| /** @file | |
| Base PE/COFF loader supports loading any PE32/PE32+ or TE image, but | |
| only supports relocating IA32, x64, IPF, ARM, RISC-V, LoongArch and EBC images. | |
| Caution: This file requires additional review when modified. | |
| This library will have external input - PE/COFF image. | |
| This external input must be validated carefully to avoid security issue like | |
| buffer overflow, integer overflow. | |
| The basic guideline is that caller need provide ImageContext->ImageRead () with the | |
| necessary data range check, to make sure when this library reads PE/COFF image, the | |
| PE image buffer is always in valid range. | |
| This library will also do some additional check for PE header fields. | |
| PeCoffLoaderGetPeHeader() routine will do basic check for PE/COFF header. | |
| PeCoffLoaderGetImageInfo() routine will do basic check for whole PE/COFF image. | |
| Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR> | |
| Portions copyright (c) 2008 - 2009, Apple Inc. All rights reserved.<BR> | |
| Portions Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR> | |
| Portions Copyright (c) 2022, Loongson Technology Corporation Limited. All rights reserved.<BR> | |
| SPDX-License-Identifier: BSD-2-Clause-Patent | |
| **/ | |
| #include "BasePeCoffLibInternals.h" | |
| /** | |
| Adjust some fields in section header for TE image. | |
| @param SectionHeader Pointer to the section header. | |
| @param TeStrippedOffset Size adjust for the TE image. | |
| **/ | |
| VOID | |
| PeCoffLoaderAdjustOffsetForTeImage ( | |
| EFI_IMAGE_SECTION_HEADER *SectionHeader, | |
| UINT32 TeStrippedOffset | |
| ) | |
| { | |
| SectionHeader->VirtualAddress -= TeStrippedOffset; | |
| SectionHeader->PointerToRawData -= TeStrippedOffset; | |
| } | |
| /** | |
| Retrieves the PE or TE Header from a PE/COFF or TE image. | |
| Caution: This function may receive untrusted input. | |
| PE/COFF image is external input, so this routine will | |
| also done many checks in PE image to make sure PE image DosHeader, PeOptionHeader, | |
| SizeOfHeader, Section Data Region and Security Data Region be in PE image range. | |
| @param ImageContext The context of the image being loaded. | |
| @param Hdr The buffer in which to return the PE32, PE32+, or TE header. | |
| @retval RETURN_SUCCESS The PE or TE Header is read. | |
| @retval Other The error status from reading the PE/COFF or TE image using the ImageRead function. | |
| **/ | |
| RETURN_STATUS | |
| PeCoffLoaderGetPeHeader ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, | |
| OUT EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr | |
| ) | |
| { | |
| RETURN_STATUS Status; | |
| EFI_IMAGE_DOS_HEADER DosHdr; | |
| UINTN Size; | |
| UINTN ReadSize; | |
| UINT32 SectionHeaderOffset; | |
| UINT32 Index; | |
| UINT32 HeaderWithoutDataDir; | |
| CHAR8 BufferData; | |
| UINTN NumberOfSections; | |
| EFI_IMAGE_SECTION_HEADER SectionHeader; | |
| // | |
| // Read the DOS image header to check for its existence | |
| // | |
| Size = sizeof (EFI_IMAGE_DOS_HEADER); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| 0, | |
| &Size, | |
| &DosHdr | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| ImageContext->PeCoffHeaderOffset = 0; | |
| if (DosHdr.e_magic == EFI_IMAGE_DOS_SIGNATURE) { | |
| // | |
| // DOS image header is present, so read the PE header after the DOS image | |
| // header | |
| // | |
| ImageContext->PeCoffHeaderOffset = DosHdr.e_lfanew; | |
| } | |
| // | |
| // Read the PE/COFF Header. For PE32 (32-bit) this will read in too much | |
| // data, but that should not hurt anything. Hdr.Pe32->OptionalHeader.Magic | |
| // determines if this is a PE32 or PE32+ image. The magic is in the same | |
| // location in both images. | |
| // | |
| Size = sizeof (EFI_IMAGE_OPTIONAL_HEADER_UNION); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| ImageContext->PeCoffHeaderOffset, | |
| &Size, | |
| Hdr.Pe32 | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // Use Signature to figure out if we understand the image format | |
| // | |
| if (Hdr.Te->Signature == EFI_TE_IMAGE_HEADER_SIGNATURE) { | |
| ImageContext->IsTeImage = TRUE; | |
| ImageContext->Machine = Hdr.Te->Machine; | |
| ImageContext->ImageType = (UINT16)(Hdr.Te->Subsystem); | |
| // | |
| // For TeImage, SectionAlignment is undefined to be set to Zero | |
| // ImageSize can be calculated. | |
| // | |
| ImageContext->ImageSize = 0; | |
| ImageContext->SectionAlignment = 0; | |
| ImageContext->SizeOfHeaders = sizeof (EFI_TE_IMAGE_HEADER) + (UINTN)Hdr.Te->BaseOfCode - (UINTN)Hdr.Te->StrippedSize; | |
| // | |
| // Check the StrippedSize. | |
| // | |
| if (sizeof (EFI_TE_IMAGE_HEADER) >= (UINT32)Hdr.Te->StrippedSize) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Check the SizeOfHeaders field. | |
| // | |
| if (Hdr.Te->BaseOfCode <= Hdr.Te->StrippedSize) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Read last byte of Hdr.Te->SizeOfHeaders from the file. | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| ImageContext->SizeOfHeaders - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // TE Image Data Directory Entry size is non-zero, but the Data Directory Virtual Address is zero. | |
| // This case is not a valid TE image. | |
| // | |
| if (((Hdr.Te->DataDirectory[0].Size != 0) && (Hdr.Te->DataDirectory[0].VirtualAddress == 0)) || | |
| ((Hdr.Te->DataDirectory[1].Size != 0) && (Hdr.Te->DataDirectory[1].VirtualAddress == 0))) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| } else if (Hdr.Pe32->Signature == EFI_IMAGE_NT_SIGNATURE) { | |
| ImageContext->IsTeImage = FALSE; | |
| ImageContext->Machine = Hdr.Pe32->FileHeader.Machine; | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // 1. Check OptionalHeader.NumberOfRvaAndSizes filed. | |
| // | |
| if (EFI_IMAGE_NUMBER_OF_DIRECTORY_ENTRIES < Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 2. Check the FileHeader.SizeOfOptionalHeader field. | |
| // OptionalHeader.NumberOfRvaAndSizes is not bigger than 16, so | |
| // OptionalHeader.NumberOfRvaAndSizes * sizeof (EFI_IMAGE_DATA_DIRECTORY) will not overflow. | |
| // | |
| HeaderWithoutDataDir = sizeof (EFI_IMAGE_OPTIONAL_HEADER32) - sizeof (EFI_IMAGE_DATA_DIRECTORY) * EFI_IMAGE_NUMBER_OF_DIRECTORY_ENTRIES; | |
| if (((UINT32)Hdr.Pe32->FileHeader.SizeOfOptionalHeader - HeaderWithoutDataDir) != | |
| Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes * sizeof (EFI_IMAGE_DATA_DIRECTORY)) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| SectionHeaderOffset = ImageContext->PeCoffHeaderOffset + sizeof (UINT32) + sizeof (EFI_IMAGE_FILE_HEADER) + Hdr.Pe32->FileHeader.SizeOfOptionalHeader; | |
| // | |
| // 3. Check the FileHeader.NumberOfSections field. | |
| // | |
| if (Hdr.Pe32->OptionalHeader.SizeOfImage <= SectionHeaderOffset) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if ((Hdr.Pe32->OptionalHeader.SizeOfImage - SectionHeaderOffset) / EFI_IMAGE_SIZEOF_SECTION_HEADER <= Hdr.Pe32->FileHeader.NumberOfSections) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 4. Check the OptionalHeader.SizeOfHeaders field. | |
| // | |
| if (Hdr.Pe32->OptionalHeader.SizeOfHeaders <= SectionHeaderOffset) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if (Hdr.Pe32->OptionalHeader.SizeOfHeaders >= Hdr.Pe32->OptionalHeader.SizeOfImage) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if ((Hdr.Pe32->OptionalHeader.SizeOfHeaders - SectionHeaderOffset) / EFI_IMAGE_SIZEOF_SECTION_HEADER < (UINT32)Hdr.Pe32->FileHeader.NumberOfSections) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 4.2 Read last byte of Hdr.Pe32.OptionalHeader.SizeOfHeaders from the file. | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| Hdr.Pe32->OptionalHeader.SizeOfHeaders - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // Check the EFI_IMAGE_DIRECTORY_ENTRY_SECURITY data. | |
| // Read the last byte to make sure the data is in the image region. | |
| // The DataDirectory array begin with 1, not 0, so here use < to compare not <=. | |
| // | |
| if (EFI_IMAGE_DIRECTORY_ENTRY_SECURITY < Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes) { | |
