1 | ␊ |
2 | /*␊ |
3 | * Copyright 2007 David F. Elliott. All rights reserved.␊ |
4 | */␊ |
5 | ␊ |
6 | #include "libsaio.h"␊ |
7 | #include "boot.h"␊ |
8 | #include "bootstruct.h"␊ |
9 | #include "efi.h"␊ |
10 | #include "acpi.h"␊ |
11 | #include "fake_efi.h"␊ |
12 | #include "efi_tables.h"␊ |
13 | #include "platform.h"␊ |
14 | #include "acpi_patcher.h"␊ |
15 | #include "smbios_patcher.h"␊ |
16 | #include "device_inject.h"␊ |
17 | #include "convert.h"␊ |
18 | #include "pci.h"␊ |
19 | #include "sl.h"␊ |
20 | ␊ |
21 | extern struct SMBEntryPoint * getSmbios(int which); // now cached␊ |
22 | extern void setup_pci_devs(pci_dt_t *pci_dt);␊ |
23 | ␊ |
24 | /*␊ |
25 | Modern Darwin kernels require some amount of EFI because Apple machines all␊ |
26 | have EFI. Modifying the kernel source to not require EFI is of course␊ |
27 | possible but would have to be maintained as a separate patch because it is␊ |
28 | unlikely that Apple wishes to add legacy support to their kernel.␊ |
29 | ␊ |
30 | As you can see from the Apple-supplied code in bootstruct.c, it seems that␊ |
31 | the intention was clearly to modify this booter to provide EFI-like structures␊ |
32 | to the kernel rather than modifying the kernel to handle non-EFI stuff. This␊ |
33 | makes a lot of sense from an engineering point of view as it means the kernel␊ |
34 | for the as yet unreleased EFI-only Macs could still be booted by the non-EFI␊ |
35 | DTK systems so long as the kernel checked to ensure the boot tables were␊ |
36 | filled in appropriately. Modern xnu requires a system table and a runtime␊ |
37 | services table and performs no checks whatsoever to ensure the pointers to␊ |
38 | these tables are non-NULL. Therefore, any modern xnu kernel will page fault␊ |
39 | early on in the boot process if the system table pointer is zero.␊ |
40 | ␊ |
41 | Even before that happens, the tsc_init function in modern xnu requires the FSB␊ |
42 | Frequency to be a property in the /efi/platform node of the device tree or else␊ |
43 | it panics the bootstrap process very early on.␊ |
44 | ␊ |
45 | As of this writing, the current implementation found here is good enough␊ |
46 | to make the currently available xnu kernel boot without modification on a␊ |
47 | system with an appropriate processor. With a minor source modification to␊ |
48 | the tsc_init function to remove the explicit check for Core or Core 2␊ |
49 | processors the kernel can be made to boot on other processors so long as␊ |
50 | the code can be executed by the processor and the machine contains the␊ |
51 | necessary hardware.␊ |
52 | */␊ |
53 | ␊ |
54 | ␊ |
55 | /*==========================================================================␊ |
56 | * Utility function to make a device tree string from an EFI_GUID␊ |
57 | */␊ |
58 | ␊ |
59 | static inline char * mallocStringForGuid(EFI_GUID const *pGuid)␊ |
60 | {␊ |
61 | char *string = malloc(37);␊ |
62 | efi_guid_unparse_upper(pGuid, string);␊ |
63 | return string;␊ |
64 | }␊ |
65 | ␊ |
66 | ␊ |
67 | /*==========================================================================␊ |
68 | * Function to map 32 bit physical address to 64 bit virtual address␊ |
