1 // SPDX-License-Identifier: GPL-2.0+ 2 /* 3 * EFI image loader 4 * 5 * based partly on wine code 6 * 7 * Copyright (c) 2016 Alexander Graf 8 */ 9 10 #include <common.h> 11 #include <efi_loader.h> 12 #include <pe.h> 13 14 const efi_guid_t efi_global_variable_guid = EFI_GLOBAL_VARIABLE_GUID; 15 const efi_guid_t efi_guid_device_path = DEVICE_PATH_GUID; 16 const efi_guid_t efi_guid_loaded_image = LOADED_IMAGE_GUID; 17 const efi_guid_t efi_simple_file_system_protocol_guid = 18 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID; 19 const efi_guid_t efi_file_info_guid = EFI_FILE_INFO_GUID; 20 21 static int machines[] = { 22 #if defined(CONFIG_ARM64) 23 IMAGE_FILE_MACHINE_ARM64, 24 #elif defined(CONFIG_ARM) 25 IMAGE_FILE_MACHINE_ARM, 26 IMAGE_FILE_MACHINE_THUMB, 27 IMAGE_FILE_MACHINE_ARMNT, 28 #endif 29 30 #if defined(CONFIG_X86_64) 31 IMAGE_FILE_MACHINE_AMD64, 32 #elif defined(CONFIG_X86) 33 IMAGE_FILE_MACHINE_I386, 34 #endif 35 36 #if defined(CONFIG_CPU_RISCV_32) 37 IMAGE_FILE_MACHINE_RISCV32, 38 #endif 39 40 #if defined(CONFIG_CPU_RISCV_64) 41 IMAGE_FILE_MACHINE_RISCV64, 42 #endif 43 0 }; 44 45 /* 46 * Print information about a loaded image. 47 * 48 * If the program counter is located within the image the offset to the base 49 * address is shown. 50 * 51 * @image: loaded image 52 * @pc: program counter (use NULL to suppress offset output) 53 * @return: status code 54 */ 55 efi_status_t efi_print_image_info(struct efi_loaded_image *image, void *pc) 56 { 57 if (!image) 58 return EFI_INVALID_PARAMETER; 59 printf("UEFI image"); 60 printf(" [0x%p:0x%p]", 61 image->reloc_base, image->reloc_base + image->reloc_size - 1); 62 if (pc && pc >= image->reloc_base && 63 pc < image->reloc_base + image->reloc_size) 64 printf(" pc=0x%zx", pc - image->reloc_base); 65 if (image->file_path) 66 printf(" '%pD'", image->file_path); 67 printf("\n"); 68 return EFI_SUCCESS; 69 } 70 71 /* 72 * Print information about all loaded images. 73 * 74 * @pc: program counter (use NULL to suppress offset output) 75 */ 76 void efi_print_image_infos(void *pc) 77 { 78 struct efi_object *efiobj; 79 struct efi_handler *handler; 80 81 list_for_each_entry(efiobj, &efi_obj_list, link) { 82 list_for_each_entry(handler, &efiobj->protocols, link) { 83 if (!guidcmp(handler->guid, &efi_guid_loaded_image)) { 84 efi_print_image_info( 85 handler->protocol_interface, pc); 86 } 87 } 88 } 89 } 90 91 static efi_status_t efi_loader_relocate(const IMAGE_BASE_RELOCATION *rel, 92 unsigned long rel_size, void *efi_reloc, 93 unsigned long pref_address) 94 { 95 unsigned long delta = (unsigned long)efi_reloc - pref_address; 96 const IMAGE_BASE_RELOCATION *end; 97 int i; 98 99 if (delta == 0) 100 return EFI_SUCCESS; 101 102 end = (const IMAGE_BASE_RELOCATION *)((const char *)rel + rel_size); 103 while (rel < end - 1 && rel->SizeOfBlock) { 104 const uint16_t *relocs = (const uint16_t *)(rel + 1); 105 i = (rel->SizeOfBlock - sizeof(*rel)) / sizeof(uint16_t); 106 while (i--) { 107 uint32_t offset = (uint32_t)(*relocs & 0xfff) + 108 rel->VirtualAddress; 109 int type = *relocs >> EFI_PAGE_SHIFT; 110 uint64_t *x64 = efi_reloc + offset; 111 uint32_t *x32 = efi_reloc + offset; 112 uint16_t *x16 = efi_reloc + offset; 113 114 switch (type) { 115 case IMAGE_REL_BASED_ABSOLUTE: 116 break; 117 case IMAGE_REL_BASED_HIGH: 118 *x16 += ((uint32_t)delta) >> 16; 119 break; 120 case IMAGE_REL_BASED_LOW: 121 *x16 += (uint16_t)delta; 122 break; 123 case IMAGE_REL_BASED_HIGHLOW: 124 *x32 += (uint32_t)delta; 125 break; 126 case IMAGE_REL_BASED_DIR64: 127 *x64 += (uint64_t)delta; 128 break; 129 default: 130 printf("Unknown Relocation off %x type %x\n", 131 offset, type); 132 return EFI_LOAD_ERROR; 133 } 134 relocs++; 135 } 136 rel = (const IMAGE_BASE_RELOCATION *)relocs; 137 } 138 return EFI_SUCCESS; 139 } 140 141 void __weak invalidate_icache_all(void) 142 { 143 /* If the system doesn't support icache_all flush, cross our fingers */ 144 } 145 146 /* 147 * Determine the memory types to be used for code and data. 148 * 149 * @loaded_image_info image descriptor 150 * @image_type field Subsystem of the optional header for 151 * Windows specific field 152 */ 153 static void efi_set_code_and_data_type( 154 struct efi_loaded_image *loaded_image_info, 155 uint16_t image_type) 156 { 157 switch (image_type) { 158 case IMAGE_SUBSYSTEM_EFI_APPLICATION: 159 loaded_image_info->image_code_type = EFI_LOADER_CODE; 160 loaded_image_info->image_data_type = EFI_LOADER_DATA; 161 break; 162 case IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER: 163 loaded_image_info->image_code_type = EFI_BOOT_SERVICES_CODE; 164 loaded_image_info->image_data_type = EFI_BOOT_SERVICES_DATA; 165 break; 166 case IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER: 167 case IMAGE_SUBSYSTEM_EFI_ROM: 168 loaded_image_info->image_code_type = EFI_RUNTIME_SERVICES_CODE; 169 loaded_image_info->image_data_type = EFI_RUNTIME_SERVICES_DATA; 170 break; 171 default: 172 printf("%s: invalid image type: %u\n", __func__, image_type); 173 /* Let's assume it is an application */ 174 loaded_image_info->image_code_type = EFI_LOADER_CODE; 175 loaded_image_info->image_data_type = EFI_LOADER_DATA; 176 break; 177 } 178 } 179 180 /* 181 * This function loads all sections from a PE binary into a newly reserved 182 * piece of memory. On successful load it then returns the entry point for 183 * the binary. Otherwise NULL. 184 */ 185 void *efi_load_pe(void *efi, struct efi_loaded_image *loaded_image_info) 186 { 187 IMAGE_NT_HEADERS32 *nt; 188 IMAGE_DOS_HEADER *dos; 189 IMAGE_SECTION_HEADER *sections; 190 int num_sections; 191 void *efi_reloc; 192 int i; 193 const IMAGE_BASE_RELOCATION *rel; 194 unsigned long rel_size; 195 int rel_idx = IMAGE_DIRECTORY_ENTRY_BASERELOC; 196 void *entry; 197 uint64_t image_base; 198 uint64_t image_size; 199 unsigned long virt_size = 0; 200 int supported = 0; 201 202 dos = efi; 203 if (dos->e_magic != IMAGE_DOS_SIGNATURE) { 204 printf("%s: Invalid DOS Signature\n", __func__); 205 return NULL; 206 } 207 208 nt = (void *) ((char *)efi + dos->e_lfanew); 209 if (nt->Signature != IMAGE_NT_SIGNATURE) { 210 printf("%s: Invalid NT Signature\n", __func__); 211 return NULL; 212 } 213 214 for (i = 0; machines[i]; i++) 215 if (machines[i] == nt->FileHeader.Machine) { 216 supported = 1; 217 break; 218 } 219 220 if (!supported) { 221 printf("%s: Machine type 0x%04x is not supported\n", 222 __func__, nt->FileHeader.Machine); 223 return NULL; 224 } 225 226 /* Calculate upper virtual address boundary */ 227 num_sections = nt->FileHeader.NumberOfSections; 228 sections = (void *)&nt->OptionalHeader + 229 nt->FileHeader.SizeOfOptionalHeader; 230 231 for (i = num_sections - 1; i >= 0; i--) { 232 IMAGE_SECTION_HEADER *sec = §ions[i]; 233 virt_size = max_t(unsigned long, virt_size, 234 sec->VirtualAddress + sec->Misc.VirtualSize); 235 } 236 237 /* Read 32/64bit specific header bits */ 238 if (nt->OptionalHeader.Magic == IMAGE_NT_OPTIONAL_HDR64_MAGIC) { 239 IMAGE_NT_HEADERS64 *nt64 = (void *)nt; 240 IMAGE_OPTIONAL_HEADER64 *opt = &nt64->OptionalHeader; 241 image_base = opt->ImageBase; 242 image_size = opt->SizeOfImage; 243 efi_set_code_and_data_type(loaded_image_info, opt->Subsystem); 244 efi_reloc = efi_alloc(virt_size, 245 loaded_image_info->image_code_type); 246 if (!efi_reloc) { 247 printf("%s: Could not allocate %lu bytes\n", 248 __func__, virt_size); 249 return NULL; 250 } 251 entry = efi_reloc + opt->AddressOfEntryPoint; 252 rel_size = opt->DataDirectory[rel_idx].Size; 253 rel = efi_reloc + opt->DataDirectory[rel_idx].VirtualAddress; 254 virt_size = ALIGN(virt_size, opt->SectionAlignment); 255 } else if (nt->OptionalHeader.Magic == IMAGE_NT_OPTIONAL_HDR32_MAGIC) { 256 IMAGE_OPTIONAL_HEADER32 *opt = &nt->OptionalHeader; 257 image_base = opt->ImageBase; 258 image_size = opt->SizeOfImage; 259 efi_set_code_and_data_type(loaded_image_info, opt->Subsystem); 260 efi_reloc = efi_alloc(virt_size, 261 loaded_image_info->image_code_type); 262 if (!efi_reloc) { 263 printf("%s: Could not allocate %lu bytes\n", 264 __func__, virt_size); 265 return NULL; 266 } 267 entry = efi_reloc + opt->AddressOfEntryPoint; 268 rel_size = opt->DataDirectory[rel_idx].Size; 269 rel = efi_reloc + opt->DataDirectory[rel_idx].VirtualAddress; 270 virt_size = ALIGN(virt_size, opt->SectionAlignment); 271 } else { 272 printf("%s: Invalid optional header magic %x\n", __func__, 273 nt->OptionalHeader.Magic); 274 return NULL; 275 } 276 277 /* Load sections into RAM */ 278 for (i = num_sections - 1; i >= 0; i--) { 279 IMAGE_SECTION_HEADER *sec = §ions[i]; 280 memset(efi_reloc + sec->VirtualAddress, 0, 281 sec->Misc.VirtualSize); 282 memcpy(efi_reloc + sec->VirtualAddress, 283 efi + sec->PointerToRawData, 284 sec->SizeOfRawData); 285 } 286 287 /* Run through relocations */ 288 if (efi_loader_relocate(rel, rel_size, efi_reloc, 289 (unsigned long)image_base) != EFI_SUCCESS) { 290 efi_free_pages((uintptr_t) efi_reloc, 291 (virt_size + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT); 292 return NULL; 293 } 294 295 /* Flush cache */ 296 flush_cache((ulong)efi_reloc, 297 ALIGN(virt_size, EFI_CACHELINE_SIZE)); 298 invalidate_icache_all(); 299 300 /* Populate the loaded image interface bits */ 301 loaded_image_info->image_base = efi; 302 loaded_image_info->image_size = image_size; 303 loaded_image_info->reloc_base = efi_reloc; 304 loaded_image_info->reloc_size = virt_size; 305 306 return entry; 307 } 308