Chameleon

Chameleon Svn Source Tree

Root/branches/ErmaC/i386/libsaio/fake_efi.c

1
2/*
3 * Copyright 2007 David F. Elliott. All rights reserved.
4 */
5
6#include "libsaio.h"
7#include "boot.h"
8#include "bootstruct.h"
9#include "efi.h"
10#include "acpi.h"
11#include "fake_efi.h"
12#include "efi_tables.h"
13#include "platform.h"
14#include "acpi_patcher.h"
15#include "smbios.h"
16#include "device_inject.h"
17#include "convert.h"
18#include "pci.h"
19#include "sl.h"
20
21extern void setup_pci_devs(pci_dt_t *pci_dt);
22
23/*
24 * Modern Darwin kernels require some amount of EFI because Apple machines all
25 * have EFI. Modifying the kernel source to not require EFI is of course
26 * possible but would have to be maintained as a separate patch because it is
27 * unlikely that Apple wishes to add legacy support to their kernel.
28 *
29 * As you can see from the Apple-supplied code in bootstruct.c, it seems that
30 * the intention was clearly to modify this booter to provide EFI-like structures
31 * to the kernel rather than modifying the kernel to handle non-EFI stuff. This
32 * makes a lot of sense from an engineering point of view as it means the kernel
33 * for the as yet unreleased EFI-only Macs could still be booted by the non-EFI
34 * DTK systems so long as the kernel checked to ensure the boot tables were
35 * filled in appropriately.Modern xnu requires a system table and a runtime
36 * services table and performs no checks whatsoever to ensure the pointers to
37 * these tables are non-NULL. Therefore, any modern xnu kernel will page fault
38 * early on in the boot process if the system table pointer is zero.
39 *
40 * Even before that happens, the tsc_init function in modern xnu requires the FSB
41 * Frequency to be a property in the /efi/platform node of the device tree or else
42 * it panics the bootstrap process very early on.
43 *
44 * As of this writing, the current implementation found here is good enough
45 * to make the currently available xnu kernel boot without modification on a
46 * system with an appropriate processor. With a minor source modification to
47 * the tsc_init function to remove the explicit check for Core or Core 2
48 * processors the kernel can be made to boot on other processors so long as
49 * the code can be executed by the processor and the machine contains the
50 * necessary hardware.
51 */
52
53/*==========================================================================
54 * Utility function to make a device tree string from an EFI_GUID
55 */
56static inline char * mallocStringForGuid(EFI_GUID const *pGuid)
57{
58char *string = malloc(37);
59efi_guid_unparse_upper(pGuid, string);
60return string;
61}
62
63/*==========================================================================
64 * Function to map 32 bit physical address to 64 bit virtual address
65 */
66static uint64_t ptov64(uint32_t addr)
67{
68return ((uint64_t)addr | 0xFFFFFF8000000000ULL);
69}
70
71/*==========================================================================
72 * Fake EFI implementation
73 */
74
75/* Identify ourselves as the EFI firmware vendor */
76static EFI_CHAR16 const FIRMWARE_VENDOR[] = {'.',':','E','r','m','a','C',':','.','_','1','.','0', 0};
77static EFI_UINT32 const FIRMWARE_REVISION = 132; /* FIXME: Find a constant for this. */
78
79/* Default platform system_id (fix by IntVar) */
80static EFI_CHAR8 const SYSTEM_ID[] = "0123456789ABCDEF"; //random value gen by uuidgen
81
82/* Just a ret instruction */
83static uint8_t const VOIDRET_INSTRUCTIONS[] = {0xc3};
84
85/* movl $0x80000003,%eax; ret */
86static uint8_t const UNSUPPORTEDRET_INSTRUCTIONS[] = {0xb8, 0x03, 0x00, 0x00, 0x80, 0xc3};
87
88EFI_SYSTEM_TABLE_32 *gST32 = NULL;
89EFI_SYSTEM_TABLE_64 *gST64 = NULL;
90Node *gEfiConfigurationTableNode = NULL;
91
92extern EFI_STATUS addConfigurationTable(EFI_GUID const *pGuid, void *table, char const *alias)
93{
94EFI_UINTN i = 0;
95
96//Azi: as is, cpu's with em64t will use EFI64 on pre 10.6 systems,
97// wich seems to cause no problem. In case it does, force i386 arch.
