Chameleon

Chameleon Svn Source Tree

Root/trunk/i386/libsaio/fake_efi.c

1
2/*
3 * Copyright 2007 David F. Elliott. All rights reserved.
4 */
5#include "saio_types.h"
6#include "libsaio.h"
7#include "boot.h"
8#include "bootstruct.h"
9#include "efi.h"
10#include "acpi.h"
11#include "fake_efi.h"
12#include "efi_tables.h"
13#include "platform.h"
14#include "acpi_patcher.h"
15#include "smbios.h"
16#include "device_inject.h"
17#include "convert.h"
18#include "pci.h"
19#include "sl.h"
20
21extern void setup_pci_devs(pci_dt_t *pci_dt);
22
23/*
24 * Modern Darwin kernels require some amount of EFI because Apple machines all
25 * have EFI. Modifying the kernel source to not require EFI is of course
26 * possible but would have to be maintained as a separate patch because it is
27 * unlikely that Apple wishes to add legacy support to their kernel.
28 *
29 * As you can see from the Apple-supplied code in bootstruct.c, it seems that
30 * the intention was clearly to modify this booter to provide EFI-like structures
31 * to the kernel rather than modifying the kernel to handle non-EFI stuff. This
32 * makes a lot of sense from an engineering point of view as it means the kernel
33 * for the as yet unreleased EFI-only Macs could still be booted by the non-EFI
34 * DTK systems so long as the kernel checked to ensure the boot tables were
35 * filled in appropriately.Modern xnu requires a system table and a runtime
36 * services table and performs no checks whatsoever to ensure the pointers to
37 * these tables are non-NULL. Therefore, any modern xnu kernel will page fault
38 * early on in the boot process if the system table pointer is zero.
39 *
40 * Even before that happens, the tsc_init function in modern xnu requires the FSB
41 * Frequency to be a property in the /efi/platform node of the device tree or else
42 * it panics the bootstrap process very early on.
43 *
44 * As of this writing, the current implementation found here is good enough
45 * to make the currently available xnu kernel boot without modification on a
46 * system with an appropriate processor. With a minor source modification to
47 * the tsc_init function to remove the explicit check for Core or Core 2
48 * processors the kernel can be made to boot on other processors so long as
49 * the code can be executed by the processor and the machine contains the
50 * necessary hardware.
51 */
52
53/*==========================================================================
54 * Utility function to make a device tree string from an EFI_GUID
55 */
56static inline char * mallocStringForGuid(EFI_GUID const *pGuid)
57{
58char *string = malloc(37);
59efi_guid_unparse_upper(pGuid, string);
60return string;
61}
62
63/*==========================================================================
64 * Function to map 32 bit physical address to 64 bit virtual address
65 */
66static uint64_t ptov64(uint32_t addr)
67{
68return ((uint64_t)addr | 0xFFFFFF8000000000ULL);
69}
70
71/*==========================================================================
72 * Fake EFI implementation
73 */
74
75/* Identify ourselves as the EFI firmware vendor */
76static EFI_CHAR16 const FIRMWARE_VENDOR[] = {'C','h','a','m','e','l','e','o','n','_','2','.','2', 0};
77static EFI_UINT32 const FIRMWARE_REVISION = 132; /* FIXME: Find a constant for this. */
78
79/* Default platform system_id (fix by IntVar) */
80static EFI_CHAR8 const SYSTEM_ID[] = "0123456789ABCDEF"; //random value gen by uuidgen
81
82/* Just a ret instruction */
83static uint8_t const VOIDRET_INSTRUCTIONS[] = {0xc3};
84
85/* movl $0x80000003,%eax; ret */
86static uint8_t const UNSUPPORTEDRET_INSTRUCTIONS_32[] = {0xb8, 0x03, 0x00, 0x00, 0x80, 0xc3};
87static uint8_t const UNSUPPORTEDRET_INSTRUCTIONS_64[] = {0x48, 0xb8, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x80, 0xc3};
88
89EFI_SYSTEM_TABLE_32 *gST32 = NULL;
90EFI_SYSTEM_TABLE_64 *gST64 = NULL;
91Node *gEfiConfigurationTableNode = NULL;
92
93extern EFI_STATUS addConfigurationTable(EFI_GUID const *pGuid, void *table, char const *alias)
94{
95EFI_UINTN i = 0;
96
97//Azi: as is, cpu's with em64t will use EFI64 on pre 10.6 systems,
98// wich seems to cause no problem. In case it does, force i386 arch.
