1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
|
/* SPDX-License-Identifier: LGPL-2.1-or-later */
#include "efi-log.h"
#if STACK_PROTECTOR_RANDOM
#include "proto/rng.h"
#include "util.h"
#endif
static unsigned log_count = 0;
bool log_isdebug = false;
void freeze(void) {
for (;;)
BS->Stall(60 * 1000 * 1000);
}
_noreturn_ static void panic(const char16_t *message) {
if (ST->ConOut->Mode->CursorColumn > 0)
ST->ConOut->OutputString(ST->ConOut, (char16_t *) u"\r\n");
ST->ConOut->SetAttribute(ST->ConOut, EFI_TEXT_ATTR(EFI_LIGHTRED, EFI_BLACK));
ST->ConOut->OutputString(ST->ConOut, (char16_t *) message);
freeze();
}
void efi_assert(const char *expr, const char *file, unsigned line, const char *function) {
static bool asserting = false;
/* Let's be paranoid. */
if (asserting)
panic(u"systemd-boot: Nested assertion failure, halting.");
asserting = true;
log_error("systemd-boot: Assertion '%s' failed at %s:%u@%s, halting.", expr, file, line, function);
freeze();
}
EFI_STATUS log_internal(EFI_STATUS status, uint8_t text_color, const char *format, ...) {
assert(format);
int32_t attr = ST->ConOut->Mode->Attribute;
if (ST->ConOut->Mode->CursorColumn > 0)
ST->ConOut->OutputString(ST->ConOut, (char16_t *) u"\r\n");
ST->ConOut->SetAttribute(ST->ConOut, EFI_TEXT_ATTR(text_color, EFI_BLACK));
va_list ap;
va_start(ap, format);
vprintf_status(status, format, ap);
va_end(ap);
ST->ConOut->OutputString(ST->ConOut, (char16_t *) u"\r\n");
ST->ConOut->SetAttribute(ST->ConOut, attr);
log_count++;
return status;
}
void log_wait(void) {
if (log_count == 0)
return;
BS->Stall(MIN(4u, log_count) * 2500 * 1000);
log_count = 0;
}
_used_ intptr_t __stack_chk_guard = (intptr_t) 0x70f6967de78acae3;
/* We can only set a random stack canary if this function attribute is available,
* otherwise this may create a stack check fail. */
#if STACK_PROTECTOR_RANDOM
void __stack_chk_guard_init(void) {
EFI_RNG_PROTOCOL *rng;
if (BS->LocateProtocol(MAKE_GUID_PTR(EFI_RNG_PROTOCOL), NULL, (void **) &rng) == EFI_SUCCESS)
(void) rng->GetRNG(rng, NULL, sizeof(__stack_chk_guard), (void *) &__stack_chk_guard);
else
/* Better than no extra entropy. */
__stack_chk_guard ^= (intptr_t) __executable_start;
}
#endif
_used_ _noreturn_ void __stack_chk_fail(void);
_used_ _noreturn_ void __stack_chk_fail_local(void);
void __stack_chk_fail(void) {
panic(u"systemd-boot: Stack check failed, halting.");
}
void __stack_chk_fail_local(void) {
__stack_chk_fail();
}
/* Called by libgcc for some fatal errors like integer overflow with -ftrapv. */
_used_ _noreturn_ void abort(void);
void abort(void) {
panic(u"systemd-boot: Unknown error, halting.");
}
#if defined(__ARM_EABI__)
/* These override the (weak) div0 handlers from libgcc as they would otherwise call raise() instead. */
_used_ _noreturn_ int __aeabi_idiv0(int return_value);
_used_ _noreturn_ long long __aeabi_ldiv0(long long return_value);
int __aeabi_idiv0(int return_value) {
panic(u"systemd-boot: Division by zero, halting.");
}
long long __aeabi_ldiv0(long long return_value) {
panic(u"systemd-boot: Division by zero, halting.");
}
#endif
|