69 | */␊ |
70 | static uint64_t ptov64(uint32_t addr)␊ |
71 | {␊ |
72 | return ((uint64_t)addr | 0xFFFFFF8000000000ULL);␊ |
73 | }␊ |
74 | ␊ |
75 | ␊ |
76 | /*==========================================================================␊ |
77 | * Fake EFI implementation␊ |
78 | */␊ |
79 | ␊ |
80 | /* Identify ourselves as the EFI firmware vendor */␊ |
81 | static EFI_CHAR16 const FIRMWARE_VENDOR[] = {'C','h','a','m','e','l','e','o','n','_','2','.','0', 0};␊ |
82 | static EFI_UINT32 const FIRMWARE_REVISION = 132; /* FIXME: Find a constant for this. */␊ |
83 | ␊ |
84 | /* Default platform system_id (fix by IntVar) */␊ |
85 | static EFI_CHAR8 const SYSTEM_ID[] = "0123456789ABCDEF";//random value gen by uuidgen␊ |
86 | ␊ |
87 | /* Just a ret instruction */␊ |
88 | static uint8_t const VOIDRET_INSTRUCTIONS[] = {0xc3};␊ |
89 | /* movl $0x80000003,%eax; ret */␊ |
90 | static uint8_t const UNSUPPORTEDRET_INSTRUCTIONS[] = {0xb8, 0x03, 0x00, 0x00, 0x80, 0xc3};␊ |
91 | ␊ |
92 | ␊ |
93 | /* We use the fake_efi_pages struct so that we only need to do one kernel␊ |
94 | * memory allocation for all needed EFI data. Otherwise, small allocations␊ |
95 | * like the FIRMWARE_VENDOR string would take up an entire page.␊ |
96 | * NOTE WELL: Do NOT assume this struct has any particular layout within itself.␊ |
97 | * It is absolutely not intended to be publicly exposed anywhere␊ |
98 | * We say pages (plural) although right now we are well within the 1 page size␊ |
99 | * and probably will stay that way.␊ |
100 | */␊ |
101 | struct fake_efi_pages␊ |
102 | {␊ |
103 | EFI_SYSTEM_TABLE_64 efiSystemTable;␊ |
104 | EFI_RUNTIME_SERVICES_64 efiRuntimeServices;␊ |
105 | EFI_CONFIGURATION_TABLE_64 efiConfigurationTable[MAX_CONFIGURATION_TABLE_ENTRIES];␊ |
106 | EFI_CHAR16 firmwareVendor[sizeof(FIRMWARE_VENDOR)/sizeof(EFI_CHAR16)];␊ |
107 | uint8_t voidret_instructions[sizeof(VOIDRET_INSTRUCTIONS)/sizeof(uint8_t)];␊ |
108 | uint8_t unsupportedret_instructions[sizeof(UNSUPPORTEDRET_INSTRUCTIONS)/sizeof(uint8_t)];␊ |
109 | };␊ |
110 | ␊ |
111 | EFI_SYSTEM_TABLE_64 *gST = NULL;␊ |
112 | Node *gEfiConfigurationTableNode = NULL;␊ |
113 | ␊ |
114 | extern EFI_STATUS addConfigurationTable(EFI_GUID const *pGuid, void *table, char const *alias)␊ |
115 | {␊ |
116 | EFI_UINTN i = gST->NumberOfTableEntries;␊ |
117 | /* We only do adds, not modifications and deletes like InstallConfigurationTable */␊ |
118 | if(i >= MAX_CONFIGURATION_TABLE_ENTRIES)␊ |
119 | stop("Ran out of space for configuration tables. Increase the reserved size in the code.\n");␊ |
120 | ␊ |
121 | if(pGuid == NULL)␊ |
122 | return EFI_INVALID_PARAMETER;␊ |
123 | ␊ |
124 | if(table != NULL)␊ |
125 | {␊ |
126 | ␉/* FIXME␊ |
127 | ((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorGuid = *pGuid;␊ |
128 | ((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorTable = (EFI_PTR64)table;␊ |
129 | ␊ |
130 | ++gST->NumberOfTableEntries;␊ |
131 | ␉␉ */␊ |
132 | Node *tableNode = DT__AddChild(gEfiConfigurationTableNode, mallocStringForGuid(pGuid));␊ |
133 | ␊ |
134 | /* Use the pointer to the GUID we just stuffed into the system table */␊ |