99if (archCpuType == CPU_TYPE_I386)
100{
101i = gST32->NumberOfTableEntries;
102}
103else
104{
105i = gST64->NumberOfTableEntries;
106}
107
108// We only do adds, not modifications and deletes like InstallConfigurationTable
109if (i >= MAX_CONFIGURATION_TABLE_ENTRIES)
110{
111stop("Ran out of space for configuration tables. Increase the reserved size in the code.\n");
112}
113
114if (pGuid == NULL)
115{
116return EFI_INVALID_PARAMETER;
117}
118
119if (table != NULL)
120{
121// FIXME
122//((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorGuid = *pGuid;
123//((EFI_CONFIGURATION_TABLE_64 *)gST->ConfigurationTable)[i].VendorTable = (EFI_PTR64)table;
124
125//++gST->NumberOfTableEntries;
126
127Node *tableNode = DT__AddChild(gEfiConfigurationTableNode, mallocStringForGuid(pGuid));
128
129// Use the pointer to the GUID we just stuffed into the system table
130DT__AddProperty(tableNode, "guid", sizeof(EFI_GUID), (void*)pGuid);
131
132// The "table" property is the 32-bit (in our implementation) physical address of the table
133DT__AddProperty(tableNode, "table", sizeof(void*) * 2, table);
134
135// Assume the alias pointer is a global or static piece of data
136if (alias != NULL)
137{
138DT__AddProperty(tableNode, "alias", strlen(alias)+1, (char*)alias);
139}
140
141return EFI_SUCCESS;
142}
143return EFI_UNSUPPORTED;
144}
145
146//Azi: crc32 done in place, on the cases were it wasn't.
147/*static inline void fixupEfiSystemTableCRC32(EFI_SYSTEM_TABLE_64 *efiSystemTable)
148{
149efiSystemTable->Hdr.CRC32 = 0;
150efiSystemTable->Hdr.CRC32 = crc32(0L, efiSystemTable, efiSystemTable->Hdr.HeaderSize);
151}*/
152
153/*
154 * What we do here is simply allocate a fake EFI system table and a fake EFI
155 * runtime services table.
156 *
157 * Because we build against modern headers with kBootArgsRevision 4 we
158 * also take care to set efiMode = 32.
159 */
160void setupEfiTables32(void)
161{
162// We use the fake_efi_pages struct so that we only need to do one kernel
163// memory allocation for all needed EFI data. Otherwise, small allocations
164// like the FIRMWARE_VENDOR string would take up an entire page.
165// NOTE WELL: Do NOT assume this struct has any particular layout within itself.
166// It is absolutely not intended to be publicly exposed anywhere
167// We say pages (plural) although right now we are well within the 1 page size
168// and probably will stay that way.
169struct fake_efi_pages
170{
171EFI_SYSTEM_TABLE_32 efiSystemTable;
172EFI_RUNTIME_SERVICES_32 efiRuntimeServices;
173EFI_CONFIGURATION_TABLE_32 efiConfigurationTable[MAX_CONFIGURATION_TABLE_ENTRIES];
174EFI_CHAR16 firmwareVendor[sizeof(FIRMWARE_VENDOR)/sizeof(EFI_CHAR16)];
175uint8_t voidret_instructions[sizeof(VOIDRET_INSTRUCTIONS)/sizeof(uint8_t)];
176uint8_t unsupportedret_instructions[sizeof(UNSUPPORTEDRET_INSTRUCTIONS_32)/sizeof(uint8_t)];
177};
178
179struct fake_efi_pages *fakeEfiPages = (struct fake_efi_pages*)AllocateKernelMemory(sizeof(struct fake_efi_pages));
180
181// Zero out all the tables in case fields are added later
182//bzero(fakeEfiPages, sizeof(struct fake_efi_pages));
183
184// --------------------------------------------------------------------
185// Initialize some machine code that will return EFI_UNSUPPORTED for
186// functions returning int and simply return for void functions.
