]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Core/Pei/Image/Image.c
1. Enable use-cases in PEI using SecurityPPI co-equal to the use-cases in DXE using...
[mirror_edk2.git] / MdeModulePkg / Core / Pei / Image / Image.c
CommitLineData
615c6dd0 1/** @file\r
b1f6a7c6 2 Pei Core Load Image Support\r
54ea99a7 3\r
935efc21 4Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>\r
cd5ebaa0 5This program and the accompanying materials\r
54ea99a7 6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
192f6d4c 12\r
615c6dd0 13**/\r
192f6d4c 14\r
0d516397 15#include "PeiMain.h"\r
192f6d4c 16\r
b0d803fe 17\r
fe1e36e5 18EFI_PEI_LOAD_FILE_PPI mPeiLoadImagePpi = {\r
b0d803fe 19 PeiLoadImageLoadImageWrapper\r
20};\r
21\r
22\r
fe1e36e5 23EFI_PEI_PPI_DESCRIPTOR gPpiLoadFilePpiList = {\r
b0d803fe 24 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
25 &gEfiPeiLoadFilePpiGuid,\r
26 &mPeiLoadImagePpi\r
27};\r
28\r
b1f6a7c6 29/**\r
30\r
25973fc3 31 Support routine for the PE/COFF Loader that reads a buffer from a PE/COFF file.\r
32 The function is used for XIP code to have optimized memory copy.\r
b1f6a7c6 33\r
34 @param FileHandle - The handle to the PE/COFF file\r
35 @param FileOffset - The offset, in bytes, into the file to read\r
36 @param ReadSize - The number of bytes to read from the file starting at FileOffset\r
37 @param Buffer - A pointer to the buffer to read the data into.\r
38\r
39 @return EFI_SUCCESS - ReadSize bytes of data were read into Buffer from the PE/COFF file starting at FileOffset\r
40\r
41**/\r
b0d803fe 42EFI_STATUS\r
43EFIAPI\r
44PeiImageRead (\r
45 IN VOID *FileHandle,\r
46 IN UINTN FileOffset,\r
ed299e3c 47 IN UINTN *ReadSize,\r
b0d803fe 48 OUT VOID *Buffer\r
49 )\r
b0d803fe 50{\r
a9bfd802
LG
51 CHAR8 *Destination8;\r
52 CHAR8 *Source8;\r
25973fc3 53 \r
54 Destination8 = Buffer;\r
55 Source8 = (CHAR8 *) ((UINTN) FileHandle + FileOffset);\r
56 if (Destination8 != Source8) {\r
57 CopyMem (Destination8, Source8, *ReadSize);\r
58 }\r
59\r
60 return EFI_SUCCESS;\r
61}\r
62\r
63/**\r
64\r
65 Support routine for the PE/COFF Loader that reads a buffer from a PE/COFF file.\r
66 The function is implemented as PIC so as to support shadowing.\r
67\r
68 @param FileHandle - The handle to the PE/COFF file\r
69 @param FileOffset - The offset, in bytes, into the file to read\r
70 @param ReadSize - The number of bytes to read from the file starting at FileOffset\r
71 @param Buffer - A pointer to the buffer to read the data into.\r
72\r
73 @return EFI_SUCCESS - ReadSize bytes of data were read into Buffer from the PE/COFF file starting at FileOffset\r
74\r
75**/\r
76EFI_STATUS\r
77EFIAPI\r
78PeiImageReadForShadow (\r
79 IN VOID *FileHandle,\r
80 IN UINTN FileOffset,\r
81 IN UINTN *ReadSize,\r
82 OUT VOID *Buffer\r
83 )\r
84{\r
4da30589 85 volatile CHAR8 *Destination8;\r
86 CHAR8 *Source8;\r
87 UINTN Length;\r
a9bfd802
LG
88\r
89 Destination8 = Buffer;\r
90 Source8 = (CHAR8 *) ((UINTN) FileHandle + FileOffset);\r
43ada17c 91 if (Destination8 != Source8) {\r
92 Length = *ReadSize;\r
93 while ((Length--) > 0) {\r
94 *(Destination8++) = *(Source8++);\r
95 }\r
a9bfd802
LG
96 }\r
97\r
b0d803fe 98 return EFI_SUCCESS;\r
99}\r
100\r
b1f6a7c6 101/**\r
b0d803fe 102\r
ed299e3c 103 Support routine to get the Image read file function.\r
b0d803fe 104\r
b1f6a7c6 105 @param ImageContext - The context of the image being loaded\r
b0d803fe 106\r
b1f6a7c6 107 @retval EFI_SUCCESS - If Image function location is found\r
b0d803fe 108\r
b1f6a7c6 109**/\r
110EFI_STATUS\r
111GetImageReadFunction (\r
112 IN PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext\r
113 )\r
b0d803fe 114{\r
43ada17c 115 PEI_CORE_INSTANCE *Private;\r
b0d803fe 116 VOID* MemoryBuffer;\r
117\r
43ada17c 118 Private = PEI_CORE_INSTANCE_FROM_PS_THIS (GetPeiServicesTablePointer ());\r
1c8029e3 119 \r
5d7f3126 120 if (Private->PeiMemoryInstalled && ((Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME) || PcdGetBool (PcdShadowPeimOnS3Boot)) &&\r
1c8029e3 121 (EFI_IMAGE_MACHINE_TYPE_SUPPORTED(EFI_IMAGE_MACHINE_X64) || EFI_IMAGE_MACHINE_TYPE_SUPPORTED(EFI_IMAGE_MACHINE_IA32))) {\r
122 // \r