135 | ␉ ␉DT__AddProperty(tableNode, "guid", sizeof(EFI_GUID), (void*)pGuid);␊ |
136 | ␊ |
137 | /* The "table" property is the 32-bit (in our implementation) physical address of the table */␊ |
138 | ␉␉DT__AddProperty(tableNode, "table", sizeof(void*) * 2, table);␊ |
139 | ␊ |
140 | /* Assume the alias pointer is a global or static piece of data */␊ |
141 | if(alias != NULL)␊ |
142 | DT__AddProperty(tableNode, "alias", strlen(alias)+1, (char*)alias);␊ |
143 | ␊ |
144 | return EFI_SUCCESS;␊ |
145 | }␊ |
146 | return EFI_UNSUPPORTED;␊ |
147 | }␊ |
148 | ␊ |
149 | static inline void fixupEfiSystemTableCRC32(EFI_SYSTEM_TABLE_64 *efiSystemTable)␊ |
150 | {␊ |
151 | efiSystemTable->Hdr.CRC32 = 0;␊ |
152 | efiSystemTable->Hdr.CRC32 = crc32(0L, efiSystemTable, efiSystemTable->Hdr.HeaderSize);␊ |
153 | }␊ |
154 | ␊ |
155 | /*␊ |
156 | What we do here is simply allocate a fake EFI system table and a fake EFI␊ |
157 | runtime services table.␊ |
158 | ␊ |
159 | Because we build against modern headers with kBootArgsRevision 4 we␊ |
160 | also take care to set efiMode = 32.␊ |
161 | */␊ |
162 | void␊ |
163 | setupEfiTables(void)␊ |
164 | {␊ |
165 | struct fake_efi_pages *fakeEfiPages= (struct fake_efi_pages*)AllocateKernelMemory(sizeof(struct fake_efi_pages));␊ |
166 | ␊ |
167 | /* Zero out all the tables in case fields are added later */␊ |
168 | bzero(fakeEfiPages, sizeof(struct fake_efi_pages));␊ |
169 | ␊ |
170 | /* --------------------------------------------------------------------␊ |
171 | * Initialize some machine code that will return EFI_UNSUPPORTED for␊ |
172 | * functions returning int and simply return for void functions.␊ |
173 | */␊ |
174 | memcpy(fakeEfiPages->voidret_instructions, VOIDRET_INSTRUCTIONS, sizeof(VOIDRET_INSTRUCTIONS));␊ |
175 | memcpy(fakeEfiPages->unsupportedret_instructions, UNSUPPORTEDRET_INSTRUCTIONS, sizeof(UNSUPPORTEDRET_INSTRUCTIONS));␊ |
176 | ␊ |
177 | /* -------------------------------------------------------------------- */␊ |
178 | /* System table */␊ |
179 | EFI_SYSTEM_TABLE_64 *efiSystemTable = gST = &fakeEfiPages->efiSystemTable;␊ |
180 | efiSystemTable->Hdr.Signature = EFI_SYSTEM_TABLE_SIGNATURE;␊ |
181 | efiSystemTable->Hdr.Revision = EFI_SYSTEM_TABLE_REVISION;␊ |
182 | efiSystemTable->Hdr.HeaderSize = sizeof(EFI_SYSTEM_TABLE_64);␊ |
183 | efiSystemTable->Hdr.CRC32 = 0; /* Initialize to zero and then do CRC32 */␊ |
184 | efiSystemTable->Hdr.Reserved = 0;␊ |
185 | ␊ |
186 | efiSystemTable->FirmwareVendor = (EFI_PTR32)&fakeEfiPages->firmwareVendor;␊ |
187 | memcpy(fakeEfiPages->firmwareVendor, FIRMWARE_VENDOR, sizeof(FIRMWARE_VENDOR));␊ |
188 | efiSystemTable->FirmwareRevision = FIRMWARE_REVISION;␊ |
189 | ␊ |
190 | /* XXX: We may need to have basic implementations of ConIn/ConOut/StdErr */␊ |
191 | /* The EFI spec states that all handles are invalid after boot services have been␊ |
192 | * exited so we can probably get by with leaving the handles as zero. */␊ |
193 | efiSystemTable->ConsoleInHandle = 0;␊ |
194 | efiSystemTable->ConIn = 0;␊ |
195 | ␊ |
196 | efiSystemTable->ConsoleOutHandle = 0;␊ |
197 | efiSystemTable->ConOut = 0;␊ |