187memcpy(fakeEfiPages->voidret_instructions, VOIDRET_INSTRUCTIONS, sizeof(VOIDRET_INSTRUCTIONS));
188memcpy(fakeEfiPages->unsupportedret_instructions, UNSUPPORTEDRET_INSTRUCTIONS_32, sizeof(UNSUPPORTEDRET_INSTRUCTIONS_32));
189
190// --------------------------------------------------------------------
191// System table
192EFI_SYSTEM_TABLE_32 *efiSystemTable = gST32 = &fakeEfiPages->efiSystemTable;
193efiSystemTable->Hdr.Signature = EFI_SYSTEM_TABLE_SIGNATURE;
194efiSystemTable->Hdr.Revision = EFI_SYSTEM_TABLE_REVISION;
195efiSystemTable->Hdr.HeaderSize = sizeof(EFI_SYSTEM_TABLE_32);
196efiSystemTable->Hdr.CRC32 = 0; // Initialize to zero and then do CRC32
197efiSystemTable->Hdr.Reserved = 0;
198
199efiSystemTable->FirmwareVendor = (EFI_PTR32)&fakeEfiPages->firmwareVendor;
200memcpy(fakeEfiPages->firmwareVendor, FIRMWARE_VENDOR, sizeof(FIRMWARE_VENDOR));
201efiSystemTable->FirmwareRevision = FIRMWARE_REVISION;
202
203// XXX: We may need to have basic implementations of ConIn/ConOut/StdErr
204// The EFI spec states that all handles are invalid after boot services have been
205// exited so we can probably get by with leaving the handles as zero.
206efiSystemTable->ConsoleInHandle = 0;
207efiSystemTable->ConIn = 0;
208
209efiSystemTable->ConsoleOutHandle = 0;
210efiSystemTable->ConOut = 0;
211
212efiSystemTable->StandardErrorHandle = 0;
213efiSystemTable->StdErr = 0;
214
215efiSystemTable->RuntimeServices = (EFI_PTR32)&fakeEfiPages->efiRuntimeServices;
216
217// According to the EFI spec, BootServices aren't valid after the
218// boot process is exited so we can probably do without it.
219// Apple didn't provide a definition for it in pexpert/i386/efi.h
220// so I'm guessing they don't use it.
221efiSystemTable->BootServices = 0;
222
223efiSystemTable->NumberOfTableEntries = 0;
224efiSystemTable->ConfigurationTable = (EFI_PTR32)fakeEfiPages->efiConfigurationTable;
225
226// We're done. Now CRC32 the thing so the kernel will accept it.
227// Must be initialized to zero before CRC32, done above.
228gST32->Hdr.CRC32 = crc32(0L, gST32, gST32->Hdr.HeaderSize);
229
230// --------------------------------------------------------------------
231// Runtime services
232EFI_RUNTIME_SERVICES_32 *efiRuntimeServices = &fakeEfiPages->efiRuntimeServices;
233efiRuntimeServices->Hdr.Signature = EFI_RUNTIME_SERVICES_SIGNATURE;
234efiRuntimeServices->Hdr.Revision = EFI_RUNTIME_SERVICES_REVISION;
235efiRuntimeServices->Hdr.HeaderSize = sizeof(EFI_RUNTIME_SERVICES_32);
236efiRuntimeServices->Hdr.CRC32 = 0;
237efiRuntimeServices->Hdr.Reserved = 0;
238
239// There are a number of function pointers in the efiRuntimeServices table.
240// These are the Foundation (e.g. core) services and are expected to be present on
241// all EFI-compliant machines.Some kernel extensions (notably AppleEFIRuntime)
242// will call these without checking to see if they are null.
243//
244// We don't really feel like doing an EFI implementation in the bootloader
245// but it is nice if we can at least prevent a complete crash by
246// at least providing some sort of implementation until one can be provided
247// nicely in a kext.
248void (*voidret_fp)() = (void*)fakeEfiPages->voidret_instructions;
249void (*unsupportedret_fp)() = (void*)fakeEfiPages->unsupportedret_instructions;
250efiRuntimeServices->GetTime = (EFI_PTR32)unsupportedret_fp;
251efiRuntimeServices->SetTime = (EFI_PTR32)unsupportedret_fp;
252efiRuntimeServices->GetWakeupTime = (EFI_PTR32)unsupportedret_fp;
253efiRuntimeServices->SetWakeupTime = (EFI_PTR32)unsupportedret_fp;
254efiRuntimeServices->SetVirtualAddressMap = (EFI_PTR32)unsupportedret_fp;
255efiRuntimeServices->ConvertPointer = (EFI_PTR32)unsupportedret_fp;
256efiRuntimeServices->GetVariable = (EFI_PTR32)unsupportedret_fp;
257efiRuntimeServices->GetNextVariableName = (EFI_PTR32)unsupportedret_fp;
258efiRuntimeServices->SetVariable = (EFI_PTR32)unsupportedret_fp;
259efiRuntimeServices->GetNextHighMonotonicCount = (EFI_PTR32)unsupportedret_fp;
260efiRuntimeServices->ResetSystem = (EFI_PTR32)voidret_fp;
261
262// We're done.Now CRC32 the thing so the kernel will accept it
263efiRuntimeServices->Hdr.CRC32 = crc32(0L, efiRuntimeServices, efiRuntimeServices->Hdr.HeaderSize);
264
265// --------------------------------------------------------------------
266// Finish filling in the rest of the boot args that we need.
