2 * This file is part of the coreboot project.
4 * Copyright (C) 2003 Eric W. Biederman <ebiederm@xmission.com>
5 * Copyright (C) 2009 Ron Minnich <rminnich@gmail.com>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; version 2 of the License.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA, 02110-1301 USA
21 #include <console/console.h>
22 #include <part/fallback_boot.h>
24 #include <boot/elf_boot.h>
25 #include <boot/coreboot_tables.h>
26 #include <ip_checksum.h>
27 #include <stream/read_bytes.h>
33 #ifndef CONFIG_BIG_ENDIAN
34 #define ntohl(x) ( ((x&0xff)<<24) | ((x&0xff00)<<8) | \
35 ((x&0xff0000) >> 8) | ((x&0xff000000) >> 24) )
40 /* Maximum physical address we can use for the coreboot bounce buffer.
46 extern unsigned char _ram_seg;
47 extern unsigned char _eram_seg;
52 struct segment *phdr_next;
53 struct segment *phdr_prev;
54 unsigned long s_dstaddr;
55 unsigned long s_srcaddr;
56 unsigned long s_memsz;
57 unsigned long s_filesz;
61 struct verify_callback {
62 struct verify_callback *next;
63 int (*callback)(struct verify_callback *vcb,
64 Elf_ehdr *ehdr, Elf_phdr *phdr, struct segment *head);
65 unsigned long desc_offset;
66 unsigned long desc_addr;
69 struct ip_checksum_vcb {
70 struct verify_callback data;
71 unsigned short ip_checksum;
75 * Static executables all want to share the same addresses
76 * in memory because only a few addresses are reliably present on
77 * a machine, and implementing general relocation is hard.
80 * - Allocate a buffer twice the size of the coreboot image.
81 * - Anything that would overwrite coreboot copy into the lower half of
83 * - After loading an ELF image copy coreboot to the upper half of the
85 * - Then jump to the loaded image.
88 * - Nearly arbitrary standalone executables can be loaded.
89 * - Coreboot is preserved, so it can be returned to.
90 * - The implementation is still relatively simple,
91 * and much simpler then the general case implemented in kexec.
95 static unsigned long get_bounce_buffer(struct lb_memory *mem)
97 unsigned long lb_size;
98 unsigned long mem_entries;
101 lb_size = (unsigned long)(&_eram_seg - &_ram_seg);
102 /* Double coreboot size so I have somewhere to place a copy to return to */
103 lb_size = lb_size + lb_size;
104 mem_entries = (mem->size - sizeof(*mem))/sizeof(mem->map[0]);
106 for(i = 0; i < mem_entries; i++) {
107 unsigned long mstart, mend;
109 unsigned long tbuffer;
110 if (mem->map[i].type != LB_MEM_RAM)
112 if (unpack_lb64(mem->map[i].start) > MAX_ADDR)
114 if (unpack_lb64(mem->map[i].size) < lb_size)
116 mstart = unpack_lb64(mem->map[i].start);
117 msize = MAX_ADDR - mstart +1;
118 if (msize > unpack_lb64(mem->map[i].size))
119 msize = unpack_lb64(mem->map[i].size);
120 mend = mstart + msize;
121 tbuffer = mend - lb_size;
122 if (tbuffer < buffer)
129 static int valid_area(struct lb_memory *mem, unsigned long buffer,
130 unsigned long start, unsigned long len)
132 /* Check through all of the memory segments and ensure
133 * the segment that was passed in is completely contained
137 unsigned long end = start + len;
138 unsigned long mem_entries = (mem->size - sizeof(*mem))/sizeof(mem->map[0]);
140 /* See if I conflict with the bounce buffer */
145 /* Walk through the table of valid memory ranges and see if I
148 for(i = 0; i < mem_entries; i++) {
149 uint64_t mstart, mend;
151 mtype = mem->map[i].type;
152 mstart = unpack_lb64(mem->map[i].start);
153 mend = mstart + unpack_lb64(mem->map[i].size);
154 if ((mtype == LB_MEM_RAM) && (start < mend) && (end > mstart)) {
157 if ((mtype == LB_MEM_TABLE) && (start < mend) && (end > mstart)) {
158 printk_err("Payload is overwriting Coreboot tables.\n");
162 if (i == mem_entries) {
163 printk_err("No matching ram area found for range:\n");
164 printk_err(" [0x%016lx, 0x%016lx)\n", start, end);
165 printk_err("Ram areas\n");
166 for(i = 0; i < mem_entries; i++) {
167 uint64_t mstart, mend;
169 mtype = mem->map[i].type;
170 mstart = unpack_lb64(mem->map[i].start);
171 mend = mstart + unpack_lb64(mem->map[i].size);
172 printk_err(" [0x%016lx, 0x%016lx) %s\n",
173 (unsigned long)mstart,
175 (mtype == LB_MEM_RAM)?"RAM":"Reserved");
183 static void relocate_segment(unsigned long buffer, struct segment *seg)
185 /* Modify all segments that want to load onto coreboot
186 * to load onto the bounce buffer instead.
