/** @file | |
Rewrite the BootOrder NvVar based on QEMU's "bootorder" fw_cfg file. | |
Copyright (C) 2012 - 2014, Red Hat, Inc. | |
Copyright (c) 2013, Intel Corporation. All rights reserved.<BR> | |
This program and the accompanying materials are licensed and made available | |
under the terms and conditions of the BSD License which accompanies this | |
distribution. The full text of the license may be found at | |
http://opensource.org/licenses/bsd-license.php | |
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT | |
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
**/ | |
#include <Library/QemuFwCfgLib.h> | |
#include <Library/DebugLib.h> | |
#include <Library/MemoryAllocationLib.h> | |
#include <Library/GenericBdsLib.h> | |
#include <Library/UefiBootServicesTableLib.h> | |
#include <Library/UefiRuntimeServicesTableLib.h> | |
#include <Library/BaseLib.h> | |
#include <Library/PrintLib.h> | |
#include <Library/DevicePathLib.h> | |
#include <Library/QemuBootOrderLib.h> | |
#include <Library/BaseMemoryLib.h> | |
#include <Guid/GlobalVariable.h> | |
#include <Guid/VirtioMmioTransport.h> | |
/** | |
OpenFirmware to UEFI device path translation output buffer size in CHAR16's. | |
**/ | |
#define TRANSLATION_OUTPUT_SIZE 0x100 | |
/** | |
Numbers of nodes in OpenFirmware device paths that are required and examined. | |
**/ | |
#define REQUIRED_PCI_OFW_NODES 2 | |
#define REQUIRED_MMIO_OFW_NODES 1 | |
#define EXAMINED_OFW_NODES 4 | |
/** | |
Simple character classification routines, corresponding to POSIX class names | |
and ASCII encoding. | |
**/ | |
STATIC | |
BOOLEAN | |
IsAlnum ( | |
IN CHAR8 Chr | |
) | |
{ | |
return (('0' <= Chr && Chr <= '9') || | |
('A' <= Chr && Chr <= 'Z') || | |
('a' <= Chr && Chr <= 'z') | |
); | |
} | |
STATIC | |
BOOLEAN | |
IsDriverNamePunct ( | |
IN CHAR8 Chr | |
) | |
{ | |
return (Chr == ',' || Chr == '.' || Chr == '_' || | |
Chr == '+' || Chr == '-' | |
); | |
} | |
STATIC | |
BOOLEAN | |
IsPrintNotDelim ( | |
IN CHAR8 Chr | |
) | |
{ | |
return (32 <= Chr && Chr <= 126 && | |
Chr != '/' && Chr != '@' && Chr != ':'); | |
} | |
/** | |
Utility types and functions. | |
**/ | |
typedef struct { | |
CONST CHAR8 *Ptr; // not necessarily NUL-terminated | |
UINTN Len; // number of non-NUL characters | |
} SUBSTRING; | |
/** | |
Check if Substring and String have identical contents. | |
The function relies on the restriction that a SUBSTRING cannot have embedded | |
NULs either. | |
@param[in] Substring The SUBSTRING input to the comparison. | |
@param[in] String The ASCII string input to the comparison. | |
@return Whether the inputs have identical contents. | |
**/ | |
STATIC | |
BOOLEAN | |
SubstringEq ( | |
IN SUBSTRING Substring, | |
IN CONST CHAR8 *String | |
) | |
{ | |
UINTN Pos; | |
CONST CHAR8 *Chr; | |
Pos = 0; | |
Chr = String; | |
while (Pos < Substring.Len && Substring.Ptr[Pos] == *Chr) { | |
++Pos; | |
++Chr; | |
} | |
return (BOOLEAN)(Pos == Substring.Len && *Chr == '\0'); | |
} | |
/** | |
Parse a comma-separated list of hexadecimal integers into the elements of an | |
UINT64 array. | |
Whitespace, "0x" prefixes, leading or trailing commas, sequences of commas, | |
or an empty string are not allowed; they are rejected. | |
The function relies on ASCII encoding. | |
@param[in] UnitAddress The substring to parse. | |
@param[out] Result The array, allocated by the caller, to receive | |
the parsed values. This parameter may be NULL if | |
NumResults is zero on input. | |
@param[in out] NumResults On input, the number of elements allocated for | |
Result. On output, the number of elements it has | |
taken (or would have taken) to parse the string | |
fully. | |
@retval RETURN_SUCCESS UnitAddress has been fully parsed. | |
NumResults is set to the number of parsed | |
values; the corresponding elements have | |
been set in Result. The rest of Result's | |
elements are unchanged. | |
@retval RETURN_BUFFER_TOO_SMALL UnitAddress has been fully parsed. | |
NumResults is set to the number of parsed | |
values, but elements have been stored only | |
up to the input value of NumResults, which | |
is less than what has been parsed. | |
@retval RETURN_INVALID_PARAMETER Parse error. The contents of Results is | |
indeterminate. NumResults has not been | |
changed. | |
**/ | |
STATIC | |
RETURN_STATUS | |
ParseUnitAddressHexList ( | |
IN SUBSTRING UnitAddress, | |
OUT UINT64 *Result, | |
IN OUT UINTN *NumResults | |
) | |
{ | |
UINTN Entry; // number of entry currently being parsed | |
UINT64 EntryVal; // value being constructed for current entry | |
CHAR8 PrevChr; // UnitAddress character previously checked | |
UINTN Pos; // current position within UnitAddress | |
RETURN_STATUS Status; | |
Entry = 0; | |
EntryVal = 0; | |
PrevChr = ','; | |
for (Pos = 0; Pos < UnitAddress.Len; ++Pos) { | |
CHAR8 Chr; | |
INT8 Val; | |
Chr = UnitAddress.Ptr[Pos]; | |
Val = ('a' <= Chr && Chr <= 'f') ? (Chr - 'a' + 10) : | |
('A' <= Chr && Chr <= 'F') ? (Chr - 'A' + 10) : | |
('0' <= Chr && Chr <= '9') ? (Chr - '0' ) : | |
-1; | |
if (Val >= 0) { | |
if (EntryVal > 0xFFFFFFFFFFFFFFFull) { | |
return RETURN_INVALID_PARAMETER; | |
} | |
EntryVal = LShiftU64 (EntryVal, 4) | Val; | |
} else if (Chr == ',') { | |
if (PrevChr == ',') { | |
return RETURN_INVALID_PARAMETER; | |
} | |