198 | ␊ |
199 | efiSystemTable->StandardErrorHandle = 0;␊ |
200 | efiSystemTable->StdErr = 0;␊ |
201 | ␊ |
202 | efiSystemTable->RuntimeServices = ptov64((EFI_PTR32)&fakeEfiPages->efiRuntimeServices);␊ |
203 | /* According to the EFI spec, BootServices aren't valid after the␊ |
204 | * boot process is exited so we can probably do without it.␊ |
205 | * Apple didn't provide a definition for it in pexpert/i386/efi.h␊ |
206 | * so I'm guessing they don't use it.␊ |
207 | */␊ |
208 | efiSystemTable->BootServices = 0;␊ |
209 | ␊ |
210 | efiSystemTable->NumberOfTableEntries = 0;␊ |
211 | efiSystemTable->ConfigurationTable = (EFI_PTR32)fakeEfiPages->efiConfigurationTable;␊ |
212 | ␊ |
213 | ␊ |
214 | /* We're done. Now CRC32 the thing so the kernel will accept it */␊ |
215 | fixupEfiSystemTableCRC32(efiSystemTable);␊ |
216 | ␊ |
217 | /* -------------------------------------------------------------------- */␊ |
218 | /* Runtime services */␊ |
219 | EFI_RUNTIME_SERVICES_64 *efiRuntimeServices = &fakeEfiPages->efiRuntimeServices;␊ |
220 | efiRuntimeServices->Hdr.Signature = EFI_RUNTIME_SERVICES_SIGNATURE;␊ |
221 | efiRuntimeServices->Hdr.Revision = EFI_RUNTIME_SERVICES_REVISION;␊ |
222 | efiRuntimeServices->Hdr.HeaderSize = sizeof(EFI_RUNTIME_SERVICES_64);␊ |
223 | efiRuntimeServices->Hdr.CRC32 = 0;␊ |
224 | efiRuntimeServices->Hdr.Reserved = 0;␊ |
225 | ␊ |
226 | /* There are a number of function pointers in the efiRuntimeServices table.␊ |
227 | * These are the Foundation (e.g. core) services and are expected to be present on␊ |
228 | * all EFI-compliant machines. Some kernel extensions (notably AppleEFIRuntime)␊ |
229 | * will call these without checking to see if they are null.␊ |
230 | *␊ |
231 | * We don't really feel like doing an EFI implementation in the bootloader␊ |
232 | * but it is nice if we can at least prevent a complete crash by␊ |
233 | * at least providing some sort of implementation until one can be provided␊ |
234 | * nicely in a kext.␊ |
235 | */␊ |
236 | void (*voidret_fp)() = (void*)fakeEfiPages->voidret_instructions;␊ |
237 | void (*unsupportedret_fp)() = (void*)fakeEfiPages->unsupportedret_instructions;␊ |
238 | efiRuntimeServices->GetTime = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
239 | efiRuntimeServices->SetTime = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
240 | efiRuntimeServices->GetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
241 | efiRuntimeServices->SetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
242 | efiRuntimeServices->SetVirtualAddressMap = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
243 | efiRuntimeServices->ConvertPointer = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
244 | efiRuntimeServices->GetVariable = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
245 | efiRuntimeServices->GetNextVariableName = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
246 | efiRuntimeServices->SetVariable = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
247 | efiRuntimeServices->GetNextHighMonotonicCount = ptov64((EFI_PTR32)unsupportedret_fp);␊ |