123 // Shadow algorithm makes lots of non ANSI C assumptions and only works for IA32 and X64 \r
124 // compilers that have been tested\r
27172c0f 125 //\r
25973fc3 126 if (Private->ShadowedImageRead == NULL) {\r
127 MemoryBuffer = AllocatePages (0x400 / EFI_PAGE_SIZE + 1);\r
128 ASSERT (MemoryBuffer != NULL);\r
129 CopyMem (MemoryBuffer, (CONST VOID *) (UINTN) PeiImageReadForShadow, 0x400);\r
130 Private->ShadowedImageRead = (PE_COFF_LOADER_READ_FILE) (UINTN) MemoryBuffer;\r
131 }\r
43ada17c 132\r
25973fc3 133 ImageContext->ImageRead = Private->ShadowedImageRead;\r
1c8029e3 134 } else {\r
135 ImageContext->ImageRead = PeiImageRead;\r
43ada17c 136 }\r
b0d803fe 137\r
138 return EFI_SUCCESS;\r
139}\r
54ea99a7 140/**\r
141 To check memory usage bit map arry to figure out if the memory range the image will be loaded in is available or not. If \r
142 memory range is avaliable, the function will mark the correponding bits to 1 which indicates the memory range is used.\r
143 The function is only invoked when load modules at fixed address feature is enabled. \r
144 \r
145 @param Private Pointer to the private data passed in from caller\r
146 @param ImageBase The base addres the image will be loaded at.\r
147 @param ImageSize The size of the image\r
148 \r
149 @retval EFI_SUCCESS The memory range the image will be loaded in is available\r
150 @retval EFI_NOT_FOUND The memory range the image will be loaded in is not available\r
151**/\r
152EFI_STATUS\r
153CheckAndMarkFixLoadingMemoryUsageBitMap (\r
154 IN PEI_CORE_INSTANCE *Private,\r
155 IN EFI_PHYSICAL_ADDRESS ImageBase,\r
156 IN UINT32 ImageSize\r
157 )\r
158{\r
159 UINT32 DxeCodePageNumber;\r
160 UINT64 ReservedCodeSize;\r
161 EFI_PHYSICAL_ADDRESS PeiCodeBase;\r
162 UINT32 BaseOffsetPageNumber;\r
163 UINT32 TopOffsetPageNumber;\r
164 UINT32 Index;\r
165 UINT64 *MemoryUsageBitMap;\r
166 \r
167\r
168 //\r
169 // The reserved code range includes RuntimeCodePage range, Boot time code range and PEI code range.\r
170 //\r
171 DxeCodePageNumber = PcdGet32(PcdLoadFixAddressBootTimeCodePageNumber);\r
172 DxeCodePageNumber += PcdGet32(PcdLoadFixAddressRuntimeCodePageNumber);\r
173 ReservedCodeSize = EFI_PAGES_TO_SIZE(DxeCodePageNumber + PcdGet32(PcdLoadFixAddressPeiCodePageNumber));\r
174 PeiCodeBase = Private->LoadModuleAtFixAddressTopAddress - ReservedCodeSize;\r
175 \r
176 //\r
177 // Test the memory range for loading the image in the PEI code range.\r
178 //\r
179 if ((Private->LoadModuleAtFixAddressTopAddress - EFI_PAGES_TO_SIZE(DxeCodePageNumber)) < (ImageBase + ImageSize) ||\r
180 (PeiCodeBase > ImageBase)) { \r
181 return EFI_NOT_FOUND; \r
182 }\r
183 \r
184 //\r
185 // Test if the memory is avalaible or not.\r
186 //\r
187 MemoryUsageBitMap = Private->PeiCodeMemoryRangeUsageBitMap; \r
188 BaseOffsetPageNumber = EFI_SIZE_TO_PAGES((UINT32)(ImageBase - PeiCodeBase));\r
189 TopOffsetPageNumber = EFI_SIZE_TO_PAGES((UINT32)(ImageBase + ImageSize - PeiCodeBase));\r
190 for (Index = BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index ++) {\r
191 if ((MemoryUsageBitMap[Index / 64] & LShiftU64(1, (Index % 64))) != 0) {\r
192 //\r
193 // This page is already used.\r
194 //\r
195 return EFI_NOT_FOUND; \r
196 }\r
197 }\r
198 \r
199 //\r
200 // Being here means the memory range is available. So mark the bits for the memory range\r
201 // \r
202 for (Index = BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index ++) {\r
203 MemoryUsageBitMap[Index / 64] |= LShiftU64(1, (Index % 64));\r
204 }\r
205 return EFI_SUCCESS; \r
206}\r
207/**\r
208\r
209 Get the fixed loadding address from image header assigned by build tool. This function only be called\r
210 when Loading module at Fixed address feature enabled.\r
211\r
212 @param ImageContext Pointer to the image context structure that describes the PE/COFF\r
213 image that needs to be examined by this function.\r
214 @param Private Pointer to the private data passed in from caller\r
215\r
216 @retval EFI_SUCCESS An fixed loading address is assigned to this image by build tools .\r
217 @retval EFI_NOT_FOUND The image has no assigned fixed loadding address.\r