| if (Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size != 0) { | |
| // | |
| // Check the member data to avoid overflow. | |
| // | |
| if ((UINT32)(~0) - Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress < | |
| Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Read last byte of section header from file | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress + | |
| Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| } | |
| } | |
| // | |
| // Use PE32 offset | |
| // | |
| ImageContext->ImageType = Hdr.Pe32->OptionalHeader.Subsystem; | |
| ImageContext->ImageSize = (UINT64)Hdr.Pe32->OptionalHeader.SizeOfImage; | |
| ImageContext->SectionAlignment = Hdr.Pe32->OptionalHeader.SectionAlignment; | |
| ImageContext->SizeOfHeaders = Hdr.Pe32->OptionalHeader.SizeOfHeaders; | |
| ImageContext->DllCharacteristics = Hdr.Pe32->OptionalHeader.DllCharacteristics; | |
| } else if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC) { | |
| // | |
| // 1. Check FileHeader.NumberOfRvaAndSizes filed. | |
| // | |
| if (EFI_IMAGE_NUMBER_OF_DIRECTORY_ENTRIES < Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 2. Check the FileHeader.SizeOfOptionalHeader field. | |
| // OptionalHeader.NumberOfRvaAndSizes is not bigger than 16, so | |
| // OptionalHeader.NumberOfRvaAndSizes * sizeof (EFI_IMAGE_DATA_DIRECTORY) will not overflow. | |
| // | |
| HeaderWithoutDataDir = sizeof (EFI_IMAGE_OPTIONAL_HEADER64) - sizeof (EFI_IMAGE_DATA_DIRECTORY) * EFI_IMAGE_NUMBER_OF_DIRECTORY_ENTRIES; | |
| if (((UINT32)Hdr.Pe32Plus->FileHeader.SizeOfOptionalHeader - HeaderWithoutDataDir) != | |
| Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes * sizeof (EFI_IMAGE_DATA_DIRECTORY)) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| SectionHeaderOffset = ImageContext->PeCoffHeaderOffset + sizeof (UINT32) + sizeof (EFI_IMAGE_FILE_HEADER) + Hdr.Pe32Plus->FileHeader.SizeOfOptionalHeader; | |
| // | |
| // 3. Check the FileHeader.NumberOfSections field. | |
| // | |
| if (Hdr.Pe32Plus->OptionalHeader.SizeOfImage <= SectionHeaderOffset) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if ((Hdr.Pe32Plus->OptionalHeader.SizeOfImage - SectionHeaderOffset) / EFI_IMAGE_SIZEOF_SECTION_HEADER <= Hdr.Pe32Plus->FileHeader.NumberOfSections) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 4. Check the OptionalHeader.SizeOfHeaders field. | |
| // | |
| if (Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders <= SectionHeaderOffset) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if (Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders >= Hdr.Pe32Plus->OptionalHeader.SizeOfImage) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if ((Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders - SectionHeaderOffset) / EFI_IMAGE_SIZEOF_SECTION_HEADER < (UINT32)Hdr.Pe32Plus->FileHeader.NumberOfSections) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // 4.2 Read last byte of Hdr.Pe32Plus.OptionalHeader.SizeOfHeaders from the file. | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // Check the EFI_IMAGE_DIRECTORY_ENTRY_SECURITY data. | |
| // Read the last byte to make sure the data is in the image region. | |
| // The DataDirectory array begin with 1, not 0, so here use < to compare not <=. | |
| // | |
| if (EFI_IMAGE_DIRECTORY_ENTRY_SECURITY < Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes) { | |
| if (Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size != 0) { | |
| // | |
| // Check the member data to avoid overflow. | |
| // | |
| if ((UINT32)(~0) - Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress < | |
| Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Read last byte of section header from file | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress + | |
| Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY].Size - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| } | |
| } | |
| // | |
| // Use PE32+ offset | |
| // | |
| ImageContext->ImageType = Hdr.Pe32Plus->OptionalHeader.Subsystem; | |
| ImageContext->ImageSize = (UINT64)Hdr.Pe32Plus->OptionalHeader.SizeOfImage; | |
| ImageContext->SectionAlignment = Hdr.Pe32Plus->OptionalHeader.SectionAlignment; | |
| ImageContext->SizeOfHeaders = Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders; | |
| ImageContext->DllCharacteristics = Hdr.Pe32Plus->OptionalHeader.DllCharacteristics; | |
| } else { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_MACHINE_TYPE; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| } else { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_MACHINE_TYPE; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| if (!PeCoffLoaderImageFormatSupported (ImageContext->Machine)) { | |
| // | |
| // If the PE/COFF loader does not support the image type return | |
| // unsupported. This library can support lots of types of images | |
| // this does not mean the user of this library can call the entry | |
| // point of the image. | |
| // | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Check each section field. | |
| // | |
| if (ImageContext->IsTeImage) { | |
| SectionHeaderOffset = sizeof (EFI_TE_IMAGE_HEADER); | |
| NumberOfSections = (UINTN)(Hdr.Te->NumberOfSections); | |
| } else { | |
| SectionHeaderOffset = ImageContext->PeCoffHeaderOffset + sizeof (UINT32) + sizeof (EFI_IMAGE_FILE_HEADER) + Hdr.Pe32->FileHeader.SizeOfOptionalHeader; | |
| NumberOfSections = (UINTN)(Hdr.Pe32->FileHeader.NumberOfSections); | |
| } | |
| for (Index = 0; Index < NumberOfSections; Index++) { | |
| // | |
| // Read section header from file | |
| // | |
| Size = sizeof (EFI_IMAGE_SECTION_HEADER); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| SectionHeaderOffset, | |
| &Size, | |
| &SectionHeader | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // Adjust some field in Section Header for TE image. | |
| // | |
| if (ImageContext->IsTeImage) { | |
| PeCoffLoaderAdjustOffsetForTeImage (&SectionHeader, (UINT32)Hdr.Te->StrippedSize - sizeof (EFI_TE_IMAGE_HEADER)); | |
| } | |
| if (SectionHeader.SizeOfRawData > 0) { | |
| // | |
| // Section data should bigger than the Pe header. | |
| // | |
| if ((SectionHeader.VirtualAddress < ImageContext->SizeOfHeaders) || | |
| (SectionHeader.PointerToRawData < ImageContext->SizeOfHeaders)) | |
| { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Check the member data to avoid overflow. | |
| // | |
| if ((UINT32)(~0) - SectionHeader.PointerToRawData < SectionHeader.SizeOfRawData) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| // | |
| // Base on the ImageRead function to check the section data field. | |
| // Read the last byte to make sure the data is in the image region. | |
| // | |
| Size = 1; | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| SectionHeader.PointerToRawData + SectionHeader.SizeOfRawData - 1, | |
| &Size, | |
| &BufferData | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| } | |
| // | |
| // Check next section. | |
| // | |
| SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER); | |
| } | |
| return RETURN_SUCCESS; | |
| } | |
| /** | |
| Retrieves information about a PE/COFF image. | |
| Computes the PeCoffHeaderOffset, IsTeImage, ImageType, ImageAddress, ImageSize, | |
| DestinationAddress, RelocationsStripped, SectionAlignment, SizeOfHeaders, | |
| DllCharacteristics, DllCharacteristicsEx and DebugDirectoryEntryRva fields of | |
| the ImageContext structure. | |
| If ImageContext is NULL, then return RETURN_INVALID_PARAMETER. | |
| If the PE/COFF image accessed through the ImageRead service in the ImageContext | |
| structure is not a supported PE/COFF image type, then return RETURN_UNSUPPORTED. | |
| If any errors occur while computing the fields of ImageContext, | |
| then the error status is returned in the ImageError field of ImageContext. | |
| If the image is a TE image, then SectionAlignment is set to 0. | |
| The ImageRead and Handle fields of ImageContext structure must be valid prior | |
| to invoking this service. | |
| Caution: This function may receive untrusted input. | |
| PE/COFF image is external input, so this routine will | |
