/** Decompress a LZAM compressed GUIDed section into a caller allocated output buffer. Decodes the GUIDed section specified by InputSection. If GUID for InputSection does not match the GUID that this handler supports, then RETURN_UNSUPPORTED is returned. If the data in InputSection can not be decoded, then RETURN_INVALID_PARAMETER is returned. If the GUID of InputSection does match the GUID that this handler supports, then InputSection is decoded into the buffer specified by OutputBuffer and the authentication status of this decode operation is returned in AuthenticationStatus. If the decoded buffer is identical to the data in InputSection, then OutputBuffer is set to point at the data in InputSection. Otherwise, the decoded data will be placed in caller allocated buffer specified by OutputBuffer. If InputSection is NULL, then ASSERT(). If OutputBuffer is NULL, then ASSERT(). If ScratchBuffer is NULL and this decode operation requires a scratch buffer, then ASSERT(). If AuthenticationStatus is NULL, then ASSERT(). @param[in] InputSection A pointer to a GUIDed section of an FFS formatted file. @param[out] OutputBuffer A pointer to a buffer that contains the result of a decode operation. @param[out] ScratchBuffer A caller allocated buffer that may be required by this function as a scratch buffer to perform the decode operation. @param[out] AuthenticationStatus A pointer to the authentication status of the decoded output buffer. See the definition of authentication status in the EFI_PEI_GUIDED_SECTION_EXTRACTION_PPI section of the PI Specification. EFI_AUTH_STATUS_PLATFORM_OVERRIDE must never be set by this handler. @retval RETURN_SUCCESS The buffer specified by InputSection was decoded. @retval RETURN_UNSUPPORTED The section specified by InputSection does not match the GUID this handler supports. @retval RETURN_INVALID_PARAMETER The section specified by InputSection can not be decoded. **/ RETURN_STATUS EFIAPI LzmaGuidedSectionExtraction ( IN CONST VOID *InputSection, OUT VOID **OutputBuffer, OUT VOID *ScratchBuffer, OPTIONAL OUT UINT32 *AuthenticationStatus ) { ASSERT (OutputBuffer != NULL); ASSERT (InputSection != NULL); if (IS_SECTION2 (InputSection)) { if (!CompareGuid ( &gLzmaCustomDecompressGuid, &(((EFI_GUID_DEFINED_SECTION2 *) InputSection)->SectionDefinitionGuid))) { return RETURN_INVALID_PARAMETER; } // // Authentication is set to Zero, which may be ignored. // *AuthenticationStatus = 0; return LzmaUefiDecompress ( (UINT8 *) InputSection + ((EFI_GUID_DEFINED_SECTION2 *) InputSection)->DataOffset, SECTION2_SIZE (InputSection) - ((EFI_GUID_DEFINED_SECTION2 *) InputSection)->DataOffset, *OutputBuffer, ScratchBuffer ); } else { if (!CompareGuid ( &gLzmaCustomDecompressGuid, &(((EFI_GUID_DEFINED_SECTION *) InputSection)->SectionDefinitionGuid))) { return RETURN_INVALID_PARAMETER; } // // Authentication is set to Zero, which may be ignored. // *AuthenticationStatus = 0; return LzmaUefiDecompress ( (UINT8 *) InputSection + ((EFI_GUID_DEFINED_SECTION *) InputSection)->DataOffset, SECTION_SIZE (InputSection) - ((EFI_GUID_DEFINED_SECTION *) InputSection)->DataOffset, *OutputBuffer, ScratchBuffer ); } }