b0d803fe 218\r
54ea99a7 219**/\r
220EFI_STATUS\r
221GetPeCoffImageFixLoadingAssignedAddress(\r
222 IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext,\r
223 IN PEI_CORE_INSTANCE *Private\r
224 )\r
225{\r
226 UINTN SectionHeaderOffset;\r
227 EFI_STATUS Status;\r
228 EFI_IMAGE_SECTION_HEADER SectionHeader;\r
229 EFI_IMAGE_OPTIONAL_HEADER_UNION *ImgHdr;\r
230 EFI_PHYSICAL_ADDRESS FixLoaddingAddress;\r
231 UINT16 Index;\r
232 UINTN Size;\r
233 UINT16 NumberOfSections;\r
234 UINT64 ValueInSectionHeader;\r
235 \r
236\r
237 FixLoaddingAddress = 0;\r
238 Status = EFI_NOT_FOUND;\r
239\r
240 //\r
241 // Get PeHeader pointer\r
242 //\r
243 ImgHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)((CHAR8* )ImageContext->Handle + ImageContext->PeCoffHeaderOffset);\r
244 if (ImageContext->IsTeImage) {\r
245 //\r
246 // for TE image, the fix loadding address is saved in first section header that doesn't point\r
247 // to code section.\r
248 //\r
249 SectionHeaderOffset = sizeof (EFI_TE_IMAGE_HEADER);\r
250 NumberOfSections = ImgHdr->Te.NumberOfSections;\r
251 } else {\r
252 SectionHeaderOffset = (UINTN)(\r
253 ImageContext->PeCoffHeaderOffset +\r
254 sizeof (UINT32) +\r
255 sizeof (EFI_IMAGE_FILE_HEADER) +\r
256 ImgHdr->Pe32.FileHeader.SizeOfOptionalHeader\r
257 );\r
258 NumberOfSections = ImgHdr->Pe32.FileHeader.NumberOfSections;\r
259 }\r
260 //\r
261 // Get base address from the first section header that doesn't point to code section.\r
262 //\r
263 for (Index = 0; Index < NumberOfSections; Index++) {\r
264 //\r
265 // Read section header from file\r
266 //\r
267 Size = sizeof (EFI_IMAGE_SECTION_HEADER);\r
268 Status = ImageContext->ImageRead (\r
269 ImageContext->Handle,\r
270 SectionHeaderOffset,\r
271 &Size,\r
272 &SectionHeader\r
273 );\r
274 if (EFI_ERROR (Status)) {\r
275 return Status;\r
276 }\r
277\r
278 Status = EFI_NOT_FOUND;\r
279\r
280 if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_CNT_CODE) == 0) {\r
281 //\r
282 // Build tool will save the address in PointerToRelocations & PointerToLineNumbers fields in the first section header\r
283 // that doesn't point to code section in image header, as well as ImageBase field of image header. A notable thing is\r
284 // that for PEIM, the value in ImageBase field may not be equal to the value in PointerToRelocations & PointerToLineNumbers because\r
285 // for XIP PEIM, ImageBase field holds the image base address running on the Flash. And PointerToRelocations & PointerToLineNumbers\r
286 // hold the image base address when it is shadow to the memory. And there is an assumption that when the feature is enabled, if a\r
287 // module is assigned a loading address by tools, PointerToRelocations & PointerToLineNumbers fields should NOT be Zero, or\r
288 // else, these 2 fileds should be set to Zero\r
289 //\r
290 ValueInSectionHeader = ReadUnaligned64((UINT64*)&SectionHeader.PointerToRelocations);\r
291 if (ValueInSectionHeader != 0) {\r
292 //\r
293 // Found first section header that doesn't point to code section.\r
294 //\r
852081fc 295 if ((INT64)PcdGet64(PcdLoadModuleAtFixAddressEnable) > 0) {\r
54ea99a7 296 //\r
297 // When LMFA feature is configured as Load Module at Fixed Absolute Address mode, PointerToRelocations & PointerToLineNumbers field\r
298 // hold the absolute address of image base runing in memory\r
299 //\r
300 FixLoaddingAddress = ValueInSectionHeader;\r
301 } else {\r
302 //\r
303 // When LMFA feature is configured as Load Module at Fixed offset mode, PointerToRelocations & PointerToLineNumbers field\r
304 // hold the offset relative to a platform-specific top address.\r
305 //\r
306 FixLoaddingAddress = (EFI_PHYSICAL_ADDRESS)(Private->LoadModuleAtFixAddressTopAddress + (INT64)ValueInSectionHeader);\r
307 }\r
308 //\r
309 // Check if the memory range is avaliable.\r
310 //\r
311 Status = CheckAndMarkFixLoadingMemoryUsageBitMap (Private, FixLoaddingAddress, (UINT32) ImageContext->ImageSize);\r
312 if (!EFI_ERROR(Status)) {\r
313 //\r
314 // The assigned address is valid. Return the specified loadding address\r
315 //\r
316 ImageContext->ImageAddress = FixLoaddingAddress;\r