if (Entry < *NumResults) { | |
Result[Entry] = EntryVal; | |
} | |
++Entry; | |
EntryVal = 0; | |
} else { | |
return RETURN_INVALID_PARAMETER; | |
} | |
PrevChr = Chr; | |
} | |
if (PrevChr == ',') { | |
return RETURN_INVALID_PARAMETER; | |
} | |
if (Entry < *NumResults) { | |
Result[Entry] = EntryVal; | |
Status = RETURN_SUCCESS; | |
} else { | |
Status = RETURN_BUFFER_TOO_SMALL; | |
} | |
++Entry; | |
*NumResults = Entry; | |
return Status; | |
} | |
/** | |
A simple array of Boot Option ID's. | |
**/ | |
typedef struct { | |
UINT16 *Data; | |
UINTN Allocated; | |
UINTN Produced; | |
} BOOT_ORDER; | |
/** | |
Array element tracking an enumerated boot option that has the | |
LOAD_OPTION_ACTIVE attribute. | |
**/ | |
typedef struct { | |
CONST BDS_COMMON_OPTION *BootOption; // reference only, no ownership | |
BOOLEAN Appended; // has been added to a BOOT_ORDER? | |
} ACTIVE_OPTION; | |
/** | |
Append an active boot option to BootOrder, reallocating the latter if needed. | |
@param[in out] BootOrder The structure pointing to the array and holding | |
allocation and usage counters. | |
@param[in] ActiveOption The active boot option whose ID should be | |
appended to the array. | |
@retval RETURN_SUCCESS ID of ActiveOption appended. | |
@retval RETURN_OUT_OF_RESOURCES Memory reallocation failed. | |
**/ | |
STATIC | |
RETURN_STATUS | |
BootOrderAppend ( | |
IN OUT BOOT_ORDER *BootOrder, | |
IN OUT ACTIVE_OPTION *ActiveOption | |
) | |
{ | |
if (BootOrder->Produced == BootOrder->Allocated) { | |
UINTN AllocatedNew; | |
UINT16 *DataNew; | |
ASSERT (BootOrder->Allocated > 0); | |
AllocatedNew = BootOrder->Allocated * 2; | |
DataNew = ReallocatePool ( | |
BootOrder->Allocated * sizeof (*BootOrder->Data), | |
AllocatedNew * sizeof (*DataNew), | |
BootOrder->Data | |
); | |
if (DataNew == NULL) { | |
return RETURN_OUT_OF_RESOURCES; | |
} | |
BootOrder->Allocated = AllocatedNew; | |
BootOrder->Data = DataNew; | |
} | |
BootOrder->Data[BootOrder->Produced++] = | |
ActiveOption->BootOption->BootCurrent; | |
ActiveOption->Appended = TRUE; | |
return RETURN_SUCCESS; | |
} | |
/** | |
Create an array of ACTIVE_OPTION elements for a boot option list. | |
@param[in] BootOptionList A boot option list, created with | |
BdsLibEnumerateAllBootOption(). | |
@param[out] ActiveOption Pointer to the first element in the new array. | |
The caller is responsible for freeing the array | |
with FreePool() after use. | |
@param[out] Count Number of elements in the new array. | |
@retval RETURN_SUCCESS The ActiveOption array has been created. | |
@retval RETURN_NOT_FOUND No active entry has been found in | |
BootOptionList. | |
@retval RETURN_OUT_OF_RESOURCES Memory allocation failed. | |
**/ | |
STATIC | |
RETURN_STATUS | |
CollectActiveOptions ( | |
IN CONST LIST_ENTRY *BootOptionList, | |
OUT ACTIVE_OPTION **ActiveOption, | |
OUT UINTN *Count | |
) | |
{ | |
UINTN ScanMode; | |
*ActiveOption = NULL; | |
// | |
// Scan the list twice: | |
// - count active entries, | |
// - store links to active entries. | |
// | |
for (ScanMode = 0; ScanMode < 2; ++ScanMode) { | |
CONST LIST_ENTRY *Link; | |
Link = BootOptionList->ForwardLink; | |
*Count = 0; | |
while (Link != BootOptionList) { | |
CONST BDS_COMMON_OPTION *Current; | |
Current = CR (Link, BDS_COMMON_OPTION, Link, BDS_LOAD_OPTION_SIGNATURE); | |
if (IS_LOAD_OPTION_TYPE (Current->Attribute, LOAD_OPTION_ACTIVE)) { | |
if (ScanMode == 1) { | |
(*ActiveOption)[*Count].BootOption = Current; | |
(*ActiveOption)[*Count].Appended = FALSE; | |
} | |
++*Count; | |
} | |
Link = Link->ForwardLink; | |
} | |
if (ScanMode == 0) { | |
if (*Count == 0) { | |
return RETURN_NOT_FOUND; | |
} | |
*ActiveOption = AllocatePool (*Count * sizeof **ActiveOption); | |
if (*ActiveOption == NULL) { | |
return RETURN_OUT_OF_RESOURCES; | |
} | |
} | |
} | |
return RETURN_SUCCESS; | |
} | |
/** | |
OpenFirmware device path node | |
**/ | |
typedef struct { | |
SUBSTRING DriverName; | |
SUBSTRING UnitAddress; | |
SUBSTRING DeviceArguments; | |
} OFW_NODE; | |
/** | |
Parse an OpenFirmware device path node into the caller-allocated OFW_NODE | |
structure, and advance in the input string. | |
The node format is mostly parsed after IEEE 1275-1994, 3.2.1.1 "Node names" | |
(a leading slash is expected and not returned): | |
/driver-name@unit-address[:device-arguments][<LF>] | |
A single trailing <LF> character is consumed but not returned. A trailing | |
<LF> or NUL character terminates the device path. | |
The function relies on ASCII encoding. | |
@param[in out] Ptr Address of the pointer pointing to the start of the | |
node string. After successful parsing *Ptr is set to | |
the byte immediately following the consumed | |
characters. On error it points to the byte that | |
caused the error. The input string is never modified. | |
@param[out] OfwNode The members of this structure point into the input | |
string, designating components of the node. | |
Separators are never included. If "device-arguments" | |
is missing, then DeviceArguments.Ptr is set to NULL. | |
All components that are present have nonzero length. | |
If the call doesn't succeed, the contents of this | |
structure is indeterminate. | |
@param[out] IsFinal In case of successul parsing, this parameter signals | |
whether the node just parsed is the final node in the | |
