1 /* SPDX-License-Identifier: GPL-2.0-only */
3 #include <console/console.h>
4 #include <commonlib/endian.h>
5 #include <commonlib/fsp.h>
7 * Intel's code does not have a handle on changing global packing state.
8 * Therefore, one needs to protect against packing policies that are set
9 * globally for a compilation unit just by including a header file.
13 /* Default bind FSP 1.1 API to edk2 UEFI 2.4 types. */
14 #include <vendorcode/intel/edk2/uefi_2.4/uefi_types.h>
15 #include <vendorcode/intel/fsp/fsp1_1/IntelFspPkg/Include/FspInfoHeader.h>
17 /* Restore original packing policy. */
20 #include <commonlib/helpers.h>
25 #define FSP_DBG_LVL BIOS_NEVER
28 * UEFI defines everything as little endian. However, this piece of code
29 * can be integrated in a userland tool. That tool could be on a big endian
30 * machine so one needs to access the fields within UEFI structures using
31 * endian-aware accesses.
34 /* Return 0 if equal. Non-zero if not equal. */
35 static int guid_compare(const EFI_GUID
*le_guid
, const EFI_GUID
*native_guid
)
37 if (read_le32(&le_guid
->Data1
) != native_guid
->Data1
)
39 if (read_le16(&le_guid
->Data2
) != native_guid
->Data2
)
41 if (read_le16(&le_guid
->Data3
) != native_guid
->Data3
)
43 return memcmp(le_guid
->Data4
, native_guid
->Data4
,
44 ARRAY_SIZE(le_guid
->Data4
));
47 static const EFI_GUID ffs2_guid
= EFI_FIRMWARE_FILE_SYSTEM2_GUID
;
48 static const EFI_GUID fih_guid
= FSP_INFO_HEADER_GUID
;
50 struct fsp_patch_table
{
52 uint16_t header_length
;
53 uint8_t header_revision
;
55 uint32_t patch_entry_num
;
56 uint32_t patch_entries
[0];
59 #define FSPP_SIG 0x50505346
61 static void *relative_offset(void *base
, ssize_t offset
)
65 loc
= (uintptr_t)base
;
71 static uint32_t *fspp_reloc(void *fsp
, size_t fsp_size
, uint32_t e
)
75 /* Offsets live in bits 23:0. */
76 offset
= e
& 0xffffff;
78 /* If bit 31 is set then the offset is considered a negative value
79 * relative to the end of the image using 16MiB as the offset's
82 offset
= fsp_size
- (16 * MiB
- offset
);
84 /* Determine if offset falls within fsp_size for a 32 bit relocation. */
85 if (offset
> fsp_size
- sizeof(uint32_t))
88 return relative_offset(fsp
, offset
);
91 static int reloc_type(uint16_t reloc_entry
)
93 /* Reloc type in upper 4 bits */
94 return reloc_entry
>> 12;
97 static size_t reloc_offset(uint16_t reloc_entry
)
99 /* Offsets are in low 12 bits. */
100 return reloc_entry
& ((1 << 12) - 1);
103 static int te_relocate(uintptr_t new_addr
, void *te
)
105 EFI_TE_IMAGE_HEADER
*teih
;
106 EFI_IMAGE_DATA_DIRECTORY
*relocd
;
107 EFI_IMAGE_BASE_RELOCATION
*relocb
;
108 uintptr_t image_base
;
112 size_t relocd_offset
;
118 if (read_le16(&teih
->Signature
) != EFI_TE_IMAGE_HEADER_SIGNATURE
) {
119 printk(BIOS_ERR
, "TE Signature mismatch: %x vs %x\n",
120 read_le16(&teih
->Signature
),
121 EFI_TE_IMAGE_HEADER_SIGNATURE
);
126 * A TE image is created by converting a PE file. Because of this
127 * the offsets within the headers are off. In order to calculate
128 * the correct relative offsets one needs to subtract fixup_offset
129 * from the encoded offsets. Similarly, the linked address of the
130 * program is found by adding the fixup_offset to the ImageBase.