317 }\r
318 }\r
319 break;\r
320 }\r
321 SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER);\r
322 }\r
852081fc 323 DEBUG ((EFI_D_INFO|EFI_D_LOAD, "LOADING MODULE FIXED INFO: Loading module at fixed address 0x%11p. Status= %r \n", (VOID *)(UINTN)FixLoaddingAddress, Status));\r
54ea99a7 324 return Status;\r
325}\r
b1f6a7c6 326/**\r
327\r
328 Loads and relocates a PE/COFF image into memory.\r
341a658f 329 If the image is not relocatable, it will not be loaded into memory and be loaded as XIP image.\r
b1f6a7c6 330\r
331 @param Pe32Data - The base address of the PE/COFF file that is to be loaded and relocated\r
332 @param ImageAddress - The base address of the relocated PE/COFF image\r
333 @param ImageSize - The size of the relocated PE/COFF image\r
334 @param EntryPoint - The entry point of the relocated PE/COFF image\r
335\r
336 @retval EFI_SUCCESS The file was loaded and relocated\r
337 @retval EFI_OUT_OF_RESOURCES There was not enough memory to load and relocate the PE/COFF file\r
5d7f3126
LG
338 @retval EFI_WARN_BUFFER_TOO_SMALL \r
339 There is not enough heap to allocate the requested size.\r
340 This will not prevent the XIP image from being invoked.\r
b1f6a7c6 341\r
342**/\r
b0d803fe 343EFI_STATUS\r
344LoadAndRelocatePeCoffImage (\r
b0d803fe 345 IN VOID *Pe32Data,\r
346 OUT EFI_PHYSICAL_ADDRESS *ImageAddress,\r
347 OUT UINT64 *ImageSize,\r
348 OUT EFI_PHYSICAL_ADDRESS *EntryPoint\r
349 )\r
b0d803fe 350{\r
351 EFI_STATUS Status;\r
352 PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;\r
43ada17c 353 PEI_CORE_INSTANCE *Private;\r
935efc21 354 UINT64 AlignImageSize;\r
5d7f3126
LG
355 BOOLEAN IsXipImage;\r
356 EFI_STATUS ReturnStatus;\r
43ada17c 357\r
358 Private = PEI_CORE_INSTANCE_FROM_PS_THIS (GetPeiServicesTablePointer ());\r
b0d803fe 359\r
5d7f3126
LG
360 ReturnStatus = EFI_SUCCESS;\r
361 IsXipImage = FALSE;\r
b0d803fe 362 ZeroMem (&ImageContext, sizeof (ImageContext));\r
363 ImageContext.Handle = Pe32Data;\r
364 Status = GetImageReadFunction (&ImageContext);\r
365\r
366 ASSERT_EFI_ERROR (Status);\r
367\r
3d7b0992 368 Status = PeCoffLoaderGetImageInfo (&ImageContext);\r
b0d803fe 369 if (EFI_ERROR (Status)) {\r
370 return Status;\r
371 }\r
5d7f3126
LG
372 \r
373 //\r
374 // XIP image that ImageAddress is same to Image handle.\r
375 //\r
376 if (ImageContext.ImageAddress == (EFI_PHYSICAL_ADDRESS)(UINTN) Pe32Data) {\r
377 IsXipImage = TRUE;\r
378 }\r
379\r
b0d803fe 380 //\r
9626a87e
LG
381 // When Image has no reloc section, it can't be relocated into memory.\r
382 //\r
5d7f3126 383 if (ImageContext.RelocationsStripped && (Private->PeiMemoryInstalled) && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME || PcdGetBool (PcdShadowPeimOnS3Boot))) {\r
54ea99a7 384 DEBUG ((EFI_D_INFO|EFI_D_LOAD, "The image at 0x%08x without reloc section can't be loaded into memory\n", (UINTN) Pe32Data));\r
9626a87e 385 }\r
414bdfb6 386\r
341a658f
LG
387 //\r
388 // Set default base address to current image address.\r
389 //\r
390 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) Pe32Data;\r
54ea99a7 391\r
9626a87e 392 //\r
341a658f 393 // Allocate Memory for the image when memory is ready, boot mode is not S3, and image is relocatable.\r
b0d803fe 394 //\r
5d7f3126 395 if ((!ImageContext.RelocationsStripped) && (Private->PeiMemoryInstalled) && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME || PcdGetBool (PcdShadowPeimOnS3Boot))) {\r
935efc21
ED
396 //\r
397 // Allocate more buffer to avoid buffer overflow.\r
398 //\r
399 if (ImageContext.IsTeImage) {\r
400 AlignImageSize = ImageContext.ImageSize + ((EFI_TE_IMAGE_HEADER *) Pe32Data)->StrippedSize - sizeof (EFI_TE_IMAGE_HEADER);\r
401 } else {\r
402 AlignImageSize = ImageContext.ImageSize;\r
403 }\r
404\r
405 if (ImageContext.SectionAlignment > EFI_PAGE_SIZE) {\r
406 AlignImageSize += ImageContext.SectionAlignment;\r
407 }\r
408\r
5d7f3126 409 if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0 && (Private->HobList.HandoffInformationTable->BootMode != BOOT_ON_S3_RESUME)) {\r
54ea99a7 410 Status = GetPeCoffImageFixLoadingAssignedAddress(&ImageContext, Private);\r