device path. The call after a final node will attempt | |
to start parsing the next path. If the call doesn't | |
succeed, then this parameter is not changed. | |
@retval RETURN_SUCCESS Parsing successful. | |
@retval RETURN_NOT_FOUND Parsing terminated. *Ptr was (and is) | |
pointing to an empty string. | |
@retval RETURN_INVALID_PARAMETER Parse error. | |
**/ | |
STATIC | |
RETURN_STATUS | |
ParseOfwNode ( | |
IN OUT CONST CHAR8 **Ptr, | |
OUT OFW_NODE *OfwNode, | |
OUT BOOLEAN *IsFinal | |
) | |
{ | |
// | |
// A leading slash is expected. End of string is tolerated. | |
// | |
switch (**Ptr) { | |
case '\0': | |
return RETURN_NOT_FOUND; | |
case '/': | |
++*Ptr; | |
break; | |
default: | |
return RETURN_INVALID_PARAMETER; | |
} | |
// | |
// driver-name | |
// | |
OfwNode->DriverName.Ptr = *Ptr; | |
OfwNode->DriverName.Len = 0; | |
while (OfwNode->DriverName.Len < 32 && | |
(IsAlnum (**Ptr) || IsDriverNamePunct (**Ptr)) | |
) { | |
++*Ptr; | |
++OfwNode->DriverName.Len; | |
} | |
if (OfwNode->DriverName.Len == 0 || OfwNode->DriverName.Len == 32) { | |
return RETURN_INVALID_PARAMETER; | |
} | |
// | |
// unit-address | |
// | |
if (**Ptr != '@') { | |
return RETURN_INVALID_PARAMETER; | |
} | |
++*Ptr; | |
OfwNode->UnitAddress.Ptr = *Ptr; | |
OfwNode->UnitAddress.Len = 0; | |
while (IsPrintNotDelim (**Ptr)) { | |
++*Ptr; | |
++OfwNode->UnitAddress.Len; | |
} | |
if (OfwNode->UnitAddress.Len == 0) { | |
return RETURN_INVALID_PARAMETER; | |
} | |
// | |
// device-arguments, may be omitted | |
// | |
OfwNode->DeviceArguments.Len = 0; | |
if (**Ptr == ':') { | |
++*Ptr; | |
OfwNode->DeviceArguments.Ptr = *Ptr; | |
while (IsPrintNotDelim (**Ptr)) { | |
++*Ptr; | |
++OfwNode->DeviceArguments.Len; | |
} | |
if (OfwNode->DeviceArguments.Len == 0) { | |
return RETURN_INVALID_PARAMETER; | |
} | |
} | |
else { | |
OfwNode->DeviceArguments.Ptr = NULL; | |
} | |
switch (**Ptr) { | |
case '\n': | |
++*Ptr; | |
// | |
// fall through | |
// | |
case '\0': | |
*IsFinal = TRUE; | |
break; | |
case '/': | |
*IsFinal = FALSE; | |
break; | |
default: | |
return RETURN_INVALID_PARAMETER; | |
} | |
DEBUG (( | |
DEBUG_VERBOSE, | |
"%a: DriverName=\"%.*a\" UnitAddress=\"%.*a\" DeviceArguments=\"%.*a\"\n", | |
__FUNCTION__, | |
OfwNode->DriverName.Len, OfwNode->DriverName.Ptr, | |
OfwNode->UnitAddress.Len, OfwNode->UnitAddress.Ptr, | |
OfwNode->DeviceArguments.Len, | |
OfwNode->DeviceArguments.Ptr == NULL ? "" : OfwNode->DeviceArguments.Ptr | |
)); | |
return RETURN_SUCCESS; | |
} | |
/** | |
Translate a PCI-like array of OpenFirmware device nodes to a UEFI device path | |
fragment. | |
@param[in] OfwNode Array of OpenFirmware device nodes to | |
translate, constituting the beginning of an | |
OpenFirmware device path. | |
@param[in] NumNodes Number of elements in OfwNode. | |
@param[out] Translated Destination array receiving the UEFI path | |
fragment, allocated by the caller. If the | |
return value differs from RETURN_SUCCESS, its | |
contents is indeterminate. | |
@param[in out] TranslatedSize On input, the number of CHAR16's in | |
Translated. On RETURN_SUCCESS this parameter | |
is assigned the number of non-NUL CHAR16's | |
written to Translated. In case of other return | |
values, TranslatedSize is indeterminate. | |
@retval RETURN_SUCCESS Translation successful. | |
@retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number | |
of bytes provided. | |
@retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't | |
be translated in the current implementation. | |
**/ | |
STATIC | |
RETURN_STATUS | |
TranslatePciOfwNodes ( | |
IN CONST OFW_NODE *OfwNode, | |
IN UINTN NumNodes, | |
OUT CHAR16 *Translated, | |
IN OUT UINTN *TranslatedSize | |
) | |
{ | |
UINT64 PciDevFun[2]; | |
UINTN NumEntries; | |
UINTN Written; | |
// | |
// Get PCI device and optional PCI function. Assume a single PCI root. | |
// | |
if (NumNodes < REQUIRED_PCI_OFW_NODES || | |
!SubstringEq (OfwNode[0].DriverName, "pci") | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
PciDevFun[1] = 0; | |
NumEntries = sizeof (PciDevFun) / sizeof (PciDevFun[0]); | |
if (ParseUnitAddressHexList ( | |
OfwNode[1].UnitAddress, | |
PciDevFun, | |
&NumEntries | |
) != RETURN_SUCCESS | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
if (NumNodes >= 4 && | |
SubstringEq (OfwNode[1].DriverName, "ide") && | |
SubstringEq (OfwNode[2].DriverName, "drive") && | |
SubstringEq (OfwNode[3].DriverName, "disk") | |
) { | |
// | |
// OpenFirmware device path (IDE disk, IDE CD-ROM): | |
// | |
// /pci@i0cf8/ide@1,1/drive@0/disk@0 | |
// ^ ^ ^ ^ ^ | |
// | | | | master or slave | |
// | | | primary or secondary | |
// | PCI slot & function holding IDE controller | |
// PCI root at system bus port, PIO | |
// | |
// UEFI device path: | |
// | |
// PciRoot(0x0)/Pci(0x1,0x1)/Ata(Primary,Master,0x0) | |
// ^ | |
// fixed LUN | |
// | |
UINT64 Secondary; | |
UINT64 Slave; | |
NumEntries = 1; | |
if (ParseUnitAddressHexList ( | |
OfwNode[2].UnitAddress, | |
&Secondary, | |
&NumEntries | |
) != RETURN_SUCCESS || | |
Secondary > 1 || | |
ParseUnitAddressHexList ( | |
OfwNode[3].UnitAddress, | |
&Slave, | |
&NumEntries // reuse after previous single-element call | |
) != RETURN_SUCCESS || | |
Slave > 1 | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Ata(%a,%a,0x0)", | |