98if (archCpuType == CPU_TYPE_I386)
99{
100i = gST32->NumberOfTableEntries;
101}
102else
103{
104i = gST64->NumberOfTableEntries;
105}
106
107// We only do adds, not modifications and deletes like InstallConfigurationTable
108if (i >= MAX_CONFIGURATION_TABLE_ENTRIES)
109stop("Ran out of space for configuration tables. Increase the reserved size in the code.\n");
110
111if (pGuid == NULL)
112return EFI_INVALID_PARAMETER;
113
114if (table != NULL)
115{
116// FIXME
117//((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorGuid = *pGuid;
118//((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorTable = (EFI_PTR64)table;
119
120//++gST->NumberOfTableEntries;
121
122Node *tableNode = DT__AddChild(gEfiConfigurationTableNode, mallocStringForGuid(pGuid));
123
124// Use the pointer to the GUID we just stuffed into the system table
125DT__AddProperty(tableNode, "guid", sizeof(EFI_GUID), (void*)pGuid);
126
127// The "table" property is the 32-bit (in our implementation) physical address of the table
128DT__AddProperty(tableNode, "table", sizeof(void*) * 2, table);
129
130// Assume the alias pointer is a global or static piece of data
131if (alias != NULL)
132DT__AddProperty(tableNode, "alias", strlen(alias)+1, (char*)alias);
133
134return EFI_SUCCESS;
135}
136return EFI_UNSUPPORTED;
137}
138
139//Azi: crc32 done in place, on the cases were it wasn't.
140/*static inline void fixupEfiSystemTableCRC32(EFI_SYSTEM_TABLE_64 *efiSystemTable)
141{
142efiSystemTable->Hdr.CRC32 = 0;
143efiSystemTable->Hdr.CRC32 = crc32(0L, efiSystemTable, efiSystemTable->Hdr.HeaderSize);
144}*/
145
146/*
147 * What we do here is simply allocate a fake EFI system table and a fake EFI
148 * runtime services table.
149 *
150 * Because we build against modern headers with kBootArgsRevision 4 we
151 * also take care to set efiMode = 32.
152 */
153void setupEfiTables32(void)
154{
155// We use the fake_efi_pages struct so that we only need to do one kernel
156// memory allocation for all needed EFI data. Otherwise, small allocations
157// like the FIRMWARE_VENDOR string would take up an entire page.
158// NOTE WELL: Do NOT assume this struct has any particular layout within itself.
159// It is absolutely not intended to be publicly exposed anywhere
160// We say pages (plural) although right now we are well within the 1 page size
161// and probably will stay that way.
162struct fake_efi_pages
163{
164EFI_SYSTEM_TABLE_32 efiSystemTable;
165EFI_RUNTIME_SERVICES_32 efiRuntimeServices;
166EFI_CONFIGURATION_TABLE_32 efiConfigurationTable[MAX_CONFIGURATION_TABLE_ENTRIES];
167EFI_CHAR16 firmwareVendor[sizeof(FIRMWARE_VENDOR)/sizeof(EFI_CHAR16)];
168uint8_t voidret_instructions[sizeof(VOIDRET_INSTRUCTIONS)/sizeof(uint8_t)];
169uint8_t unsupportedret_instructions[sizeof(UNSUPPORTEDRET_INSTRUCTIONS)/sizeof(uint8_t)];
170};
171
172struct fake_efi_pages *fakeEfiPages = (struct fake_efi_pages*)AllocateKernelMemory(sizeof(struct fake_efi_pages));
173
174// Zero out all the tables in case fields are added later
175bzero(fakeEfiPages, sizeof(struct fake_efi_pages));
176
177// --------------------------------------------------------------------
178// Initialize some machine code that will return EFI_UNSUPPORTED for
179// functions returning int and simply return for void functions.
180memcpy(fakeEfiPages->voidret_instructions, VOIDRET_INSTRUCTIONS, sizeof(VOIDRET_INSTRUCTIONS));
181memcpy(fakeEfiPages->unsupportedret_instructions, UNSUPPORTEDRET_INSTRUCTIONS, sizeof(UNSUPPORTEDRET_INSTRUCTIONS));
182
183// --------------------------------------------------------------------
184// System table
185EFI_SYSTEM_TABLE_32 *efiSystemTable = gST32 = &fakeEfiPages->efiSystemTable;
186efiSystemTable->Hdr.Signature = EFI_SYSTEM_TABLE_SIGNATURE;
187efiSystemTable->Hdr.Revision = EFI_SYSTEM_TABLE_REVISION;
188efiSystemTable->Hdr.HeaderSize = sizeof(EFI_SYSTEM_TABLE_32);
189efiSystemTable->Hdr.CRC32 = 0; // Initialize to zero and then do CRC32
190efiSystemTable->Hdr.Reserved = 0;
191
192efiSystemTable->FirmwareVendor = (EFI_PTR32)&fakeEfiPages->firmwareVendor;
193memcpy(fakeEfiPages->firmwareVendor, FIRMWARE_VENDOR, sizeof(FIRMWARE_VENDOR));
194efiSystemTable->FirmwareRevision = FIRMWARE_REVISION;
195
196// XXX: We may need to have basic implementations of ConIn/ConOut/StdErr
197// The EFI spec states that all handles are invalid after boot services have been
198// exited so we can probably get by with leaving the handles as zero.