411 if (EFI_ERROR (Status)){\r
412 DEBUG ((EFI_D_INFO|EFI_D_LOAD, "LOADING MODULE FIXED ERROR: Failed to load module at fixed address. \n"));\r
413 //\r
414 // The PEIM is not assiged valid address, try to allocate page to load it.\r
415 //\r
935efc21 416 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) AllocatePages (EFI_SIZE_TO_PAGES ((UINT32) AlignImageSize));\r
54ea99a7 417 }\r
418 } else {\r
935efc21 419 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) AllocatePages (EFI_SIZE_TO_PAGES ((UINT32) AlignImageSize));\r
54ea99a7 420 }\r
5d7f3126
LG
421 if (ImageContext.ImageAddress != 0) {\r
422 //\r
423 // Adjust the Image Address to make sure it is section alignment.\r
424 //\r
425 if (ImageContext.SectionAlignment > EFI_PAGE_SIZE) {\r
426 ImageContext.ImageAddress =\r
427 (ImageContext.ImageAddress + ImageContext.SectionAlignment - 1) &\r
428 ~((UINTN)ImageContext.SectionAlignment - 1);\r
429 }\r
430 //\r
431 // Fix alignment requirement when Load IPF TeImage into memory.\r
432 // Skip the reserved space for the stripped PeHeader when load TeImage into memory.\r
433 //\r
434 if (ImageContext.IsTeImage) {\r
435 ImageContext.ImageAddress = ImageContext.ImageAddress +\r
436 ((EFI_TE_IMAGE_HEADER *) Pe32Data)->StrippedSize -\r
437 sizeof (EFI_TE_IMAGE_HEADER);\r
438 }\r
439 } else {\r
440 //\r
441 // No enough memory resource.\r
442 //\r
443 if (IsXipImage) {\r
444 //\r
445 // XIP image can still be invoked.\r
446 //\r
447 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) Pe32Data;\r
448 ReturnStatus = EFI_WARN_BUFFER_TOO_SMALL;\r
449 } else {\r
450 //\r
451 // Non XIP image can't be loaded because no enough memory is allocated.\r
452 //\r
453 ASSERT (FALSE);\r
454 return EFI_OUT_OF_RESOURCES;\r
455 }\r
43ada17c 456 }\r
4e844595 457 }\r
b0d803fe 458\r
459 //\r
460 // Load the image to our new buffer\r
461 //\r
3d7b0992 462 Status = PeCoffLoaderLoadImage (&ImageContext);\r
b0d803fe 463 if (EFI_ERROR (Status)) {\r
464 return Status;\r
465 }\r
466 //\r
467 // Relocate the image in our new buffer\r
468 //\r
3d7b0992 469 Status = PeCoffLoaderRelocateImage (&ImageContext);\r
b0d803fe 470 if (EFI_ERROR (Status)) {\r
471 return Status;\r
472 }\r
473\r
474 //\r
475 // Flush the instruction cache so the image data is written before we execute it\r
476 //\r
5d7f3126 477 if (ImageContext.ImageAddress != (EFI_PHYSICAL_ADDRESS)(UINTN) Pe32Data) {\r
43ada17c 478 InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);\r
479 }\r
b0d803fe 480\r
481 *ImageAddress = ImageContext.ImageAddress;\r
482 *ImageSize = ImageContext.ImageSize;\r
483 *EntryPoint = ImageContext.EntryPoint;\r
484\r
5d7f3126 485 return ReturnStatus;\r
b0d803fe 486}\r
487\r
b1f6a7c6 488/**\r
54ea99a7 489 Loads a PEIM into memory for subsequent execution. If there are compressed\r
490 images or images that need to be relocated into memory for performance reasons,\r
ed299e3c 491 this service performs that transformation.\r
b1f6a7c6 492\r
ed299e3c 493 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation\r
b1f6a7c6 494 @param FileHandle Pointer to the FFS file header of the image.\r
495 @param ImageAddressArg Pointer to PE/TE image.\r
496 @param ImageSizeArg Size of PE/TE image.\r
497 @param EntryPoint Pointer to entry point of specified image file for output.\r
498 @param AuthenticationState - Pointer to attestation authentication state of image.\r
499\r
ed299e3c
LG
500 @retval EFI_SUCCESS Image is successfully loaded.\r
501 @retval EFI_NOT_FOUND Fail to locate necessary PPI.\r
502 @retval EFI_UNSUPPORTED Image Machine Type is not supported.\r
5d7f3126
LG
503 @retval EFI_WARN_BUFFER_TOO_SMALL \r
504 There is not enough heap to allocate the requested size.\r
505 This will not prevent the XIP image from being invoked.\r
b1f6a7c6 506\r
507**/\r
b0d803fe 508EFI_STATUS\r
509PeiLoadImageLoadImage (\r
284c8400 510 IN CONST EFI_PEI_SERVICES **PeiServices,\r
b0d803fe 511 IN EFI_PEI_FILE_HANDLE FileHandle,\r
512 OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL\r
513 OUT UINT64 *ImageSizeArg, OPTIONAL\r
514 OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