132 fixup_offset
= read_le16(&teih
->StrippedSize
);
133 fixup_offset
-= sizeof(EFI_TE_IMAGE_HEADER
);
134 /* Keep track of a base that is correctly adjusted so that offsets
135 * can be used directly. */
137 te_base
-= fixup_offset
;
139 image_base
= read_le64(&teih
->ImageBase
);
140 adj
= new_addr
- (image_base
+ fixup_offset
);
142 printk(FSP_DBG_LVL
, "TE Image %p -> %p adjust value: %x\n",
143 (void *)image_base
, (void *)new_addr
, adj
);
145 /* Adjust ImageBase for consistency. */
146 write_le64(&teih
->ImageBase
, (uint32_t)(image_base
+ adj
));
148 relocd
= &teih
->DataDirectory
[EFI_TE_IMAGE_DIRECTORY_ENTRY_BASERELOC
];
151 /* Though the field name is VirtualAddress it's actually relative to
152 * the beginning of the image which is linked at ImageBase. */
153 relocb
= relative_offset(te
,
154 read_le32(&relocd
->VirtualAddress
) - fixup_offset
);
155 while (relocd_offset
< read_le32(&relocd
->Size
)) {
156 size_t rva_offset
= read_le32(&relocb
->VirtualAddress
);
158 printk(FSP_DBG_LVL
, "Relocs for RVA offset %zx\n", rva_offset
);
159 num_relocs
= read_le32(&relocb
->SizeOfBlock
) - sizeof(*relocb
);
160 num_relocs
/= sizeof(uint16_t);
161 reloc
= relative_offset(relocb
, sizeof(*relocb
));
163 printk(FSP_DBG_LVL
, "Num relocs in block: %zx\n", num_relocs
);
165 while (num_relocs
> 0) {
166 uint16_t reloc_val
= read_le16(reloc
);
167 int type
= reloc_type(reloc_val
);
168 size_t offset
= reloc_offset(reloc_val
);
170 printk(FSP_DBG_LVL
, "reloc type %x offset %zx\n",
173 if (type
== EFI_IMAGE_REL_BASED_HIGHLOW
||
174 type
== EFI_IMAGE_REL_BASED_DIR64
) {
175 uint32_t *reloc_addr
;
178 offset
+= rva_offset
;
179 reloc_addr
= (void *)&te_base
[offset
];
180 val
= read_le32(reloc_addr
);
182 printk(FSP_DBG_LVL
, "Adjusting %p %x -> %x\n",
183 reloc_addr
, val
, val
+ adj
);
184 write_le32(reloc_addr
, val
+ adj
);
185 } else if (type
!= EFI_IMAGE_REL_BASED_ABSOLUTE
) {
186 printk(BIOS_ERR
, "Unknown reloc type: %x\n",
194 /* Track consumption of relocation directory contents. */
195 relocd_offset
+= read_le32(&relocb
->SizeOfBlock
);
196 /* Get next relocation block to process. */
197 relocb
= relative_offset(relocb
,
198 read_le32(&relocb
->SizeOfBlock
));
204 static size_t csh_size(const EFI_COMMON_SECTION_HEADER
*csh
)
208 /* Unpack the array into a type that can be used. */
210 size
|= read_le8(&csh
->Size
[0]) << 0;
211 size
|= read_le8(&csh
->Size
[1]) << 8;
212 size
|= read_le8(&csh
->Size
[2]) << 16;
217 static size_t section_data_offset(const EFI_COMMON_SECTION_HEADER
*csh
)
219 if (csh_size(csh
) == 0x00ffffff)
220 return sizeof(EFI_COMMON_SECTION_HEADER2
);
222 return sizeof(EFI_COMMON_SECTION_HEADER
);
225 static size_t section_data_size(const EFI_COMMON_SECTION_HEADER
*csh
)
229 if (csh_size(csh
) == 0x00ffffff)
230 section_size
= read_le32(&SECTION2_SIZE(csh
));
232 section_size
= csh_size(csh
);
234 return section_size
- section_data_offset(csh
);
237 static size_t file_section_offset(const EFI_FFS_FILE_HEADER
*ffsfh
)
239 if (IS_FFS_FILE2(ffsfh
))
240 return sizeof(EFI_FFS_FILE_HEADER2
);
242 return sizeof(EFI_FFS_FILE_HEADER
);
245 static size_t ffs_file_size(const EFI_FFS_FILE_HEADER
*ffsfh
)
249 if (IS_FFS_FILE2(ffsfh
)) {
251 * this cast is needed with UEFI 2.6 headers in order
252 * to read the UINT32 value that FFS_FILE2_SIZE converts
255 uint32_t file2_size
= FFS_FILE2_SIZE(ffsfh
);
256 size
= read_le32(&file2_size
);
258 size
= read_le8(&ffsfh
->Size
[0]) << 0;
259 size
|= read_le8(&ffsfh
->Size
[1]) << 8;
260 size
|= read_le8(&ffsfh
->Size
