WITH tftp://\n");
183 console_print(L
"TFTP SERVER MUST BE ENCLOSED IN [..]\n");
189 while ((*end
!= '\0') && (*end
!= ']')) {
191 if (end
- start
>= (int)sizeof(ip6str
)) {
192 console_print(L
"TFTP URL includes malformed IPv6 address\n");
197 console_print(L
"TFTP SERVER MUST BE ENCLOSED IN [..]\n");
200 memset(ip6str
, 0, sizeof(ip6str
));
201 memcpy(ip6str
, start
, end
- start
);
203 memcpy(&tftp_addr
.v6
, str2ip6(ip6str
), 16);
204 if (memcmp(&tftp_addr
.v6
, ip6inv
, sizeof(ip6inv
)) == 0)
206 full_path
= AllocateZeroPool(strlen(end
)+strlen(template)+1);
209 memcpy(full_path
, end
, strlen(end
));
210 end
= (CHAR8
*)strrchr((char *)full_path
, '/');
212 end
= (CHAR8
*)full_path
;
213 memcpy(end
, template, strlen(template));
214 end
[strlen(template)] = '\0';
219 static EFI_STATUS
parseDhcp6()
221 EFI_PXE_BASE_CODE_DHCPV6_PACKET
*packet
= (EFI_PXE_BASE_CODE_DHCPV6_PACKET
*)&pxe
->Mode
->DhcpAck
.Raw
;
224 bootfile_url
= get_v6_bootfile_url(packet
);
226 return EFI_NOT_FOUND
;
227 if (extract_tftp_info(bootfile_url
) == FALSE
) {
228 FreePool(bootfile_url
);
229 return EFI_NOT_FOUND
;
231 FreePool(bootfile_url
);
235 static EFI_STATUS
parseDhcp4()
237 CHAR8
template[sizeof DEFAULT_LOADER_CHAR
];
239 UINTN template_ofs
= 0;
240 EFI_PXE_BASE_CODE_DHCPV4_PACKET
* pkt_v4
= (EFI_PXE_BASE_CODE_DHCPV4_PACKET
*)&pxe
->Mode
->DhcpAck
.Dhcpv4
;
242 translate_slashes(template, DEFAULT_LOADER_CHAR
);
243 template_len
= strlen(template) + 1;
245 if(pxe
->Mode
->ProxyOfferReceived
) {
247 * Proxy should not have precedence. Check if DhcpAck
248 * contained boot info.
250 if(pxe
->Mode
->DhcpAck
.Dhcpv4
.BootpBootFile
[0] == '\0')
251 pkt_v4
= &pxe
->Mode
->ProxyOffer
.Dhcpv4
;
254 if(pxe
->Mode
->PxeReplyReceived
) {
256 * If we have no bootinfo yet search for it in the PxeReply.
257 * Some mainboards run into this when the server uses boot menus
259 if(pkt_v4
->BootpBootFile
[0] == '\0' && pxe
->Mode
->PxeReply
.Dhcpv4
.BootpBootFile
[0] != '\0')
260 pkt_v4
= &pxe
->Mode
->PxeReply
.Dhcpv4
;
263 INTN dir_len
= strnlena((CHAR8
*)pkt_v4
->BootpBootFile
, 127);
265 UINT8
*dir
= pkt_v4
->BootpBootFile
;
267 for (i
= dir_len
; i
>= 0; i
--) {
271 dir_len
= (i
>= 0) ? i
+ 1 : 0;
273 full_path
= AllocateZeroPool(dir_len
+ template_len
);
276 return EFI_OUT_OF_RESOURCES
;
279 strncpya(full_path
, (CHAR8
*)dir
, dir_len
);
280 if (full_path
[dir_len
-1] == '/' && template[0] == '/')
281 full_path
[dir_len
-1] = '\0';
283 if (dir_len
== 0 && dir
[0] != '/' && template[0] == '/')
285 strcata(full_path
, template + template_ofs
);
286 memcpy(&tftp_addr
.v4
, pkt_v4
->BootpSiAddr
, 4);
291 EFI_STATUS
parseNetbootinfo(EFI_HANDLE image_handle
)
294 EFI_STATUS efi_status
;
297 return EFI_NOT_READY
;
299 memset((UINT8
*)&tftp_addr
, 0, sizeof(tftp_addr
));
302 * If we've discovered an active pxe protocol figure out
303 * if its ipv4 or ipv6
305 if (pxe
->Mode
->UsingIpv6
){
306 efi_status
= parseDhcp6();
308 efi_status
= parseDhcp4();
312 EFI_STATUS
FetchNetbootimage(EFI_HANDLE image_handle
, VOID
**buffer
, UINT64
*bufsiz
)
314 EFI_STATUS efi_status
;
315 EFI_PXE_BASE_CODE_TFTP_OPCODE read
= EFI_PXE_BASE_CODE_TFTP_READ_FILE
;
316 BOOLEAN overwrite
= FALSE
;
317 BOOLEAN nobuffer
= FALSE
;
320 console_print(L
"Fetching Netboot Image\n");
321 if (*buffer
== NULL
) {
322 *buffer
= AllocatePool(4096 * 1024);
324 return EFI_OUT_OF_RESOURCES
;
325 *bufsiz
= 4096 * 1024;
329 efi_status
= pxe
->Mtftp(pxe
, read
, *buffer
, overwrite
, bufsiz
, &blksz
,
330 &tftp_addr
, (UINT8
*)full_path
, NULL
, nobuffer
);
331 if (efi_status
== EFI_BUFFER_TOO_SMALL
) {
332 /* try again, doubling buf size */
335 *buffer
= AllocatePool(*bufsiz
);
337 return EFI_OUT_OF_RESOURCES
;
341 if (EFI_ERROR(efi_status
) && *buffer
) {