| also done many checks in PE image to make sure PE image DosHeader, PeOptionHeader, | |
| SizeOfHeader, Section Data Region and Security Data Region be in PE image range. | |
| @param ImageContext The pointer to the image context structure that describes the PE/COFF | |
| image that needs to be examined by this function. | |
| @retval RETURN_SUCCESS The information on the PE/COFF image was collected. | |
| @retval RETURN_INVALID_PARAMETER ImageContext is NULL. | |
| @retval RETURN_UNSUPPORTED The PE/COFF image is not supported. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| PeCoffLoaderGetImageInfo ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext | |
| ) | |
| { | |
| RETURN_STATUS Status; | |
| EFI_IMAGE_OPTIONAL_HEADER_UNION HdrData; | |
| EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; | |
| EFI_IMAGE_DATA_DIRECTORY *DebugDirectoryEntry; | |
| UINTN Size; | |
| UINTN ReadSize; | |
| UINTN Index; | |
| UINTN NextIndex; | |
| UINTN DebugDirectoryEntryRva; | |
| UINTN DebugDirectoryEntryFileOffset; | |
| UINTN SectionHeaderOffset; | |
| EFI_IMAGE_SECTION_HEADER SectionHeader; | |
| EFI_IMAGE_DEBUG_DIRECTORY_ENTRY DebugEntry; | |
| UINT32 NumberOfRvaAndSizes; | |
| UINT32 TeStrippedOffset; | |
| if (ImageContext == NULL) { | |
| return RETURN_INVALID_PARAMETER; | |
| } | |
| // | |
| // Assume success | |
| // | |
| ImageContext->ImageError = IMAGE_ERROR_SUCCESS; | |
| Hdr.Union = &HdrData; | |
| Status = PeCoffLoaderGetPeHeader (ImageContext, Hdr); | |
| if (RETURN_ERROR (Status)) { | |
| return Status; | |
| } | |
| // | |
| // Retrieve the base address of the image | |
| // | |
| if (!(ImageContext->IsTeImage)) { | |
| TeStrippedOffset = 0; | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| ImageContext->ImageAddress = Hdr.Pe32->OptionalHeader.ImageBase; | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| ImageContext->ImageAddress = Hdr.Pe32Plus->OptionalHeader.ImageBase; | |
| } | |
| } else { | |
| TeStrippedOffset = (UINT32)Hdr.Te->StrippedSize - sizeof (EFI_TE_IMAGE_HEADER); | |
| ImageContext->ImageAddress = (PHYSICAL_ADDRESS)(Hdr.Te->ImageBase + TeStrippedOffset); | |
| } | |
| // | |
| // Initialize the alternate destination address to 0 indicating that it | |
| // should not be used. | |
| // | |
| ImageContext->DestinationAddress = 0; | |
| // | |
| // Initialize the debug codeview pointer. | |
| // | |
| ImageContext->DebugDirectoryEntryRva = 0; | |
| ImageContext->CodeView = NULL; | |
| ImageContext->PdbPointer = NULL; | |
| // | |
| // Three cases with regards to relocations: | |
| // - Image has base relocs, RELOCS_STRIPPED==0 => image is relocatable | |
| // - Image has no base relocs, RELOCS_STRIPPED==1 => Image is not relocatable | |
| // - Image has no base relocs, RELOCS_STRIPPED==0 => Image is relocatable but | |
| // has no base relocs to apply | |
| // Obviously having base relocations with RELOCS_STRIPPED==1 is invalid. | |
| // | |
| // Look at the file header to determine if relocations have been stripped, and | |
| // save this information in the image context for later use. | |
| // | |
| if ((!(ImageContext->IsTeImage)) && ((Hdr.Pe32->FileHeader.Characteristics & EFI_IMAGE_FILE_RELOCS_STRIPPED) != 0)) { | |
| ImageContext->RelocationsStripped = TRUE; | |
| } else if ((ImageContext->IsTeImage) && (Hdr.Te->DataDirectory[0].Size == 0) && (Hdr.Te->DataDirectory[0].VirtualAddress == 0)) { | |
| ImageContext->RelocationsStripped = TRUE; | |
| } else { | |
| ImageContext->RelocationsStripped = FALSE; | |
| } | |
| if (!(ImageContext->IsTeImage)) { | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; | |
| DebugDirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_DEBUG]); | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes; | |
| DebugDirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_DEBUG]); | |
| } | |
| if (NumberOfRvaAndSizes > EFI_IMAGE_DIRECTORY_ENTRY_DEBUG) { | |
| DebugDirectoryEntryRva = DebugDirectoryEntry->VirtualAddress; | |
| // | |
| // Determine the file offset of the debug directory... This means we walk | |
| // the sections to find which section contains the RVA of the debug | |
| // directory | |
| // | |
| DebugDirectoryEntryFileOffset = 0; | |
| SectionHeaderOffset = ImageContext->PeCoffHeaderOffset + | |
| sizeof (UINT32) + | |
| sizeof (EFI_IMAGE_FILE_HEADER) + | |
| Hdr.Pe32->FileHeader.SizeOfOptionalHeader; | |
| for (Index = 0; Index < Hdr.Pe32->FileHeader.NumberOfSections; Index++) { | |
| // | |
| // Read section header from file | |
| // | |
| Size = sizeof (EFI_IMAGE_SECTION_HEADER); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| SectionHeaderOffset, | |
| &Size, | |
| &SectionHeader | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| if ((DebugDirectoryEntryRva >= SectionHeader.VirtualAddress) && | |
| (DebugDirectoryEntryRva < SectionHeader.VirtualAddress + SectionHeader.Misc.VirtualSize)) | |
| { | |
| DebugDirectoryEntryFileOffset = DebugDirectoryEntryRva - SectionHeader.VirtualAddress + SectionHeader.PointerToRawData; | |
| break; | |
| } | |
| SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER); | |
| } | |
| if (DebugDirectoryEntryFileOffset != 0) { | |
| for (Index = 0; Index < DebugDirectoryEntry->Size; Index += sizeof (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY)) { | |
| // | |
| // Read next debug directory entry | |
| // | |
| Size = sizeof (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| DebugDirectoryEntryFileOffset + Index, | |
| &Size, | |
| &DebugEntry | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| // | |
| // From PeCoff spec, when DebugEntry.RVA == 0 means this debug info will not load into memory. | |
| // Here we will always load EFI_IMAGE_DEBUG_TYPE_CODEVIEW type debug info. so need adjust the | |
| // ImageContext->ImageSize when DebugEntry.RVA == 0. | |
| // | |
| if (DebugEntry.Type == EFI_IMAGE_DEBUG_TYPE_CODEVIEW) { | |
| ImageContext->DebugDirectoryEntryRva = (UINT32)(DebugDirectoryEntryRva + Index); | |
| if ((DebugEntry.RVA == 0) && (DebugEntry.FileOffset != 0)) { | |
| ImageContext->ImageSize += DebugEntry.SizeOfData; | |
| } | |
| // | |
| // Implementations of GenFw before commit 60e85a39fe49071 will | |
| // concatenate the debug directory entry and the codeview entry, | |
| // and erroneously put the combined size into the debug directory's | |
| // size field. If this is the case, no other relevant directory | |
| // entries can exist, and we can terminate here. | |
| // | |
| NextIndex = Index + sizeof (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY); | |
| if ((NextIndex < DebugDirectoryEntry->Size) && | |
| (DebugEntry.FileOffset == (DebugDirectoryEntryFileOffset + NextIndex))) | |
| { | |
| break; | |
| } | |
| continue; | |
| } | |
| if (DebugEntry.Type == EFI_IMAGE_DEBUG_TYPE_EX_DLLCHARACTERISTICS) { | |
| Size = sizeof (EFI_IMAGE_DEBUG_EX_DLLCHARACTERISTICS_ENTRY); | |
| ReadSize = sizeof (EFI_IMAGE_DEBUG_EX_DLLCHARACTERISTICS_ENTRY); | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| DebugEntry.FileOffset, | |
| &Size, | |
| &ImageContext->DllCharacteristicsEx | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| continue; | |
| } | |
| } | |
| } | |
| } | |
| } else { | |
| DebugDirectoryEntry = &Hdr.Te->DataDirectory[1]; | |
| DebugDirectoryEntryRva = DebugDirectoryEntry->VirtualAddress; | |
| SectionHeaderOffset = (UINTN)(sizeof (EFI_TE_IMAGE_HEADER)); | |
| DebugDirectoryEntryFileOffset = 0; | |
| for (Index = 0; Index < Hdr.Te->NumberOfSections;) { | |
| // | |
| // Read section header from file | |
| // | |
| Size = sizeof (EFI_IMAGE_SECTION_HEADER); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| SectionHeaderOffset, | |
| &Size, | |
| &SectionHeader | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| if ((DebugDirectoryEntryRva >= SectionHeader.VirtualAddress) && | |
| (DebugDirectoryEntryRva < SectionHeader.VirtualAddress + SectionHeader.Misc.VirtualSize)) | |
| { | |
| DebugDirectoryEntryFileOffset = DebugDirectoryEntryRva - | |
| SectionHeader.VirtualAddress + | |
| SectionHeader.PointerToRawData - | |
| TeStrippedOffset; | |
| // | |