PciDevFun[0], | |
PciDevFun[1], | |
Secondary ? "Secondary" : "Primary", | |
Slave ? "Slave" : "Master" | |
); | |
} else if (NumNodes >= 4 && | |
SubstringEq (OfwNode[1].DriverName, "isa") && | |
SubstringEq (OfwNode[2].DriverName, "fdc") && | |
SubstringEq (OfwNode[3].DriverName, "floppy") | |
) { | |
// | |
// OpenFirmware device path (floppy disk): | |
// | |
// /pci@i0cf8/isa@1/fdc@03f0/floppy@0 | |
// ^ ^ ^ ^ | |
// | | | A: or B: | |
// | | ISA controller io-port (hex) | |
// | PCI slot holding ISA controller | |
// PCI root at system bus port, PIO | |
// | |
// UEFI device path: | |
// | |
// PciRoot(0x0)/Pci(0x1,0x0)/Floppy(0x0) | |
// ^ | |
// ACPI UID | |
// | |
UINT64 AcpiUid; | |
NumEntries = 1; | |
if (ParseUnitAddressHexList ( | |
OfwNode[3].UnitAddress, | |
&AcpiUid, | |
&NumEntries | |
) != RETURN_SUCCESS || | |
AcpiUid > 1 | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Floppy(0x%Lx)", | |
PciDevFun[0], | |
PciDevFun[1], | |
AcpiUid | |
); | |
} else if (NumNodes >= 3 && | |
SubstringEq (OfwNode[1].DriverName, "scsi") && | |
SubstringEq (OfwNode[2].DriverName, "disk") | |
) { | |
// | |
// OpenFirmware device path (virtio-blk disk): | |
// | |
// /pci@i0cf8/scsi@6[,3]/disk@0,0 | |
// ^ ^ ^ ^ ^ | |
// | | | fixed | |
// | | PCI function corresponding to disk (optional) | |
// | PCI slot holding disk | |
// PCI root at system bus port, PIO | |
// | |
// UEFI device path prefix: | |
// | |
// PciRoot(0x0)/Pci(0x6,0x0)/HD( -- if PCI function is 0 or absent | |
// PciRoot(0x0)/Pci(0x6,0x3)/HD( -- if PCI function is present and nonzero | |
// | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/HD(", | |
PciDevFun[0], | |
PciDevFun[1] | |
); | |
} else if (NumNodes >= 4 && | |
SubstringEq (OfwNode[1].DriverName, "scsi") && | |
SubstringEq (OfwNode[2].DriverName, "channel") && | |
SubstringEq (OfwNode[3].DriverName, "disk") | |
) { | |
// | |
// OpenFirmware device path (virtio-scsi disk): | |
// | |
// /pci@i0cf8/scsi@7[,3]/channel@0/disk@2,3 | |
// ^ ^ ^ ^ ^ | |
// | | | | LUN | |
// | | | target | |
// | | channel (unused, fixed 0) | |
// | PCI slot[, function] holding SCSI controller | |
// PCI root at system bus port, PIO | |
// | |
// UEFI device path prefix: | |
// | |
// PciRoot(0x0)/Pci(0x7,0x0)/Scsi(0x2,0x3) | |
// -- if PCI function is 0 or absent | |
// PciRoot(0x0)/Pci(0x7,0x3)/Scsi(0x2,0x3) | |
// -- if PCI function is present and nonzero | |
// | |
UINT64 TargetLun[2]; | |
TargetLun[1] = 0; | |
NumEntries = sizeof (TargetLun) / sizeof (TargetLun[0]); | |
if (ParseUnitAddressHexList ( | |
OfwNode[3].UnitAddress, | |
TargetLun, | |
&NumEntries | |
) != RETURN_SUCCESS | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"PciRoot(0x0)/Pci(0x%Lx,0x%Lx)/Scsi(0x%Lx,0x%Lx)", | |
PciDevFun[0], | |
PciDevFun[1], | |
TargetLun[0], | |
TargetLun[1] | |
); | |
} else { | |
// | |
// Generic OpenFirmware device path for PCI devices: | |
// | |
// /pci@i0cf8/ethernet@3[,2] | |
// ^ ^ | |
// | PCI slot[, function] holding Ethernet card | |
// PCI root at system bus port, PIO | |
// | |
// UEFI device path prefix (dependent on presence of nonzero PCI function): | |
// | |
// PciRoot(0x0)/Pci(0x3,0x0) | |
// PciRoot(0x0)/Pci(0x3,0x2) | |
// | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"PciRoot(0x0)/Pci(0x%Lx,0x%Lx)", | |
PciDevFun[0], | |
PciDevFun[1] | |
); | |
} | |
// | |
// There's no way to differentiate between "completely used up without | |
// truncation" and "truncated", so treat the former as the latter, and return | |
// success only for "some room left unused". | |
// | |
if (Written + 1 < *TranslatedSize) { | |
*TranslatedSize = Written; | |
return RETURN_SUCCESS; | |
} | |
return RETURN_BUFFER_TOO_SMALL; | |
} | |
// | |
// A type providing easy raw access to the base address of a virtio-mmio | |
// transport. | |
// | |
typedef union { | |
UINT64 Uint64; | |
UINT8 Raw[8]; | |
} VIRTIO_MMIO_BASE_ADDRESS; | |
/** | |
Translate an MMIO-like array of OpenFirmware device nodes to a UEFI device | |
path fragment. | |
@param[in] OfwNode Array of OpenFirmware device nodes to | |
translate, constituting the beginning of an | |
OpenFirmware device path. | |
@param[in] NumNodes Number of elements in OfwNode. | |
@param[out] Translated Destination array receiving the UEFI path | |
fragment, allocated by the caller. If the | |
return value differs from RETURN_SUCCESS, its | |
contents is indeterminate. | |
@param[in out] TranslatedSize On input, the number of CHAR16's in | |
Translated. On RETURN_SUCCESS this parameter | |
is assigned the number of non-NUL CHAR16's | |
written to Translated. In case of other return | |
values, TranslatedSize is indeterminate. | |
@retval RETURN_SUCCESS Translation successful. | |
@retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number | |
of bytes provided. | |
@retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't | |
be translated in the current implementation. | |
**/ | |
STATIC | |
RETURN_STATUS | |
TranslateMmioOfwNodes ( | |
IN CONST OFW_NODE *OfwNode, | |
IN UINTN NumNodes, | |
OUT CHAR16 *Translated, | |
IN OUT UINTN *TranslatedSize | |
) | |
{ | |
VIRTIO_MMIO_BASE_ADDRESS VirtioMmioBase; | |
CHAR16 VenHwString[60 + 1]; | |
UINTN NumEntries; | |
UINTN Written; | |
// | |