199efiSystemTable->ConsoleInHandle = 0;
200efiSystemTable->ConIn = 0;
201
202efiSystemTable->ConsoleOutHandle = 0;
203efiSystemTable->ConOut = 0;
204
205efiSystemTable->StandardErrorHandle = 0;
206efiSystemTable->StdErr = 0;
207
208efiSystemTable->RuntimeServices = (EFI_PTR32)&fakeEfiPages->efiRuntimeServices;
209
210// According to the EFI spec, BootServices aren't valid after the
211// boot process is exited so we can probably do without it.
212// Apple didn't provide a definition for it in pexpert/i386/efi.h
213// so I'm guessing they don't use it.
214efiSystemTable->BootServices = 0;
215
216efiSystemTable->NumberOfTableEntries = 0;
217efiSystemTable->ConfigurationTable = (EFI_PTR32)fakeEfiPages->efiConfigurationTable;
218
219// We're done. Now CRC32 the thing so the kernel will accept it.
220// Must be initialized to zero before CRC32, done above.
221gST32->Hdr.CRC32 = crc32(0L, gST32, gST32->Hdr.HeaderSize);
222
223// --------------------------------------------------------------------
224// Runtime services
225EFI_RUNTIME_SERVICES_32 *efiRuntimeServices = &fakeEfiPages->efiRuntimeServices;
226efiRuntimeServices->Hdr.Signature = EFI_RUNTIME_SERVICES_SIGNATURE;
227efiRuntimeServices->Hdr.Revision = EFI_RUNTIME_SERVICES_REVISION;
228efiRuntimeServices->Hdr.HeaderSize = sizeof(EFI_RUNTIME_SERVICES_32);
229efiRuntimeServices->Hdr.CRC32 = 0;
230efiRuntimeServices->Hdr.Reserved = 0;
231
232// There are a number of function pointers in the efiRuntimeServices table.
233// These are the Foundation (e.g. core) services and are expected to be present on
234// all EFI-compliant machines.Some kernel extensions (notably AppleEFIRuntime)
235// will call these without checking to see if they are null.
236//
237// We don't really feel like doing an EFI implementation in the bootloader
238// but it is nice if we can at least prevent a complete crash by
239// at least providing some sort of implementation until one can be provided
240// nicely in a kext.
241void (*voidret_fp)() = (void*)fakeEfiPages->voidret_instructions;
242void (*unsupportedret_fp)() = (void*)fakeEfiPages->unsupportedret_instructions;
243efiRuntimeServices->GetTime = (EFI_PTR32)unsupportedret_fp;
244efiRuntimeServices->SetTime = (EFI_PTR32)unsupportedret_fp;
245efiRuntimeServices->GetWakeupTime = (EFI_PTR32)unsupportedret_fp;
246efiRuntimeServices->SetWakeupTime = (EFI_PTR32)unsupportedret_fp;
247efiRuntimeServices->SetVirtualAddressMap = (EFI_PTR32)unsupportedret_fp;
248efiRuntimeServices->ConvertPointer = (EFI_PTR32)unsupportedret_fp;
249efiRuntimeServices->GetVariable = (EFI_PTR32)unsupportedret_fp;
250efiRuntimeServices->GetNextVariableName = (EFI_PTR32)unsupportedret_fp;
251efiRuntimeServices->SetVariable = (EFI_PTR32)unsupportedret_fp;
252efiRuntimeServices->GetNextHighMonotonicCount = (EFI_PTR32)unsupportedret_fp;
253efiRuntimeServices->ResetSystem = (EFI_PTR32)voidret_fp;
254
255// We're done.Now CRC32 the thing so the kernel will accept it
256efiRuntimeServices->Hdr.CRC32 = crc32(0L, efiRuntimeServices, efiRuntimeServices->Hdr.HeaderSize);
257
258// --------------------------------------------------------------------
259// Finish filling in the rest of the boot args that we need.
