freebsd-dev/sys/boot/efi/loader/main.c
2002-07-20 03:44:01 +00:00

490 lines
12 KiB
C

/*-
* Copyright (c) 1998 Michael Smith <msmith@freebsd.org>
* Copyright (c) 1998,2000 Doug Rabson <dfr@freebsd.org>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#ifndef lint
static const char rcsid[] =
"$FreeBSD$";
#endif /* not lint */
#include <stand.h>
#include <string.h>
#include <setjmp.h>
#include <machine/sal.h>
#include <machine/pal.h>
#include <machine/pte.h>
#include <efi.h>
#include <efilib.h>
#include "bootstrap.h"
#include "efiboot.h"
extern char bootprog_name[];
extern char bootprog_rev[];
extern char bootprog_date[];
extern char bootprog_maker[];
struct efi_devdesc currdev; /* our current device */
struct arch_switch archsw; /* MI/MD interface boundary */
extern u_int64_t ia64_pal_entry;
static void
find_pal_proc(void)
{
int i;
struct sal_system_table *saltab = 0;
static int sizes[6] = {
48, 32, 16, 32, 16, 16
};
u_int8_t *p;
for (i = 0; i < ST->NumberOfTableEntries; i++) {
static EFI_GUID sal = SAL_SYSTEM_TABLE_GUID;
if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&sal, sizeof(EFI_GUID)))
saltab = ST->ConfigurationTable[i].VendorTable;
}
if (!saltab) {
printf("Can't find SAL System Table\n");
return;
}
if (memcmp(saltab->sal_signature, "SST_", 4)) {
printf("Bad signature for SAL System Table\n");
return;
}
p = (u_int8_t *) (saltab + 1);
for (i = 0; i < saltab->sal_entry_count; i++) {
if (*p == 0) {
struct sal_entrypoint_descriptor *dp;
dp = (struct sal_entrypoint_descriptor *) p;
ia64_pal_entry = dp->sale_pal_proc;
return;
}
p += sizes[*p];
}
printf("Can't find PAL proc\n");
return;
}
EFI_STATUS
efi_main (EFI_HANDLE image_handle, EFI_SYSTEM_TABLE *system_table)
{
static EFI_GUID imgid = LOADED_IMAGE_PROTOCOL;
static EFI_GUID netid = EFI_SIMPLE_NETWORK_PROTOCOL;
EFI_PHYSICAL_ADDRESS mem;
EFI_LOADED_IMAGE *img;
EFI_SIMPLE_NETWORK *net;
EFI_STATUS status;
struct ia64_pal_result res;
char buf[32];
int i;
efi_init(image_handle, system_table);
/*
* Initialise the heap as early as possible. Once this is done,
* alloc() is usable. The stack is buried inside us, so this is
* safe.
*/
BS->AllocatePages(AllocateAnyPages, EfiLoaderData,
512*1024/4096, &mem);
setheap((void *)mem, (void *)(mem + 512*1024));
/*
* XXX Chicken-and-egg problem; we want to have console output
* early, but some console attributes may depend on reading from
* eg. the boot device, which we can't do yet. We can use
* printf() etc. once this is done.
*/
cons_probe();
/*
* Initialise the block cache
*/
bcache_init(32, 512); /* 16k XXX tune this */
find_pal_proc();
/*
* March through the device switch probing for things.
*/
for (i = 0; devsw[i] != NULL; i++)
if (devsw[i]->dv_init != NULL)
(devsw[i]->dv_init)();
efinet_init_driver();
printf("\n");
printf("%s, Revision %s\n", bootprog_name, bootprog_rev);
printf("(%s, %s)\n", bootprog_maker, bootprog_date);
#if 0
printf("Memory: %ld k\n", memsize() / 1024);
#endif
/*
* XXX quick and dirty check to see if we're loaded from the
* network. If so, we set the default device to 'net'. In all
* other cases we set the default device to 'disk'. We presume
* fixed positions in devsw for both net and disk.