248 | efiRuntimeServices->ResetSystem = ptov64((EFI_PTR32)voidret_fp);␊ |
249 | ␊ |
250 | /* We're done. Now CRC32 the thing so the kernel will accept it */␊ |
251 | efiRuntimeServices->Hdr.CRC32 = crc32(0L, efiRuntimeServices, efiRuntimeServices->Hdr.HeaderSize);␊ |
252 | ␊ |
253 | ␊ |
254 | /* -------------------------------------------------------------------- */␊ |
255 | /* Finish filling in the rest of the boot args that we need. */␊ |
256 | bootArgs->efiSystemTable = (uint32_t)efiSystemTable;␊ |
257 | bootArgs->efiMode = kBootArgsEfiMode64;␊ |
258 | ␊ |
259 | /* The bootArgs structure as a whole is bzero'd so we don't need to fill in␊ |
260 | * things like efiRuntimeServices* and what not.␊ |
261 | *␊ |
262 | * In fact, the only code that seems to use that is the hibernate code so it␊ |
263 | * knows not to save the pages. It even checks to make sure its nonzero.␊ |
264 | */␊ |
265 | }␊ |
266 | ␊ |
267 | /*␊ |
268 | In addition to the EFI tables there is also the EFI device tree node.␊ |
269 | In particular, we need /efi/platform to have an FSBFrequency key. Without it,␊ |
270 | the tsc_init function will panic very early on in kernel startup, before␊ |
271 | the console is available.␊ |
272 | */␊ |
273 | ␊ |
274 | /*==========================================================================␊ |
275 | * FSB Frequency detection␊ |
276 | */␊ |
277 | ␊ |
278 | /* These should be const but DT__AddProperty takes char* */␊ |
279 | static const char const TSC_Frequency_prop[] = "TSCFrequency";␊ |
280 | static const char const FSB_Frequency_prop[] = "FSBFrequency";␊ |
281 | static const char const CPU_Frequency_prop[] = "CPUFrequency";␊ |
282 | ␊ |
283 | /*==========================================================================␊ |
284 | * SMBIOS␊ |
285 | */␊ |
286 | ␊ |
287 | /* From Foundation/Efi/Guid/Smbios/SmBios.c */␊ |
288 | EFI_GUID const gEfiSmbiosTableGuid = EFI_SMBIOS_TABLE_GUID;␊ |
289 | ␊ |
290 | #define SMBIOS_RANGE_START 0x000F0000␊ |
291 | #define SMBIOS_RANGE_END 0x000FFFFF␊ |
292 | ␊ |
293 | /* '_SM_' in little endian: */␊ |
294 | #define SMBIOS_ANCHOR_UINT32_LE 0x5f4d535f␊ |
295 | ␊ |
296 | #define EFI_ACPI_TABLE_GUID \␊ |
297 | { \␊ |
298 | 0xeb9d2d30, 0x2d88, 0x11d3, { 0x9a, 0x16, 0x0, 0x90, 0x27, 0x3f, 0xc1, 0x4d } \␊ |
299 | }␊ |
300 | ␊ |
301 | #define EFI_ACPI_20_TABLE_GUID \␊ |
302 | { \␊ |
303 | 0x8868e871, 0xe4f1, 0x11d3, { 0xbc, 0x22, 0x0, 0x80, 0xc7, 0x3c, 0x88, 0x81 } \␊ |
304 | }␊ |
305 | ␊ |
306 | EFI_GUID gEfiAcpiTableGuid = EFI_ACPI_TABLE_GUID;␊ |
307 | EFI_GUID gEfiAcpi20TableGuid = EFI_ACPI_20_TABLE_GUID;␊ |
308 | ␊ |
309 | ␊ |
310 | /*==========================================================================␊ |
311 | * Fake EFI implementation␊ |
312 | */␊ |
313 | ␊ |
314 | /* These should be const but DT__AddProperty takes char* */␊ |
315 | static const char const FIRMWARE_REVISION_PROP[] = "firmware-revision";␊ |
316 | static const char const FIRMWARE_ABI_PROP[] = "firmware-abi";␊ |
317 | static const char const FIRMWARE_VENDOR_PROP[] = "firmware-vendor";␊ |
318 | static const char const FIRMWARE_ABI_PROP_VALUE[] = "EFI64";␊ |
319 | static const char const SYSTEM_ID_PROP[] = "system-id";␊ |