260bootArgs->efiSystemTable = (uint32_t)efiSystemTable;
261bootArgs->efiMode = kBootArgsEfiMode32;
262
263// The bootArgs structure as a whole is bzero'd so we don't need to fill in
264// things like efiRuntimeServices* and what not.
265//
266// In fact, the only code that seems to use that is the hibernate code so it
267// knows not to save the pages. It even checks to make sure its nonzero.
268}
269
270void setupEfiTables64(void)
271{
272struct fake_efi_pages
273{
274EFI_SYSTEM_TABLE_64 efiSystemTable;
275EFI_RUNTIME_SERVICES_64 efiRuntimeServices;
276EFI_CONFIGURATION_TABLE_64 efiConfigurationTable[MAX_CONFIGURATION_TABLE_ENTRIES];
277EFI_CHAR16 firmwareVendor[sizeof(FIRMWARE_VENDOR)/sizeof(EFI_CHAR16)];
278uint8_t voidret_instructions[sizeof(VOIDRET_INSTRUCTIONS)/sizeof(uint8_t)];
279uint8_t unsupportedret_instructions[sizeof(UNSUPPORTEDRET_INSTRUCTIONS)/sizeof(uint8_t)];
280};
281
282struct fake_efi_pages *fakeEfiPages = (struct fake_efi_pages*)AllocateKernelMemory(sizeof(struct fake_efi_pages));
283
284// Zero out all the tables in case fields are added later
285bzero(fakeEfiPages, sizeof(struct fake_efi_pages));
286
287// --------------------------------------------------------------------
288// Initialize some machine code that will return EFI_UNSUPPORTED for
289// functions returning int and simply return for void functions.
290memcpy(fakeEfiPages->voidret_instructions, VOIDRET_INSTRUCTIONS, sizeof(VOIDRET_INSTRUCTIONS));
291memcpy(fakeEfiPages->unsupportedret_instructions, UNSUPPORTEDRET_INSTRUCTIONS, sizeof(UNSUPPORTEDRET_INSTRUCTIONS));
292
293// --------------------------------------------------------------------
294// System table
295EFI_SYSTEM_TABLE_64 *efiSystemTable = gST64 = &fakeEfiPages->efiSystemTable;
296efiSystemTable->Hdr.Signature = EFI_SYSTEM_TABLE_SIGNATURE;
297efiSystemTable->Hdr.Revision = EFI_SYSTEM_TABLE_REVISION;
298efiSystemTable->Hdr.HeaderSize = sizeof(EFI_SYSTEM_TABLE_64);
299efiSystemTable->Hdr.CRC32 = 0; // Initialize to zero and then do CRC32
300efiSystemTable->Hdr.Reserved = 0;
301
302efiSystemTable->FirmwareVendor = ptov64((EFI_PTR32)&fakeEfiPages->firmwareVendor);
303memcpy(fakeEfiPages->firmwareVendor, FIRMWARE_VENDOR, sizeof(FIRMWARE_VENDOR));
304efiSystemTable->FirmwareRevision = FIRMWARE_REVISION;
305
306// XXX: We may need to have basic implementations of ConIn/ConOut/StdErr
307// The EFI spec states that all handles are invalid after boot services have been
308// exited so we can probably get by with leaving the handles as zero.
309efiSystemTable->ConsoleInHandle = 0;
310efiSystemTable->ConIn = 0;
311
312efiSystemTable->ConsoleOutHandle = 0;
313efiSystemTable->ConOut = 0;
314
315efiSystemTable->StandardErrorHandle = 0;
316efiSystemTable->StdErr = 0;
317
318efiSystemTable->RuntimeServices = ptov64((EFI_PTR32)&fakeEfiPages->efiRuntimeServices);
319// According to the EFI spec, BootServices aren't valid after the
320// boot process is exited so we can probably do without it.
321// Apple didn't provide a definition for it in pexpert/i386/efi.h
322// so I'm guessing they don't use it.
323efiSystemTable->BootServices = 0;
324
325efiSystemTable->NumberOfTableEntries = 0;
326efiSystemTable->ConfigurationTable = ptov64((EFI_PTR32)fakeEfiPages->efiConfigurationTable);
327
328// We're done.Now CRC32 the thing so the kernel will accept it
329gST64->Hdr.CRC32 = crc32(0L, gST64, gST64->Hdr.HeaderSize);
330
331// --------------------------------------------------------------------
332// Runtime services
333EFI_RUNTIME_SERVICES_64 *efiRuntimeServices = &fakeEfiPages->efiRuntimeServices;
334efiRuntimeServices->Hdr.Signature = EFI_RUNTIME_SERVICES_SIGNATURE;
335efiRuntimeServices->Hdr.Revision = EFI_RUNTIME_SERVICES_REVISION;
336efiRuntimeServices->Hdr.HeaderSize = sizeof(EFI_RUNTIME_SERVICES_64);
337efiRuntimeServices->Hdr.CRC32 = 0;
338efiRuntimeServices->Hdr.Reserved = 0;
339
340// There are a number of function pointers in the efiRuntimeServices table.