*/
BS->HandleProtocol(image_handle, &imgid, (VOID**)&img);
status = BS->HandleProtocol(img->DeviceHandle, &netid, (VOID**)&net);
if (status == EFI_SUCCESS && net != NULL) {
currdev.d_dev = devsw[1]; /* XXX net */
currdev.d_kind.netif.unit = 0;
} else {
currdev.d_dev = devsw[0]; /* XXX disk */
currdev.d_kind.efidisk.unit = 0;
/* XXX should be able to detect this, default to autoprobe */
currdev.d_kind.efidisk.slice = -1;
/* default to 'a' */
currdev.d_kind.efidisk.partition = 0;
}
currdev.d_type = currdev.d_dev->dv_type;
#if 0
/* Create arc-specific variables */
bootfile = GetEnvironmentVariable(ARCENV_BOOTFILE);
if (bootfile)
setenv("bootfile", bootfile, 1);
#endif
env_setenv("currdev", EV_VOLATILE, efi_fmtdev(&currdev),
efi_setcurrdev, env_nounset);
env_setenv("loaddev", EV_VOLATILE, efi_fmtdev(&currdev), env_noset,
env_nounset);
setenv("LINES", "24", 1); /* optional */
archsw.arch_autoload = efi_autoload;
archsw.arch_getdev = efi_getdev;
archsw.arch_copyin = efi_copyin;
archsw.arch_copyout = efi_copyout;
archsw.arch_readin = efi_readin;
interact(); /* doesn't return */
return (EFI_SUCCESS); /* keep compiler happy */
}
COMMAND_SET(quit, "quit", "exit the loader", command_quit);
static int
command_quit(int argc, char *argv[])
{
exit(0);
return (CMD_OK);
}
COMMAND_SET(memmap, "memmap", "print memory map", command_memmap);
static int
command_memmap(int argc, char *argv[])
{
UINTN sz;
EFI_MEMORY_DESCRIPTOR *map, *p;
UINTN key, dsz;
UINT32 dver;
EFI_STATUS status;
int i, ndesc;
static char *types[] = {
"Reserved",
"LoaderCode",
"LoaderData",
"BootServicesCode",
"BootServicesData",
"RuntimeServicesCode",
"RuntimeServicesData",
"ConventionalMemory",
"UnusableMemory",
"ACPIReclaimMemory",
"ACPIMemoryNVS",
"MemoryMappedIO",
"MemoryMappedIOPortSpace",
"PalCode"
};
sz = 0;
status = BS->GetMemoryMap(&sz, 0, &key, &dsz, &dver);
if (status != EFI_BUFFER_TOO_SMALL) {
printf("Can't determine memory map size\n");
return CMD_ERROR;
}
map = malloc(sz);
status = BS->GetMemoryMap(&sz, map, &key, &dsz, &dver);
if (EFI_ERROR(status)) {
printf("Can't read memory map\n");
return CMD_ERROR;
}
ndesc = sz / dsz;
printf("%23s %12s %12s %8s %4s\n",
"Type", "Physical", "Virtual", "#Pages", "Attr");
for (i = 0, p = map; i < ndesc;
i++, p = NextMemoryDescriptor(p, dsz)) {
printf("%23s %012lx %012lx %08lx ",
types[p->Type],
p->PhysicalStart,
p->VirtualStart,
p->NumberOfPages);
if (p->Attribute & EFI_MEMORY_UC)
printf("UC ");
if (p->Attribute & EFI_MEMORY_WC)
printf("WC ");
if (p->Attribute & EFI_MEMORY_WT)
printf("WT ");
if (p->Attribute & EFI_MEMORY_WB)
printf("WB ");
if (p->Attribute & EFI_MEMORY_UCE)
printf("UCE ");
if (p->Attribute & EFI_MEMORY_WP)
printf("WP ");
if (p->Attribute & EFI_MEMORY_RP)
printf("RP ");
if (p->Attribute & EFI_MEMORY_XP)
printf("XP ");
if (p->Attribute & EFI_MEMORY_RUNTIME)
printf("RUNTIME");
printf("\n");
}
return CMD_OK;
}
COMMAND_SET(configuration, "configuration",
"print configuration tables", command_configuration);
static int
command_configuration(int argc, char *argv[])
{
int i;
printf("NumberOfTableEntries=%ld\n", ST->NumberOfTableEntries);
for (i = 0; i < ST->NumberOfTableEntries; i++) {
static EFI_GUID mps = MPS_TABLE_GUID;
static EFI_GUID acpi = ACPI_TABLE_GUID;
static EFI_GUID acpi20 = ACPI_20_TABLE_GUID;
static EFI_GUID smbios = SMBIOS_TABLE_GUID;
static EFI_GUID sal = SAL_SYSTEM_TABLE_GUID;
printf(" ");
if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&mps, sizeof(EFI_GUID)))
printf("MPS Table");
else if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&acpi, sizeof(EFI_GUID)))
printf("ACPI Table");
else if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&acpi20, sizeof(EFI_GUID)))
printf("ACPI 2.0 Table");