267bootArgs->efiSystemTable = (uint32_t)efiSystemTable;
268bootArgs->efiMode = kBootArgsEfiMode32;
269
270// The bootArgs structure as a whole is bzero'd so we don't need to fill in
271// things like efiRuntimeServices* and what not.
272//
273// In fact, the only code that seems to use that is the hibernate code so it
274// knows not to save the pages. It even checks to make sure its nonzero.
275}
276
277void setupEfiTables64(void)
278{
279struct fake_efi_pages
280{
281EFI_SYSTEM_TABLE_64 efiSystemTable;
282EFI_RUNTIME_SERVICES_64 efiRuntimeServices;
283EFI_CONFIGURATION_TABLE_64 efiConfigurationTable[MAX_CONFIGURATION_TABLE_ENTRIES];
284EFI_CHAR16 firmwareVendor[sizeof(FIRMWARE_VENDOR)/sizeof(EFI_CHAR16)];
285uint8_t voidret_instructions[sizeof(VOIDRET_INSTRUCTIONS)/sizeof(uint8_t)];
286uint8_t unsupportedret_instructions[sizeof(UNSUPPORTEDRET_INSTRUCTIONS_64)/sizeof(uint8_t)];
287};
288
289struct fake_efi_pages *fakeEfiPages = (struct fake_efi_pages*)AllocateKernelMemory(sizeof(struct fake_efi_pages));
290
291// Zero out all the tables in case fields are added later
292//bzero(fakeEfiPages, sizeof(struct fake_efi_pages));
293
294// --------------------------------------------------------------------
295// Initialize some machine code that will return EFI_UNSUPPORTED for
296// functions returning int and simply return for void functions.
297memcpy(fakeEfiPages->voidret_instructions, VOIDRET_INSTRUCTIONS, sizeof(VOIDRET_INSTRUCTIONS));
298memcpy(fakeEfiPages->unsupportedret_instructions, UNSUPPORTEDRET_INSTRUCTIONS_64, sizeof(UNSUPPORTEDRET_INSTRUCTIONS_64));
299
300// --------------------------------------------------------------------
301// System table
302EFI_SYSTEM_TABLE_64 *efiSystemTable = gST64 = &fakeEfiPages->efiSystemTable;
303efiSystemTable->Hdr.Signature = EFI_SYSTEM_TABLE_SIGNATURE;
304efiSystemTable->Hdr.Revision = EFI_SYSTEM_TABLE_REVISION;
305efiSystemTable->Hdr.HeaderSize = sizeof(EFI_SYSTEM_TABLE_64);
306efiSystemTable->Hdr.CRC32 = 0; // Initialize to zero and then do CRC32
307efiSystemTable->Hdr.Reserved = 0;
308
309efiSystemTable->FirmwareVendor = ptov64((EFI_PTR32)&fakeEfiPages->firmwareVendor);
310memcpy(fakeEfiPages->firmwareVendor, FIRMWARE_VENDOR, sizeof(FIRMWARE_VENDOR));
311efiSystemTable->FirmwareRevision = FIRMWARE_REVISION;
312
313// XXX: We may need to have basic implementations of ConIn/ConOut/StdErr
314// The EFI spec states that all handles are invalid after boot services have been
315// exited so we can probably get by with leaving the handles as zero.
316efiSystemTable->ConsoleInHandle = 0;
317efiSystemTable->ConIn = 0;
318
319efiSystemTable->ConsoleOutHandle = 0;
320efiSystemTable->ConOut = 0;
321
322efiSystemTable->StandardErrorHandle = 0;
323efiSystemTable->StdErr = 0;
324
325efiSystemTable->RuntimeServices = ptov64((EFI_PTR32)&fakeEfiPages->efiRuntimeServices);
326// According to the EFI spec, BootServices aren't valid after the
327// boot process is exited so we can probably do without it.
328// Apple didn't provide a definition for it in pexpert/i386/efi.h
329// so I'm guessing they don't use it.
330efiSystemTable->BootServices = 0;
331
332efiSystemTable->NumberOfTableEntries = 0;
333efiSystemTable->ConfigurationTable = ptov64((EFI_PTR32)fakeEfiPages->efiConfigurationTable);
334
335// We're done.Now CRC32 the thing so the kernel will accept it
336gST64->Hdr.CRC32 = crc32(0L, gST64, gST64->Hdr.HeaderSize);
337
338// --------------------------------------------------------------------
339// Runtime services
340EFI_RUNTIME_SERVICES_64 *efiRuntimeServices = &fakeEfiPages->efiRuntimeServices;
341efiRuntimeServices->Hdr.Signature = EFI_RUNTIME_SERVICES_SIGNATURE;
342efiRuntimeServices->Hdr.Revision = EFI_RUNTIME_SERVICES_REVISION;
343efiRuntimeServices->Hdr.HeaderSize = sizeof(EFI_RUNTIME_SERVICES_64);
344efiRuntimeServices->Hdr.CRC32 = 0;
345efiRuntimeServices->Hdr.Reserved = 0;
346
347// There are a number of function pointers in the efiRuntimeServices table.
