From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025772287916.6303192222355; Fri, 6 Apr 2018 07:42:52 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 1EAF72268524A; Fri, 6 Apr 2018 07:42:51 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id B45C920957465 for ; Fri, 6 Apr 2018 07:42:49 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6CA9B1529; Fri, 6 Apr 2018 07:42:49 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E9E913F587; Fri, 6 Apr 2018 07:42:47 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:06 +0100 Message-Id: <20180406144223.10931-2-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 01/18] ArmPkg: Add PCDs needed for MM communication driver. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch defines PCDs to describe the base address and size of communication buffer between normal world (uefi) and standalone MM environment in the secure world. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh Acked-by: Achin Gupta --- ArmPkg/ArmPkg.dec | 3 +++ 1 file changed, 3 insertions(+) diff --git a/ArmPkg/ArmPkg.dec b/ArmPkg/ArmPkg.dec index a55b6268ff..b64942220b 100644 --- a/ArmPkg/ArmPkg.dec +++ b/ArmPkg/ArmPkg.dec @@ -223,6 +223,9 @@ gArmTokenSpaceGuid.PcdSystemMemoryBase|0|UINT64|0x00000029 gArmTokenSpaceGuid.PcdSystemMemorySize|0|UINT64|0x0000002A =20 + gArmTokenSpaceGuid.PcdMmBufferBase|0|UINT64|0x00000045 + gArmTokenSpaceGuid.PcdMmBufferSize|0|UINT64|0x00000046 + [PcdsFixedAtBuild.common, PcdsDynamic.common] # # ARM Architectural Timer --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025777297310.0443060268483; Fri, 6 Apr 2018 07:42:57 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 4C53322685250; Fri, 6 Apr 2018 07:42:56 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 75D6720957465 for ; Fri, 6 Apr 2018 07:42:54 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 551ED1529; Fri, 6 Apr 2018 07:42:54 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AF0303F587; Fri, 6 Apr 2018 07:42:52 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:07 +0100 Message-Id: <20180406144223.10931-3-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 02/18] ArmPkg/Drivers: Add EFI_MM_COMMUNICATION_PROTOCOL DXE driver. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" PI v1.5 Specification Volume 4 defines Management Mode Core Interface and defines EFI_MM_COMMUNICATION_PROTOCOL. This protocol provides a means of communicating between drivers outside of MM and MMI handlers inside of MM. This patch implements the EFI_MM_COMMUNICATION_PROTOCOL DXE runtime driver for AARCH64 platforms. It uses SMCs allocated from the standard SMC range defined in DEN0060A_ARM_MM_Interface_Specification.pdf to communicate with the standalone MM environment in the secure world. This patch also adds the MM Communication driver (.inf) file to define entry point for this driver and other compile related information the driver needs. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- .../Drivers/MmCommunicationDxe/MmCommunication.c | 339 +++++++++++++++++= ++++ .../Drivers/MmCommunicationDxe/MmCommunication.inf | 50 +++ 2 files changed, 389 insertions(+) create mode 100644 ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c create mode 100644 ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf diff --git a/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c b/ArmPkg/D= rivers/MmCommunicationDxe/MmCommunication.c new file mode 100644 index 0000000000..e801c1c601 --- /dev/null +++ b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c @@ -0,0 +1,339 @@ +/** @file + + Copyright (c) 2016-2017, ARM Limited. All rights reserved. + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +#include + +// +// Address, Length of the pre-allocated buffer for communication with the = secure +// world. +// +STATIC ARM_MEMORY_REGION_DESCRIPTOR mNsCommBuffMemRegion; + +// Notification event when virtual address map is set. +STATIC EFI_EVENT mSetVirtualAddressMapEvent; + +// +// Handle to install the MM Communication Protocol +// +STATIC EFI_HANDLE mMmCommunicateHandle; + +/** + Communicates with a registered handler. + + This function provides an interface to send and receive messages to the + Standalone MM environment on behalf of UEFI services. This function is = part + of the MM Communication Protocol that may be called in physical mode pri= or to + SetVirtualAddressMap() and in virtual mode after SetVirtualAddressMap(). + + @param[in] This The EFI_MM_COMMUNICATION_PROTOCOL + instance. + @param[in, out] CommBuffer A pointer to the buffer to convey + into MMRAM. + @param[in, out] CommSize The size of the data buffer being + passed in. This is optional. + + @retval EFI_SUCCESS The message was successfully posted. + @retval EFI_INVALID_PARAMETER The CommBuffer was NULL. + @retval EFI_BAD_BUFFER_SIZE The buffer size is incorrect for the= MM + implementation. If this error is + returned, the MessageLength field in + the CommBuffer header or the integer + pointed by CommSize are updated to r= eflect + the maximum payload size the + implementation can accommodate. + @retval EFI_ACCESS_DENIED The CommunicateBuffer parameter + or CommSize parameter, if not omitte= d, + are in address range that cannot be + accessed by the MM environment +**/ +STATIC +EFI_STATUS +EFIAPI +MmCommunicationCommunicate ( + IN CONST EFI_MM_COMMUNICATION_PROTOCOL *This, + IN OUT VOID *CommBuffer, + IN OUT UINTN *CommSize OPTIONAL + ) +{ + EFI_MM_COMMUNICATE_HEADER *CommunicateHeader; + ARM_SMC_ARGS CommunicateSmcArgs; + EFI_STATUS Status; + UINTN BufferSize; + + CommunicateHeader =3D CommBuffer; + Status =3D EFI_ACCESS_DENIED; + BufferSize =3D 0; + + ZeroMem (&CommunicateSmcArgs, sizeof (ARM_SMC_ARGS)); + + // + // Check parameters + // + if (CommBuffer =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // If the length of the CommBuffer is 0 then return the expected length. + if (CommSize) { + if (*CommSize =3D=3D 0) { + *CommSize =3D mNsCommBuffMemRegion.Length; + return EFI_BAD_BUFFER_SIZE; + } + // + // CommSize must hold HeaderGuid and MessageLength + // + if (*CommSize < sizeof (EFI_MM_COMMUNICATE_HEADER)) { + return EFI_INVALID_PARAMETER; + } + BufferSize =3D *CommSize; + } else { + BufferSize =3D CommunicateHeader->MessageLength + + sizeof (CommunicateHeader->HeaderGuid) + + sizeof (CommunicateHeader->MessageLength); + } + + // + // If the buffer size is 0 or greater than what can be tolerated by the = MM + // environment then return the expected size. + // + if ((BufferSize =3D=3D 0) || + (BufferSize > mNsCommBuffMemRegion.Length)) { + CommunicateHeader->MessageLength =3D mNsCommBuffMemRegion.Length - + sizeof (CommunicateHeader->HeaderGu= id) - + sizeof (CommunicateHeader->MessageL= ength); + return EFI_BAD_BUFFER_SIZE; + } + + // SMC Function ID + CommunicateSmcArgs.Arg0 =3D ARM_SMC_ID_MM_COMMUNICATE_AARCH64; + + // Reserved for Future. Must be Zero. + CommunicateSmcArgs.Arg1 =3D 0; + + if (mNsCommBuffMemRegion.VirtualBase) { + CopyMem ((VOID *)mNsCommBuffMemRegion.VirtualBase, CommBuffer, BufferS= ize); + } else { + return EFI_ACCESS_DENIED; + } + + // For the SMC64 version, this parameter is a 64-bit Physical Address (P= A) + // or Intermediate Physical Address (IPA). + // For the SMC32 version, this parameter is a 32-bit PA or IPA. + CommunicateSmcArgs.Arg2 =3D (UINTN)mNsCommBuffMemRegion.PhysicalBase; + + // comm_size_address is a PA or an IPA that holds the size of the + // communication buffer being passed in. This parameter is optional + // and can be omitted by passing a zero. + // ARM does not recommend using it since this might require the + // implementation to create a separate memory mapping for the parameter. + // ARM recommends storing the buffer size in the buffer itself. + CommunicateSmcArgs.Arg3 =3D 0; + + // Call the Standalone MM environment. + ArmCallSmc (&CommunicateSmcArgs); + + switch (CommunicateSmcArgs.Arg0) { + case ARM_SMC_MM_RET_SUCCESS: + // On exit, the size of data being returned is inferred from + // CommSize or MessageLength + Header. + CopyMem (CommBuffer, + (const VOID *)mNsCommBuffMemRegion.VirtualBase, + BufferSize); + Status =3D EFI_SUCCESS; + break; + + case ARM_SMC_MM_RET_NOT_SUPPORTED: + case ARM_SMC_MM_RET_INVALID_PARAMS: + Status =3D EFI_INVALID_PARAMETER; + break; + + case ARM_SMC_MM_RET_DENIED: + Status =3D EFI_ACCESS_DENIED; + break; + + case ARM_SMC_MM_RET_NO_MEMORY: + // Unexpected error since the CommSize was checked for zero length + // prior to issuing the SMC + default: + Status =3D EFI_ACCESS_DENIED; + ASSERT (0); + } + + return Status; +} + +// +// MM Communication Protocol instance +// +EFI_MM_COMMUNICATION_PROTOCOL mMmCommunication =3D { + MmCommunicationCommunicate +}; + +/** + Notification callback on SetVirtualAddressMap event. + + This function notifies the MM communication protocol interface on + SetVirtualAddressMap event and converts pointers used in this driver + from physical to virtual address. + + @param Event SetVirtualAddressMap event. + @param Context A context when the SetVirtualAddressMap triggered. + + @retval EFI_SUCCESS The function executed successfully. + @retval Other Some error occurred when executing this function. + +**/ +STATIC +VOID +EFIAPI +NotifySetVirtualAddressMap ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + EFI_STATUS Status; + + Status =3D gRT->ConvertPointer (EFI_OPTIONAL_PTR, + (VOID **)&mNsCommBuffMemRegion.VirtualBase + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "NotifySetVirtualAddressMap():" + " Unable to convert MM runtime pointer. Status:0x%r\n", Status= )); + } + +} + +/** + The Entry Point for MM Communication + + This function installs the MM communication protocol interface and finds= out + what type of buffer management will be required prior to invoking the + communication SMC. + + @param ImageHandle The firmware allocated handle for the EFI image. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The entry point is executed successfully. + @retval Other Some error occurred when executing this entry poi= nt. + +**/ +EFI_STATUS +EFIAPI +MmCommunicationInitialize ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + + mNsCommBuffMemRegion.PhysicalBase =3D PcdGet64 (PcdMmBufferBase); + // During boot , Virtual and Physical are same + mNsCommBuffMemRegion.VirtualBase =3D mNsCommBuffMemRegion.PhysicalBase; + mNsCommBuffMemRegion.Length =3D PcdGet64 (PcdMmBufferSize); + + if (mNsCommBuffMemRegion.PhysicalBase =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " + "Invalid MM Buffer Base Address.\n")); + goto ReturnErrorStatus; + } + + if (mNsCommBuffMemRegion.Length =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " + "Maximum Buffer Size is zero.\n")); + goto ReturnErrorStatus; + } + + Status =3D gDS->AddMemorySpace (EfiGcdMemoryTypeSystemMemory, + mNsCommBuffMemRegion.PhysicalBase, + mNsCommBuffMemRegion.Length, + EFI_MEMORY_WB | + EFI_MEMORY_XP | + EFI_MEMORY_RUNTIME); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " + "Failed to add MM-NS Buffer Memory Space\n")); + goto ReturnErrorStatus; + } + + Status =3D gDS->SetMemorySpaceAttributes(mNsCommBuffMemRegion.PhysicalBa= se, + mNsCommBuffMemRegion.Length, + EFI_MEMORY_WB | EFI_MEMORY_XP); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " + "Failed to set MM-NS Buffer Memory attributes\n")); + goto CleanAddedMemorySpace; + } + + Status =3D gBS->AllocatePages (AllocateAddress, + EfiRuntimeServicesData, + EFI_SIZE_TO_PAGES (mNsCommBuffMemRegion.Len= gth), + &mNsCommBuffMemRegion.PhysicalBase); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " + "Failed to allocate MM-NS Buffer Memory Space\n")); + goto CleanAddedMemorySpace; + } + + // Install the communication protocol + Status =3D gBS->InstallProtocolInterface (&mMmCommunicateHandle, + &gEfiMmCommunicationProtocolGuid, + EFI_NATIVE_INTERFACE, + &mMmCommunication); + if (EFI_ERROR(Status)) { + DEBUG ((DEBUG_ERROR, "MmCommunicationInitialize: " + "Failed to install MM communication protocol\n")); + goto CleanAllocatedPages; + } + + // Register notification callback when virtual address is associated + // with the physical address. + // Create a Set Virtual Address Map event. + // + Status =3D gBS->CreateEvent (EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE, // Type + TPL_NOTIFY, // Notify= Tpl + NotifySetVirtualAddressMap, // Notify= Function + NULL, // Notify= Context + &mSetVirtualAddressMapEvent // Event + ); + if (Status =3D=3D EFI_SUCCESS) { + return Status; + } + + gBS->UninstallProtocolInterface(mMmCommunicateHandle, + &gEfiMmCommunicationProtocolGuid, + &mMmCommunication); + +CleanAllocatedPages: + gBS->FreePages (mNsCommBuffMemRegion.PhysicalBase, + EFI_SIZE_TO_PAGES (mNsCommBuffMemRegion.Length)); + +CleanAddedMemorySpace: + gDS->RemoveMemorySpace (mNsCommBuffMemRegion.PhysicalBase, + mNsCommBuffMemRegion.Length); + +ReturnErrorStatus: + return EFI_INVALID_PARAMETER; +} diff --git a/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf b/ArmPkg= /Drivers/MmCommunicationDxe/MmCommunication.inf new file mode 100644 index 0000000000..344d55f333 --- /dev/null +++ b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf @@ -0,0 +1,50 @@ +#/** @file +# +# DXE MM Communicate driver +# +# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +#**/ + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D ArmMmCommunication + FILE_GUID =3D 09EE81D3-F15E-43F4-85B4-CB9873DA5D6B + MODULE_TYPE =3D DXE_RUNTIME_DRIVER + VERSION_STRING =3D 1.0 + + ENTRY_POINT =3D MmCommunicationInitialize + +[Sources.Common] + MmCommunication.c + +[Packages] + ArmPkg/ArmPkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses] + ArmLib + ArmSmcLib + BaseMemoryLib + DebugLib + DxeServicesTableLib + HobLib + UefiDriverEntryPoint + +[Protocols] + gEfiMmCommunicationProtocolGuid ## PRODUCES + +[Pcd.common] + gArmTokenSpaceGuid.PcdMmBufferBase + gArmTokenSpaceGuid.PcdMmBufferSize + +[Depex] + AFTER gArmGicDxeFileGuid --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025781527504.6801679634119; Fri, 6 Apr 2018 07:43:01 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 78CFE2268523B; Fri, 6 Apr 2018 07:43:00 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 6592220957465 for ; Fri, 6 Apr 2018 07:42:58 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 12D251529; Fri, 6 Apr 2018 07:42:58 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 904723F587; Fri, 6 Apr 2018 07:42:56 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:08 +0100 Message-Id: <20180406144223.10931-4-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 03/18] ArmPkg/Include: Add MM interface SVC return codes. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch adds the Management Mode(MM) SVC return codes as specified in http://infocenter.arm.com/help/topic/com.arm.doc.den0060a/DEN0060A_ARM_MM_I= nterface_Specification.pdf. Also, corrects SVC ID for retrieving SPM version information. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- ArmPkg/Include/IndustryStandard/ArmMmSvc.h | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/ArmPkg/Include/IndustryStandard/ArmMmSvc.h b/ArmPkg/Include/In= dustryStandard/ArmMmSvc.h index 4c7b6c3386..a64b9ec23c 100644 --- a/ArmPkg/Include/IndustryStandard/ArmMmSvc.h +++ b/ArmPkg/Include/IndustryStandard/ArmMmSvc.h @@ -20,7 +20,7 @@ * delegated events and request the Secure partition manager to perform * privileged operations on its behalf. */ -#define ARM_SVC_ID_SPM_VERSION_AARCH64 0xC4000060 +#define ARM_SVC_ID_SPM_VERSION_AARCH32 0x84000060 #define ARM_SVC_ID_SP_EVENT_COMPLETE_AARCH64 0xC4000061 #define ARM_SVC_ID_SP_GET_MEM_ATTRIBUTES_AARCH64 0xC4000064 #define ARM_SVC_ID_SP_SET_MEM_ATTRIBUTES_AARCH64 0xC4000065 @@ -40,4 +40,11 @@ ((((c_perm) & SET_MEM_ATTR_CODE_PERM_MASK) << SET_MEM_ATTR_CODE_PERM_S= HIFT) | \ (( (d_perm) & SET_MEM_ATTR_DATA_PERM_MASK) << SET_MEM_ATTR_DATA_PERM_S= HIFT)) =20 +/* MM SVC Return error codes */ +#define ARM_SVC_SPM_RET_SUCCESS 0 +#define ARM_SVC_SPM_RET_NOT_SUPPORTED -1 +#define ARM_SVC_SPM_RET_INVALID_PARAMS -2 +#define ARM_SVC_SPM_RET_DENIED -3 +#define ARM_SVC_SPM_RET_NO_MEMORY -5 + #endif --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025783791314.5112471077016; Fri, 6 Apr 2018 07:43:03 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id A148922685258; Fri, 6 Apr 2018 07:43:02 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id CB85B22685255 for ; Fri, 6 Apr 2018 07:43:01 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A947B1529; Fri, 6 Apr 2018 07:43:01 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 323033F587; Fri, 6 Apr 2018 07:43:00 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:09 +0100 Message-Id: <20180406144223.10931-5-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 04/18] ArmPkg/ArmMmuLib: Add MMU Library suitable for use in S-EL0. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The Standalone MM environment runs in S-EL0 in AArch64 on ARM Standard Platforms. Privileged firmware e.g. ARM Trusted Firmware sets up its architectural context including the initial translation tables for the S-EL1/EL0 translation regime. The MM environment could still request ARM TF to change the memory attributes of memory regions during initialization. This patch adds a simple MMU library suitable for execution in S-EL0 and requesting operations from higher exception levels. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuSecLib.c | 146 ++++++++++++++++++++= ++++ 1 file changed, 146 insertions(+) create mode 100644 ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuSecLib.c diff --git a/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuSecLib.c b/ArmPkg/Libra= ry/ArmMmuLib/AArch64/ArmMmuSecLib.c new file mode 100644 index 0000000000..56969e31d1 --- /dev/null +++ b/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuSecLib.c @@ -0,0 +1,146 @@ +/** @file +* File managing the MMU for ARMv8 architecture in S-EL0 +* +* Copyright (c) 2017, ARM Limited. All rights reserved. +* +* This program and the accompanying materials +* are licensed and made available under the terms and conditions of the B= SD License +* which accompanies this distribution. The full text of the license may = be found at +* http://opensource.org/licenses/bsd-license.php +* +* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +* +**/ + +#include +#include +#include + +#include +#include +#include +#include +#include + +EFI_STATUS +RequestMemoryPermissionChange( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length, + IN UINTN Permissions + ) +{ + EFI_STATUS Status; + ARM_SVC_ARGS ChangeMemoryPermissionsSvcArgs =3D {0}; + + ChangeMemoryPermissionsSvcArgs.Arg0 =3D ARM_SVC_ID_SP_SET_MEM_ATTRIBUTES= _AARCH64; + ChangeMemoryPermissionsSvcArgs.Arg1 =3D BaseAddress; + ChangeMemoryPermissionsSvcArgs.Arg2 =3D (Length >=3D EFI_PAGE_SIZE) ? \ + Length >> EFI_PAGE_SHIFT : 1; + ChangeMemoryPermissionsSvcArgs.Arg3 =3D Permissions; + + ArmCallSvc(&ChangeMemoryPermissionsSvcArgs); + + Status =3D ChangeMemoryPermissionsSvcArgs.Arg0; + + switch (Status) { + case ARM_SVC_SPM_RET_SUCCESS: + Status =3D EFI_SUCCESS; + break; + + case ARM_SVC_SPM_RET_NOT_SUPPORTED: + Status =3D EFI_UNSUPPORTED; + break; + + case ARM_SVC_SPM_RET_INVALID_PARAMS: + Status =3D EFI_INVALID_PARAMETER; + break; + + case ARM_SVC_SPM_RET_DENIED: + Status =3D EFI_ACCESS_DENIED; + break; + + case ARM_SVC_SPM_RET_NO_MEMORY: + Status =3D EFI_BAD_BUFFER_SIZE; + break; + + default: + Status =3D EFI_ACCESS_DENIED; + ASSERT (0); + } + + return Status; +} + +EFI_STATUS +ArmSetMemoryRegionNoExec ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + return RequestMemoryPermissionChange(BaseAddress, + Length, + SET_MEM_ATTR_MAKE_PERM_REQUEST( \ + SET_MEM_ATTR_DATA_PERM_RO, \ + SET_MEM_ATTR_CODE_PERM_XN)); +} + +EFI_STATUS +ArmClearMemoryRegionNoExec ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + return RequestMemoryPermissionChange(BaseAddress, + Length, + SET_MEM_ATTR_MAKE_PERM_REQUEST( \ + SET_MEM_ATTR_DATA_PERM_RO, \ + SET_MEM_ATTR_CODE_PERM_X)); +} + +EFI_STATUS +ArmSetMemoryRegionReadOnly ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + return RequestMemoryPermissionChange(BaseAddress, + Length, + SET_MEM_ATTR_MAKE_PERM_REQUEST( \ + SET_MEM_ATTR_DATA_PERM_RO, \ + SET_MEM_ATTR_CODE_PERM_XN)); +} + +EFI_STATUS +ArmClearMemoryRegionReadOnly ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + return RequestMemoryPermissionChange(BaseAddress, + Length, + SET_MEM_ATTR_MAKE_PERM_REQUEST( \ + SET_MEM_ATTR_DATA_PERM_RW, \ + SET_MEM_ATTR_CODE_PERM_XN)); +} + +EFI_STATUS +EFIAPI +ArmConfigureMmu ( + IN ARM_MEMORY_REGION_DESCRIPTOR *MemoryTable, + OUT VOID **TranslationTableBase OPTIONAL, + OUT UINTN *TranslationTableSize OPTIONAL + ) +{ + return EFI_UNSUPPORTED; +} + +EFI_STATUS +EFIAPI +ArmMmuSecLibConstructor ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ) +{ + return EFI_SUCCESS; +} --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025787878398.42310344485907; Fri, 6 Apr 2018 07:43:07 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id C53E322685257; Fri, 6 Apr 2018 07:43:06 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 92E9D2268522D for ; Fri, 6 Apr 2018 07:43:05 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 743B81529; Fri, 6 Apr 2018 07:43:05 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F18963F587; Fri, 6 Apr 2018 07:43:03 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:10 +0100 Message-Id: <20180406144223.10931-6-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 05/18] ArmPkg/ArmMmuLib: Add MMU library inf file suitable for use in S-EL0. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch adds the definitions, sources, packages and library classes needed to compile and link MMU Library suitable for use in S-EL0. Currently, this is used only during the Standalone MM Core initialization and hence defined as MM_CORE_STANDALONE Module. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh Acked-by: Achin Gupta --- ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf | 37 +++++++++++++++++++++++++++= ++++ 1 file changed, 37 insertions(+) create mode 100644 ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf diff --git a/ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf b/ArmPkg/Library/Arm= MmuLib/ArmMmuSecLib.inf new file mode 100644 index 0000000000..5c802923da --- /dev/null +++ b/ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf @@ -0,0 +1,37 @@ +#/** @file +# +# Copyright (c) 2017, ARM Limited. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +# +#**/ + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D ArmMmuSecLib + FILE_GUID =3D da8f0232-fb14-42f0-922c-63104d2c70bd + MODULE_TYPE =3D MM_CORE_STANDALONE + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D ArmMmuSecLib|MM_CORE_STANDALONE + PI_SPECIFICATION_VERSION =3D 0x00010032 + CONSTRUCTOR =3D ArmMmuSecLibConstructor + +[Sources.AARCH64] + AArch64/ArmMmuSecLib.c + +[Packages] + ArmPkg/ArmPkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses] + ArmLib + CacheMaintenanceLib + MemoryAllocationLib + + --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025792190208.34992830346482; Fri, 6 Apr 2018 07:43:12 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id ECA412268525F; Fri, 6 Apr 2018 07:43:10 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id BC11622685255 for ; Fri, 6 Apr 2018 07:43:09 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9CA521529; Fri, 6 Apr 2018 07:43:09 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D26103F587; Fri, 6 Apr 2018 07:43:07 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:11 +0100 Message-Id: <20180406144223.10931-7-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 06/18] StandaloneMmPkg: Add an AArch64 specific entry point library. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The Standalone MM environment runs in S-EL0 in AArch64 on ARM Standard Platforms and is initialised during the SEC phase. ARM Trusted firmware in EL3 is responsible for initialising the architectural context for S-EL0 and loading the Standalone MM image. The memory allocated to this image is marked as RO+X. Heap memory is marked as RW+XN. Certain actions have to be completed prior to executing the generic code in the Standalone MM Core module. These are: 1. Memory permission attributes for each section of the Standalone MM Core module need to be changed prior to accessing any RW data. 2. A Hob list has to be created with information that allows the MM environment to initialise and dispatch drivers. Furthermore, this module is responsible for handing over runtime MM events to the Standalone MM CPU driver and returning control to ARM Trusted Firmware upon event completion. Hence it needs to know the CPU driver entry point. This patch implements an entry point module that ARM Trusted Firmware jumps to in S-EL0. It then performs the above actions before calling the Standalone MM Foundation entry point and handling subsequent MM events. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- .../Library/Arm/StandaloneMmCoreEntryPoint.h | 232 +++++++++++++++++ .../Include/Library/MmCoreStandaloneEntryPoint.h | 101 ++++++++ .../StandaloneMmCoreEntryPoint/Arm/CreateHobList.c | 200 +++++++++++++++ .../Arm/SetPermissions.c | 278 +++++++++++++++++= ++++ .../Arm/StandaloneMmCoreEntryPoint.c | 264 +++++++++++++++++= ++ .../StandaloneMmCoreEntryPoint.inf | 53 ++++ StandaloneMmPkg =3D> StandaloneMmPkg~HEAD | 0 7 files changed, 1128 insertions(+) create mode 100644 StandaloneMmPkg/Include/Library/Arm/StandaloneMmCoreEnt= ryPoint.h create mode 100644 StandaloneMmPkg/Include/Library/MmCoreStandaloneEntryPo= int.h create mode 100644 StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/= CreateHobList.c create mode 100644 StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/= SetPermissions.c create mode 100644 StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/= StandaloneMmCoreEntryPoint.c create mode 100644 StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Stan= daloneMmCoreEntryPoint.inf rename StandaloneMmPkg =3D> StandaloneMmPkg~HEAD (100%) diff --git a/StandaloneMmPkg/Include/Library/Arm/StandaloneMmCoreEntryPoint= .h b/StandaloneMmPkg/Include/Library/Arm/StandaloneMmCoreEntryPoint.h new file mode 100644 index 0000000000..029c6c476c --- /dev/null +++ b/StandaloneMmPkg/Include/Library/Arm/StandaloneMmCoreEntryPoint.h @@ -0,0 +1,232 @@ +/** @file + Entry point to the Standalone MM Foundation when initialised during the = SEC + phase on ARM platforms + +Copyright (c) 2017, ARM Ltd. All rights reserved.
+This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MODULE_ENTRY_POINT_H__ +#define __MODULE_ENTRY_POINT_H__ + +#include +#include + +#define CPU_INFO_FLAG_PRIMARY_CPU 0x00000001 + +typedef +EFI_STATUS +(*PI_MM_CPU_TP_FW_ENTRYPOINT) ( + IN UINTN EventId, + IN UINTN CpuNumber, + IN UINTN NsCommBufferAddr + ); + +typedef struct { + UINT8 Type; /* type of the structure */ + UINT8 Version; /* version of this structure */ + UINT16 Size; /* size of this structure in bytes */ + UINT32 Attr; /* attributes: unused bits SBZ */ +} EFI_PARAM_HEADER; + +typedef struct { + UINT64 Mpidr; + UINT32 LinearId; + UINT32 Flags; +} EFI_SECURE_PARTITION_CPU_INFO; + +typedef struct { + EFI_PARAM_HEADER Header; + UINT64 SpMemBase; + UINT64 SpMemLimit; + UINT64 SpImageBase; + UINT64 SpStackBase; + UINT64 SpHeapBase; + UINT64 SpNsCommBufBase; + UINT64 SpSharedBufBase; + UINT64 SpImageSize; + UINT64 SpPcpuStackSize; + UINT64 SpHeapSize; + UINT64 SpNsCommBufSize; + UINT64 SpPcpuSharedBufSize; + UINT32 NumSpMemRegions; + UINT32 NumCpus; + EFI_SECURE_PARTITION_CPU_INFO *CpuInfo; +} EFI_SECURE_PARTITION_BOOT_INFO; + +typedef struct { + EFI_PARAM_HEADER h; + UINT64 SpStackBase; + UINT64 SpSharedBufBase; + UINT32 SpPcpuStackSize; + UINT32 SpPcpuSharedBufSize; + EFI_SECURE_PARTITION_CPU_INFO CpuInfo; +} EFI_SECURE_PARTITION_WARM_BOOT_INFO; + + +typedef +EFI_STATUS +(*PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT) ( + IN UINTN EventId, + IN UINTN CpuNumber, + IN UINTN NsCommBufferAddr + ); + +typedef struct { + PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT *ArmTfCpuDriverEpPtr; +} ARM_TF_CPU_DRIVER_EP_DESCRIPTOR; + +typedef RETURN_STATUS (*REGION_PERMISSION_UPDATE_FUNC) ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ); + +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function sets the correct permissions = of + sections in the Standalone MM Core module to be able to access RO and RW= data + and make further progress in the boot process. + + @param ImageContext Pointer to PE/COFF image context + @param SectionHeaderOffset Offset of PE/COFF image section header + @param NumberOfSections Number of Sections + @param TextUpdater Function to change code permissions + @param ReadOnlyUpdater Function to change RO permissions + @param ReadWriteUpdater Function to change RW permissions + +**/ +EFI_STATUS +EFIAPI +UpdateMmFoundationPeCoffPermissions ( + IN CONST PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN UINT32 SectionHeaderOffset, + IN CONST UINTN NumberOfSections, + IN REGION_PERMISSION_UPDATE_FUNC TextUpdater, + IN REGION_PERMISSION_UPDATE_FUNC ReadOnlyUpdater, + IN REGION_PERMISSION_UPDATE_FUNC ReadWriteUpdater + ); + + +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function locates the section informati= on of + the Standalone MM Core module to be able to change permissions of the + individual sections later in the boot process. + + @param TeData Pointer to PE/COFF image data + @param ImageContext Pointer to PE/COFF image context + @param SectionHeaderOffset Offset of PE/COFF image section header + @param NumberOfSections Number of Sections + +**/ +EFI_STATUS +EFIAPI +GetStandaloneMmCorePeCoffSections ( + IN VOID *TeData, + IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN OUT UINT32 *SectionHeaderOffset; + IN OUT UINTN *NumberOfSections; + ); + + +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function locates the Standalone MM Core + module PE/COFF image in the BFV and returns this information. + + @param BfvAddress Base Address of Boot Firmware Volume + @param TeData Pointer to address for allocating memory = for + PE/COFF image data + @param TeDataSize Pointer to size of PE/COFF image data + +**/ +EFI_STATUS +EFIAPI +LocateStandaloneMmCorePeCoffData ( + IN EFI_FIRMWARE_VOLUME_HEADER *BfvAddress, + IN OUT VOID **TeData; + IN OUT UINTN *TeDataSize; + ); + + +/** + Use the boot information passed by privileged firmware to populate a HOB= list + suitable for consumption by the MM Core and drivers. + + @param CpuDriverEntryPoint Address of MM CPU driver entrypoint + @param PayloadBootInfo Boot information passed by privileged fir= mware + +**/ +VOID * +EFIAPI +CreateHobListFromBootInfo ( + IN OUT PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT *CpuDriverEntryPoint, + IN EFI_SECURE_PARTITION_BOOT_INFO *PayloadBootInfo + ); + + +/** + The entry point of Standalone MM Foundation. + + @param HobStart Pointer to the beginning of the HOB List. + +**/ +VOID +EFIAPI +_ModuleEntryPoint ( + IN VOID *SharedBufAddress, + IN UINT64 SharedBufSize, + IN UINT64 cookie1, + IN UINT64 cookie2 + ); + + +/** + Autogenerated function that calls the library constructors for all of th= e module's dependent libraries. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of library constructors for the set of libra= ry instances + that a module depends on. This includes library instances that a module= depends on + directly and library instances that a module depends on indirectly throu= gh other + libraries. This function is autogenerated by build tools and those build= tools are + responsible for collecting the set of library instances, determine which= ones have + constructors, and calling the library constructors in the proper order b= ased upon + each of the library instances own dependencies. + + @param ImageHandle The image handle of the DXE Core. + @param SystemTable A pointer to the EFI System Table. + +**/ +VOID +EFIAPI +ProcessLibraryConstructorList ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Autogenerated function that calls a set of module entry points. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of module entry points. + This function is autogenerated by build tools and those build tools are = responsible + for collecting the module entry points and calling them in a specified o= rder. + + @param HobStart Pointer to the beginning of the HOB List passed in fro= m the PEI Phase. + +**/ +VOID +EFIAPI +ProcessModuleEntryPointList ( + IN VOID *HobStart + ); + +#endif diff --git a/StandaloneMmPkg/Include/Library/MmCoreStandaloneEntryPoint.h b= /StandaloneMmPkg/Include/Library/MmCoreStandaloneEntryPoint.h new file mode 100644 index 0000000000..d6105d4935 --- /dev/null +++ b/StandaloneMmPkg/Include/Library/MmCoreStandaloneEntryPoint.h @@ -0,0 +1,101 @@ +/** @file + Module entry point library for DXE core. + +Copyright (c) 2006 - 2008, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MODULE_ENTRY_POINT_H__ +#define __MODULE_ENTRY_POINT_H__ + +/// +/// Global variable that contains a pointer to the Hob List passed into th= e DXE Core entry point. +/// +extern VOID *gHobList; + + +/** + The entry point of PE/COFF Image for the DXE Core. + + This function is the entry point for the DXE Core. This function is requ= ired to call + ProcessModuleEntryPointList() and ProcessModuleEntryPointList() is never= expected to return. + The DXE Core is responsible for calling ProcessLibraryConstructorList() = as soon as the EFI + System Table and the image handle for the DXE Core itself have been esta= blished. + If ProcessModuleEntryPointList() returns, then ASSERT() and halt the sys= tem. + + @param HobStart Pointer to the beginning of the HOB List passed in fro= m the PEI Phase. + +**/ +VOID +EFIAPI +_ModuleEntryPoint ( + IN VOID *HobStart + ); + + +/** + Required by the EBC compiler and identical in functionality to _ModuleEn= tryPoint(). + + This function is required to call _ModuleEntryPoint() passing in HobStar= t. + + @param HobStart Pointer to the beginning of the HOB List passed in fro= m the PEI Phase. + +**/ +VOID +EFIAPI +EfiMain ( + IN VOID *HobStart + ); + + +/** + Autogenerated function that calls the library constructors for all of th= e module's dependent libraries. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of library constructors for the set of libra= ry instances + that a module depends on. This includes library instances that a module= depends on + directly and library instances that a module depends on indirectly throu= gh other + libraries. This function is autogenerated by build tools and those build= tools are + responsible for collecting the set of library instances, determine which= ones have + constructors, and calling the library constructors in the proper order b= ased upon + each of the library instances own dependencies. + + @param ImageHandle The image handle of the DXE Core. + @param SystemTable A pointer to the EFI System Table. + +**/ +VOID +EFIAPI +ProcessLibraryConstructorList ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Autogenerated function that calls a set of module entry points. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of module entry points. + This function is auto generated by build tools and those build tools are= responsible + for collecting the module entry points and calling them in a specified o= rder. + + @param HobStart Pointer to the beginning of the HOB List passed in fro= m the PEI Phase. + +**/ +VOID +EFIAPI +ProcessModuleEntryPointList ( + IN VOID *HobStart + ); + +#endif diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/CreateH= obList.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/CreateHob= List.c new file mode 100644 index 0000000000..f9b3faea8f --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/CreateHobList.c @@ -0,0 +1,200 @@ +/** @file + Entry point to the Standalone MM Foundation when initialized during the = SEC + phase on ARM platforms + +Copyright (c) 2017, ARM Ltd. All rights reserved.
+This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + + +#include + +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +extern EFI_HOB_HANDOFF_INFO_TABLE* +HobConstructor ( + IN VOID *EfiMemoryBegin, + IN UINTN EfiMemoryLength, + IN VOID *EfiFreeMemoryBottom, + IN VOID *EfiFreeMemoryTop + ); + +// GUID to identify HOB with whereabouts of communication buffer with Norm= al +// World +extern EFI_GUID gEfiStandaloneMmNonSecureBufferGuid; + +// GUID to identify HOB where the entry point of the CPU driver will be +// populated to allow this entry point driver to invoke it upon receipt of= an +// event +extern EFI_GUID gEfiArmTfCpuDriverEpDescriptorGuid; + +/** + Use the boot information passed by privileged firmware to populate a HOB= list + suitable for consumption by the MM Core and drivers. + + @param PayloadBootInfo Boot information passed by privileged firmware + +**/ +VOID * +CreateHobListFromBootInfo ( + IN OUT PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT *CpuDriverEntryPoint, + IN EFI_SECURE_PARTITION_BOOT_INFO *PayloadBootInfo +) +{ + EFI_HOB_HANDOFF_INFO_TABLE *HobStart; + EFI_RESOURCE_ATTRIBUTE_TYPE Attributes; + UINT32 Index; + UINT32 BufferSize; + UINT32 Flags; + EFI_MMRAM_HOB_DESCRIPTOR_BLOCK *MmramRangesHob; + EFI_MMRAM_DESCRIPTOR *MmramRanges; + EFI_MMRAM_DESCRIPTOR *NsCommBufMmramRange; + MP_INFORMATION_HOB_DATA *MpInformationHobData; + EFI_PROCESSOR_INFORMATION *ProcInfoBuffer; + EFI_SECURE_PARTITION_CPU_INFO *CpuInfo; + ARM_TF_CPU_DRIVER_EP_DESCRIPTOR *CpuDriverEntryPointDesc; + + // Create a hoblist with a PHIT and EOH + HobStart =3D HobConstructor ((VOID *) PayloadBootInfo->SpMemBase, + (UINTN) PayloadBootInfo->SpMemLimit - PayloadBootInfo->SpMemBase, + (VOID *) PayloadBootInfo->SpHeapBase, + (VOID *) (PayloadBootInfo->SpHeapBase + PayloadBootInfo->SpHeapSize)); + + // Check that the Hoblist starts at the bottom of the Heap + ASSERT (HobStart =3D=3D (VOID *) PayloadBootInfo->SpHeapBase); + + // Build a Boot Firmware Volume HOB + BuildFvHob(PayloadBootInfo->SpImageBase, PayloadBootInfo->SpImageSize); + + // Build a resource descriptor Hob that describes the available physical + // memory range + Attributes =3D( + EFI_RESOURCE_ATTRIBUTE_PRESENT | + EFI_RESOURCE_ATTRIBUTE_INITIALIZED | + EFI_RESOURCE_ATTRIBUTE_TESTED | + EFI_RESOURCE_ATTRIBUTE_UNCACHEABLE | + EFI_RESOURCE_ATTRIBUTE_WRITE_COMBINEABLE | + EFI_RESOURCE_ATTRIBUTE_WRITE_THROUGH_CACHEABLE | + EFI_RESOURCE_ATTRIBUTE_WRITE_BACK_CACHEABLE + ); + + BuildResourceDescriptorHob (EFI_RESOURCE_SYSTEM_MEMORY, + Attributes, + (UINTN) PayloadBootInfo->SpMemBase, + PayloadBootInfo->SpMemLimit - PayloadBootInfo->SpMemBase); + + // Find the size of the GUIDed HOB with MP information + BufferSize =3D sizeof (MP_INFORMATION_HOB_DATA); + BufferSize +=3D sizeof (EFI_PROCESSOR_INFORMATION) * PayloadBootInfo->Nu= mCpus; + + // Create a Guided MP information HOB to enable the ARM TF CPU driver to + // perform per-cpu allocations. + MpInformationHobData =3D BuildGuidHob(&gMpInformationHobGuid, BufferSize= ); + + // Populate the MP information HOB with the topology information passed = by + // privileged firmware + MpInformationHobData->NumberOfProcessors =3D PayloadBootInfo->NumCpus; + MpInformationHobData->NumberOfEnabledProcessors =3D PayloadBootInfo->Num= Cpus; + ProcInfoBuffer =3D MpInformationHobData->ProcessorInfoBuffer; + CpuInfo =3D PayloadBootInfo->CpuInfo; + + for (Index =3D 0; Index < PayloadBootInfo->NumCpus; Index++) { + ProcInfoBuffer[Index].ProcessorId =3D CpuInfo[Index].Mpidr; + ProcInfoBuffer[Index].Location.Package =3D GET_CLUSTER_ID(CpuInfo[Inde= x].Mpidr); + ProcInfoBuffer[Index].Location.Core =3D GET_CORE_ID(CpuInfo[Index].= Mpidr); + ProcInfoBuffer[Index].Location.Thread =3D GET_CORE_ID(CpuInfo[Index].= Mpidr); + + Flags =3D PROCESSOR_ENABLED_BIT | PROCESSOR_HEALTH_STATUS_BIT; + if (CpuInfo[Index].Flags & CPU_INFO_FLAG_PRIMARY_CPU) { + Flags |=3D PROCESSOR_AS_BSP_BIT; + } + ProcInfoBuffer[Index].StatusFlag =3D Flags; + } + + // Create a Guided HOB to tell the ARM TF CPU driver the location and le= ngth + // of the communication buffer shared with the Normal world. + NsCommBufMmramRange =3D (EFI_MMRAM_DESCRIPTOR *) BuildGuidHob (&gEfiStan= daloneMmNonSecureBufferGuid, sizeof(EFI_MMRAM_DESCRIPTOR)); + NsCommBufMmramRange->PhysicalStart =3D PayloadBootInfo->SpNsCommBufBase; + NsCommBufMmramRange->CpuStart =3D PayloadBootInfo->SpNsCommBufBase; + NsCommBufMmramRange->PhysicalSize =3D PayloadBootInfo->SpNsCommBufSize; + NsCommBufMmramRange->RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Create a Guided HOB to enable the ARM TF CPU driver to share its entry + // point and populate it with the address of the shared buffer + CpuDriverEntryPointDesc =3D (ARM_TF_CPU_DRIVER_EP_DESCRIPTOR *) BuildGui= dHob (&gEfiArmTfCpuDriverEpDescriptorGuid, sizeof(ARM_TF_CPU_DRIVER_EP_DESC= RIPTOR)); + + *CpuDriverEntryPoint =3D NULL; + CpuDriverEntryPointDesc->ArmTfCpuDriverEpPtr =3D CpuDriverEntryPoint; + + // Find the size of the GUIDed HOB with SRAM ranges + BufferSize =3D sizeof (EFI_MMRAM_HOB_DESCRIPTOR_BLOCK); + BufferSize +=3D PayloadBootInfo->NumSpMemRegions * + sizeof(EFI_MMRAM_DESCRIPTOR); + + // Create a GUIDed HOB with SRAM ranges + MmramRangesHob =3D BuildGuidHob (&gEfiMmPeiMmramMemoryReserveGuid, Buffe= rSize); + + // Fill up the number of MMRAM memory regions + MmramRangesHob->NumberOfMmReservedRegions =3D PayloadBootInfo->NumSpMemR= egions; + // Fill up the MMRAM ranges + MmramRanges =3D &MmramRangesHob->Descriptor[0]; + + // Base and size of memory occupied by the Standalone MM image + MmramRanges[0].PhysicalStart =3D PayloadBootInfo->SpImageBase; + MmramRanges[0].CpuStart =3D PayloadBootInfo->SpImageBase; + MmramRanges[0].PhysicalSize =3D PayloadBootInfo->SpImageSize; + MmramRanges[0].RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Base and size of buffer shared with privileged Secure world software + MmramRanges[1].PhysicalStart =3D PayloadBootInfo->SpSharedBufBase; + MmramRanges[1].CpuStart =3D PayloadBootInfo->SpSharedBufBase; + MmramRanges[1].PhysicalSize =3D PayloadBootInfo->SpPcpuSharedBufSize * = PayloadBootInfo->NumCpus; + MmramRanges[1].RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Base and size of buffer used for synchronous communication with Normal + // world software + MmramRanges[2].PhysicalStart =3D PayloadBootInfo->SpNsCommBufBase; + MmramRanges[2].CpuStart =3D PayloadBootInfo->SpNsCommBufBase; + MmramRanges[2].PhysicalSize =3D PayloadBootInfo->SpNsCommBufSize; + MmramRanges[2].RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Base and size of memory allocated for stacks for all cpus + MmramRanges[3].PhysicalStart =3D PayloadBootInfo->SpStackBase; + MmramRanges[3].CpuStart =3D PayloadBootInfo->SpStackBase; + MmramRanges[3].PhysicalSize =3D PayloadBootInfo->SpPcpuStackSize * Payl= oadBootInfo->NumCpus; + MmramRanges[3].RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Base and size of heap memory shared by all cpus + MmramRanges[4].PhysicalStart =3D (EFI_PHYSICAL_ADDRESS) HobStart; + MmramRanges[4].CpuStart =3D (EFI_PHYSICAL_ADDRESS) HobStart; + MmramRanges[4].PhysicalSize =3D HobStart->EfiFreeMemoryBottom - (EFI_PH= YSICAL_ADDRESS) HobStart; + MmramRanges[4].RegionState =3D EFI_CACHEABLE | EFI_ALLOCATED; + + // Base and size of heap memory shared by all cpus + MmramRanges[5].PhysicalStart =3D HobStart->EfiFreeMemoryBottom; + MmramRanges[5].CpuStart =3D HobStart->EfiFreeMemoryBottom; + MmramRanges[5].PhysicalSize =3D HobStart->EfiFreeMemoryTop - HobStart->= EfiFreeMemoryBottom; + MmramRanges[5].RegionState =3D EFI_CACHEABLE; + + return HobStart; +} diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/SetPerm= issions.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/SetPermi= ssions.c new file mode 100644 index 0000000000..e96b81cdc0 --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/SetPermissions= .c @@ -0,0 +1,278 @@ +/** @file + Entry point to the Standalone MM Foundation when initialised during the = SEC + phase on ARM platforms + +Copyright (c) 2017, ARM Ltd. All rights reserved.
+This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + + +#include + + + +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include + + +#include + +EFI_STATUS +EFIAPI +UpdateMmFoundationPeCoffPermissions ( + IN CONST PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN UINT32 SectionHeaderOffset, + IN CONST UINTN NumberOfSections, + IN REGION_PERMISSION_UPDATE_FUNC TextUpdater, + IN REGION_PERMISSION_UPDATE_FUNC ReadOnlyUpdater, + IN REGION_PERMISSION_UPDATE_FUNC ReadWriteUpdater + ) +{ + EFI_IMAGE_SECTION_HEADER SectionHeader; + RETURN_STATUS Status; + EFI_PHYSICAL_ADDRESS Base; + UINTN Size; + UINTN ReadSize; + UINTN Index; + + ASSERT (ImageContext !=3D NULL); + + // + // Iterate over the sections + // + for (Index =3D 0; Index < NumberOfSections; Index++) { + // + // Read section header from file + // + Size =3D sizeof (EFI_IMAGE_SECTION_HEADER); + ReadSize =3D Size; + Status =3D ImageContext->ImageRead (ImageContext->Handle, SectionHeade= rOffset, + &Size, &SectionHeader); + if (RETURN_ERROR (Status) || (Size !=3D ReadSize)) { + DEBUG ((DEBUG_ERROR, + "%a: ImageContext->ImageRead () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + + DEBUG ((DEBUG_INFO, + "%a: Section %d of image at 0x%lx has 0x%x permissions\n", + __FUNCTION__, Index, ImageContext->ImageAddress, SectionHeader= .Characteristics)); + DEBUG ((DEBUG_INFO, + "%a: Section %d of image at 0x%lx has %s name\n", + __FUNCTION__, Index, ImageContext->ImageAddress, SectionHeader= .Name)); + DEBUG ((DEBUG_INFO, + "%a: Section %d of image at 0x%lx has 0x%x address\n", + __FUNCTION__, Index, ImageContext->ImageAddress, ImageContext-= >ImageAddress + SectionHeader.VirtualAddress)); + DEBUG ((DEBUG_INFO, + "%a: Section %d of image at 0x%lx has 0x%x data\n", + __FUNCTION__, Index, ImageContext->ImageAddress, SectionHeader= .PointerToRawData)); + + // + // If the section is marked as XN then remove the X attribute. Further= more, + // if it is a writeable section then mark it appropriately as well. + // + if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_MEM_EXECUTE) =3D=3D= 0) { + Base =3D ImageContext->ImageAddress + SectionHeader.VirtualAddress; + + TextUpdater (Base, SectionHeader.Misc.VirtualSize); + + if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_MEM_WRITE) !=3D 0= ) { + ReadWriteUpdater (Base, SectionHeader.Misc.VirtualSize); + DEBUG ((DEBUG_INFO, + "%a: Mapping section %d of image at 0x%lx with RW-XN permi= ssions\n", + __FUNCTION__, Index, ImageContext->ImageAddress)); + } else { + DEBUG ((DEBUG_INFO, + "%a: Mapping section %d of image at 0x%lx with RO-XN permi= ssions\n", + __FUNCTION__, Index, ImageContext->ImageAddress)); + } + } else { + DEBUG ((DEBUG_INFO, + "%a: Ignoring section %d of image at 0x%lx with 0x%x permi= ssions\n", + __FUNCTION__, Index, ImageContext->ImageAddress, SectionHe= ader.Characteristics)); + } + SectionHeaderOffset +=3D sizeof (EFI_IMAGE_SECTION_HEADER); + } + + return RETURN_SUCCESS; +} + +EFI_STATUS +EFIAPI +LocateStandaloneMmCorePeCoffData ( + IN EFI_FIRMWARE_VOLUME_HEADER *BfvAddress, + IN OUT VOID **TeData, + IN OUT UINTN *TeDataSize + ) +{ + EFI_FFS_FILE_HEADER *FileHeader =3D NULL; + EFI_STATUS Status; + + Status =3D FfsFindNextFile ( + EFI_FV_FILETYPE_SECURITY_CORE, + BfvAddress, + &FileHeader); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Unable to locate Standalone MM FFS file - 0x%x\n= ", + Status)); + return Status; + } + + Status =3D FfsFindSectionData (EFI_SECTION_PE32, FileHeader, TeData, TeD= ataSize); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Unable to locate Standalone MM Section data - = 0x%x\n", + Status)); + return Status; + } + + DEBUG ((DEBUG_INFO, "Found Standalone MM PE data - 0x%x\n", *TeData)); + return Status; +} + +static +EFI_STATUS +GetPeCoffSectionInformation ( + IN CONST PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *TmpContext, + IN OUT UINT32 *SectionHeaderOffset, + IN OUT UINTN *NumberOfSections + ) +{ + RETURN_STATUS Status; + EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; + EFI_IMAGE_OPTIONAL_HEADER_UNION HdrData; + UINTN Size; + UINTN ReadSize; + + ASSERT (ImageContext !=3D NULL); + ASSERT (TmpContext !=3D NULL); + ASSERT (SectionHeaderOffset !