341// These are the Foundation (e.g. core) services and are expected to be present on
342// all EFI-compliant machines.Some kernel extensions (notably AppleEFIRuntime)
343// will call these without checking to see if they are null.
344//
345// We don't really feel like doing an EFI implementation in the bootloader
346// but it is nice if we can at least prevent a complete crash by
347// at least providing some sort of implementation until one can be provided
348// nicely in a kext.
349
350void (*voidret_fp)() = (void*)fakeEfiPages->voidret_instructions;
351void (*unsupportedret_fp)() = (void*)fakeEfiPages->unsupportedret_instructions;
352efiRuntimeServices->GetTime = ptov64((EFI_PTR32)unsupportedret_fp);
353efiRuntimeServices->SetTime = ptov64((EFI_PTR32)unsupportedret_fp);
354efiRuntimeServices->GetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);
355efiRuntimeServices->SetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);
356efiRuntimeServices->SetVirtualAddressMap = ptov64((EFI_PTR32)unsupportedret_fp);
357efiRuntimeServices->ConvertPointer = ptov64((EFI_PTR32)unsupportedret_fp);
358efiRuntimeServices->GetVariable = ptov64((EFI_PTR32)unsupportedret_fp);
359efiRuntimeServices->GetNextVariableName = ptov64((EFI_PTR32)unsupportedret_fp);
360efiRuntimeServices->SetVariable = ptov64((EFI_PTR32)unsupportedret_fp);
361efiRuntimeServices->GetNextHighMonotonicCount = ptov64((EFI_PTR32)unsupportedret_fp);
362efiRuntimeServices->ResetSystem = ptov64((EFI_PTR32)voidret_fp);
363
364// We're done.Now CRC32 the thing so the kernel will accept it
365efiRuntimeServices->Hdr.CRC32 = crc32(0L, efiRuntimeServices, efiRuntimeServices->Hdr.HeaderSize);
366
367// --------------------------------------------------------------------
368// Finish filling in the rest of the boot args that we need.
369bootArgs->efiSystemTable = (uint32_t)efiSystemTable;
370bootArgs->efiMode = kBootArgsEfiMode64;
371
372// The bootArgs structure as a whole is bzero'd so we don't need to fill in
373// things like efiRuntimeServices* and what not.
374//
375// In fact, the only code that seems to use that is the hibernate code so it
376// knows not to save the pages. It even checks to make sure its nonzero.
377}
378
379/*
380 * In addition to the EFI tables there is also the EFI device tree node.
381 * In particular, we need /efi/platform to have an FSBFrequency key. Without it,
382 * the tsc_init function will panic very early on in kernel startup, before
383 * the console is available.
384 */
385
386/*==========================================================================
387 * FSB Frequency detection
388 */
389
390/* These should be const but DT__AddProperty takes char* */
391static const char const TSC_Frequency_prop[] = "TSCFrequency";
392static const char const FSB_Frequency_prop[] = "FSBFrequency";
393static const char const CPU_Frequency_prop[] = "CPUFrequency";
394
395/*==========================================================================
396 * SMBIOS
397 */
398
399/* From Foundation/Efi/Guid/Smbios/SmBios.c */
400EFI_GUID constgEfiSmbiosTableGuid = EFI_SMBIOS_TABLE_GUID;
401
402#define SMBIOS_RANGE_START0x000F0000
403#define SMBIOS_RANGE_END0x000FFFFF
404
405/* '_SM_' in little endian: */
406#define SMBIOS_ANCHOR_UINT32_LE 0x5f4d535f
407
408#define EFI_ACPI_TABLE_GUID \
409{ \
4100xeb9d2d30, 0x2d88, 0x11d3, { 0x9a, 0x16, 0x0, 0x90, 0x27, 0x3f, 0xc1, 0x4d } \
411}
412
413#define EFI_ACPI_20_TABLE_GUID \
414{ \
4150x8868e871, 0xe4f1, 0x11d3, { 0xbc, 0x22, 0x0, 0x80, 0xc7, 0x3c, 0x88, 0x81 } \
416}
417
418EFI_GUID gEfiAcpiTableGuid = EFI_ACPI_TABLE_GUID;
419EFI_GUID gEfiAcpi20TableGuid = EFI_ACPI_20_TABLE_GUID;
420
421
422/*==========================================================================
423 * Fake EFI implementation
424 */
425
426/* These should be const but DT__AddProperty takes char* */