// Get the base address of the virtio-mmio transport. | |
// | |
if (NumNodes < REQUIRED_MMIO_OFW_NODES || | |
!SubstringEq (OfwNode[0].DriverName, "virtio-mmio") | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
NumEntries = 1; | |
if (ParseUnitAddressHexList ( | |
OfwNode[0].UnitAddress, | |
&VirtioMmioBase.Uint64, | |
&NumEntries | |
) != RETURN_SUCCESS | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
UnicodeSPrintAsciiFormat (VenHwString, sizeof VenHwString, | |
"VenHw(%g,%02X%02X%02X%02X%02X%02X%02X%02X)", &gVirtioMmioTransportGuid, | |
VirtioMmioBase.Raw[0], VirtioMmioBase.Raw[1], VirtioMmioBase.Raw[2], | |
VirtioMmioBase.Raw[3], VirtioMmioBase.Raw[4], VirtioMmioBase.Raw[5], | |
VirtioMmioBase.Raw[6], VirtioMmioBase.Raw[7]); | |
if (NumNodes >= 2 && | |
SubstringEq (OfwNode[1].DriverName, "disk")) { | |
// | |
// OpenFirmware device path (virtio-blk disk): | |
// | |
// /virtio-mmio@000000000a003c00/disk@0,0 | |
// ^ ^ ^ | |
// | fixed | |
// base address of virtio-mmio register block | |
// | |
// UEFI device path prefix: | |
// | |
// <VenHwString>/HD( | |
// | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"%s/HD(", | |
VenHwString | |
); | |
} else if (NumNodes >= 3 && | |
SubstringEq (OfwNode[1].DriverName, "channel") && | |
SubstringEq (OfwNode[2].DriverName, "disk")) { | |
// | |
// OpenFirmware device path (virtio-scsi disk): | |
// | |
// /virtio-mmio@000000000a003a00/channel@0/disk@2,3 | |
// ^ ^ ^ ^ | |
// | | | LUN | |
// | | target | |
// | channel (unused, fixed 0) | |
// base address of virtio-mmio register block | |
// | |
// UEFI device path prefix: | |
// | |
// <VenHwString>/Scsi(0x2,0x3) | |
// | |
UINT64 TargetLun[2]; | |
TargetLun[1] = 0; | |
NumEntries = sizeof (TargetLun) / sizeof (TargetLun[0]); | |
if (ParseUnitAddressHexList ( | |
OfwNode[2].UnitAddress, | |
TargetLun, | |
&NumEntries | |
) != RETURN_SUCCESS | |
) { | |
return RETURN_UNSUPPORTED; | |
} | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"%s/Scsi(0x%Lx,0x%Lx)", | |
VenHwString, | |
TargetLun[0], | |
TargetLun[1] | |
); | |
} else if (NumNodes >= 2 && | |
SubstringEq (OfwNode[1].DriverName, "ethernet-phy")) { | |
// | |
// OpenFirmware device path (virtio-net NIC): | |
// | |
// /virtio-mmio@000000000a003e00/ethernet-phy@0 | |
// ^ ^ | |
// | fixed | |
// base address of virtio-mmio register block | |
// | |
// UEFI device path prefix (dependent on presence of nonzero PCI function): | |
// | |
// <VenHwString>/MAC( | |
// | |
Written = UnicodeSPrintAsciiFormat ( | |
Translated, | |
*TranslatedSize * sizeof (*Translated), // BufferSize in bytes | |
"%s/MAC(", | |
VenHwString | |
); | |
} else { | |
return RETURN_UNSUPPORTED; | |
} | |
// | |
// There's no way to differentiate between "completely used up without | |
// truncation" and "truncated", so treat the former as the latter, and return | |
// success only for "some room left unused". | |
// | |
if (Written + 1 < *TranslatedSize) { | |
*TranslatedSize = Written; | |
return RETURN_SUCCESS; | |
} | |
return RETURN_BUFFER_TOO_SMALL; | |
} | |
/** | |
Translate an array of OpenFirmware device nodes to a UEFI device path | |
fragment. | |
@param[in] OfwNode Array of OpenFirmware device nodes to | |
translate, constituting the beginning of an | |
OpenFirmware device path. | |
@param[in] NumNodes Number of elements in OfwNode. | |
@param[out] Translated Destination array receiving the UEFI path | |
fragment, allocated by the caller. If the | |
return value differs from RETURN_SUCCESS, its | |
contents is indeterminate. | |
@param[in out] TranslatedSize On input, the number of CHAR16's in | |
Translated. On RETURN_SUCCESS this parameter | |
is assigned the number of non-NUL CHAR16's | |
written to Translated. In case of other return | |
values, TranslatedSize is indeterminate. | |
@retval RETURN_SUCCESS Translation successful. | |
@retval RETURN_BUFFER_TOO_SMALL The translation does not fit into the number | |
of bytes provided. | |
@retval RETURN_UNSUPPORTED The array of OpenFirmware device nodes can't | |
be translated in the current implementation. | |
**/ | |
STATIC | |
RETURN_STATUS | |
TranslateOfwNodes ( | |
IN CONST OFW_NODE *OfwNode, | |
IN UINTN NumNodes, | |
OUT CHAR16 *Translated, | |
IN OUT UINTN *TranslatedSize | |
) | |
{ | |
RETURN_STATUS Status; | |
Status = RETURN_UNSUPPORTED; | |
if (FeaturePcdGet (PcdQemuBootOrderPciTranslation)) { | |
Status = TranslatePciOfwNodes (OfwNode, NumNodes, Translated, | |
TranslatedSize); | |
} | |
if (Status == RETURN_UNSUPPORTED && | |
FeaturePcdGet (PcdQemuBootOrderMmioTranslation)) { | |
Status = TranslateMmioOfwNodes (OfwNode, NumNodes, Translated, | |
TranslatedSize); | |
} | |
return Status; | |
} | |
/** | |
Translate an OpenFirmware device path fragment to a UEFI device path | |
fragment, and advance in the input string. | |
@param[in out] Ptr Address of the pointer pointing to the start | |
of the path string. After successful | |
translation (RETURN_SUCCESS) or at least | |
successful parsing (RETURN_UNSUPPORTED, | |
RETURN_BUFFER_TOO_SMALL), *Ptr is set to the | |
byte immediately following the consumed | |
characters. In other error cases, it points to | |
the byte that caused the error. | |
@param[out] Translated Destination array receiving the UEFI path | |
fragment, allocated by the caller. If the | |