320 | static const char const SYSTEM_SERIAL_PROP[] = "SystemSerialNumber";␊ |
321 | static const char const SYSTEM_TYPE_PROP[] = "system-type";␊ |
322 | static const char const MODEL_PROP[] = "Model";␊ |
323 | ␊ |
324 | ␊ |
325 | /* Get an smbios option string option to convert to EFI_CHAR16 string */␊ |
326 | static EFI_CHAR16* getSmbiosChar16(const char * key, size_t* len)␊ |
327 | {␊ |
328 | const char * src= getStringForKey(key, &bootInfo->smbiosConfig);␊ |
329 | EFI_CHAR16* dst = 0;␊ |
330 | size_t i=0;␊ |
331 | ␊ |
332 | if (!key || !(*key) || !len || !src) return 0;␊ |
333 | ␊ |
334 | *len = strlen(src);␊ |
335 | dst = (EFI_CHAR16*) malloc( ((*len)+1) * 2 );␊ |
336 | for (; i < (*len); i++) dst[i] = src[i];␊ |
337 | dst[(*len)] = '\0';␊ |
338 | *len = ((*len)+1)*2; // return the CHAR16 bufsize in cluding zero terminated CHAR16␊ |
339 | return dst;␊ |
340 | }␊ |
341 | ␊ |
342 | /* Get the SystemID from the bios dmi info */␊ |
343 | static EFI_CHAR8* getSmbiosUUID()␊ |
344 | {␊ |
345 | ␉struct SMBEntryPoint␉*smbios;␊ |
346 | ␉SMBByte␉␉␉*p;␊ |
347 | ␉int␉␉␉i, isZero, isOnes;␊ |
348 | ␉static EFI_CHAR8 uuid[UUID_LEN];␊ |
349 | ␊ |
350 | ␉smbios = getSmbios(SMBIOS_PATCHED);␉/* checks for _SM_ anchor and table header checksum */␊ |
351 | ␉if (smbios==NULL) return 0; // getSmbios() return a non null value if smbios is found␊ |
352 | ␊ |
353 | ␉p = (SMBByte*) FindFirstDmiTableOfType(1, 0x19); /* Type 1: (3.3.2) System Information */␊ |
354 | ␉if (p==NULL) return NULL;␊ |
355 | ␊ |
356 | ␉verbose("Found SMBIOS System Information Table 1\n");␊ |
357 | ␉p += 8;␊ |
358 | ␊ |
359 | ␉for (i=0, isZero=1, isOnes=1; i<UUID_LEN; i++) {␊ |
360 | ␉␉if (p[i] != 0x00) isZero = 0;␊ |
361 | ␉␉if (p[i] != 0xff) isOnes = 0;␊ |
362 | ␉}␊ |
363 | ␉if (isZero || isOnes) {␉/* empty or setable means: no uuid present */␊ |
364 | ␉␉verbose("No UUID present in SMBIOS System Information Table\n");␊ |
365 | ␉␉return 0;␊ |
366 | ␉}␊ |
367 | ␊ |
368 | ␉memcpy(uuid, p, UUID_LEN);␊ |
369 | ␉return uuid;␊ |
370 | }␊ |
371 | ␊ |
372 | /* return a binary UUID value from the overriden SystemID and SMUUID if found, ␊ |
373 | * or from the bios if not, or from a fixed value if no bios value is found ␊ |
374 | */␊ |
375 | static EFI_CHAR8* getSystemID()␊ |
376 | { // unable to determine UUID for host. Error: 35 fix␊ |
377 | ␊ |
378 | // Rek: new SMsystemid option conforming to smbios notation standards, this option should␊ |
379 | // belong to smbios config only ...␊ |
380 | const char * sysId = getStringForKey(kSystemID, &bootInfo->bootConfig);␊ |
381 | EFI_CHAR8* ret = getUUIDFromString(sysId);␊ |
382 | ␊ |
383 | if(!sysId || !ret) { // try bios dmi info UUID extraction ␊ |
384 | ret = getSmbiosUUID();␊ |
385 | sysId = 0;␊ |
386 | }␊ |
387 | if(!ret) // no bios dmi UUID available, set a fixed value for system-id␊ |
388 | ret=getUUIDFromString((sysId = (const char*) SYSTEM_ID));␊ |
389 | ␊ |
390 | verbose("Customizing SystemID with : %s\n", getStringFromUUID(ret)); // apply a nice formatting to the displayed output␊ |
391 | return ret;␊ |
392 | }␊ |
393 | ␊ |