348// These are the Foundation (e.g. core) services and are expected to be present on
349// all EFI-compliant machines.Some kernel extensions (notably AppleEFIRuntime)
350// will call these without checking to see if they are null.
351//
352// We don't really feel like doing an EFI implementation in the bootloader
353// but it is nice if we can at least prevent a complete crash by
354// at least providing some sort of implementation until one can be provided
355// nicely in a kext.
356
357void (*voidret_fp)() = (void*)fakeEfiPages->voidret_instructions;
358void (*unsupportedret_fp)() = (void*)fakeEfiPages->unsupportedret_instructions;
359efiRuntimeServices->GetTime = ptov64((EFI_PTR32)unsupportedret_fp);
360efiRuntimeServices->SetTime = ptov64((EFI_PTR32)unsupportedret_fp);
361efiRuntimeServices->GetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);
362efiRuntimeServices->SetWakeupTime = ptov64((EFI_PTR32)unsupportedret_fp);
363efiRuntimeServices->SetVirtualAddressMap = ptov64((EFI_PTR32)unsupportedret_fp);
364efiRuntimeServices->ConvertPointer = ptov64((EFI_PTR32)unsupportedret_fp);
365efiRuntimeServices->GetVariable = ptov64((EFI_PTR32)unsupportedret_fp);
366efiRuntimeServices->GetNextVariableName = ptov64((EFI_PTR32)unsupportedret_fp);
367efiRuntimeServices->SetVariable = ptov64((EFI_PTR32)unsupportedret_fp);
368efiRuntimeServices->GetNextHighMonotonicCount = ptov64((EFI_PTR32)unsupportedret_fp);
369efiRuntimeServices->ResetSystem = ptov64((EFI_PTR32)voidret_fp);
370
371// We're done.Now CRC32 the thing so the kernel will accept it
372efiRuntimeServices->Hdr.CRC32 = crc32(0L, efiRuntimeServices, efiRuntimeServices->Hdr.HeaderSize);
373
374// --------------------------------------------------------------------
375// Finish filling in the rest of the boot args that we need.
376bootArgs->efiSystemTable = (uint32_t)efiSystemTable;
377bootArgs->efiMode = kBootArgsEfiMode64;
378
379// The bootArgs structure as a whole is bzero'd so we don't need to fill in
380// things like efiRuntimeServices* and what not.
381//
382// In fact, the only code that seems to use that is the hibernate code so it
383// knows not to save the pages. It even checks to make sure its nonzero.
384}
385
386/*
387 * In addition to the EFI tables there is also the EFI device tree node.
388 * In particular, we need /efi/platform to have an FSBFrequency key. Without it,
389 * the tsc_init function will panic very early on in kernel startup, before
390 * the console is available.