return value differs from RETURN_SUCCESS, its | |
contents is indeterminate. | |
@param[in out] TranslatedSize On input, the number of CHAR16's in | |
Translated. On RETURN_SUCCESS this parameter | |
is assigned the number of non-NUL CHAR16's | |
written to Translated. In case of other return | |
values, TranslatedSize is indeterminate. | |
@retval RETURN_SUCCESS Translation successful. | |
@retval RETURN_BUFFER_TOO_SMALL The OpenFirmware device path was parsed | |
successfully, but its translation did not | |
fit into the number of bytes provided. | |
Further calls to this function are | |
possible. | |
@retval RETURN_UNSUPPORTED The OpenFirmware device path was parsed | |
successfully, but it can't be translated in | |
the current implementation. Further calls | |
to this function are possible. | |
@retval RETURN_NOT_FOUND Translation terminated. On input, *Ptr was | |
pointing to the empty string or "HALT". On | |
output, *Ptr points to the empty string | |
(ie. "HALT" is consumed transparently when | |
present). | |
@retval RETURN_INVALID_PARAMETER Parse error. This is a permanent error. | |
**/ | |
STATIC | |
RETURN_STATUS | |
TranslateOfwPath ( | |
IN OUT CONST CHAR8 **Ptr, | |
OUT CHAR16 *Translated, | |
IN OUT UINTN *TranslatedSize | |
) | |
{ | |
UINTN NumNodes; | |
RETURN_STATUS Status; | |
OFW_NODE Node[EXAMINED_OFW_NODES]; | |
BOOLEAN IsFinal; | |
OFW_NODE Skip; | |
IsFinal = FALSE; | |
NumNodes = 0; | |
if (AsciiStrCmp (*Ptr, "HALT") == 0) { | |
*Ptr += 4; | |
Status = RETURN_NOT_FOUND; | |
} else { | |
Status = ParseOfwNode (Ptr, &Node[NumNodes], &IsFinal); | |
} | |
if (Status == RETURN_NOT_FOUND) { | |
DEBUG ((DEBUG_VERBOSE, "%a: no more nodes\n", __FUNCTION__)); | |
return RETURN_NOT_FOUND; | |
} | |
while (Status == RETURN_SUCCESS && !IsFinal) { | |
++NumNodes; | |
Status = ParseOfwNode ( | |
Ptr, | |
(NumNodes < EXAMINED_OFW_NODES) ? &Node[NumNodes] : &Skip, | |
&IsFinal | |
); | |
} | |
switch (Status) { | |
case RETURN_SUCCESS: | |
++NumNodes; | |
break; | |
case RETURN_INVALID_PARAMETER: | |
DEBUG ((DEBUG_VERBOSE, "%a: parse error\n", __FUNCTION__)); | |
return RETURN_INVALID_PARAMETER; | |
default: | |
ASSERT (0); | |
} | |
Status = TranslateOfwNodes ( | |
Node, | |
NumNodes < EXAMINED_OFW_NODES ? NumNodes : EXAMINED_OFW_NODES, | |
Translated, | |
TranslatedSize); | |
switch (Status) { | |
case RETURN_SUCCESS: | |
DEBUG ((DEBUG_VERBOSE, "%a: success: \"%s\"\n", __FUNCTION__, Translated)); | |
break; | |
case RETURN_BUFFER_TOO_SMALL: | |
DEBUG ((DEBUG_VERBOSE, "%a: buffer too small\n", __FUNCTION__)); | |
break; | |
case RETURN_UNSUPPORTED: | |
DEBUG ((DEBUG_VERBOSE, "%a: unsupported\n", __FUNCTION__)); | |
break; | |
default: | |
ASSERT (0); | |
} | |
return Status; | |
} | |
/** | |
Convert the UEFI DevicePath to full text representation with DevPathToText, | |
then match the UEFI device path fragment in Translated against it. | |
@param[in] Translated UEFI device path fragment, translated from | |
OpenFirmware format, to search for. | |
@param[in] TranslatedLength The length of Translated in CHAR16's. | |
@param[in] DevicePath Boot option device path whose textual rendering | |
to search in. | |
@param[in] DevPathToText Binary-to-text conversion protocol for DevicePath. | |
@retval TRUE If Translated was found at the beginning of DevicePath after | |
converting the latter to text. | |
@retval FALSE If DevicePath was NULL, or it could not be converted, or there | |
was no match. | |
**/ | |
STATIC | |
BOOLEAN | |
Match ( | |
IN CONST CHAR16 *Translated, | |
IN UINTN TranslatedLength, | |
IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath | |
) | |
{ | |
CHAR16 *Converted; | |
BOOLEAN Result; | |
Converted = ConvertDevicePathToText ( | |
DevicePath, | |
FALSE, // DisplayOnly | |
FALSE // AllowShortcuts | |
); | |
if (Converted == NULL) { | |
return FALSE; | |
} | |
// | |
// Attempt to expand any relative UEFI device path starting with HD() to an | |
// absolute device path first. The logic imitates BdsLibBootViaBootOption(). | |
// We don't have to free the absolute device path, | |
// BdsExpandPartitionPartialDevicePathToFull() has internal caching. | |
// | |
Result = FALSE; | |
if (DevicePathType (DevicePath) == MEDIA_DEVICE_PATH && | |
DevicePathSubType (DevicePath) == MEDIA_HARDDRIVE_DP) { | |
EFI_DEVICE_PATH_PROTOCOL *AbsDevicePath; | |
CHAR16 *AbsConverted; | |
AbsDevicePath = BdsExpandPartitionPartialDevicePathToFull ( | |
(HARDDRIVE_DEVICE_PATH *) DevicePath); | |
if (AbsDevicePath == NULL) { | |
goto Exit; | |
} | |
AbsConverted = ConvertDevicePathToText (AbsDevicePath, FALSE, FALSE); | |
if (AbsConverted == NULL) { | |
goto Exit; | |
} | |
DEBUG ((DEBUG_VERBOSE, | |
"%a: expanded relative device path \"%s\" for prefix matching\n", | |
__FUNCTION__, Converted)); | |
FreePool (Converted); | |
Converted = AbsConverted; | |
} | |
// | |
// Is Translated a prefix of Converted? | |
// | |
Result = (BOOLEAN)(StrnCmp (Converted, Translated, TranslatedLength) == 0); | |
DEBUG (( | |
DEBUG_VERBOSE, | |
"%a: against \"%s\": %a\n", | |
__FUNCTION__, | |
Converted, | |
Result ? "match" : "no match" | |
)); | |
Exit: | |
FreePool (Converted); | |
return Result; | |
} | |
/** | |
Append some of the unselected active boot options to the boot order. | |