| // File offset of the debug directory was found, if this is not the last | |
| // section, then skip to the last section for calculating the image size. | |
| // | |
| if (Index < (UINTN)Hdr.Te->NumberOfSections - 1) { | |
| SectionHeaderOffset += (Hdr.Te->NumberOfSections - 1 - Index) * sizeof (EFI_IMAGE_SECTION_HEADER); | |
| Index = Hdr.Te->NumberOfSections - 1; | |
| continue; | |
| } | |
| } | |
| // | |
| // In Te image header there is not a field to describe the ImageSize. | |
| // Actually, the ImageSize equals the RVA plus the VirtualSize of | |
| // the last section mapped into memory (Must be rounded up to | |
| // a multiple of Section Alignment). Per the PE/COFF specification, the | |
| // section headers in the Section Table must appear in order of the RVA | |
| // values for the corresponding sections. So the ImageSize can be determined | |
| // by the RVA and the VirtualSize of the last section header in the | |
| // Section Table. | |
| // | |
| if ((++Index) == (UINTN)Hdr.Te->NumberOfSections) { | |
| ImageContext->ImageSize = (SectionHeader.VirtualAddress + SectionHeader.Misc.VirtualSize) - TeStrippedOffset; | |
| } | |
| SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER); | |
| } | |
| if (DebugDirectoryEntryFileOffset != 0) { | |
| for (Index = 0; Index < DebugDirectoryEntry->Size; Index += sizeof (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY)) { | |
| // | |
| // Read next debug directory entry | |
| // | |
| Size = sizeof (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY); | |
| ReadSize = Size; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| DebugDirectoryEntryFileOffset + Index, | |
| &Size, | |
| &DebugEntry | |
| ); | |
| if (RETURN_ERROR (Status) || (Size != ReadSize)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| if (Size != ReadSize) { | |
| Status = RETURN_UNSUPPORTED; | |
| } | |
| return Status; | |
| } | |
| if (DebugEntry.Type == EFI_IMAGE_DEBUG_TYPE_CODEVIEW) { | |
| ImageContext->DebugDirectoryEntryRva = (UINT32)(DebugDirectoryEntryRva + Index); | |
| return RETURN_SUCCESS; | |
| } | |
| } | |
| } | |
| } | |
| return RETURN_SUCCESS; | |
| } | |
| /** | |
| Converts an image address to the loaded address. | |
| @param ImageContext The context of the image being loaded. | |
| @param Address The address to be converted to the loaded address. | |
| @param TeStrippedOffset Stripped offset for TE image. | |
| @return The converted address or NULL if the address can not be converted. | |
| **/ | |
| VOID * | |
| PeCoffLoaderImageAddress ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, | |
| IN UINTN Address, | |
| IN UINTN TeStrippedOffset | |
| ) | |
| { | |
| // | |
| // Make sure that Address and ImageSize is correct for the loaded image. | |
| // | |
| if (Address >= ImageContext->ImageSize + TeStrippedOffset) { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_IMAGE_ADDRESS; | |
| return NULL; | |
| } | |
| return (CHAR8 *)((UINTN)ImageContext->ImageAddress + Address - TeStrippedOffset); | |
| } | |
| /** | |
| Applies relocation fixups to a PE/COFF image that was loaded with PeCoffLoaderLoadImage(). | |
| If the DestinationAddress field of ImageContext is 0, then use the ImageAddress field of | |
| ImageContext as the relocation base address. Otherwise, use the DestinationAddress field | |
| of ImageContext as the relocation base address. The caller must allocate the relocation | |
| fixup log buffer and fill in the FixupData field of ImageContext prior to calling this function. | |
| The ImageRead, Handle, PeCoffHeaderOffset, IsTeImage, Machine, ImageType, ImageAddress, | |
| ImageSize, DestinationAddress, RelocationsStripped, SectionAlignment, SizeOfHeaders, | |
| DebugDirectoryEntryRva, EntryPoint, FixupDataSize, CodeView, PdbPointer, and FixupData of | |
| the ImageContext structure must be valid prior to invoking this service. | |
| If ImageContext is NULL, then ASSERT(). | |
| Note that if the platform does not maintain coherency between the instruction cache(s) and the data | |
| cache(s) in hardware, then the caller is responsible for performing cache maintenance operations | |
| prior to transferring control to a PE/COFF image that is loaded using this library. | |
| @param ImageContext The pointer to the image context structure that describes the PE/COFF | |
| image that is being relocated. | |
| @retval RETURN_SUCCESS The PE/COFF image was relocated. | |
| Extended status information is in the ImageError field of ImageContext. | |
| @retval RETURN_LOAD_ERROR The image in not a valid PE/COFF image. | |
| Extended status information is in the ImageError field of ImageContext. | |
| @retval RETURN_UNSUPPORTED A relocation record type is not supported. | |
| Extended status information is in the ImageError field of ImageContext. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| PeCoffLoaderRelocateImage ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext | |
| ) | |
| { | |
| RETURN_STATUS Status; | |
| EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; | |
| EFI_IMAGE_DATA_DIRECTORY *RelocDir; | |
| UINT64 Adjust; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBaseOrg; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBase; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBaseEnd; | |
| UINT16 *Reloc; | |
| UINT16 *RelocEnd; | |
| CHAR8 *Fixup; | |
| CHAR8 *FixupBase; | |
| UINT16 *Fixup16; | |
| UINT32 *Fixup32; | |
| UINT64 *Fixup64; | |
| CHAR8 *FixupData; | |
| PHYSICAL_ADDRESS BaseAddress; | |
| UINT32 NumberOfRvaAndSizes; | |
| UINT32 TeStrippedOffset; | |
| ASSERT (ImageContext != NULL); | |
| // | |
| // Assume success | |
| // | |
| ImageContext->ImageError = IMAGE_ERROR_SUCCESS; | |
| // | |
| // If there are no relocation entries, then we are done | |
| // | |
| if (ImageContext->RelocationsStripped) { | |
| // Applies additional environment specific actions to relocate fixups | |
| // to a PE/COFF image if needed | |
| PeCoffLoaderRelocateImageExtraAction (ImageContext); | |
| return RETURN_SUCCESS; | |
| } | |
| // | |
| // If the destination address is not 0, use that rather than the | |
| // image address as the relocation target. | |
| // | |
| if (ImageContext->DestinationAddress != 0) { | |
| BaseAddress = ImageContext->DestinationAddress; | |
| } else { | |
| BaseAddress = ImageContext->ImageAddress; | |
| } | |
| if (!(ImageContext->IsTeImage)) { | |
| Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)((UINTN)ImageContext->ImageAddress + ImageContext->PeCoffHeaderOffset); | |
| TeStrippedOffset = 0; | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| Adjust = (UINT64)BaseAddress - Hdr.Pe32->OptionalHeader.ImageBase; | |
| if (Adjust != 0) { | |
| Hdr.Pe32->OptionalHeader.ImageBase = (UINT32)BaseAddress; | |
| } | |
| NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; | |
| RelocDir = &Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC]; | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| Adjust = (UINT64)BaseAddress - Hdr.Pe32Plus->OptionalHeader.ImageBase; | |
| if (Adjust != 0) { | |
| Hdr.Pe32Plus->OptionalHeader.ImageBase = (UINT64)BaseAddress; | |
| } | |
| NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes; | |
| RelocDir = &Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC]; | |
| } | |
| // | |
| // Find the relocation block | |
| // Per the PE/COFF spec, you can't assume that a given data directory | |
| // is present in the image. You have to check the NumberOfRvaAndSizes in | |
| // the optional header to verify a desired directory entry is there. | |
| // | |
| if ((NumberOfRvaAndSizes < EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC)) { | |
| RelocDir = NULL; | |
| } | |
| } else { | |
| Hdr.Te = (EFI_TE_IMAGE_HEADER *)(UINTN)(ImageContext->ImageAddress); | |
| TeStrippedOffset = (UINT32)Hdr.Te->StrippedSize - sizeof (EFI_TE_IMAGE_HEADER); | |
| Adjust = (UINT64)(BaseAddress - (Hdr.Te->ImageBase + TeStrippedOffset)); | |
| if (Adjust != 0) { | |
| Hdr.Te->ImageBase = (UINT64)(BaseAddress - TeStrippedOffset); | |
| } | |
| // | |
| // Find the relocation block | |
| // | |