EFI_STATUS LzmaDecompressKernel ( IN ESL_LINUX LinuxKernel ) { UINT32 OutputBufferSize; UINT32 ScratchBufferSize; VOID *Buffer; VOID *ScratchBuffer; INTN Result; EFI_STATUS Status = EFI_SUCCESS; (VOID)LzmaUefiDecompressGetInfo ((void *)0xA4B00000, 0x500000, &OutputBufferSize, &ScratchBufferSize); Buffer = AllocatePool(OutputBufferSize); if(NULL == Buffer) { DEBUG ((EFI_D_ERROR, "AllocatePool Fail\n")); return EFI_OUT_OF_RESOURCES; } ScratchBuffer = AllocatePool(ScratchBufferSize); if(NULL == ScratchBuffer) { FreePool(Buffer); DEBUG ((EFI_D_ERROR, "Allocate ScratchBuffer Fail\n")); return EFI_OUT_OF_RESOURCES; } Result = LzmaUefiDecompress((void *)0xA4B00000, OutputBufferSize, Buffer, ScratchBuffer); if (0 != Result) { DEBUG ((EFI_D_ERROR, "Decompress Failed. Result : %d \n", Result)); Status = EFI_DEVICE_ERROR; goto Exit; } gBS->CopyMem((void *)(UINTN)LinuxKernel, Buffer, OutputBufferSize); Exit: FreePool(Buffer); FreePool(ScratchBuffer); return Status; }
VOID EfiLoader ( UINT32 BiosMemoryMapBaseAddress ) { BIOS_MEMORY_MAP *BiosMemoryMap; EFILDR_IMAGE *EFILDRImage; EFI_MEMORY_DESCRIPTOR EfiMemoryDescriptor[EFI_MAX_MEMORY_DESCRIPTORS]; EFI_STATUS Status; UINTN NumberOfMemoryMapEntries; UINT32 DestinationSize; UINT32 ScratchSize; UINTN BfvPageNumber; UINTN BfvBase; EFI_MAIN_ENTRYPOINT EfiMainEntrypoint; EFILDRHANDOFF Handoff; UINTN Index; ClearScreen(); PrintHeader ('A'); PrintString ("Enter DUET Loader...\n"); PrintString ("BiosMemoryMapBaseAddress = %x\n", (UINTN) BiosMemoryMapBaseAddress); // // Add all EfiConventionalMemory descriptors to the table. If there are partial pages, then // round the start address up to the next page, and round the length down to a page boundary. // BiosMemoryMap = (BIOS_MEMORY_MAP *) (UINTN) BiosMemoryMapBaseAddress; NumberOfMemoryMapEntries = 0; GenMemoryMap (&NumberOfMemoryMapEntries, EfiMemoryDescriptor, BiosMemoryMap); PrintString ("Get %d entries of memory map!\n", NumberOfMemoryMapEntries); // // Get information on where the image is in memory // EFILDRImage = (EFILDR_IMAGE *)(UINTN)(EFILDR_HEADER_ADDRESS + sizeof(EFILDR_HEADER)); // // Point to the 4th image (Bfv) // EFILDRImage += 3; // // Decompress the image // PrintString ( "Decompress BFV image, Image Address = %x Offset = %x\n", (UINTN) (EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), (UINTN) EFILDRImage->Offset ); Status = LzmaUefiDecompressGetInfo ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, &DestinationSize, &ScratchSize ); if (EFI_ERROR (Status)) { SystemHang ("Failed to get decompress information for BFV!\n"); } PrintString ("BFV decompress: DestinationSize = %x, ScratchSize = %x\n", (UINTN) DestinationSize, (UINTN) ScratchSize); Status = LzmaUefiDecompress ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, (VOID *)(UINTN)EFI_DECOMPRESSED_BUFFER_ADDRESS, (VOID *)(UINTN)((EFI_DECOMPRESSED_BUFFER_ADDRESS + DestinationSize + 0x1000) & 0xfffff000) ); if (EFI_ERROR (Status)) { SystemHang ("Failed to decompress BFV!\n"); } BfvPageNumber = EFI_SIZE_TO_PAGES (DestinationSize); BfvBase = (UINTN) FindSpace (BfvPageNumber, &NumberOfMemoryMapEntries, EfiMemoryDescriptor, EfiRuntimeServicesData, EFI_MEMORY_WB); if (BfvBase == 0) { SystemHang ("Failed to find free space to hold decompressed BFV\n"); } ZeroMem ((VOID *)(UINTN)BfvBase, BfvPageNumber * EFI_PAGE_SIZE); CopyMem ((VOID *)(UINTN)BfvBase, (VOID *)(UINTN)EFI_DECOMPRESSED_BUFFER_ADDRESS, DestinationSize); PrintHeader ('B'); // // Point to the 2nd image (DxeIpl) // EFILDRImage -= 2; // // Decompress the image // PrintString ( "Decompress DxeIpl image, Image Address = %x Offset = %x\n", (UINTN) (EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), (UINTN) EFILDRImage->Offset ); Status = LzmaUefiDecompressGetInfo ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, &DestinationSize, &ScratchSize ); if (EFI_ERROR (Status)) { SystemHang ("Failed to get decompress information for DxeIpl!