427static const char const FIRMWARE_REVISION_PROP[] = "firmware-revision";
428static const char const FIRMWARE_ABI_PROP[] = "firmware-abi";
429static const char const FIRMWARE_VENDOR_PROP[] = "firmware-vendor";
430static const char const FIRMWARE_ABI_32_PROP_VALUE[] = "EFI32";
431static const char const FIRMWARE_ABI_64_PROP_VALUE[] = "EFI64";
432static const char const SYSTEM_ID_PROP[] = "system-id";
433static const char const SYSTEM_SERIAL_PROP[] = "SystemSerialNumber";
434static const char const SYSTEM_TYPE_PROP[] = "system-type";
435static const char const MODEL_PROP[] = "Model";
436static const char const BOARDID_PROP[] = "board-id";
437// Facetime fix from olegpronin @ insanelymac
438// Breaks booting from RAID
439static const char const BOOT_UUID_PROP[] = "boot-uuid";
440static char uuidStr[64];
441
442/*
443 * Get an smbios option string option to convert to EFI_CHAR16 string
444 */
445static EFI_CHAR16* getSmbiosChar16(const char * key, size_t* len)
446{
447const char*src = getStringForKey(key, &bootInfo->smbiosConfig);
448EFI_CHAR16* dst = 0;
449size_t i = 0;
450
451if (!key || !(*key) || !len || !src) return 0;
452
453*len = strlen(src);
454dst = (EFI_CHAR16*) malloc( ((*len)+1) * 2 );
455for (; i < (*len); i++) dst[i] = src[i];
456dst[(*len)] = '\0';
457*len = ((*len)+1)*2; // return the CHAR16 bufsize in cluding zero terminated CHAR16
458return dst;
459}
460
461/*
462 * Get the SystemID from the bios dmi info
463 */
464staticEFI_CHAR8* getSmbiosUUID()
465{
466static EFI_CHAR8 uuid[UUID_LEN];
467int i, isZero, isOnes;
468SMBByte*p;
469
470p = (SMBByte*)Platform.UUID;
471
472for (i=0, isZero=1, isOnes=1; i<UUID_LEN; i++)
473{
474if (p[i] != 0x00) isZero = 0;
475if (p[i] != 0xff) isOnes = 0;
476}
477
478if (isZero || isOnes) // empty or setable means: no uuid present
479{
480verbose("No UUID present in SMBIOS System Information Table\n");
481return 0;
482}
483
484memcpy(uuid, p, UUID_LEN);
485return uuid;
486}
487
488/*
489 * return a binary UUID value from the overriden SystemID and SMUUID if found,
490 * or from the bios if not, or from a fixed value if no bios value is found
491 */
492static EFI_CHAR8* getSystemID()
493{
494// unable to determine UUID for host. Error: 35 fix
495// Rek: new SMsystemid option conforming to smbios notation standards, this option should
496// belong to smbios config only ...
497const char *sysId = getStringForKey(kSystemID, &bootInfo->chameleonConfig);
498EFI_CHAR8*ret = getUUIDFromString(sysId);
499
500if (!sysId || !ret) // try bios dmi info UUID extraction
501{
502ret = getSmbiosUUID();
503sysId = 0;
504}
505
506if (!ret) // no bios dmi UUID available, set a fixed value for system-id
507ret=getUUIDFromString((sysId = (const char*) SYSTEM_ID));
508
509verbose("Customizing SystemID with : %s\n", getStringFromUUID(ret)); // apply a nice formatting to the displayed output
510return ret;
511}
512
513/*
514 * Must be called AFTER setup Acpi because we need to take care of correct
515 * facp content to reflect in ioregs
516 */
517void setupSystemType()
518{
519Node *node = DT__FindNode("/", false);
520if (node == 0) stop("Couldn't get root node");
521// we need to write this property after facp parsing
522// Export system-type only if it has been overrriden by the SystemType option
523DT__AddProperty(node, SYSTEM_TYPE_PROP, sizeof(Platform.Type), &Platform.Type);
524}
525
526void setupEfiDeviceTree(void)
527{
528EFI_CHAR8* ret = 0;
529EFI_CHAR16* ret16 = 0;
530size_t len = 0;
531Node*node;
532
533node = DT__FindNode("/", false);
534
535if (node == 0) stop("Couldn't get root node");
536
537// We could also just do DT__FindNode("/efi/platform", true)
538// But I think eventually we want to fill stuff in the efi node
539// too so we might as well create it so we have a pointer for it too.