| RelocDir = &Hdr.Te->DataDirectory[0]; | |
| } | |
| if ((RelocDir != NULL) && (RelocDir->Size > 0)) { | |
| RelocBase = (EFI_IMAGE_BASE_RELOCATION *)PeCoffLoaderImageAddress (ImageContext, RelocDir->VirtualAddress, TeStrippedOffset); | |
| RelocBaseEnd = (EFI_IMAGE_BASE_RELOCATION *)PeCoffLoaderImageAddress ( | |
| ImageContext, | |
| RelocDir->VirtualAddress + RelocDir->Size - 1, | |
| TeStrippedOffset | |
| ); | |
| if ((RelocBase == NULL) || (RelocBaseEnd == NULL) || ((UINTN)RelocBaseEnd < (UINTN)RelocBase)) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| } else { | |
| // | |
| // Set base and end to bypass processing below. | |
| // | |
| RelocBase = RelocBaseEnd = NULL; | |
| } | |
| RelocBaseOrg = RelocBase; | |
| // | |
| // If Adjust is not zero, then apply fix ups to the image | |
| // | |
| if (Adjust != 0) { | |
| // | |
| // Run the relocation information and apply the fixups | |
| // | |
| FixupData = ImageContext->FixupData; | |
| while ((UINTN)RelocBase < (UINTN)RelocBaseEnd) { | |
| Reloc = (UINT16 *)((CHAR8 *)RelocBase + sizeof (EFI_IMAGE_BASE_RELOCATION)); | |
| // | |
| // Add check for RelocBase->SizeOfBlock field. | |
| // | |
| if (RelocBase->SizeOfBlock == 0) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| if ((UINTN)RelocBase > MAX_ADDRESS - RelocBase->SizeOfBlock) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| RelocEnd = (UINT16 *)((CHAR8 *)RelocBase + RelocBase->SizeOfBlock); | |
| if ((UINTN)RelocEnd > (UINTN)RelocBaseOrg + RelocDir->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| FixupBase = PeCoffLoaderImageAddress (ImageContext, RelocBase->VirtualAddress, TeStrippedOffset); | |
| if (FixupBase == NULL) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| // | |
| // Run this relocation record | |
| // | |
| while ((UINTN)Reloc < (UINTN)RelocEnd) { | |
| Fixup = PeCoffLoaderImageAddress (ImageContext, RelocBase->VirtualAddress + (*Reloc & 0xFFF), TeStrippedOffset); | |
| if (Fixup == NULL) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| switch ((*Reloc) >> 12) { | |
| case EFI_IMAGE_REL_BASED_ABSOLUTE: | |
| break; | |
| case EFI_IMAGE_REL_BASED_HIGH: | |
| Fixup16 = (UINT16 *)Fixup; | |
| *Fixup16 = (UINT16)(*Fixup16 + ((UINT16)((UINT32)Adjust >> 16))); | |
| if (FixupData != NULL) { | |
| *(UINT16 *)FixupData = *Fixup16; | |
| FixupData = FixupData + sizeof (UINT16); | |
| } | |
| break; | |
| case EFI_IMAGE_REL_BASED_LOW: | |
| Fixup16 = (UINT16 *)Fixup; | |
| *Fixup16 = (UINT16)(*Fixup16 + (UINT16)Adjust); | |
| if (FixupData != NULL) { | |
| *(UINT16 *)FixupData = *Fixup16; | |
| FixupData = FixupData + sizeof (UINT16); | |
| } | |
| break; | |
| case EFI_IMAGE_REL_BASED_HIGHLOW: | |
| Fixup32 = (UINT32 *)Fixup; | |
| *Fixup32 = *Fixup32 + (UINT32)Adjust; | |
| if (FixupData != NULL) { | |
| FixupData = ALIGN_POINTER (FixupData, sizeof (UINT32)); | |
| *(UINT32 *)FixupData = *Fixup32; | |
| FixupData = FixupData + sizeof (UINT32); | |
| } | |
| break; | |
| case EFI_IMAGE_REL_BASED_DIR64: | |
| Fixup64 = (UINT64 *)Fixup; | |
| *Fixup64 = *Fixup64 + (UINT64)Adjust; | |
| if (FixupData != NULL) { | |
| FixupData = ALIGN_POINTER (FixupData, sizeof (UINT64)); | |
| *(UINT64 *)(FixupData) = *Fixup64; | |
| FixupData = FixupData + sizeof (UINT64); | |
| } | |
| break; | |
| default: | |
| // | |
| // The common code does not handle some of the stranger IPF relocations | |
| // PeCoffLoaderRelocateImageEx () adds support for these complex fixups | |
| // on IPF and is a No-Op on other architectures. | |
| // | |
| Status = PeCoffLoaderRelocateImageEx (Reloc, Fixup, &FixupData, Adjust); | |
| if (RETURN_ERROR (Status)) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return Status; | |
| } | |
| } | |
| // | |
| // Next relocation record | |
| // | |
| Reloc += 1; | |
| } | |
| // | |
| // Next reloc block | |
| // | |
| RelocBase = (EFI_IMAGE_BASE_RELOCATION *)RelocEnd; | |
| } | |
| ASSERT ((UINTN)FixupData <= (UINTN)ImageContext->FixupData + ImageContext->FixupDataSize); | |
| // | |
| // Adjust the EntryPoint to match the linked-to address | |
| // | |
| if (ImageContext->DestinationAddress != 0) { | |
| ImageContext->EntryPoint -= (UINT64)ImageContext->ImageAddress; | |
| ImageContext->EntryPoint += (UINT64)ImageContext->DestinationAddress; | |
| } | |
| } | |
| // Applies additional environment specific actions to relocate fixups | |
| // to a PE/COFF image if needed | |
| PeCoffLoaderRelocateImageExtraAction (ImageContext); | |
| return RETURN_SUCCESS; | |
| } | |
| /** | |
| Loads a PE/COFF image into memory. | |
| Loads the PE/COFF image accessed through the ImageRead service of ImageContext into the buffer | |
| specified by the ImageAddress and ImageSize fields of ImageContext. The caller must allocate | |
| the load buffer and fill in the ImageAddress and ImageSize fields prior to calling this function. | |
| The EntryPoint, FixupDataSize, CodeView, PdbPointer and HiiResourceData fields of ImageContext are computed. | |
| The ImageRead, Handle, PeCoffHeaderOffset, IsTeImage, Machine, ImageType, ImageAddress, ImageSize, | |
| DestinationAddress, RelocationsStripped, SectionAlignment, SizeOfHeaders, and DebugDirectoryEntryRva | |
| fields of the ImageContext structure must be valid prior to invoking this service. | |
| If ImageContext is NULL, then ASSERT(). | |
| Note that if the platform does not maintain coherency between the instruction cache(s) and the data | |
| cache(s) in hardware, then the caller is responsible for performing cache maintenance operations | |
| prior to transferring control to a PE/COFF image that is loaded using this library. | |
| @param ImageContext The pointer to the image context structure that describes the PE/COFF | |
| image that is being loaded. | |
| @retval RETURN_SUCCESS The PE/COFF image was loaded into the buffer specified by | |
| the ImageAddress and ImageSize fields of ImageContext. | |
| Extended status information is in the ImageError field of ImageContext. | |
| @retval RETURN_BUFFER_TOO_SMALL The caller did not provide a large enough buffer. | |
| Extended status information is in the ImageError field of ImageContext. | |
| @retval RETURN_LOAD_ERROR The PE/COFF image is an EFI Runtime image with no relocations. | |
| Extended status information is in the ImageError field of ImageContext. | |
| @retval RETURN_INVALID_PARAMETER The image address is invalid. | |
| Extended status information is in the ImageError field of ImageContext. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| PeCoffLoaderLoadImage ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext | |
| ) | |
| { | |
| RETURN_STATUS Status; | |
| EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; | |
| PE_COFF_LOADER_IMAGE_CONTEXT CheckContext; | |
| EFI_IMAGE_SECTION_HEADER *FirstSection; | |
| EFI_IMAGE_SECTION_HEADER *Section; | |
| UINTN NumberOfSections; | |
| UINTN Index; | |
| CHAR8 *Base; | |
| CHAR8 *End; | |
| EFI_IMAGE_DATA_DIRECTORY *DirectoryEntry; | |
| EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *DebugEntry; | |
| UINTN Size; | |
| UINT32 TempDebugEntryRva; | |
| UINT32 NumberOfRvaAndSizes; | |
| EFI_IMAGE_RESOURCE_DIRECTORY *ResourceDirectory; | |
| EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY *ResourceDirectoryEntry; | |
| EFI_IMAGE_RESOURCE_DIRECTORY_STRING *ResourceDirectoryString; | |
| EFI_IMAGE_RESOURCE_DATA_ENTRY *ResourceDataEntry; | |
| CHAR16 *String; | |
| UINT32 Offset; | |
| UINT32 TeStrippedOffset; | |
| ASSERT (ImageContext != NULL); | |
| // | |
| // Assume success | |
| // | |
| ImageContext->ImageError = IMAGE_ERROR_SUCCESS; | |
| // | |
| // Copy the provided context information into our local version, get what we | |
| // can from the original image, and then use that to make sure everything | |
| // is legit. | |
| // | |
| CopyMem (&CheckContext, ImageContext, sizeof (PE_COFF_LOADER_IMAGE_CONTEXT)); | |
| Status = PeCoffLoaderGetImageInfo (&CheckContext); | |
| if (RETURN_ERROR (Status)) { | |
| return Status; | |
| } | |
| // | |
| // Make sure there is enough allocated space for the image being loaded | |
| // | |