394 | // must be called AFTER setup Acpi because we need to take care of correct facp content to reflect in ioregs␊ |
395 | void setupSystemType()␊ |
396 | {␊ |
397 | Node *node = DT__FindNode("/", false);␊ |
398 | if (node == 0) stop("Couldn't get root node");␊ |
399 | // we need to write this property after facp parsing␊ |
400 | /* Export system-type only if it has been overrriden by the SystemType option */␊ |
401 | DT__AddProperty(node, SYSTEM_TYPE_PROP, sizeof(Platform.Type), &Platform.Type);␊ |
402 | }␊ |
403 | ␊ |
404 | void setupEfiDeviceTree(void)␊ |
405 | {␊ |
406 | EFI_CHAR16* ret16=0;␊ |
407 | EFI_CHAR8* ret=0;␊ |
408 | size_t len=0;␊ |
409 | Node *node;␊ |
410 | ␊ |
411 | node = DT__FindNode("/", false);␊ |
412 | ␊ |
413 | if (node == 0) stop("Couldn't get root node");␊ |
414 | ␊ |
415 | /* We could also just do DT__FindNode("/efi/platform", true)␊ |
416 | * But I think eventually we want to fill stuff in the efi node␊ |
417 | * too so we might as well create it so we have a pointer for it too.␊ |
418 | */␊ |
419 | node = DT__AddChild(node, "efi");␊ |
420 | ␊ |
421 | DT__AddProperty(node, FIRMWARE_REVISION_PROP, sizeof(FIRMWARE_REVISION), (EFI_UINT32*)&FIRMWARE_REVISION);␊ |
422 | DT__AddProperty(node, FIRMWARE_ABI_PROP, sizeof(FIRMWARE_ABI_PROP_VALUE), (char*)FIRMWARE_ABI_PROP_VALUE);␊ |
423 | DT__AddProperty(node, FIRMWARE_VENDOR_PROP, sizeof(FIRMWARE_VENDOR), (EFI_CHAR16*)FIRMWARE_VENDOR);␊ |
424 | ␊ |
425 | /* TODO: Fill in other efi properties if necessary */␊ |
426 | ␊ |
427 | /* Set up the /efi/runtime-services table node similar to the way a child node of configuration-table␊ |
428 | * is set up. That is, name and table properties */␊ |
429 | Node *runtimeServicesNode = DT__AddChild(node, "runtime-services");␊ |
430 | ␊ |
431 | /* The value of the table property is the 32-bit physical address for the RuntimeServices table.␊ |
432 | * Since the EFI system table already has a pointer to it, we simply use the address of that pointer␊ |
433 | * for the pointer to the property data. Warning.. DT finalization calls free on that but we're not␊ |
434 | * the only thing to use a non-malloc'd pointer for something in the DT␊ |
435 | */␊ |
436 | DT__AddProperty(runtimeServicesNode, "table", sizeof(uint64_t), &gST->RuntimeServices);␊ |
437 | ␊ |
438 | /* Set up the /efi/configuration-table node which will eventually have several child nodes for␊ |
439 | * all of the configuration tables needed by various kernel extensions.␊ |
440 | */␊ |
441 | gEfiConfigurationTableNode = DT__AddChild(node, "configuration-table");␊ |
442 | ␊ |
443 | /* Now fill in the /efi/platform Node */␊ |
444 | Node *efiPlatformNode = DT__AddChild(node, "platform");␊ |
445 | ␊ |
446 | /* NOTE WELL: If you do add FSB Frequency detection, make sure to store␊ |
447 | * the value in the fsbFrequency global and not an malloc'd pointer␊ |
448 | * because the DT_AddProperty function does not copy its args.␊ |
449 | */␊ |
450 | if(Platform.CPU.FSBFrequency != 0) ␊ |
451 | DT__AddProperty(efiPlatformNode, FSB_Frequency_prop, sizeof(uint64_t), &Platform.CPU.FSBFrequency);␊ |
452 | ␊ |
453 | /* Export TSC and CPU frequencies for use by the kernel or KEXTs */␊ |