else if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&smbios, sizeof(EFI_GUID)))
printf("SMBIOS Table");
else if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&sal, sizeof(EFI_GUID)))
printf("SAL System Table");
else
printf("Unknown Table");
printf(" at %p\n", ST->ConfigurationTable[i].VendorTable);
}
return CMD_OK;
}
COMMAND_SET(sal, "sal", "print SAL System Table", command_sal);
static int
command_sal(int argc, char *argv[])
{
int i;
struct sal_system_table *saltab = 0;
static int sizes[6] = {
48, 32, 16, 32, 16, 16
};
u_int8_t *p;
for (i = 0; i < ST->NumberOfTableEntries; i++) {
static EFI_GUID sal = SAL_SYSTEM_TABLE_GUID;
if (!memcmp(&ST->ConfigurationTable[i].VendorGuid,
&sal, sizeof(EFI_GUID)))
saltab = ST->ConfigurationTable[i].VendorTable;
}
if (!saltab) {
printf("Can't find SAL System Table\n");
return CMD_ERROR;
}
if (memcmp(saltab->sal_signature, "SST_", 4)) {
printf("Bad signature for SAL System Table\n");
return CMD_ERROR;
}
printf("SAL Revision %x.%02x\n",
saltab->sal_rev[1],
saltab->sal_rev[0]);
printf("SAL A Version %x.%02x\n",
saltab->sal_a_version[1],
saltab->sal_a_version[0]);
printf("SAL B Version %x.%02x\n",
saltab->sal_b_version[1],
saltab->sal_b_version[0]);
p = (u_int8_t *) (saltab + 1);
for (i = 0; i < saltab->sal_entry_count; i++) {
printf(" Desc %d", *p);
if (*p == 0) {
struct sal_entrypoint_descriptor *dp;
dp = (struct sal_entrypoint_descriptor *) p;
printf("\n");
printf(" PAL Proc at 0x%lx\n",
dp->sale_pal_proc);
printf(" SAL Proc at 0x%lx\n",
dp->sale_sal_proc);
printf(" SAL GP at 0x%lx\n",
dp->sale_sal_gp);
} else if (*p == 1) {
struct sal_memory_descriptor *dp;
dp = (struct sal_memory_descriptor *) p;
printf(" Type %d.%d, ",
dp->sale_memory_type[0],
dp->sale_memory_type[1]);
printf("Address 0x%lx, ",
dp->sale_physical_address);
printf("Length 0x%x\n",
dp->sale_length);
} else {
printf("\n");
}
p += sizes[*p];
}
return CMD_OK;
}
int
print_trs(int type)
{
struct ia64_pal_result res;
int i, maxtr;
struct {
struct ia64_pte pte;
struct ia64_itir itir;
struct ia64_ifa ifa;
struct ia64_rr rr;
} buf;
static const char* psnames[] = {
"1B", "2B", "4B", "8B",
"16B", "32B", "64B", "128B",
"256B", "512B", "1K", "2K",
"4K", "8K", "16K", "32K",
"64K", "128K", "256K", "512K",
"1M", "2M", "4M", "8M",
"16M", "32M", "64M", "128M",
"256M", "512M", "1G", "2G"
};
static const char* manames[] = {
"WB", "bad", "bad", "bad",
"UC", "UCE", "WC", "NaT",
};
res = ia64_call_pal_static(PAL_VM_SUMMARY, 0, 0, 0);
if (res.pal_status != 0) {
printf("Can't get VM summary\n");
return CMD_ERROR;
}
if (type == 0)
maxtr = (res.pal_result[0] >> 40) & 0xff;
else
maxtr = (res.pal_result[0] >> 32) & 0xff;
pager_open();
pager_output("V RID Virtual Page Physical Page PgSz ED AR PL D A MA P KEY\n");
for (i = 0; i <= maxtr; i++) {
char lbuf[128];
bzero(&buf, sizeof(buf));
res = ia64_call_pal_stacked(PAL_VM_TR_READ, i, type,
(u_int64_t) &buf);
if (!(res.pal_result[0] & 1))
buf.pte.pte_ar = 0;
if (!(res.pal_result[0] & 2))
buf.pte.pte_pl = 0;
if (!(res.pal_result[0] & 4))
buf.pte.pte_d = 0;
if (!(res.pal_result[0] & 8))
buf.pte.pte_ma = 0;
sprintf(lbuf,
"%d %06x %013lx %013lx %4s %d %d %d %d %d %-3s %d %06x\n",
buf.ifa.ifa_ig & 1,
buf.rr.rr_rid,
buf.ifa.ifa_vpn,
buf.pte.pte_ppn,
psnames[buf.itir.itir_ps],
buf.pte.pte_ed,
buf.pte.pte_ar,
buf.pte.pte_pl,
buf.pte.pte_d,
buf.pte.pte_a,
manames[buf.pte.pte_ma],
buf.pte.pte_p,
buf.itir.itir_key);
pager_output(lbuf);
}
pager_close();
return CMD_OK;
}
COMMAND_SET(itr, "itr", "print instruction TRs", command_itr);
static int
command_itr(int argc, char *argv[])
{
return print_trs(0);
}
COMMAND_SET(dtr, "dtr", "print data TRs", command_dtr);
static int
command_dtr(int argc, char *argv[])
{
return print_trs(1);
}