540node = DT__AddChild(node, "efi");
541
542if (archCpuType == CPU_TYPE_I386)
543{
544DT__AddProperty(node, FIRMWARE_ABI_PROP, sizeof(FIRMWARE_ABI_32_PROP_VALUE), (char*)FIRMWARE_ABI_32_PROP_VALUE);
545}
546else
547{
548DT__AddProperty(node, FIRMWARE_ABI_PROP, sizeof(FIRMWARE_ABI_64_PROP_VALUE), (char*)FIRMWARE_ABI_64_PROP_VALUE);
549}
550
551DT__AddProperty(node, FIRMWARE_REVISION_PROP, sizeof(FIRMWARE_REVISION), (EFI_UINT32*)&FIRMWARE_REVISION);
552DT__AddProperty(node, FIRMWARE_VENDOR_PROP, sizeof(FIRMWARE_VENDOR), (EFI_CHAR16*)FIRMWARE_VENDOR);
553
554// TODO: Fill in other efi properties if necessary
555
556// Set up the /efi/runtime-services table node similar to the way a child node of configuration-table
557// is set up. That is, name and table properties
558Node *runtimeServicesNode = DT__AddChild(node, "runtime-services");
559
560if (archCpuType == CPU_TYPE_I386)
561{
562// The value of the table property is the 32-bit physical address for the RuntimeServices table.
563// Since the EFI system table already has a pointer to it, we simply use the address of that pointer
564// for the pointer to the property data. Warning.. DT finalization calls free on that but we're not
565// the only thing to use a non-malloc'd pointer for something in the DT
566
567DT__AddProperty(runtimeServicesNode, "table", sizeof(uint64_t), &gST32->RuntimeServices);
568}
569else
570{
571DT__AddProperty(runtimeServicesNode, "table", sizeof(uint64_t), &gST64->RuntimeServices);
572}
573
574// Set up the /efi/configuration-table node which will eventually have several child nodes for
575// all of the configuration tables needed by various kernel extensions.
576gEfiConfigurationTableNode = DT__AddChild(node, "configuration-table");
577
578// Now fill in the /efi/platform Node
579Node *efiPlatformNode = DT__AddChild(node, "platform");
580
581// NOTE WELL: If you do add FSB Frequency detection, make sure to store
582// the value in the fsbFrequency global and not an malloc'd pointer
583// because the DT_AddProperty function does not copy its args.
584
585if (Platform.CPU.FSBFrequency != 0)
586DT__AddProperty(efiPlatformNode, FSB_Frequency_prop, sizeof(uint64_t), &Platform.CPU.FSBFrequency);
587
588// Export TSC and CPU frequencies for use by the kernel or KEXTs
589if (Platform.CPU.TSCFrequency != 0)
590DT__AddProperty(efiPlatformNode, TSC_Frequency_prop, sizeof(uint64_t), &Platform.CPU.TSCFrequency);
591
592if (Platform.CPU.CPUFrequency != 0)
593DT__AddProperty(efiPlatformNode, CPU_Frequency_prop, sizeof(uint64_t), &Platform.CPU.CPUFrequency);
594
595// Export system-id. Can be disabled with SystemId=No in com.apple.Boot.plist
596if ((ret=getSystemID()))
597DT__AddProperty(efiPlatformNode, SYSTEM_ID_PROP, UUID_LEN, (EFI_UINT32*) ret);
598
599// Export SystemSerialNumber if present
600if ((ret16=getSmbiosChar16("SMserial", &len)))
601DT__AddProperty(efiPlatformNode, SYSTEM_SERIAL_PROP, len, ret16);
602
603// Export Model if present
604if ((ret16=getSmbiosChar16("SMproductname", &len)))
605DT__AddProperty(efiPlatformNode, MODEL_PROP, len, ret16);
606
607// Fill /efi/device-properties node.