| if (ImageContext->ImageSize < CheckContext.ImageSize) { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_IMAGE_SIZE; | |
| return RETURN_BUFFER_TOO_SMALL; | |
| } | |
| if (ImageContext->ImageAddress == 0) { | |
| // | |
| // Image cannot be loaded into 0 address. | |
| // | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_IMAGE_ADDRESS; | |
| return RETURN_INVALID_PARAMETER; | |
| } | |
| // | |
| // If there's no relocations, then make sure it's not a runtime driver, | |
| // and that it's being loaded at the linked address. | |
| // | |
| if (CheckContext.RelocationsStripped) { | |
| // | |
| // If the image does not contain relocations and it is a runtime driver | |
| // then return an error. | |
| // | |
| if (CheckContext.ImageType == EFI_IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER) { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_SUBSYSTEM; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| // | |
| // If the image does not contain relocations, and the requested load address | |
| // is not the linked address, then return an error. | |
| // | |
| if (CheckContext.ImageAddress != ImageContext->ImageAddress) { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_IMAGE_ADDRESS; | |
| return RETURN_INVALID_PARAMETER; | |
| } | |
| } | |
| // | |
| // Make sure the allocated space has the proper section alignment | |
| // | |
| if (!(ImageContext->IsTeImage)) { | |
| if ((ImageContext->ImageAddress & (CheckContext.SectionAlignment - 1)) != 0) { | |
| ImageContext->ImageError = IMAGE_ERROR_INVALID_SECTION_ALIGNMENT; | |
| return RETURN_INVALID_PARAMETER; | |
| } | |
| } | |
| // | |
| // Read the entire PE/COFF or TE header into memory | |
| // | |
| if (!(ImageContext->IsTeImage)) { | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| 0, | |
| &ImageContext->SizeOfHeaders, | |
| (VOID *)(UINTN)ImageContext->ImageAddress | |
| ); | |
| Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)((UINTN)ImageContext->ImageAddress + ImageContext->PeCoffHeaderOffset); | |
| FirstSection = (EFI_IMAGE_SECTION_HEADER *)( | |
| (UINTN)ImageContext->ImageAddress + | |
| ImageContext->PeCoffHeaderOffset + | |
| sizeof (UINT32) + | |
| sizeof (EFI_IMAGE_FILE_HEADER) + | |
| Hdr.Pe32->FileHeader.SizeOfOptionalHeader | |
| ); | |
| NumberOfSections = (UINTN)(Hdr.Pe32->FileHeader.NumberOfSections); | |
| TeStrippedOffset = 0; | |
| } else { | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| 0, | |
| &ImageContext->SizeOfHeaders, | |
| (void *)(UINTN)ImageContext->ImageAddress | |
| ); | |
| Hdr.Te = (EFI_TE_IMAGE_HEADER *)(UINTN)(ImageContext->ImageAddress); | |
| FirstSection = (EFI_IMAGE_SECTION_HEADER *)( | |
| (UINTN)ImageContext->ImageAddress + | |
| sizeof (EFI_TE_IMAGE_HEADER) | |
| ); | |
| NumberOfSections = (UINTN)(Hdr.Te->NumberOfSections); | |
| TeStrippedOffset = (UINT32)Hdr.Te->StrippedSize - sizeof (EFI_TE_IMAGE_HEADER); | |
| } | |
| if (RETURN_ERROR (Status)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| // | |
| // Load each section of the image | |
| // | |
| Section = FirstSection; | |
| for (Index = 0; Index < NumberOfSections; Index++) { | |
| // | |
| // Read the section | |
| // | |
| Size = (UINTN)Section->Misc.VirtualSize; | |
| if ((Size == 0) || (Size > Section->SizeOfRawData)) { | |
| Size = (UINTN)Section->SizeOfRawData; | |
| } | |
| // | |
| // Compute sections address | |
| // | |
| Base = PeCoffLoaderImageAddress (ImageContext, Section->VirtualAddress, TeStrippedOffset); | |
| End = PeCoffLoaderImageAddress (ImageContext, Section->VirtualAddress + Section->Misc.VirtualSize - 1, TeStrippedOffset); | |
| // | |
| // If the size of the section is non-zero and the base address or end address resolved to 0, then fail. | |
| // | |
| if ((Size > 0) && ((Base == NULL) || (End == NULL))) { | |
| ImageContext->ImageError = IMAGE_ERROR_SECTION_NOT_LOADED; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| if (Section->SizeOfRawData > 0) { | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| Section->PointerToRawData - TeStrippedOffset, | |
| &Size, | |
| Base | |
| ); | |
| if (RETURN_ERROR (Status)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| return Status; | |
| } | |
| } | |
| // | |
| // If raw size is less then virtual size, zero fill the remaining | |
| // | |
| if (Size < Section->Misc.VirtualSize) { | |
| ZeroMem (Base + Size, Section->Misc.VirtualSize - Size); | |
| } | |
| // | |
| // Next Section | |
| // | |
| Section += 1; | |
| } | |
| // | |
| // Get image's entry point | |
| // | |
| if (!(ImageContext->IsTeImage)) { | |
| // | |
| // Sizes of AddressOfEntryPoint are different so we need to do this safely | |
| // | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| ImageContext->EntryPoint = (PHYSICAL_ADDRESS)(UINTN)PeCoffLoaderImageAddress ( | |
| ImageContext, | |
| (UINTN)Hdr.Pe32->OptionalHeader.AddressOfEntryPoint, | |
| 0 | |
| ); | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| ImageContext->EntryPoint = (PHYSICAL_ADDRESS)(UINTN)PeCoffLoaderImageAddress ( | |
| ImageContext, | |
| (UINTN)Hdr.Pe32Plus->OptionalHeader.AddressOfEntryPoint, | |
| 0 | |
| ); | |
| } | |
| } else { | |
| ImageContext->EntryPoint = (PHYSICAL_ADDRESS)(UINTN)PeCoffLoaderImageAddress ( | |
| ImageContext, | |
| (UINTN)Hdr.Te->AddressOfEntryPoint, | |
| TeStrippedOffset | |
| ); | |
| } | |
| // | |
| // Determine the size of the fixup data | |
| // | |
| // Per the PE/COFF spec, you can't assume that a given data directory | |
| // is present in the image. You have to check the NumberOfRvaAndSizes in | |
| // the optional header to verify a desired directory entry is there. | |
| // | |
| if (!(ImageContext->IsTeImage)) { | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; | |
| DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC]; | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes; | |
| DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC]; | |
| } | |
| // | |
| // Must use UINT64 here, because there might a case that 32bit loader to load 64bit image. | |
| // | |
| if (NumberOfRvaAndSizes > EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC) { | |
| ImageContext->FixupDataSize = DirectoryEntry->Size / sizeof (UINT16) * sizeof (UINT64); | |
| } else { | |
| ImageContext->FixupDataSize = 0; | |
| } | |
| } else { | |
| DirectoryEntry = &Hdr.Te->DataDirectory[0]; | |
| ImageContext->FixupDataSize = DirectoryEntry->Size / sizeof (UINT16) * sizeof (UINT64); | |
| } | |
| // | |
| // Consumer must allocate a buffer for the relocation fixup log. | |
| // Only used for runtime drivers. | |
| // | |
| ImageContext->FixupData = NULL; | |
| // | |
| // Load the Codeview information if present | |
| // | |
| if (ImageContext->DebugDirectoryEntryRva != 0) { | |
| DebugEntry = PeCoffLoaderImageAddress ( | |
| ImageContext, | |
| ImageContext->DebugDirectoryEntryRva, | |
| TeStrippedOffset | |
| ); | |
| if (DebugEntry == NULL) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| TempDebugEntryRva = DebugEntry->RVA; | |
| if ((DebugEntry->RVA == 0) && (DebugEntry->FileOffset != 0)) { | |
| Section--; | |
| if ((UINTN)Section->SizeOfRawData < Section->Misc.VirtualSize) { | |
| TempDebugEntryRva = Section->VirtualAddress + Section->Misc.VirtualSize; | |
| } else { | |
| TempDebugEntryRva = Section->VirtualAddress + Section->SizeOfRawData; | |
| } | |
| } | |
| if (TempDebugEntryRva != 0) { | |
| ImageContext->CodeView = PeCoffLoaderImageAddress (ImageContext, TempDebugEntryRva, TeStrippedOffset); | |
| if (ImageContext->CodeView == NULL) { | |
| ImageContext->ImageError = IMAGE_ERROR_FAILED_RELOCATION; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| if (DebugEntry->RVA == 0) { | |
| Size = DebugEntry->SizeOfData; | |
| Status = ImageContext->ImageRead ( | |
| ImageContext->Handle, | |
| DebugEntry->FileOffset - TeStrippedOffset, | |
| &Size, | |
| ImageContext->CodeView | |
| ); | |
| // | |
| // Should we apply fix up to this field according to the size difference between PE and TE? | |
| // Because now we maintain TE header fields unfixed, this field will also remain as they are | |