This function should accommodate any further policy changes in "boot option | |
survival". Currently we're adding back everything that starts with neither | |
PciRoot() nor HD() nor a virtio-mmio VenHw() node. | |
@param[in,out] BootOrder The structure holding the boot order to | |
complete. The caller is responsible for | |
initializing (and potentially populating) it | |
before calling this function. | |
@param[in,out] ActiveOption The array of active boot options to scan. | |
Entries marked as Appended will be skipped. | |
Those of the rest that satisfy the survival | |
policy will be added to BootOrder with | |
BootOrderAppend(). | |
@param[in] ActiveCount Number of elements in ActiveOption. | |
@retval RETURN_SUCCESS BootOrder has been extended with any eligible boot | |
options. | |
@return Error codes returned by BootOrderAppend(). | |
**/ | |
STATIC | |
RETURN_STATUS | |
BootOrderComplete ( | |
IN OUT BOOT_ORDER *BootOrder, | |
IN OUT ACTIVE_OPTION *ActiveOption, | |
IN UINTN ActiveCount | |
) | |
{ | |
RETURN_STATUS Status; | |
UINTN Idx; | |
Status = RETURN_SUCCESS; | |
Idx = 0; | |
while (!RETURN_ERROR (Status) && Idx < ActiveCount) { | |
if (!ActiveOption[Idx].Appended) { | |
CONST BDS_COMMON_OPTION *Current; | |
CONST EFI_DEVICE_PATH_PROTOCOL *FirstNode; | |
Current = ActiveOption[Idx].BootOption; | |
FirstNode = Current->DevicePath; | |
if (FirstNode != NULL) { | |
CHAR16 *Converted; | |
STATIC CHAR16 ConvFallBack[] = L"<unable to convert>"; | |
BOOLEAN Keep; | |
Converted = ConvertDevicePathToText (FirstNode, FALSE, FALSE); | |
if (Converted == NULL) { | |
Converted = ConvFallBack; | |
} | |
Keep = TRUE; | |
if (DevicePathType(FirstNode) == MEDIA_DEVICE_PATH && | |
DevicePathSubType(FirstNode) == MEDIA_HARDDRIVE_DP) { | |
// | |
// drop HD() | |
// | |
Keep = FALSE; | |
} else if (DevicePathType(FirstNode) == ACPI_DEVICE_PATH && | |
DevicePathSubType(FirstNode) == ACPI_DP) { | |
ACPI_HID_DEVICE_PATH *Acpi; | |
Acpi = (ACPI_HID_DEVICE_PATH *) FirstNode; | |
if ((Acpi->HID & PNP_EISA_ID_MASK) == PNP_EISA_ID_CONST && | |
EISA_ID_TO_NUM (Acpi->HID) == 0x0a03) { | |
// | |
// drop PciRoot() if we enabled the user to select PCI-like boot | |
// options, by providing translation for such OFW device path | |
// fragments | |
// | |
Keep = !FeaturePcdGet (PcdQemuBootOrderPciTranslation); | |
} | |
} else if (DevicePathType(FirstNode) == HARDWARE_DEVICE_PATH && | |
DevicePathSubType(FirstNode) == HW_VENDOR_DP) { | |
VENDOR_DEVICE_PATH *VenHw; | |
VenHw = (VENDOR_DEVICE_PATH *)FirstNode; | |
if (CompareGuid (&VenHw->Guid, &gVirtioMmioTransportGuid)) { | |
// | |
// drop virtio-mmio if we enabled the user to select boot options | |
// referencing such device paths | |
// | |
Keep = !FeaturePcdGet (PcdQemuBootOrderMmioTranslation); | |
} | |
} | |
if (Keep) { | |
Status = BootOrderAppend (BootOrder, &ActiveOption[Idx]); | |
if (!RETURN_ERROR (Status)) { | |
DEBUG ((DEBUG_VERBOSE, "%a: keeping \"%s\"\n", __FUNCTION__, | |
Converted)); | |
} | |
} else { | |
DEBUG ((DEBUG_VERBOSE, "%a: dropping \"%s\"\n", __FUNCTION__, | |
Converted)); | |
} | |
if (Converted != ConvFallBack) { | |
FreePool (Converted); | |
} | |
} | |
} | |
++Idx; | |
} | |
return Status; | |
} | |
/** | |
Delete Boot#### variables that stand for such active boot options that have | |
been dropped (ie. have not been selected by either matching or "survival | |
policy"). | |
@param[in] ActiveOption The array of active boot options to scan. Each | |
entry not marked as appended will trigger the | |
deletion of the matching Boot#### variable. | |
@param[in] ActiveCount Number of elements in ActiveOption. | |
**/ | |
STATIC | |
VOID | |
PruneBootVariables ( | |
IN CONST ACTIVE_OPTION *ActiveOption, | |
IN UINTN ActiveCount | |
) | |
{ | |
UINTN Idx; | |
for (Idx = 0; Idx < ActiveCount; ++Idx) { | |
if (!ActiveOption[Idx].Appended) { | |
CHAR16 VariableName[9]; | |
UnicodeSPrintAsciiFormat (VariableName, sizeof VariableName, "Boot%04x", | |
ActiveOption[Idx].BootOption->BootCurrent); | |
// | |
// "The space consumed by the deleted variable may not be available until | |
// the next power cycle", but that's good enough. | |
// | |
gRT->SetVariable (VariableName, &gEfiGlobalVariableGuid, | |
0, // Attributes, 0 means deletion | |
0, // DataSize, 0 means deletion | |
NULL // Data | |
); | |
} | |
} | |
} | |
/** | |
Set the boot order based on configuration retrieved from QEMU. | |
Attempt to retrieve the "bootorder" fw_cfg file from QEMU. Translate the | |
OpenFirmware device paths therein to UEFI device path fragments. Match the | |
translated fragments against BootOptionList, and rewrite the BootOrder NvVar | |
so that it corresponds to the order described in fw_cfg. | |
@param[in] BootOptionList A boot option list, created with | |
BdsLibEnumerateAllBootOption (). | |
@retval RETURN_SUCCESS BootOrder NvVar rewritten. | |
@retval RETURN_UNSUPPORTED QEMU's fw_cfg is not supported. | |
@retval RETURN_NOT_FOUND Empty or nonexistent "bootorder" fw_cfg | |
file, or no match found between the | |
"bootorder" fw_cfg file and BootOptionList. | |
@retval RETURN_INVALID_PARAMETER Parse error in the "bootorder" fw_cfg file. | |
@retval RETURN_OUT_OF_RESOURCES Memory allocation failed. | |
@return Values returned by gBS->LocateProtocol () | |
or gRT->SetVariable (). | |