608setupDeviceProperties(node);
609
610// Facetime fix from olegpronin @ insanelymac
611// Thanks to Lnx2Mac for the idea of using the key SkipFTFix=Yes as a temporary work around for this breaking RAID booting
612bool skipFTFix=false;
613getBoolForKey(kSkipFTFix, &skipFTFix, &bootInfo->chameleonConfig);
614if (!skipFTFix) {
615//Facetime temp fix start
616Node *ChoosenNode;
617if (gBootVolume->fs_getuuid && gBootVolume->fs_getuuid (gBootVolume, uuidStr) == 0)
618{
619ChoosenNode = DT__FindNode("/chosen", false);
620DT__AddProperty(ChoosenNode, BOOT_UUID_PROP, 64, uuidStr);
621}
622//Facetime fix end
623}
624}
625
626/*
627 * Must be called AFTER getSmbios
628 */
629void setupBoardId()
630{
631Node *node;
632node = DT__FindNode("/", false);
633if (node == 0) {
634stop("Couldn't get root node");
635}
636const char *boardid = getStringForKey("SMboardproduct", &bootInfo->smbiosConfig);
637if (boardid)
638DT__AddProperty(node, BOARDID_PROP, strlen(boardid)+1, (EFI_CHAR16*)boardid);
639}
640
641/*
642 * Load the smbios.plist override config file if any
643 */
644static void setupSmbiosConfigFile(const char *filename)
645{
646chardirSpecSMBIOS[128] = "";
647const char *override_pathname = NULL;
648intlen = 0, err = 0;
649extern void scan_mem();
650
651// Take in account user overriding
652if (getValueForKey(kSMBIOSKey, &override_pathname, &len, &bootInfo->chameleonConfig) && len > 0)
653{
654// Specify a path to a file, e.g. SMBIOS=/Extra/macProXY.plist
655sprintf(dirSpecSMBIOS, override_pathname);
656err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig);
657}
658else
659{
660// Check selected volume's Extra.
661sprintf(dirSpecSMBIOS, "/Extra/%s", filename);
662if (err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig))
663{
664// Check booter volume/rdbt Extra.
665sprintf(dirSpecSMBIOS, "bt(0,0)/Extra/%s", filename);
666err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig);
667}
668}
669
670if (err)
671{
672verbose("No SMBIOS replacement found.\n");
673}
674
675// get a chance to scan mem dynamically if user asks for it while having the config options
676// loaded as well, as opposed to when it was in scan_platform(); also load the orig. smbios
677// so that we can access dmi info, without patching the smbios yet.
678scan_mem();
679}
680
681/*
682 * Installs all the needed configuration table entries
683 */
684static void setupEfiConfigurationTable()
685{
686smbios_p = (EFI_PTR32)getSmbios(SMBIOS_PATCHED);
687addConfigurationTable(&gEfiSmbiosTableGuid, &smbios_p, NULL);
688
689setupBoardId(); //need to be called after getSmbios
690
691// Setup ACPI with DSDT overrides (mackerintel's patch)
692setupAcpi();
693
694// We've obviously changed the count.. so fix up the CRC32
695if (archCpuType == CPU_TYPE_I386)
696{
697gST32->Hdr.CRC32 = 0;
698gST32->Hdr.CRC32 = crc32(0L, gST32, gST32->Hdr.HeaderSize);
699}
700else
701{
702gST64->Hdr.CRC32 = 0;
703gST64->Hdr.CRC32 = crc32(0L, gST64, gST64->Hdr.HeaderSize);
704}
705}
706
707void saveOriginalSMBIOS(void)
708{
709Node *node;
710SMBEntryPoint *origeps;
711void *tableAddress;
712
713node = DT__FindNode("/efi/platform", false);
714if (!node)
715{
716verbose("/efi/platform node not found\n");
717return;
718}
719
720origeps = getSmbios(SMBIOS_ORIGINAL);
721if (!origeps)
722{
723return;
724}
725
726tableAddress = (void *)AllocateKernelMemory(origeps->dmi.tableLength);
727if (!tableAddress)
728{
729return;
730}
731
732memcpy(tableAddress, (void *)origeps->dmi.tableAddress, origeps->dmi.tableLength);
733DT__AddProperty(node, "SMBIOS", origeps->dmi.tableLength, tableAddress);
734}
735
736/*
737 * Entrypoint from boot.c
738 */
739void setupFakeEfi(void)
740{
741// Generate efi device strings
742setup_pci_devs(root_pci_dev);
743
744readSMBIOSInfo(getSmbios(SMBIOS_ORIGINAL));
745
746// load smbios.plist file if any
747setupSmbiosConfigFile("smbios.plist");
748
749setupSMBIOSTable();
750
751// Initialize the base table
752if (archCpuType == CPU_TYPE_I386)
753{
754setupEfiTables32();
755}
756else
757{
758setupEfiTables64();
759}
760
761// Initialize the device tree
762setupEfiDeviceTree();
763
764saveOriginalSMBIOS();
765
766// Add configuration table entries to both the services table and the device tree
767setupEfiConfigurationTable();
768}
769

Archive Download this file

Revision: 1524