391 */
392
393/*==========================================================================
394 * FSB Frequency detection
395 */
396
397/* These should be const but DT__AddProperty takes char* */
398static const char TSC_Frequency_prop[] = "TSCFrequency";
399static const char FSB_Frequency_prop[] = "FSBFrequency";
400static const char CPU_Frequency_prop[] = "CPUFrequency";
401
402/*==========================================================================
403 * SMBIOS
404 */
405
406/* From Foundation/Efi/Guid/Smbios/SmBios.c */
407EFI_GUID constgEfiSmbiosTableGuid = EFI_SMBIOS_TABLE_GUID;
408
409#define SMBIOS_RANGE_START0x000F0000
410#define SMBIOS_RANGE_END0x000FFFFF
411
412/* '_SM_' in little endian: */
413#define SMBIOS_ANCHOR_UINT32_LE 0x5f4d535f
414
415#define EFI_ACPI_TABLE_GUID \
416{ \
4170xeb9d2d30, 0x2d88, 0x11d3, { 0x9a, 0x16, 0x0, 0x90, 0x27, 0x3f, 0xc1, 0x4d } \
418}
419
420#define EFI_ACPI_20_TABLE_GUID \
421{ \
4220x8868e871, 0xe4f1, 0x11d3, { 0xbc, 0x22, 0x0, 0x80, 0xc7, 0x3c, 0x88, 0x81 } \
423}
424
425EFI_GUID gEfiAcpiTableGuid = EFI_ACPI_TABLE_GUID;
426EFI_GUID gEfiAcpi20TableGuid = EFI_ACPI_20_TABLE_GUID;
427
428
429/*==========================================================================
430 * Fake EFI implementation
431 */
432
433/* These should be const but DT__AddProperty takes char* */
434static const char FIRMWARE_REVISION_PROP[] = "firmware-revision";
435static const char FIRMWARE_ABI_PROP[] = "firmware-abi";
436static const char FIRMWARE_VENDOR_PROP[] = "firmware-vendor";
437static const char FIRMWARE_ABI_32_PROP_VALUE[] = "EFI32";
438static const char FIRMWARE_ABI_64_PROP_VALUE[] = "EFI64";
439static const char SYSTEM_ID_PROP[] = "system-id";
440static const char SYSTEM_SERIAL_PROP[] = "SystemSerialNumber";
441static const char SYSTEM_TYPE_PROP[] = "system-type";
442static const char MODEL_PROP[] = "Model";
443static const char BOARDID_PROP[] = "board-id";
444
445/*
446 * Get an smbios option string option to convert to EFI_CHAR16 string
447 */
448static EFI_CHAR16* getSmbiosChar16(const char * key, size_t* len)
449{
450const char*src = getStringForKey(key, &bootInfo->smbiosConfig);
451EFI_CHAR16* dst = 0;
452size_t i = 0;
453
454if (!key || !(*key) || !len || !src)
455{
456return 0;
457}
458
459*len = strlen(src);
460dst = (EFI_CHAR16*) malloc( ((*len)+1) * 2 );
461for (; i < (*len); i++)
462{
463dst[i] = src[i];
464}
465dst[(*len)] = '\0';
466*len = ((*len)+1)*2; // return the CHAR16 bufsize in cluding zero terminated CHAR16
467return dst;
468}
469
470/*
471 * Get the SystemID from the bios dmi info
472 */
473staticEFI_CHAR8* getSmbiosUUID()
474{
475static EFI_CHAR8 uuid[UUID_LEN];
476int i, isZero, isOnes;
477SMBByte*p;
478
479p = (SMBByte*)Platform.UUID;
480
481for (i=0, isZero=1, isOnes=1; i<UUID_LEN; i++)
482{
483if (p[i] != 0x00)
484{
485isZero = 0;
486}
487
488if (p[i] != 0xff)
489{
490isOnes = 0;
491}
492}
493
494if (isZero || isOnes) // empty or setable means: no uuid present
495{
496verbose("No UUID present in SMBIOS System Information Table\n");
497return 0;
498}
499
500memcpy(uuid, p, UUID_LEN);
501return uuid;
502}
503
504/*
505 * return a binary UUID value from the overriden SystemID and SMUUID if found,
506 * or from the bios if not, or from a fixed value if no bios value is found
507 */
508static EFI_CHAR8* getSystemID()
509{
510// unable to determine UUID for host. Error: 35 fix
511// Rek: new SMsystemid option conforming to smbios notation standards, this option should
512// belong to smbios config only ...
513const char *sysId = getStringForKey(kSystemID, &bootInfo->chameleonConfig);
514EFI_CHAR8*ret = getUUIDFromString(sysId);
515
516if (!sysId || !ret) // try bios dmi info UUID extraction
517{
518ret = getSmbiosUUID();
519sysId = 0;
520}
521
522if (!ret)
523{
524// no bios dmi UUID available, set a fixed value for system-id
525ret=getUUIDFromString((sysId = (const char*) SYSTEM_ID));
526}
527verbose("Customizing SystemID with : %s\n", getStringFromUUID(ret)); // apply a nice formatting to the displayed output
528return ret;
529}
530
531/*
532 * Must be called AFTER setup Acpi because we need to take care of correct
533 * facp content to reflect in ioregs
534 */
535void setupSystemType()
536{
537Node *node = DT__FindNode("/", false);
538if (node == 0)
539{
540stop("Couldn't get root node");
541}
542// we need to write this property after facp parsing
543// Export system-type only if it has been overrriden by the SystemType option
544DT__AddProperty(node, SYSTEM_TYPE_PROP, sizeof(Platform.Type), &Platform.Type);
545}
546
547void setupEfiDeviceTree(void)
548{
549EFI_CHAR8* ret = 0;
550EFI_CHAR16* ret16 = 0;
551size_t len = 0;
552Node*node;
553
554node = DT__FindNode("/", false);
555
556if (node == 0)
557{
558stop("Couldn't get root node");
559}
560
561// We could also just do DT__FindNode("/efi/platform", true)
562// But I think eventually we want to fill stuff in the efi node
563// too so we might as well create it so we have a pointer for it too.