515 OUT UINT32 *AuthenticationState\r
516 )\r
192f6d4c 517{\r
518 EFI_STATUS Status;\r
519 VOID *Pe32Data;\r
192f6d4c 520 EFI_PHYSICAL_ADDRESS ImageAddress;\r
521 UINT64 ImageSize;\r
522 EFI_PHYSICAL_ADDRESS ImageEntryPoint;\r
192f6d4c 523 UINT16 Machine;\r
3076397e 524 EFI_SECTION_TYPE SearchType1;\r
525 EFI_SECTION_TYPE SearchType2;\r
192f6d4c 526\r
3d7b0992
LG
527 *EntryPoint = 0;\r
528 ImageSize = 0;\r
b0d803fe 529 *AuthenticationState = 0;\r
192f6d4c 530\r
3076397e 531 if (FeaturePcdGet (PcdPeiCoreImageLoaderSearchTeSectionFirst)) {\r
532 SearchType1 = EFI_SECTION_TE;\r
533 SearchType2 = EFI_SECTION_PE32;\r
534 } else {\r
535 SearchType1 = EFI_SECTION_PE32;\r
536 SearchType2 = EFI_SECTION_TE;\r
537 }\r
1b620adb 538\r
192f6d4c 539 //\r
54ea99a7 540 // Try to find a first exe section (if PcdPeiCoreImageLoaderSearchTeSectionFirst\r
3076397e 541 // is true, TE will be searched first).\r
192f6d4c 542 //\r
c7935105 543 Status = PeiServicesFfsFindSectionData3 (\r
3076397e 544 SearchType1,\r
c7935105 545 0,\r
b0d803fe 546 FileHandle,\r
c7935105
SZ
547 &Pe32Data,\r
548 AuthenticationState\r
192f6d4c 549 );\r
550 //\r
3076397e 551 // If we didn't find a first exe section, try to find the second exe section.\r
192f6d4c 552 //\r
553 if (EFI_ERROR (Status)) {\r
c7935105 554 Status = PeiServicesFfsFindSectionData3 (\r
3076397e 555 SearchType2,\r
c7935105 556 0,\r
b0d803fe 557 FileHandle,\r
c7935105
SZ
558 &Pe32Data,\r
559 AuthenticationState\r
192f6d4c 560 );\r
b0d803fe 561 if (EFI_ERROR (Status)) {\r
192f6d4c 562 //\r
c7935105 563 // PEI core only carry the loader function for TE and PE32 executables\r
b0d803fe 564 // If this two section does not exist, just return.\r
192f6d4c 565 //\r
b0d803fe 566 return Status;\r
567 }\r
568 }\r
54ea99a7 569\r
43ada17c 570 //\r
571 // If memory is installed, perform the shadow operations\r
572 //\r
573 Status = LoadAndRelocatePeCoffImage (\r
574 Pe32Data,\r
575 &ImageAddress,\r
576 &ImageSize,\r
577 &ImageEntryPoint\r
578 );\r
192f6d4c 579\r
43ada17c 580 ASSERT_EFI_ERROR (Status);\r
3d7b0992 581\r
43ada17c 582\r
583 if (EFI_ERROR (Status)) {\r
584 return Status;\r
192f6d4c 585 }\r
43ada17c 586\r
587 //\r
588 // Got the entry point from the loaded Pe32Data\r
589 //\r
590 Pe32Data = (VOID *) ((UINTN) ImageAddress);\r
591 *EntryPoint = ImageEntryPoint;\r
54ea99a7 592\r
3d7b0992 593 Machine = PeCoffLoaderGetMachineType (Pe32Data);\r
54ea99a7 594\r
192f6d4c 595 if (!EFI_IMAGE_MACHINE_TYPE_SUPPORTED (Machine)) {\r
8c519a56 596 if (!EFI_IMAGE_MACHINE_CROSS_TYPE_SUPPORTED (Machine)) {\r
597 return EFI_UNSUPPORTED;\r
598 }\r
192f6d4c 599 }\r
600\r
b0d803fe 601 if (ImageAddressArg != NULL) {\r
602 *ImageAddressArg = ImageAddress;\r
603 }\r
604\r
605 if (ImageSizeArg != NULL) {\r
606 *ImageSizeArg = ImageSize;\r
607 }\r
54ea99a7 608\r
192f6d4c 609 DEBUG_CODE_BEGIN ();\r
3d7b0992 610 CHAR8 *AsciiString;\r
77a750a5 611 CHAR8 EfiFileName[512];\r
3d7b0992 612 INT32 Index;\r
77a750a5 613 INT32 StartIndex;\r
e98cd821
LG
614\r
615 //\r
616 // Print debug message: Loading PEIM at 0x12345678 EntryPoint=0x12345688 Driver.efi\r
617 //\r
7cf02714 618 if (Machine != EFI_IMAGE_MACHINE_IA64) {\r
91136124 619 DEBUG ((EFI_D_INFO | EFI_D_LOAD, "Loading PEIM at 0x%11p EntryPoint=0x%11p ", (VOID *)(UINTN)ImageAddress, (VOID *)(UINTN)*EntryPoint));\r
e98cd821
LG
620 } else {\r
621 //\r
622 // For IPF Image, the real entry point should be print.\r
623 //\r
91136124 624 DEBUG ((EFI_D_INFO | EFI_D_LOAD, "Loading PEIM at 0x%11p EntryPoint=0x%11p ", (VOID *)(UINTN)ImageAddress, (VOID *)(UINTN)(*(UINT64 *)(UINTN)*EntryPoint)));\r
e98cd821 625 }\r
54ea99a7 626\r
e98cd821
LG
627 //\r
628 // Print Module Name by PeImage PDB file name.\r
629 //\r
3d7b0992 630 AsciiString = PeCoffLoaderGetPdbPointer (Pe32Data);\r
54ea99a7 631\r
3d7b0992 632 if (AsciiString != NULL) {\r
77a750a5
LG
633 StartIndex = 0;\r
634 for (Index = 0; AsciiString[Index] != 0; Index++) {\r
1e21413c 635 if (AsciiString[Index] == '\\' || AsciiString[Index] == '/') {\r
77a750a5 636 StartIndex = Index + 1;\r
3d7b0992 637 }\r
192f6d4c 638 }\r
192f6d4c 639\r
77a750a5
LG
640 //\r