188 unsigned long lb_start = (unsigned long)&_ram_seg;
189 unsigned long lb_end = (unsigned long)&_eram_seg;
190 unsigned long start, middle, end;
192 printk_spew("lb: [0x%016lx, 0x%016lx)\n",
195 start = seg->s_dstaddr;
196 middle = start + seg->s_filesz;
197 end = start + seg->s_memsz;
198 /* I don't conflict with coreboot so get out of here */
199 if ((end <= lb_start) || (start >= lb_end))
202 printk_spew("segment: [0x%016lx, 0x%016lx, 0x%016lx)\n",
205 if (seg->compression == CBFS_COMPRESS_NONE) {
206 /* Slice off a piece at the beginning
207 * that doesn't conflict with coreboot.
209 if (start < lb_start) {
211 unsigned long len = lb_start - start;
212 new = malloc(sizeof(*new));
216 seg->s_dstaddr += len;
217 seg->s_srcaddr += len;
218 if (seg->s_filesz > len) {
220 seg->s_filesz -= len;
225 /* Order by stream offset */
227 new->prev = seg->prev;
228 seg->prev->next = new;
230 /* Order by original program header order */
231 new->phdr_next = seg;
232 new->phdr_prev = seg->phdr_prev;
233 seg->phdr_prev->phdr_next = new;
234 seg->phdr_prev = new;
236 /* compute the new value of start */
237 start = seg->s_dstaddr;
239 printk_spew(" early: [0x%016lx, 0x%016lx, 0x%016lx)\n",
241 new->s_dstaddr + new->s_filesz,
242 new->s_dstaddr + new->s_memsz);
245 /* Slice off a piece at the end
246 * that doesn't conflict with coreboot
249 unsigned long len = lb_end - start;
251 new = malloc(sizeof(*new));
255 new->s_dstaddr += len;
256 new->s_srcaddr += len;
257 if (seg->s_filesz > len) {
259 new->s_filesz -= len;
263 /* Order by stream offset */
264 new->next = seg->next;
266 seg->next->prev = new;
268 /* Order by original program header order */
269 new->phdr_next = seg->phdr_next;
270 new->phdr_prev = seg;
271 seg->phdr_next->phdr_prev = new;
272 seg->phdr_next = new;
274 /* compute the new value of end */
277 printk_spew(" late: [0x%016lx, 0x%016lx, 0x%016lx)\n",
279 new->s_dstaddr + new->s_filesz,
280 new->s_dstaddr + new->s_memsz);
284 /* Now retarget this segment onto the bounce buffer */
285 /* sort of explanation: the buffer is a 1:1 mapping to coreboot.
286 * so you will make the dstaddr be this buffer, and it will get copied
287 * later to where coreboot lives.
289 seg->s_dstaddr = buffer + (seg->s_dstaddr - lb_start);
291 printk_spew(" bounce: [0x%016lx, 0x%016lx, 0x%016lx)\n",
293 seg->s_dstaddr + seg->s_filesz,
294 seg->s_dstaddr + seg->s_memsz);
298 static int build_self_segment_list(
299 struct segment *head,
300 unsigned long bounce_buffer, struct lb_memory *mem,
301 struct cbfs_payload *payload, u32 *entry)
306 struct cbfs_payload_segment *segment, *first_segment;
307 memset(head, 0, sizeof(*head));
308 head->phdr_next = head->phdr_prev = head;
309 head->next = head->prev = head;
310 first_segment = segment = &payload->segments;
313 printk_debug("Segment %p\n", segment);
314 switch(segment->type) {
315 default: printk_emerg("Bad segment type %x\n", segment->type);
317 case PAYLOAD_SEGMENT_PARAMS:
318 printk_info("found param section\n");
321 case PAYLOAD_SEGMENT_CODE:
322 case PAYLOAD_SEGMENT_DATA:
323 printk_info( "%s: ", segment->type == PAYLOAD_SEGMENT_CODE ?