564node = DT__AddChild(node, "efi");
565
566if (archCpuType == CPU_TYPE_I386)
567{
568DT__AddProperty(node, FIRMWARE_ABI_PROP, sizeof(FIRMWARE_ABI_32_PROP_VALUE), (char*)FIRMWARE_ABI_32_PROP_VALUE);
569}
570else
571{
572DT__AddProperty(node, FIRMWARE_ABI_PROP, sizeof(FIRMWARE_ABI_64_PROP_VALUE), (char*)FIRMWARE_ABI_64_PROP_VALUE);
573}
574
575DT__AddProperty(node, FIRMWARE_REVISION_PROP, sizeof(FIRMWARE_REVISION), (EFI_UINT32*)&FIRMWARE_REVISION);
576DT__AddProperty(node, FIRMWARE_VENDOR_PROP, sizeof(FIRMWARE_VENDOR), (EFI_CHAR16*)FIRMWARE_VENDOR);
577
578// TODO: Fill in other efi properties if necessary
579
580// Set up the /efi/runtime-services table node similar to the way a child node of configuration-table
581// is set up. That is, name and table properties
582Node *runtimeServicesNode = DT__AddChild(node, "runtime-services");
583
584if (archCpuType == CPU_TYPE_I386)
585{
586// The value of the table property is the 32-bit physical address for the RuntimeServices table.
587// Since the EFI system table already has a pointer to it, we simply use the address of that pointer
588// for the pointer to the property data. Warning.. DT finalization calls free on that but we're not
589// the only thing to use a non-malloc'd pointer for something in the DT
590
591DT__AddProperty(runtimeServicesNode, "table", sizeof(uint64_t), &gST32->RuntimeServices);
592}
593else
594{
595DT__AddProperty(runtimeServicesNode, "table", sizeof(uint64_t), &gST64->RuntimeServices);
596}
597
598// Set up the /efi/configuration-table node which will eventually have several child nodes for
599// all of the configuration tables needed by various kernel extensions.
600gEfiConfigurationTableNode = DT__AddChild(node, "configuration-table");
601
602// Now fill in the /efi/platform Node
603Node *efiPlatformNode = DT__AddChild(node, "platform");
604
605// NOTE WELL: If you do add FSB Frequency detection, make sure to store
606// the value in the fsbFrequency global and not an malloc'd pointer
607// because the DT_AddProperty function does not copy its args.
608
609if (Platform.CPU.FSBFrequency != 0)
610{
611DT__AddProperty(efiPlatformNode, FSB_Frequency_prop, sizeof(uint64_t), &Platform.CPU.FSBFrequency);
612}
613
614// Export TSC and CPU frequencies for use by the kernel or KEXTs
615if (Platform.CPU.TSCFrequency != 0)
616{
617DT__AddProperty(efiPlatformNode, TSC_Frequency_prop, sizeof(uint64_t), &Platform.CPU.TSCFrequency);
618}
619
620if (Platform.CPU.CPUFrequency != 0)
621{
622DT__AddProperty(efiPlatformNode, CPU_Frequency_prop, sizeof(uint64_t), &Platform.CPU.CPUFrequency);
623}
624
625// Export system-id. Can be disabled with SystemId=No in com.apple.Boot.plist
626if ((ret=getSystemID()))
627{
628DT__AddProperty(efiPlatformNode, SYSTEM_ID_PROP, UUID_LEN, (EFI_UINT32*) ret);
629}
630
631// Export SystemSerialNumber if present
632if ((ret16=getSmbiosChar16("SMserial", &len)))
633{
634DT__AddProperty(efiPlatformNode, SYSTEM_SERIAL_PROP, len, ret16);
635}
636
637// Export Model if present
638if ((ret16=getSmbiosChar16("SMproductname", &len)))
639{
640DT__AddProperty(efiPlatformNode, MODEL_PROP, len, ret16);
641}
642
643// Fill /efi/device-properties node.