641 // Copy the PDB file name to our temporary string, and replace .pdb with .efi\r
642 // The PDB file name is limited in the range of 0~511.\r
643 // If the length is bigger than 511, trim the redudant characters to avoid overflow in array boundary.\r
644 //\r
645 for (Index = 0; Index < sizeof (EfiFileName) - 4; Index++) {\r
646 EfiFileName[Index] = AsciiString[Index + StartIndex];\r
647 if (EfiFileName[Index] == 0) {\r
648 EfiFileName[Index] = '.';\r
649 }\r
650 if (EfiFileName[Index] == '.') {\r
651 EfiFileName[Index + 1] = 'e';\r
652 EfiFileName[Index + 2] = 'f';\r
653 EfiFileName[Index + 3] = 'i';\r
654 EfiFileName[Index + 4] = 0;\r
655 break;\r
192f6d4c 656 }\r
657 }\r
77a750a5
LG
658\r
659 if (Index == sizeof (EfiFileName) - 4) {\r
660 EfiFileName[Index] = 0;\r
661 }\r
662\r
663 DEBUG ((EFI_D_INFO | EFI_D_LOAD, "%a", EfiFileName));\r
192f6d4c 664 }\r
3d7b0992 665\r
192f6d4c 666 DEBUG_CODE_END ();\r
667\r
668 DEBUG ((EFI_D_INFO | EFI_D_LOAD, "\n"));\r
669\r
670 return EFI_SUCCESS;\r
b0d803fe 671\r
672}\r
673\r
674\r
b1f6a7c6 675/**\r
676 The wrapper function of PeiLoadImageLoadImage().\r
677\r
678 @param This - Pointer to EFI_PEI_LOAD_FILE_PPI.\r
679 @param FileHandle - Pointer to the FFS file header of the image.\r
680 @param ImageAddressArg - Pointer to PE/TE image.\r
681 @param ImageSizeArg - Size of PE/TE image.\r
682 @param EntryPoint - Pointer to entry point of specified image file for output.\r
683 @param AuthenticationState - Pointer to attestation authentication state of image.\r
684\r
685 @return Status of PeiLoadImageLoadImage().\r
686\r
687**/\r
b0d803fe 688EFI_STATUS\r
689EFIAPI\r
690PeiLoadImageLoadImageWrapper (\r
691 IN CONST EFI_PEI_LOAD_FILE_PPI *This,\r
692 IN EFI_PEI_FILE_HANDLE FileHandle,\r
693 OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL\r
694 OUT UINT64 *ImageSizeArg, OPTIONAL\r
695 OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
696 OUT UINT32 *AuthenticationState\r
697 )\r
b0d803fe 698{\r
699 return PeiLoadImageLoadImage (\r
700 GetPeiServicesTablePointer (),\r
701 FileHandle,\r
702 ImageAddressArg,\r
703 ImageSizeArg,\r
704 EntryPoint,\r
705 AuthenticationState\r
706 );\r
192f6d4c 707}\r
b0d803fe 708\r
341a658f
LG
709/**\r
710 Check whether the input image has the relocation.\r
711\r
712 @param Pe32Data Pointer to the PE/COFF or TE image.\r
713\r
714 @retval TRUE Relocation is stripped.\r
715 @retval FALSE Relocation is not stripped.\r
716\r
717**/\r
718BOOLEAN\r
719RelocationIsStrip (\r
720 IN VOID *Pe32Data\r
721 )\r
722{\r
723 EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr;\r
724 EFI_IMAGE_DOS_HEADER *DosHdr;\r
725\r
726 ASSERT (Pe32Data != NULL);\r
727\r
728 DosHdr = (EFI_IMAGE_DOS_HEADER *)Pe32Data;\r
729 if (DosHdr->e_magic == EFI_IMAGE_DOS_SIGNATURE) {\r
730 //\r
731 // DOS image header is present, so read the PE header after the DOS image header.\r
732 //\r
733 Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)((UINTN) Pe32Data + (UINTN) ((DosHdr->e_lfanew) & 0x0ffff));\r
734 } else {\r
735 //\r
736 // DOS image header is not present, so PE header is at the image base.\r
737 //\r
738 Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)Pe32Data;\r
739 }\r
740\r
741 //\r
742 // Three cases with regards to relocations:\r
743 // - Image has base relocs, RELOCS_STRIPPED==0 => image is relocatable\r
744 // - Image has no base relocs, RELOCS_STRIPPED==1 => Image is not relocatable\r
745 // - Image has no base relocs, RELOCS_STRIPPED==0 => Image is relocatable but\r
746 // has no base relocs to apply\r
747 // Obviously having base relocations with RELOCS_STRIPPED==1 is invalid.\r
748 //\r
749 // Look at the file header to determine if relocations have been stripped, and\r
750 // save this info in the image context for later use.\r
751 //\r
752 if (Hdr.Te->Signature == EFI_TE_IMAGE_HEADER_SIGNATURE) {\r
753 if ((Hdr.Te->DataDirectory[0].Size == 0) && (Hdr.Te->DataDirectory[0].VirtualAddress == 0)) {\r
754 return TRUE;\r
755 } else {\r
756 return FALSE;\r
757 }\r
758 } else if (Hdr.Pe32->Signature == EFI_IMAGE_NT_SIGNATURE) {\r
759 if ((Hdr.Pe32->FileHeader.Characteristics & EFI_IMAGE_FILE_RELOCS_STRIPPED) != 0) {\r