325 new = malloc(sizeof(*new));
326 new->s_dstaddr = ntohl((u32) segment->load_addr);
327 new->s_memsz = ntohl(segment->mem_len);
328 new->compression = ntohl(segment->compression);
330 datasize = ntohl(segment->len);
331 new->s_srcaddr = (u32) ((unsigned char *) first_segment) + ntohl(segment->offset);
332 new->s_filesz = ntohl(segment->len);
333 printk_debug("New segment dstaddr 0x%lx memsize 0x%lx srcaddr 0x%lx filesize 0x%lx\n",
334 new->s_dstaddr, new->s_memsz, new->s_srcaddr, new->s_filesz);
335 /* Clean up the values */
336 if (new->s_filesz > new->s_memsz) {
337 new->s_filesz = new->s_memsz;
339 printk_debug("(cleaned up) New segment addr 0x%lx size 0x%lx offset 0x%lx filesize 0x%lx\n",
340 new->s_dstaddr, new->s_memsz, new->s_srcaddr, new->s_filesz);
342 case PAYLOAD_SEGMENT_BSS:
343 printk_info("BSS %p/%d\n", (void *) ntohl((u32) segment->load_addr),
344 ntohl(segment->mem_len));
345 new = malloc(sizeof(*new));
347 new->s_dstaddr = ntohl((u32) segment->load_addr);
348 new->s_memsz = ntohl(segment->mem_len);
352 case PAYLOAD_SEGMENT_ENTRY:
353 printk_info("Entry %p\n", (void *) ntohl((u32) segment->load_addr));
354 *entry = ntohl((u32) segment->load_addr);
358 for(ptr = head->next; ptr != head; ptr = ptr->next) {
359 if (new->s_srcaddr < ntohl((u32) segment->load_addr))
362 /* Order by stream offset */
364 new->prev = ptr->prev;
365 ptr->prev->next = new;
367 /* Order by original program header order */
368 new->phdr_next = head;
369 new->phdr_prev = head->phdr_prev;
370 head->phdr_prev->phdr_next = new;
371 head->phdr_prev = new;
373 /* Verify the memory addresses in the segment are valid */
374 if (!valid_area(mem, bounce_buffer, new->s_dstaddr, new->s_memsz))
377 /* Modify the segment to load onto the bounce_buffer if necessary.
379 relocate_segment(bounce_buffer, new);
386 static int load_self_segments(
387 struct segment *head, struct cbfs_payload *payload)
389 unsigned long offset;
393 for(ptr = head->next; ptr != head; ptr = ptr->next) {
394 unsigned char *dest, *middle, *end, *src;
395 printk_debug("Loading Segment: addr: 0x%016lx memsz: 0x%016lx filesz: 0x%016lx\n",
396 ptr->s_dstaddr, ptr->s_memsz, ptr->s_filesz);
398 /* Compute the boundaries of the segment */
399 dest = (unsigned char *)(ptr->s_dstaddr);
400 src = (unsigned char *)(ptr->s_srcaddr);
402 /* Copy data from the initial buffer */
406 switch(ptr->compression) {
407 #if CONFIG_COMPRESSED_PAYLOAD_LZMA==1
408 case CBFS_COMPRESS_LZMA: {
409 printk_debug("using LZMA\n");
410 unsigned long ulzma(unsigned char *src, unsigned char *dst);
411 len = ulzma(src, dest);
415 #if CONFIG_COMPRESSED_PAYLOAD_NRV2B==1
416 case CBFS_COMPRESS_NRV2B: {
417 printk_debug("using NRV2B\n");
418 unsigned long unrv2b(u8 *src, u8 *dst, unsigned long *ilen_p);
420 len = unrv2b(src, dest, &tmp);
424 case CBFS_COMPRESS_NONE: {
425 printk_debug("it's not compressed!\n");
426 memcpy(dest, src, len);
430 printk_info( "CBFS: Unknown compression type %d\n", ptr->compression);
433 end = dest + ptr->s_memsz;
435 printk_spew("[ 0x%016lx, %016lx, 0x%016lx) <- %016lx\n",
437 (unsigned long)middle,
441 /* Zero the extra bytes between middle & end */
443 printk_debug("Clearing Segment: addr: 0x%016lx memsz: 0x%016lx\n",
444 (unsigned long)middle, (unsigned long)(end - middle));
446 /* Zero the extra bytes */
447 memset(middle, 0, end - middle);
453 int selfboot(struct lb_memory *mem, struct cbfs_payload *payload)
457 unsigned long bounce_buffer;
459 /* Find a bounce buffer so I can load to coreboot's current location */
460 bounce_buffer = get_bounce_buffer(mem);
461 if (!bounce_buffer) {
462 printk_err("Could not find a bounce buffer...\n");
466 /* Preprocess the self segments */
467 if (!build_self_segment_list(&head, bounce_buffer, mem, payload, &entry))
470 /* Load the segments */
471 if (!load_self_segments(&head, payload))
474 printk_spew("Loaded segments\n");
476 /* Reset to booting from this image as late as possible */
479 printk_debug("Jumping to boot code at %x\n", entry);
483 jmp_to_elf_entry((void*)entry, bounce_buffer);