644setupDeviceProperties(node);
645}
646
647/*
648 * Must be called AFTER getSmbios
649 */
650void setupBoardId()
651{
652Node *node;
653node = DT__FindNode("/", false);
654if (node == 0)
655{
656stop("Couldn't get root node");
657}
658const char *boardid = getStringForKey("SMboardproduct", &bootInfo->smbiosConfig);
659if (boardid)
660{
661DT__AddProperty(node, BOARDID_PROP, strlen(boardid)+1, (EFI_CHAR16*)boardid);
662}
663}
664
665/*
666 * Populate the chosen node
667 */
668
669void setupChosenNode()
670{
671Node *chosenNode;
672chosenNode = DT__FindNode("/chosen", false);
673if (chosenNode == 0)
674{
675stop("Couldn't get chosen node");
676}
677
678int bootUUIDLength = strlen(gBootUUIDString);
679if (bootUUIDLength)
680{
681DT__AddProperty(chosenNode, "boot-uuid", bootUUIDLength + 1, gBootUUIDString);
682}
683}
684
685/*
686 * Load the smbios.plist override config file if any
687 */
688static void setupSmbiosConfigFile(const char *filename)
689{
690chardirSpecSMBIOS[128];
691const char*override_pathname = NULL;
692intlen = 0, err = 0;
693extern void scan_mem();
694
695// Take in account user overriding
696if (getValueForKey(kSMBIOSKey, &override_pathname, &len, &bootInfo->chameleonConfig) && len > 0)
697{
698// Specify a path to a file, e.g. SMBIOS=/Extra/macProXY.plist
699sprintf(dirSpecSMBIOS, override_pathname);
700err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig);
701}
702else
703{
704// Check selected volume's Extra.
705sprintf(dirSpecSMBIOS, "/Extra/%s", filename);
706if ( (err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig)) )
707{
708// Check booter volume/rdbt Extra.
709sprintf(dirSpecSMBIOS, "bt(0,0)/Extra/%s", filename);
710err = loadConfigFile(dirSpecSMBIOS, &bootInfo->smbiosConfig);
711}
712}
713
714if (err)
715{
716verbose("No SMBIOS replacement found.\n");
717}
718
719// get a chance to scan mem dynamically if user asks for it while having the config options
720// loaded as well, as opposed to when it was in scan_platform(); also load the orig. smbios
721// so that we can access dmi info, without patching the smbios yet.
722scan_mem();
723}
724
725/*
726 * Installs all the needed configuration table entries
727 */
728static void setupEfiConfigurationTable()
729{
730smbios_p = (EFI_PTR32)getSmbios(SMBIOS_PATCHED);
731addConfigurationTable(&gEfiSmbiosTableGuid, &smbios_p, NULL);
732
733setupBoardId(); //need to be called after getSmbios
734
735// Setup ACPI with DSDT overrides (mackerintel's patch)
736setupAcpi();
737
738// We've obviously changed the count.. so fix up the CRC32
739if (archCpuType == CPU_TYPE_I386)
740{
741gST32->Hdr.CRC32 = 0;
742gST32->Hdr.CRC32 = crc32(0L, gST32, gST32->Hdr.HeaderSize);
743}
744else
745{
746gST64->Hdr.CRC32 = 0;
747gST64->Hdr.CRC32 = crc32(0L, gST64, gST64->Hdr.HeaderSize);
748}
749
750// Setup the chosen node
751setupChosenNode();
752}
753
754void saveOriginalSMBIOS(void)
755{
756Node *node;
757SMBEntryPoint *origeps;
758void *tableAddress;
759
760node = DT__FindNode("/efi/platform", false);
761if (!node)
762{
763verbose("/efi/platform node not found\n");
764return;
765}
766
767origeps = getSmbios(SMBIOS_ORIGINAL);
768if (!origeps)
769{
770return;
771}
772
773tableAddress = (void *)AllocateKernelMemory(origeps->dmi.tableLength);
774if (!tableAddress)
775{
776return;
777}
778
779memcpy(tableAddress, (void *)origeps->dmi.tableAddress, origeps->dmi.tableLength);
780DT__AddProperty(node, "SMBIOS", origeps->dmi.tableLength, tableAddress);
781}
782
783/*
784 * Entrypoint from boot.c
785 */
786void setupFakeEfi(void)
787{
788// Generate efi device strings
789setup_pci_devs(root_pci_dev);
790
791readSMBIOSInfo(getSmbios(SMBIOS_ORIGINAL));
792
793// load smbios.plist file if any
794setupSmbiosConfigFile("smbios.plist");
795
796setupSMBIOSTable();
797
798// Initialize the base table
799if (archCpuType == CPU_TYPE_I386)
800{
801setupEfiTables32();
802}
803else
804{
805setupEfiTables64();
806}
807
808// Initialize the device tree
809setupEfiDeviceTree();
810
811saveOriginalSMBIOS();
812
813// Add configuration table entries to both the services table and the device tree
814setupEfiConfigurationTable();
815}
816

Archive Download this file

Revision: 2269