**/ | |
RETURN_STATUS | |
SetBootOrderFromQemu ( | |
IN CONST LIST_ENTRY *BootOptionList | |
) | |
{ | |
RETURN_STATUS Status; | |
FIRMWARE_CONFIG_ITEM FwCfgItem; | |
UINTN FwCfgSize; | |
CHAR8 *FwCfg; | |
CONST CHAR8 *FwCfgPtr; | |
BOOT_ORDER BootOrder; | |
ACTIVE_OPTION *ActiveOption; | |
UINTN ActiveCount; | |
UINTN TranslatedSize; | |
CHAR16 Translated[TRANSLATION_OUTPUT_SIZE]; | |
Status = QemuFwCfgFindFile ("bootorder", &FwCfgItem, &FwCfgSize); | |
if (Status != RETURN_SUCCESS) { | |
return Status; | |
} | |
if (FwCfgSize == 0) { | |
return RETURN_NOT_FOUND; | |
} | |
FwCfg = AllocatePool (FwCfgSize); | |
if (FwCfg == NULL) { | |
return RETURN_OUT_OF_RESOURCES; | |
} | |
QemuFwCfgSelectItem (FwCfgItem); | |
QemuFwCfgReadBytes (FwCfgSize, FwCfg); | |
if (FwCfg[FwCfgSize - 1] != '\0') { | |
Status = RETURN_INVALID_PARAMETER; | |
goto ErrorFreeFwCfg; | |
} | |
DEBUG ((DEBUG_VERBOSE, "%a: FwCfg:\n", __FUNCTION__)); | |
DEBUG ((DEBUG_VERBOSE, "%a\n", FwCfg)); | |
DEBUG ((DEBUG_VERBOSE, "%a: FwCfg: <end>\n", __FUNCTION__)); | |
FwCfgPtr = FwCfg; | |
BootOrder.Produced = 0; | |
BootOrder.Allocated = 1; | |
BootOrder.Data = AllocatePool ( | |
BootOrder.Allocated * sizeof (*BootOrder.Data) | |
); | |
if (BootOrder.Data == NULL) { | |
Status = RETURN_OUT_OF_RESOURCES; | |
goto ErrorFreeFwCfg; | |
} | |
Status = CollectActiveOptions (BootOptionList, &ActiveOption, &ActiveCount); | |
if (RETURN_ERROR (Status)) { | |
goto ErrorFreeBootOrder; | |
} | |
// | |
// translate each OpenFirmware path | |
// | |
TranslatedSize = sizeof (Translated) / sizeof (Translated[0]); | |
Status = TranslateOfwPath (&FwCfgPtr, Translated, &TranslatedSize); | |
while (Status == RETURN_SUCCESS || | |
Status == RETURN_UNSUPPORTED || | |
Status == RETURN_BUFFER_TOO_SMALL) { | |
if (Status == RETURN_SUCCESS) { | |
UINTN Idx; | |
// | |
// match translated OpenFirmware path against all active boot options | |
// | |
for (Idx = 0; Idx < ActiveCount; ++Idx) { | |
if (Match ( | |
Translated, | |
TranslatedSize, // contains length, not size, in CHAR16's here | |
ActiveOption[Idx].BootOption->DevicePath | |
) | |
) { | |
// | |
// match found, store ID and continue with next OpenFirmware path | |
// | |
Status = BootOrderAppend (&BootOrder, &ActiveOption[Idx]); | |
if (Status != RETURN_SUCCESS) { | |
goto ErrorFreeActiveOption; | |
} | |
break; | |
} | |
} // scanned all active boot options | |
} // translation successful | |
TranslatedSize = sizeof (Translated) / sizeof (Translated[0]); | |
Status = TranslateOfwPath (&FwCfgPtr, Translated, &TranslatedSize); | |
} // scanning of OpenFirmware paths done | |
if (Status == RETURN_NOT_FOUND && BootOrder.Produced > 0) { | |
// | |
// No more OpenFirmware paths, some matches found: rewrite BootOrder NvVar. | |
// Some of the active boot options that have not been selected over fw_cfg | |
// should be preserved at the end of the boot order. | |
// | |
Status = BootOrderComplete (&BootOrder, ActiveOption, ActiveCount); | |
if (RETURN_ERROR (Status)) { | |
goto ErrorFreeActiveOption; | |
} | |
// | |
// See Table 10 in the UEFI Spec 2.3.1 with Errata C for the required | |
// attributes. | |
// | |
Status = gRT->SetVariable ( | |
L"BootOrder", | |
&gEfiGlobalVariableGuid, | |
EFI_VARIABLE_NON_VOLATILE | | |
EFI_VARIABLE_BOOTSERVICE_ACCESS | | |
EFI_VARIABLE_RUNTIME_ACCESS, | |
BootOrder.Produced * sizeof (*BootOrder.Data), | |
BootOrder.Data | |
); | |
if (EFI_ERROR (Status)) { | |
DEBUG ((DEBUG_ERROR, "%a: setting BootOrder: %r\n", __FUNCTION__, Status)); | |
goto ErrorFreeActiveOption; | |
} | |
DEBUG ((DEBUG_INFO, "%a: setting BootOrder: success\n", __FUNCTION__)); | |
PruneBootVariables (ActiveOption, ActiveCount); | |
} | |
ErrorFreeActiveOption: | |
FreePool (ActiveOption); | |
ErrorFreeBootOrder: | |
FreePool (BootOrder.Data); | |
ErrorFreeFwCfg: | |
FreePool (FwCfg); | |
return Status; | |
} | |
/** | |
Calculate the number of seconds we should be showing the FrontPage progress | |
bar for. | |
@return The TimeoutDefault argument for PlatformBdsEnterFrontPage(). | |
**/ | |
UINT16 | |
GetFrontPageTimeoutFromQemu ( | |
VOID | |
) | |
{ | |
FIRMWARE_CONFIG_ITEM BootMenuWaitItem; | |
UINTN BootMenuWaitSize; | |
QemuFwCfgSelectItem (QemuFwCfgItemBootMenu); | |
if (QemuFwCfgRead16 () == 0) { | |
// | |
// The user specified "-boot menu=off", or didn't specify "-boot | |
// menu=(on|off)" at all. Return the platform default. | |
// | |
return PcdGet16 (PcdPlatformBootTimeOut); | |
} | |
if (RETURN_ERROR (QemuFwCfgFindFile ("etc/boot-menu-wait", &BootMenuWaitItem, | |
&BootMenuWaitSize)) || | |
BootMenuWaitSize != sizeof (UINT16)) { | |
// | |
// "-boot menu=on" was specified without "splash-time=N". In this case, | |
// return three seconds if the platform default would cause us to skip the | |
// front page, and return the platform default otherwise. | |
// | |
UINT16 Timeout; | |
Timeout = PcdGet16 (PcdPlatformBootTimeOut); | |
if (Timeout == 0) { | |
Timeout = 3; | |
} | |
return Timeout; | |
} | |
// | |
// "-boot menu=on,splash-time=N" was specified, where N is in units of | |
// milliseconds. The Intel BDS Front Page progress bar only supports whole | |
// seconds, round N up. | |
// | |
QemuFwCfgSelectItem (BootMenuWaitItem); | |
return (UINT16)((QemuFwCfgRead16 () + 999) / 1000); | |
} |