[2]) << 16;
265 static int relocate_patch_table(void *fsp
, size_t size
, size_t offset
,
268 struct fsp_patch_table
*table
;
272 table
= relative_offset(fsp
, offset
);
274 if ((offset
+ sizeof(*table
) > size
) ||
275 (read_le16(&table
->header_length
) + offset
) > size
) {
276 printk(BIOS_ERR
, "FSPP not entirely contained in region.\n");
280 num_entries
= read_le32(&table
->patch_entry_num
);
281 printk(FSP_DBG_LVL
, "FSPP relocs: %zx\n", num_entries
);
283 for (num
= 0; num
< num_entries
; num
++) {
287 reloc
= fspp_reloc(fsp
, size
,
288 read_le32(&table
->patch_entries
[num
]));
291 printk(BIOS_ERR
, "Ignoring FSPP entry: %x\n",
292 read_le32(&table
->patch_entries
[num
]));
296 reloc_val
= read_le32(reloc
);
297 printk(FSP_DBG_LVL
, "Adjusting %p %x -> %x\n",
299 (unsigned int)(reloc_val
+ adjustment
));
301 write_le32(reloc
, reloc_val
+ adjustment
);
307 static ssize_t
relocate_remaining_items(void *fsp
, size_t size
,
308 uintptr_t new_addr
, size_t fih_offset
)
310 EFI_FFS_FILE_HEADER
*ffsfh
;
311 EFI_COMMON_SECTION_HEADER
*csh
;
312 FSP_INFO_HEADER
*fih
;
316 printk(FSP_DBG_LVL
, "FSP_INFO_HEADER offset is %zx\n", fih_offset
);
318 if (fih_offset
== 0) {
319 printk(BIOS_ERR
, "FSP_INFO_HEADER offset is 0.\n");
323 /* FSP_INFO_HEADER at first file in FV within first RAW section. */
324 ffsfh
= relative_offset(fsp
, fih_offset
);
325 fih_offset
+= file_section_offset(ffsfh
);
326 csh
= relative_offset(fsp
, fih_offset
);
327 fih_offset
+= section_data_offset(csh
);
328 fih
= relative_offset(fsp
, fih_offset
);
330 if (guid_compare(&ffsfh
->Name
, &fih_guid
)) {
331 printk(BIOS_ERR
, "Bad FIH GUID.\n");
335 if (read_le8(&csh
->Type
) != EFI_SECTION_RAW
) {
336 printk(BIOS_ERR
, "FIH file should have raw section: %x\n",
337 read_le8(&csh
->Type
));
341 if (read_le32(&fih
->Signature
) != FSP_SIG
) {
342 printk(BIOS_ERR
, "Unexpected FIH signature: %08x\n",
343 read_le32(&fih
->Signature
));
347 adjustment
= (intptr_t)new_addr
- read_le32(&fih
->ImageBase
);
349 /* Update ImageBase to reflect FSP's new home. */
350 write_le32(&fih
->ImageBase
, adjustment
+ read_le32(&fih
->ImageBase
));
352 /* Need to find patch table and adjust each entry. The tables
353 * following FSP_INFO_HEADER have a 32-bit signature and header
354 * length. The patch table is denoted as having a 'FSPP' signature;
355 * the table format doesn't follow the other tables. */
356 offset
= fih_offset
+ read_le32(&fih
->HeaderLength
);
357 while (offset
+ 2 * sizeof(uint32_t) <= size
) {
358 uint32_t *table_headers
;
360 table_headers
= relative_offset(fsp
, offset
);
362 printk(FSP_DBG_LVL
, "Checking offset %zx for 'FSPP'\n",
365 if (read_le32(&table_headers
[0]) != FSPP_SIG
) {
366 offset
+= read_le32(&table_headers
[1]);
370 if (relocate_patch_table(fsp
, size
, offset
, adjustment
)) {
371 printk(BIOS_ERR
, "FSPP relocation failed.\n");
378 printk(BIOS_ERR
, "Could not find the FSP patch table.\n");
382 static ssize_t
relocate_fvh(uintptr_t new_addr
, void *fsp
, size_t fsp_size
,
383 size_t fvh_offset
, size_t *fih_offset
)
385 EFI_FIRMWARE_VOLUME_HEADER
*fvh
;
386 EFI_FFS_FILE_HEADER
*ffsfh
;
387 EFI_COMMON_SECTION_HEADER
*csh
;
394 fvh
= relative_offset(fsp
, offset
);
396 if (read_le32(&fvh
->Signature
) != EFI_FVH_SIGNATURE
)
399 fv_length
= read_le64(&fvh
->FvLength
);
401 printk(FSP_DBG_LVL
, "FVH length: %zx Offset: %zx Mapping length: %zx\n",
402 fv_length
, offset
, fsp_size
);
404 if (fv_length
+ offset
> fsp_size
)
407 /* Parse only this FV. However, the algorithm uses offsets into the