760 return TRUE;\r
761 } else {\r
762 return FALSE;\r
763 }\r
764 }\r
765\r
766 return FALSE;\r
767}\r
768\r
b1f6a7c6 769/**\r
ed299e3c 770 Routine to load image file for subsequent execution by LoadFile Ppi.\r
54ea99a7 771 If any LoadFile Ppi is not found, the build-in support function for the PE32+/TE\r
ed299e3c 772 XIP image format is used.\r
b1f6a7c6 773\r
ed299e3c
LG
774 @param PeiServices - An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation\r
775 @param FileHandle - Pointer to the FFS file header of the image.\r
341a658f 776 @param PeimState - The dispatch state of the input PEIM handle.\r
ed299e3c
LG
777 @param EntryPoint - Pointer to entry point of specified image file for output.\r
778 @param AuthenticationState - Pointer to attestation authentication state of image.\r
b1f6a7c6 779\r
ed299e3c
LG
780 @retval EFI_SUCCESS - Image is successfully loaded.\r
781 @retval EFI_NOT_FOUND - Fail to locate necessary PPI\r
782 @retval Others - Fail to load file.\r
b1f6a7c6 783\r
784**/\r
b0d803fe 785EFI_STATUS\r
786PeiLoadImage (\r
6c7a807a 787 IN CONST EFI_PEI_SERVICES **PeiServices,\r
b0d803fe 788 IN EFI_PEI_FILE_HANDLE FileHandle,\r
341a658f 789 IN UINT8 PeimState,\r
b0d803fe 790 OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
791 OUT UINT32 *AuthenticationState\r
792 )\r
b0d803fe 793{\r
794 EFI_STATUS PpiStatus;\r
795 EFI_STATUS Status;\r
796 UINTN Index;\r
797 EFI_PEI_LOAD_FILE_PPI *LoadFile;\r
798 EFI_PHYSICAL_ADDRESS ImageAddress;\r
799 UINT64 ImageSize;\r
341a658f 800 BOOLEAN IsStrip;\r
b0d803fe 801\r
341a658f 802 IsStrip = FALSE;\r
b0d803fe 803 //\r
804 // If any instances of PEI_LOAD_FILE_PPI are installed, they are called.\r
805 // one at a time, until one reports EFI_SUCCESS.\r
806 //\r
807 Index = 0;\r
808 do {\r
809 PpiStatus = PeiServicesLocatePpi (\r
810 &gEfiPeiLoadFilePpiGuid,\r
811 Index,\r
812 NULL,\r
813 (VOID **)&LoadFile\r
814 );\r
815 if (!EFI_ERROR (PpiStatus)) {\r
816 Status = LoadFile->LoadFile (\r
54ea99a7 817 LoadFile,\r
818 FileHandle,\r
819 &ImageAddress,\r
b0d803fe 820 &ImageSize,\r
821 EntryPoint,\r
822 AuthenticationState\r
823 );\r
5d7f3126 824 if (!EFI_ERROR (Status) || Status == EFI_WARN_BUFFER_TOO_SMALL) {\r
341a658f
LG
825 //\r
826 // The shadowed PEIM must be relocatable.\r
827 //\r
828 if (PeimState == PEIM_STATE_REGISITER_FOR_SHADOW) {\r
829 IsStrip = RelocationIsStrip ((VOID *) (UINTN) ImageAddress);\r
830 ASSERT (!IsStrip);\r
831 if (IsStrip) {\r
832 return EFI_UNSUPPORTED;\r
833 }\r
834 }\r
835\r
db0b7ad5
LG
836 //\r
837 // The image to be started must have the machine type supported by PeiCore.\r
838 //\r
839 ASSERT (EFI_IMAGE_MACHINE_TYPE_SUPPORTED (PeCoffLoaderGetMachineType ((VOID *) (UINTN) ImageAddress)));\r
919df8e6 840 if (!EFI_IMAGE_MACHINE_TYPE_SUPPORTED (PeCoffLoaderGetMachineType ((VOID *) (UINTN) ImageAddress))) {\r
919df8e6
LG
841 return EFI_UNSUPPORTED;\r
842 }\r
5d7f3126 843 return EFI_SUCCESS;\r
b0d803fe 844 }\r
845 }\r
846 Index++;\r
847 } while (!EFI_ERROR (PpiStatus));\r
848\r
8c519a56 849 return PpiStatus;\r
b0d803fe 850}\r
851\r
852\r
b1f6a7c6 853/**\r
b0d803fe 854\r
ed299e3c
LG
855 Install Pei Load File PPI.\r
856\r
857\r
858 @param PrivateData - Pointer to PEI_CORE_INSTANCE.\r
859 @param OldCoreData - Pointer to PEI_CORE_INSTANCE.\r
b0d803fe 860\r
b1f6a7c6 861**/\r
862VOID\r
863InitializeImageServices (\r
864 IN PEI_CORE_INSTANCE *PrivateData,\r
865 IN PEI_CORE_INSTANCE *OldCoreData\r
866 )\r
b0d803fe 867{\r
b0d803fe 868 if (OldCoreData == NULL) {\r
869 //\r
870 // The first time we are XIP (running from FLASH). We need to remember the\r
871 // FLASH address so we can reinstall the memory version that runs faster\r
872 //\r
873 PrivateData->XipLoadFile = &gPpiLoadFilePpiList;\r
874 PeiServicesInstallPpi (PrivateData->XipLoadFile);\r
875 } else {\r
876 //\r
54ea99a7 877 // 2nd time we are running from memory so replace the XIP version with the\r
878 // new memory version.\r
b0d803fe 879 //\r
54ea99a7 880 PeiServicesReInstallPpi (PrivateData->XipLoadFile, &gPpiLoadFilePpiList);\r
b0d803fe 881 }\r
882}\r
883\r
884\r
885\r
341a658f 886\r