\n"); } Status = LzmaUefiDecompress ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, (VOID *)(UINTN)EFI_DECOMPRESSED_BUFFER_ADDRESS, (VOID *)(UINTN)((EFI_DECOMPRESSED_BUFFER_ADDRESS + DestinationSize + 0x1000) & 0xfffff000) ); if (EFI_ERROR (Status)) { SystemHang ("Failed to decompress DxeIpl image\n"); } PrintString ("Start load DxeIpl PE image\n"); // // Load and relocate the EFI PE/COFF Firmware Image // Status = EfiLdrPeCoffLoadPeImage ( (VOID *)(UINTN)(EFI_DECOMPRESSED_BUFFER_ADDRESS), &DxeIplImage, &NumberOfMemoryMapEntries, EfiMemoryDescriptor ); if (EFI_ERROR (Status)) { SystemHang ("Failed to load and relocate DxeIpl PE image!\n"); } PrintString ( "DxeIpl PE image is successed loaded at %lx, entry=%p\n", DxeIplImage.ImageBasePage, DxeIplImage.EntryPoint ); PrintHeader ('C'); // // Point to the 3rd image (DxeMain) // EFILDRImage++; // // Decompress the image // PrintString ( "Decompress DxeMain FV image, Image Address = %x Offset = %x\n", (UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), (UINTN) EFILDRImage->Offset ); Status = LzmaUefiDecompressGetInfo ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, &DestinationSize, &ScratchSize ); if (EFI_ERROR (Status)) { SystemHang ("Failed to get decompress information for DxeMain FV image!\n"); } Status = LzmaUefiDecompress ( (VOID *)(UINTN)(EFILDR_HEADER_ADDRESS + EFILDRImage->Offset), EFILDRImage->Length, (VOID *)(UINTN)EFI_DECOMPRESSED_BUFFER_ADDRESS, (VOID *)(UINTN)((EFI_DECOMPRESSED_BUFFER_ADDRESS + DestinationSize + 0x1000) & 0xfffff000) ); if (EFI_ERROR (Status)) { SystemHang ("Failed to decompress DxeMain FV image!\n"); } // // Load and relocate the EFI PE/COFF Firmware Image // Status = EfiLdrPeCoffLoadPeImage ( (VOID *)(UINTN)(EFI_DECOMPRESSED_BUFFER_ADDRESS), &DxeCoreImage, &NumberOfMemoryMapEntries, EfiMemoryDescriptor ); if (EFI_ERROR (Status)) { SystemHang ("Failed to load/relocate DxeMain!\n"); } PrintString ( "DxeCore PE image is successed loaded at %lx, entry=%p\n", DxeCoreImage.ImageBasePage, DxeCoreImage.EntryPoint ); PrintHeader ('E'); // // Display the table of memory descriptors. // PrintString ("\nEFI Memory Descriptors\n"); for (Index = 0; Index < NumberOfMemoryMapEntries; Index++) { PrintString ( "Type = %x Start = %08lx NumberOfPages = %08lx\n", EfiMemoryDescriptor[Index].Type, EfiMemoryDescriptor[Index].PhysicalStart, EfiMemoryDescriptor[Index].NumberOfPages ); } // // Jump to EFI Firmware // if (DxeIplImage.EntryPoint != NULL) { Handoff.MemDescCount = NumberOfMemoryMapEntries; Handoff.MemDesc = EfiMemoryDescriptor; Handoff.BfvBase = (VOID *)(UINTN)BfvBase; Handoff.BfvSize = BfvPageNumber * EFI_PAGE_SIZE; Handoff.DxeIplImageBase = (VOID *)(UINTN)DxeIplImage.ImageBasePage; Handoff.DxeIplImageSize = DxeIplImage.NoPages * EFI_PAGE_SIZE; Handoff.DxeCoreImageBase = (VOID *)(UINTN)DxeCoreImage.ImageBasePage; Handoff.DxeCoreImageSize = DxeCoreImage.NoPages * EFI_PAGE_SIZE; Handoff.DxeCoreEntryPoint = (VOID *)(UINTN)DxeCoreImage.EntryPoint; PrintString ("Transfer to DxeIpl ...EntryPoint = %p\n", DxeIplImage.EntryPoint); EfiMainEntrypoint = (EFI_MAIN_ENTRYPOINT) DxeIplImage.EntryPoint; EfiMainEntrypoint (&Handoff); } PrintHeader ('F'); // // There was a problem loading the image, so HALT the system. // SystemHang ("Failed to jump to DxeIpl!\n"); }