408 * entire FSP region so make size include the starting offset. */
409 size
= fv_length
+ offset
;
411 if (guid_compare(&fvh
->FileSystemGuid
, &ffs2_guid
)) {
412 printk(BIOS_ERR
, "FVH not an FFS2 type.\n");
416 if (read_le16(&fvh
->ExtHeaderOffset
) != 0) {
417 EFI_FIRMWARE_VOLUME_EXT_HEADER
*fveh
;
419 offset
+= read_le16(&fvh
->ExtHeaderOffset
);
420 fveh
= relative_offset(fsp
, offset
);
421 printk(FSP_DBG_LVL
, "Extended Header Offset: %zx Size: %zx\n",
422 (size_t)read_le16(&fvh
->ExtHeaderOffset
),
423 (size_t)read_le32(&fveh
->ExtHeaderSize
));
424 offset
+= read_le32(&fveh
->ExtHeaderSize
);
425 /* FFS files are 8 byte aligned after extended header. */
426 offset
= ALIGN_UP(offset
, 8);
428 offset
+= read_le16(&fvh
->HeaderLength
);
431 file_offset
= offset
;
432 while (file_offset
+ sizeof(*ffsfh
) < size
) {
433 offset
= file_offset
;
434 printk(FSP_DBG_LVL
, "file offset: %zx\n", file_offset
);
436 /* First file and section should be FSP info header. */
437 if (fih_offset
!= NULL
&& *fih_offset
== 0)
438 *fih_offset
= file_offset
;
440 ffsfh
= relative_offset(fsp
, file_offset
);
442 printk(FSP_DBG_LVL
, "file type = %x\n", read_le8(&ffsfh
->Type
));
443 printk(FSP_DBG_LVL
, "file attribs = %x\n",
444 read_le8(&ffsfh
->Attributes
));
446 /* Exit FV relocation when empty space found */
447 if (read_le8(&ffsfh
->Type
) == EFI_FV_FILETYPE_FFS_MAX
)
450 /* Next file on 8 byte alignment. */
451 file_offset
+= ffs_file_size(ffsfh
);
452 file_offset
= ALIGN_UP(file_offset
, 8);
454 /* Padding files have no section information. */
455 if (read_le8(&ffsfh
->Type
) == EFI_FV_FILETYPE_FFS_PAD
)
458 offset
+= file_section_offset(ffsfh
);
460 while (offset
+ sizeof(*csh
) < file_offset
) {
464 csh
= relative_offset(fsp
, offset
);
466 printk(FSP_DBG_LVL
, "section offset: %zx\n", offset
);
467 printk(FSP_DBG_LVL
, "section type: %x\n",
468 read_le8(&csh
->Type
));
470 data_size
= section_data_size(csh
);
471 data_offset
= section_data_offset(csh
);
473 if (data_size
+ data_offset
+ offset
> file_offset
) {
474 printk(BIOS_ERR
, "Section exceeds FV size.\n");
479 * The entire FSP image can be thought of as one
480 * program with a single link address even though there
481 * are multiple TEs linked separately. The reason is
482 * that each TE is linked for XIP. So in order to
483 * relocate the TE properly we need to form the
484 * relocated address based on the TE offset within
487 if (read_le8(&csh
->Type
) == EFI_SECTION_TE
) {
489 size_t te_offset
= offset
+ data_offset
;
490 uintptr_t te_addr
= new_addr
+ te_offset
;
492 printk(FSP_DBG_LVL
, "TE image at offset %zx\n",
494 te
= relative_offset(fsp
, te_offset
);
495 te_relocate(te_addr
, te
);
498 offset
+= data_size
+ data_offset
;
499 /* Sections are aligned to 4 bytes. */
500 offset
= ALIGN_UP(offset
, 4);
504 /* Return amount of buffer parsed: FV size. */
508 ssize_t
fsp_component_relocate(uintptr_t new_addr
, void *fsp
, size_t size
)
515 while (offset
< size
) {
518 /* Relocate each FV within the FSP region. The FSP_INFO_HEADER
519 * should only be located in the first FV. */
521 nparsed
= relocate_fvh(new_addr
, fsp
, size
, offset
,
524 nparsed
= relocate_fvh(new_addr
, fsp
, size
, offset
,
527 /* FV should be larger than 0 or failed to parse. */
529 printk(BIOS_ERR
, "FV @ offset %zx relocation failed\n",
537 return relocate_remaining_items(fsp
, size
, new_addr
, fih_offset
);
540 ssize_t
fsp1_1_relocate(uintptr_t new_addr
, void *fsp
, size_t size
)
542 return fsp_component_relocate(new_addr
, fsp
, size
);