454 | if(Platform.CPU.TSCFrequency != 0) ␊ |
455 | DT__AddProperty(efiPlatformNode, TSC_Frequency_prop, sizeof(uint64_t), &Platform.CPU.TSCFrequency);␊ |
456 | ␊ |
457 | if(Platform.CPU.CPUFrequency != 0) ␊ |
458 | DT__AddProperty(efiPlatformNode, CPU_Frequency_prop, sizeof(uint64_t), &Platform.CPU.CPUFrequency);␊ |
459 | ␊ |
460 | /* Export system-id. Can be disabled with system-id=No in com.apple.Boot.plist */␊ |
461 | if((ret=getSystemID()))␊ |
462 | DT__AddProperty(efiPlatformNode, SYSTEM_ID_PROP, UUID_LEN, (EFI_UINT32*) ret);␊ |
463 | ␊ |
464 | /* Export SystemSerialNumber if present */␊ |
465 | if ((ret16=getSmbiosChar16("SMserial", &len)))␊ |
466 | DT__AddProperty(efiPlatformNode, SYSTEM_SERIAL_PROP, len, ret16);␊ |
467 | ␊ |
468 | /* Export Model if present */␊ |
469 | if ((ret16=getSmbiosChar16("SMproductname", &len)))␊ |
470 | DT__AddProperty(efiPlatformNode, MODEL_PROP, len, ret16);␊ |
471 | ␊ |
472 | /* Fill /efi/device-properties node.␊ |
473 | */␊ |
474 | setupDeviceProperties(node);␊ |
475 | }␊ |
476 | ␊ |
477 | /* Load the smbios.plist override config file if any */␊ |
478 | static void setupSmbiosConfigFile()␊ |
479 | {␊ |
480 | const char * value = getStringForKey(kSMBIOS, &bootInfo->bootConfig);␊ |
481 | extern void scan_mem();␊ |
482 | ␊ |
483 | if (!value) value = "/Extra/smbios.plist";␊ |
484 | if (loadConfigFile(value, &bootInfo->smbiosConfig) == -1) {␊ |
485 | verbose("No SMBIOS replacement found\n");␊ |
486 | }␊ |
487 | ␊ |
488 | // get a chance to scan mem dynamically if user asks for it while having the config options loaded as well␊ |
489 | // as opposed to when it was in scan_platform(), also load the orig. smbios so that we can access dmi info without␊ |
490 | // patching the smbios yet␊ |
491 | getSmbios(SMBIOS_ORIGINAL);␊ |
492 | scan_mem(); ␊ |
493 | smbios_p = (EFI_PTR32) getSmbios(SMBIOS_PATCHED);␉// process smbios asap␊ |
494 | }␊ |
495 | ␊ |
496 | /* Installs all the needed configuration table entries */␊ |
497 | static void setupEfiConfigurationTable()␊ |
498 | {␊ |
499 | smbios_p = (EFI_PTR32)getSmbios(SMBIOS_PATCHED);␊ |
500 | addConfigurationTable(&gEfiSmbiosTableGuid, &smbios_p, NULL);␊ |
501 | ␊ |
502 | // Setup ACPI with DSDT overrides (mackerintel's patch)␊ |
503 | setupAcpi();␊ |
504 | ␊ |
505 | // We've obviously changed the count.. so fix up the CRC32␊ |
506 | fixupEfiSystemTableCRC32(gST);␊ |
507 | }␊ |
508 | ␊ |
509 | static void setupEfiDevices(setup)␊ |
510 | {␊ |
511 | ␉setup_pci_devs(root_pci_dev);␊ |
512 | }␊ |
513 | ␊ |
514 | /* Entrypoint from boot.c */␊ |
515 | void setupFakeEfi(void)␊ |
516 | {␊ |
517 | ␉// load smbios.plist file if any␊ |
518 | ␉setupSmbiosConfigFile();␊ |
519 | ␉␊ |
520 | ␉// Generate efi device strings ␊ |
521 | ␉setupEfiDevices();␊ |
522 | ␉␊ |
523 | ␉// Initialize the base table␊ |
524 | ␉setupEfiTables();␊ |
525 | ␉␊ |
526 | ␉// Initialize the device tree␊ |
527 | ␉setupEfiDeviceTree();␊ |
528 | ␉␊ |
529 | ␉// Add configuration table entries to both the services table and the device tree␊ |
530 | ␉setupEfiConfigurationTable();␊ |
531 | }␊ |
532 | ␊ |
533 | |