| // in original PE image. | |
| // | |
| if (RETURN_ERROR (Status)) { | |
| ImageContext->ImageError = IMAGE_ERROR_IMAGE_READ; | |
| return RETURN_LOAD_ERROR; | |
| } | |
| DebugEntry->RVA = TempDebugEntryRva; | |
| } | |
| switch (*(UINT32 *)ImageContext->CodeView) { | |
| case CODEVIEW_SIGNATURE_NB10: | |
| if (DebugEntry->SizeOfData < sizeof (EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY)) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ImageContext->PdbPointer = (CHAR8 *)ImageContext->CodeView + sizeof (EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY); | |
| break; | |
| case CODEVIEW_SIGNATURE_RSDS: | |
| if (DebugEntry->SizeOfData < sizeof (EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY)) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ImageContext->PdbPointer = (CHAR8 *)ImageContext->CodeView + sizeof (EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY); | |
| break; | |
| case CODEVIEW_SIGNATURE_MTOC: | |
| if (DebugEntry->SizeOfData < sizeof (EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY)) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ImageContext->PdbPointer = (CHAR8 *)ImageContext->CodeView + sizeof (EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY); | |
| break; | |
| default: | |
| break; | |
| } | |
| } | |
| } | |
| // | |
| // Get Image's HII resource section | |
| // | |
| ImageContext->HiiResourceData = 0; | |
| if (!(ImageContext->IsTeImage)) { | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; | |
| DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE]; | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes; | |
| DirectoryEntry = (EFI_IMAGE_DATA_DIRECTORY *)&Hdr.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE]; | |
| } | |
| if ((NumberOfRvaAndSizes > EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE) && (DirectoryEntry->Size != 0)) { | |
| Base = PeCoffLoaderImageAddress (ImageContext, DirectoryEntry->VirtualAddress, 0); | |
| if (Base != NULL) { | |
| ResourceDirectory = (EFI_IMAGE_RESOURCE_DIRECTORY *)Base; | |
| Offset = sizeof (EFI_IMAGE_RESOURCE_DIRECTORY) + sizeof (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY) * | |
| (ResourceDirectory->NumberOfNamedEntries + ResourceDirectory->NumberOfIdEntries); | |
| if (Offset > DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectoryEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY *)(ResourceDirectory + 1); | |
| for (Index = 0; Index < ResourceDirectory->NumberOfNamedEntries; Index++) { | |
| if (ResourceDirectoryEntry->u1.s.NameIsString) { | |
| // | |
| // Check the ResourceDirectoryEntry->u1.s.NameOffset before use it. | |
| // | |
| if (ResourceDirectoryEntry->u1.s.NameOffset >= DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectoryString = (EFI_IMAGE_RESOURCE_DIRECTORY_STRING *)(Base + ResourceDirectoryEntry->u1.s.NameOffset); | |
| String = &ResourceDirectoryString->String[0]; | |
| if ((ResourceDirectoryString->Length == 3) && | |
| (String[0] == L'H') && | |
| (String[1] == L'I') && | |
| (String[2] == L'I')) | |
| { | |
| // | |
| // Resource Type "HII" found | |
| // | |
| if (ResourceDirectoryEntry->u2.s.DataIsDirectory) { | |
| // | |
| // Move to next level - resource Name | |
| // | |
| if (ResourceDirectoryEntry->u2.s.OffsetToDirectory >= DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectory = (EFI_IMAGE_RESOURCE_DIRECTORY *)(Base + ResourceDirectoryEntry->u2.s.OffsetToDirectory); | |
| Offset = ResourceDirectoryEntry->u2.s.OffsetToDirectory + sizeof (EFI_IMAGE_RESOURCE_DIRECTORY) + | |
| sizeof (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY) * (ResourceDirectory->NumberOfNamedEntries + ResourceDirectory->NumberOfIdEntries); | |
| if (Offset > DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectoryEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY *)(ResourceDirectory + 1); | |
| if (ResourceDirectoryEntry->u2.s.DataIsDirectory) { | |
| // | |
| // Move to next level - resource Language | |
| // | |
| if (ResourceDirectoryEntry->u2.s.OffsetToDirectory >= DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectory = (EFI_IMAGE_RESOURCE_DIRECTORY *)(Base + ResourceDirectoryEntry->u2.s.OffsetToDirectory); | |
| Offset = ResourceDirectoryEntry->u2.s.OffsetToDirectory + sizeof (EFI_IMAGE_RESOURCE_DIRECTORY) + | |
| sizeof (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY) * (ResourceDirectory->NumberOfNamedEntries + ResourceDirectory->NumberOfIdEntries); | |
| if (Offset > DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDirectoryEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY *)(ResourceDirectory + 1); | |
| } | |
| } | |
| // | |
| // Now it ought to be resource Data | |
| // | |
| if (!ResourceDirectoryEntry->u2.s.DataIsDirectory) { | |
| if (ResourceDirectoryEntry->u2.OffsetToData >= DirectoryEntry->Size) { | |
| ImageContext->ImageError = IMAGE_ERROR_UNSUPPORTED; | |
| return RETURN_UNSUPPORTED; | |
| } | |
| ResourceDataEntry = (EFI_IMAGE_RESOURCE_DATA_ENTRY *)(Base + ResourceDirectoryEntry->u2.OffsetToData); | |
| ImageContext->HiiResourceData = (PHYSICAL_ADDRESS)(UINTN)PeCoffLoaderImageAddress (ImageContext, ResourceDataEntry->OffsetToData, 0); | |
| break; | |
| } | |
| } | |
| } | |
| ResourceDirectoryEntry++; | |
| } | |
| } | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Reapply fixups on a fixed up PE32/PE32+ image to allow virutal calling at EFI | |
| runtime. | |
| This function reapplies relocation fixups to the PE/COFF image specified by ImageBase | |
| and ImageSize so the image will execute correctly when the PE/COFF image is mapped | |
| to the address specified by VirtualImageBase. RelocationData must be identical | |
| to the FiuxupData buffer from the PE_COFF_LOADER_IMAGE_CONTEXT structure | |
| after this PE/COFF image was relocated with PeCoffLoaderRelocateImage(). | |
| Note that if the platform does not maintain coherency between the instruction cache(s) and the data | |
| cache(s) in hardware, then the caller is responsible for performing cache maintenance operations | |
| prior to transferring control to a PE/COFF image that is loaded using this library. | |
| @param ImageBase The base address of a PE/COFF image that has been loaded | |
| and relocated into system memory. | |
| @param VirtImageBase The request virtual address that the PE/COFF image is to | |
| be fixed up for. | |
| @param ImageSize The size, in bytes, of the PE/COFF image. | |
| @param RelocationData A pointer to the relocation data that was collected when the PE/COFF | |
| image was relocated using PeCoffLoaderRelocateImage(). | |
| **/ | |
| VOID | |
| EFIAPI | |
| PeCoffLoaderRelocateImageForRuntime ( | |
| IN PHYSICAL_ADDRESS ImageBase, | |
| IN PHYSICAL_ADDRESS VirtImageBase, | |
| IN UINTN ImageSize, | |
| IN VOID *RelocationData | |
| ) | |
| { | |
| CHAR8 *OldBase; | |
| CHAR8 *NewBase; | |
| EFI_IMAGE_DOS_HEADER *DosHdr; | |
| EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; | |
| UINT32 NumberOfRvaAndSizes; | |
| EFI_IMAGE_DATA_DIRECTORY *DataDirectory; | |
| EFI_IMAGE_DATA_DIRECTORY *RelocDir; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBase; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBaseEnd; | |
| EFI_IMAGE_BASE_RELOCATION *RelocBaseOrig; | |
| UINT16 *Reloc; | |
| UINT16 *RelocEnd; | |
| CHAR8 *Fixup; | |
| CHAR8 *FixupBase; | |
| UINT16 *Fixup16; | |
| UINT32 *Fixup32; | |
| UINT64 *Fixup64; | |
| CHAR8 *FixupData; | |
| UINTN Adjust; | |
| RETURN_STATUS Status; | |
| PE_COFF_LOADER_IMAGE_CONTEXT ImageContext; | |
| if ((RelocationData == NULL) || (ImageBase == 0x0) || (VirtImageBase == 0x0)) { | |
| return; | |
| } | |
| OldBase = (CHAR8 *)((UINTN)ImageBase); | |
| NewBase = (CHAR8 *)((UINTN)VirtImageBase); | |
| Adjust = (UINTN)NewBase - (UINTN)OldBase; | |
| ImageContext.ImageAddress = ImageBase; | |
| ImageContext.ImageSize = ImageSize; | |
| // | |
| // Find the image's relocate dir info | |
| // | |
| DosHdr = (EFI_IMAGE_DOS_HEADER *)OldBase; | |
| if (DosHdr->e_magic == EFI_IMAGE_DOS_SIGNATURE) { | |
| // | |
| // Valid DOS header so get address of PE header | |
| // | |
| Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)(((CHAR8 *)DosHdr) + DosHdr->e_lfanew); | |
| } else { | |
| // | |
| // No Dos header so assume image starts with PE header. | |
| // | |
| Hdr.Pe32 = (EFI_IMAGE_NT_HEADERS32 *)OldBase; | |
| } | |
| if (Hdr.Pe32->Signature != EFI_IMAGE_NT_SIGNATURE) { | |
| // | |
| // Not a valid PE image so Exit | |
| // | |
| return; | |
| } | |
| if (Hdr.Pe32->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { | |
| // | |
| // Use PE32 offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32->OptionalHeader.NumberOfRvaAndSizes; | |
| DataDirectory = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32->OptionalHeader.DataDirectory[0]); | |
| } else { | |
| // | |
| // Use PE32+ offset | |
| // | |
| NumberOfRvaAndSizes = Hdr.Pe32Plus->OptionalHeader.NumberOfRvaAndSizes; | |
| DataDirectory = (EFI_IMAGE_DATA_DIRECTORY *)&(Hdr.Pe32Plus->OptionalHeader.DataDirectory[0]); | |
| } | |
| // | |
| // Find the relocation block | |
| // | |
| // Per the PE/COFF spec, you can't assume that a given data directory | |
| // is present in the image. You have to check the NumberOfRvaAndSizes in | |
| // the optional header to verify a desired directory entry is there. | |
| // | |
| RelocBase = NULL; | |
| RelocBaseEnd = NULL; | |
| if (NumberOfRvaAndSizes > EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC) { | |
| RelocDir = DataDirectory + EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC; | |
| if ((RelocDir != NULL) && (RelocDir->Size > 0)) { | |
| RelocBase = (EFI_IMAGE_BASE_RELOCATION *)PeCoffLoaderImageAddress (&ImageContext, RelocDir->VirtualAddress, 0); | |
| RelocBaseEnd = (EFI_IMAGE_BASE_RELOCATION *)PeCoffLoaderImageAddress ( | |
| &ImageContext, | |
| RelocDir->VirtualAddress + RelocDir->Size - 1, | |
| 0 | |
| ); | |
| } | |
| if ((RelocBase == NULL) || (RelocBaseEnd == NULL) || ((UINTN)RelocBaseEnd < (UINTN)RelocBase)) { | |
| // | |
| // relocation block is not valid, just return | |
| // | |
| return; | |
| } | |
| } else { | |
| // | |
| // Cannot find relocations, cannot continue to relocate the image, ASSERT for this invalid image. | |
| // | |
| ASSERT (FALSE); | |
| return; | |
| } | |
| // | |
| // ASSERT for the invalid image when RelocBase and RelocBaseEnd are both NULL. | |
| // | |
| ASSERT (RelocBase != NULL && RelocBaseEnd != NULL); | |
| if (Adjust != 0) { | |
| // | |
| // Run the whole relocation block. And re-fixup data that has not been | |
| // modified. The FixupData is used to see if the image has been modified | |
| // since it was relocated. This is so data sections that have been updated | |
| // by code will not be fixed up, since that would set them back to | |
| // defaults. | |
| // | |
| FixupData = RelocationData; | |
| RelocBaseOrig = RelocBase; | |
| while ((UINTN)RelocBase < (UINTN)RelocBaseEnd) { | |
| // | |
| // Add check for RelocBase->SizeOfBlock field. | |
| // | |
| if ((RelocBase->SizeOfBlock == 0) || (RelocBase->SizeOfBlock > RelocDir->Size)) { | |
| // | |
| // Data invalid, cannot continue to relocate the image, just return. | |
| // | |
| return; | |
| } | |
| Reloc = (UINT16 *)((UINT8 *)RelocBase + sizeof (EFI_IMAGE_BASE_RELOCATION)); | |
| RelocEnd = (UINT16 *)((UINT8 *)RelocBase + RelocBase->SizeOfBlock); | |
| if ((UINTN)RelocEnd > (UINTN)RelocBaseOrig + RelocDir->Size) { | |
| return; | |
| } | |
| FixupBase = PeCoffLoaderImageAddress (&ImageContext, RelocBase->VirtualAddress, 0); | |
| if (FixupBase == NULL) { | |
| return; | |
| } | |
| // | |
| // Run this relocation record | |
| // | |
| while ((UINTN)Reloc < (UINTN)RelocEnd) { | |
| Fixup = PeCoffLoaderImageAddress (&ImageContext, RelocBase->VirtualAddress + (*Reloc & 0xFFF), 0); | |
| if (Fixup == NULL) { | |
| return; | |
| } | |
| switch ((*Reloc) >> 12) { | |
| case EFI_IMAGE_REL_BASED_ABSOLUTE: | |
| break; | |
| case EFI_IMAGE_REL_BASED_HIGH: | |
| Fixup16 = (UINT16 *)Fixup; | |
| if (*(UINT16 *)FixupData == *Fixup16) { | |
| *Fixup16 = (UINT16)(*Fixup16 + ((UINT16)((UINT32)Adjust >> 16))); | |
| } | |
| FixupData = FixupData + sizeof (UINT16); | |
| break; | |
| case EFI_IMAGE_REL_BASED_LOW: | |
| Fixup16 = (UINT16 *)Fixup; | |
| if (*(UINT16 *)FixupData == *Fixup16) { | |
| *Fixup16 = (UINT16)(*Fixup16 + ((UINT16)Adjust & 0xffff)); | |
| } | |
| FixupData = FixupData + sizeof (UINT16); | |
| break; | |
| case EFI_IMAGE_REL_BASED_HIGHLOW: | |
| Fixup32 = (UINT32 *)Fixup; | |
| FixupData = ALIGN_POINTER (FixupData, sizeof (UINT32)); | |
| if (*(UINT32 *)FixupData == *Fixup32) { | |
| *Fixup32 = *Fixup32 + (UINT32)Adjust; | |
| } | |
| FixupData = FixupData + sizeof (UINT32); | |
| break; | |
| case EFI_IMAGE_REL_BASED_DIR64: | |
| Fixup64 = (UINT64 *)Fixup; | |
| FixupData = ALIGN_POINTER (FixupData, sizeof (UINT64)); | |
| if (*(UINT64 *)FixupData == *Fixup64) { | |
| *Fixup64 = *Fixup64 + (UINT64)Adjust; | |
| } | |
| FixupData = FixupData + sizeof (UINT64); | |
| break; | |
| default: | |
| // | |
| // Only Itanium requires ConvertPeImage_Ex | |
| // | |
| Status = PeHotRelocateImageEx (Reloc, Fixup, &FixupData, Adjust); | |
| if (RETURN_ERROR (Status)) { | |
| return; | |
| } | |
| } | |
| // | |
| // Next relocation record | |
| // | |
| Reloc += 1; | |
| } | |
| // | |
| // next reloc block | |
| // | |
| RelocBase = (EFI_IMAGE_BASE_RELOCATION *)RelocEnd; | |
| } | |
| } | |
| } | |
| /** | |
| Reads contents of a PE/COFF image from a buffer in system memory. | |
| This is the default implementation of a PE_COFF_LOADER_READ_FILE function | |
| that assumes FileHandle pointer to the beginning of a PE/COFF image. | |
| This function reads contents of the PE/COFF image that starts at the system memory | |
| address specified by FileHandle. The read operation copies ReadSize bytes from the | |
| PE/COFF image starting at byte offset FileOffset into the buffer specified by Buffer. | |
| The size of the buffer actually read is returned in ReadSize. | |
| The caller must make sure the FileOffset and ReadSize within the file scope. | |
| If FileHandle is NULL, then ASSERT(). | |
| If ReadSize is NULL, then ASSERT(). | |
| If Buffer is NULL, then ASSERT(). | |
| @param FileHandle The pointer to base of the input stream | |
| @param FileOffset Offset into the PE/COFF image to begin the read operation. | |
| @param ReadSize On input, the size in bytes of the requested read operation. | |
| On output, the number of bytes actually read. | |
| @param Buffer Output buffer that contains the data read from the PE/COFF image. | |
| @retval RETURN_SUCCESS Data is read from FileOffset from the Handle into | |
| the buffer. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| PeCoffLoaderImageReadFromMemory ( | |
| IN VOID *FileHandle, | |
| IN UINTN FileOffset, | |
| IN OUT UINTN *ReadSize, | |
| OUT VOID *Buffer | |
| ) | |
| { | |
| ASSERT (ReadSize != NULL); | |
| ASSERT (FileHandle != NULL); | |
| ASSERT (Buffer != NULL); | |
| CopyMem (Buffer, ((UINT8 *)FileHandle) + FileOffset, *ReadSize); | |
| return RETURN_SUCCESS; | |
| } | |
| /** | |
| Unloads a loaded PE/COFF image from memory and releases its taken resource. | |
| Releases any environment specific resources that were allocated when the image | |
| specified by ImageContext was loaded using PeCoffLoaderLoadImage(). | |
| For NT32 emulator, the PE/COFF image loaded by system needs to release. | |
| For real platform, the PE/COFF image loaded by Core doesn't needs to be unloaded, | |
| this function can simply return RETURN_SUCCESS. | |
| If ImageContext is NULL, then ASSERT(). | |
| @param ImageContext The pointer to the image context structure that describes the PE/COFF | |
| image to be unloaded. | |
| @retval RETURN_SUCCESS The PE/COFF image was unloaded successfully. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| PeCoffLoaderUnloadImage ( | |
| IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext | |
| ) | |
| { | |
| // | |
| // Applies additional environment specific actions to unload a | |
| // PE/COFF image if needed | |
| // | |
| PeCoffLoaderUnloadImageExtraAction (ImageContext); | |
| return RETURN_SUCCESS; | |
| } |