=3D NULL); + ASSERT (NumberOfSections !=3D NULL); + + // + // We need to copy ImageContext since PeCoffLoaderGetImageInfo () + // will mangle the ImageAddress field + // + CopyMem (TmpContext, ImageContext, sizeof (*TmpContext)); + + if (TmpContext->PeCoffHeaderOffset =3D=3D 0) { + Status =3D PeCoffLoaderGetImageInfo (TmpContext); + if (RETURN_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, + "%a: PeCoffLoaderGetImageInfo () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + } + + if (TmpContext->IsTeImage && + TmpContext->ImageAddress =3D=3D ImageContext->ImageAddress) { + DEBUG ((DEBUG_INFO, "%a: ignoring XIP TE image at 0x%lx\n", __FUNCTION= __, + ImageContext->ImageAddress)); + return RETURN_UNSUPPORTED; + } + + if (TmpContext->SectionAlignment < EFI_PAGE_SIZE) { + // + // The sections need to be at least 4 KB aligned, since that is the + // granularity at which we can tighten permissions. + // + if (!TmpContext->IsTeImage) { + DEBUG ((DEBUG_WARN, + "%a: non-TE Image at 0x%lx has SectionAlignment < 4 KB (%lu)\n", + __FUNCTION__, ImageContext->ImageAddress, TmpContext->SectionAlign= ment)); + } + return RETURN_UNSUPPORTED; + } + + // + // Read the PE/COFF Header. For PE32 (32-bit) this will read in too much + // data, but that should not hurt anything. Hdr.Pe32->OptionalHeader.Mag= ic + // determines if this is a PE32 or PE32+ image. The magic is in the same + // location in both images. + // + Hdr.Union =3D &HdrData; + Size =3D sizeof (EFI_IMAGE_OPTIONAL_HEADER_UNION); + ReadSize =3D Size; + Status =3D TmpContext->ImageRead (TmpContext->Handle, + TmpContext->PeCoffHeaderOffset, &Size, Hdr.Pe32); + if (RETURN_ERROR (Status) || (Size !=3D ReadSize)) { + DEBUG ((DEBUG_ERROR, + "%a: TmpContext->ImageRead () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + + ASSERT (Hdr.Pe32->Signature =3D=3D EFI_IMAGE_NT_SIGNATURE); + + *SectionHeaderOffset =3D TmpContext->PeCoffHeaderOffset + sizeof (UINT32= ) + + sizeof (EFI_IMAGE_FILE_HEADER); + *NumberOfSections =3D (UINTN)(Hdr.Pe32->FileHeader.NumberOfSections); + + switch (Hdr.Pe32->OptionalHeader.Magic) { + case EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC: + *SectionHeaderOffset +=3D Hdr.Pe32->FileHeader.SizeOfOptionalHeader; + break; + case EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC: + *SectionHeaderOffset +=3D Hdr.Pe32Plus->FileHeader.SizeOfOptionalHea= der; + break; + default: + ASSERT (FALSE); + } + + return RETURN_SUCCESS; +} + +EFI_STATUS +EFIAPI +GetStandaloneMmCorePeCoffSections ( + IN VOID *TeData, + IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN OUT UINT32 *SectionHeaderOffset, + IN OUT UINTN *NumberOfSections + ) +{ + EFI_STATUS Status; + PE_COFF_LOADER_IMAGE_CONTEXT TmpContext; + + // Initialize the Image Context + ZeroMem (ImageContext, sizeof (PE_COFF_LOADER_IMAGE_CONTEXT)); + ImageContext->Handle =3D TeData; + ImageContext->ImageRead =3D PeCoffLoaderImageReadFromMemory; + + DEBUG((DEBUG_INFO, "Found Standalone MM PE data - 0x%x\n", TeData)); + + Status =3D PeCoffLoaderGetImageInfo (ImageContext); + if (EFI_ERROR(Status)) { + DEBUG((DEBUG_ERROR, "Unable to locate Standalone MM Core PE-COFF Image= information - 0x%x\n", Status)); + return Status; + } + + Status =3D GetPeCoffSectionInformation(ImageContext, &TmpContext, Sectio= nHeaderOffset, NumberOfSections); + if (EFI_ERROR(Status)) { + DEBUG((DEBUG_ERROR, "Unable to locate Standalone MM Core PE-COFF Secti= on information - 0x%x\n", Status)); + return Status; + } + + DEBUG((DEBUG_INFO, "Standalone MM Core PE-COFF SectionHeaderOffset - 0x%= x, NumberOfSections - %d\n", *SectionHeaderOffset, *NumberOfSections)); + + return Status; +} diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/Standal= oneMmCoreEntryPoint.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/= Arm/StandaloneMmCoreEntryPoint.c new file mode 100644 index 0000000000..72e3b834d4 --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/Arm/StandaloneMmCo= reEntryPoint.c @@ -0,0 +1,264 @@ +/** @file + Entry point to the Standalone MM Foundation when initialized during the = SEC + phase on ARM platforms + +Copyright (c) 2017, ARM Ltd. All rights reserved.
+This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + + +#include + +#include + +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include + +#include +#include + +#define SPM_MAJOR_VER_MASK 0xFFFF0000 +#define SPM_MINOR_VER_MASK 0x0000FFFF +#define SPM_MAJOR_VER_SHIFT 16 + +const UINT32 SPM_MAJOR_VER =3D 0; +const UINT32 SPM_MINOR_VER =3D 1; + +const UINT8 BOOT_PAYLOAD_VERSION =3D 1; + +PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT CpuDriverEntryPoint =3D NULL; + +/** + Retrieve a pointer to and print the boot information passed by privileged + secure firmware + + @param SharedBufAddress The pointer memory shared with privileged firmw= are + +**/ +EFI_SECURE_PARTITION_BOOT_INFO * +GetAndPrintBootinformation ( + IN VOID *SharedBufAddress +) +{ + EFI_SECURE_PARTITION_BOOT_INFO *PayloadBootInfo; + EFI_SECURE_PARTITION_CPU_INFO *PayloadCpuInfo; + UINTN Index; + + PayloadBootInfo =3D (EFI_SECURE_PARTITION_BOOT_INFO *) SharedBufAddress; + + if (PayloadBootInfo->Header.Version !=3D BOOT_PAYLOAD_VERSION) + { + DEBUG((DEBUG_ERROR, "Boot Information Version Mismatch. Current=3D0x%x= , Expected=3D0x%x.\n", PayloadBootInfo->Header.Version, BOOT_PAYLOAD_VERSIO= N)); + return NULL; + } + DEBUG((DEBUG_INFO, "NumSpMemRegions - 0x%x\n", PayloadBootInfo->NumSpMem= Regions)); + DEBUG((DEBUG_INFO, "SpMemBase - 0x%lx\n", PayloadBootInfo->SpMemBa= se)); + DEBUG((DEBUG_INFO, "SpMemLimit - 0x%lx\n", PayloadBootInfo->SpMemLi= mit)); + DEBUG((DEBUG_INFO, "SpImageBase - 0x%lx\n", PayloadBootInfo->SpImage= Base)); + DEBUG((DEBUG_INFO, "SpStackBase - 0x%lx\n", PayloadBootInfo->SpStack= Base)); + DEBUG((DEBUG_INFO, "SpHeapBase - 0x%lx\n", PayloadBootInfo->SpHeapB= ase)); + DEBUG((DEBUG_INFO, "SpNsCommBufBase - 0x%lx\n", PayloadBootInfo->SpNsCom= mBufBase)); + DEBUG((DEBUG_INFO, "SpSharedBufBase - 0x%lx\n", PayloadBootInfo->SpShare= dBufBase)); + + DEBUG((DEBUG_INFO, "SpImageSize - 0x%x\n", PayloadBootInfo->SpImageS= ize)); + DEBUG((DEBUG_INFO, "SpPcpuStackSize - 0x%x\n", PayloadBootInfo->SpPcpuSt= ackSize)); + DEBUG((DEBUG_INFO, "SpHeapSize - 0x%x\n", PayloadBootInfo->SpHeapSi= ze)); + DEBUG((DEBUG_INFO, "SpNsCommBufSize - 0x%x\n", PayloadBootInfo->SpNsComm= BufSize)); + DEBUG((DEBUG_INFO, "SpPcpuSharedBufSize - 0x%x\n", PayloadBootInfo->SpPc= puSharedBufSize)); + + DEBUG((DEBUG_INFO, "NumCpus - 0x%x\n", PayloadBootInfo->NumCpus)= ); + DEBUG((DEBUG_INFO, "CpuInfo - 0x%p\n", PayloadBootInfo->CpuInfo)= ); + + PayloadCpuInfo =3D (EFI_SECURE_PARTITION_CPU_INFO *) PayloadBootInfo->Cp= uInfo; + + for (Index =3D 0; Index < PayloadBootInfo->NumCpus; Index++) { + DEBUG((DEBUG_INFO, "Mpidr - 0x%lx\n", PayloadCpuInfo[Index].= Mpidr)); + DEBUG((DEBUG_INFO, "LinearId - 0x%x\n", PayloadCpuInfo[Index].L= inearId)); + DEBUG((DEBUG_INFO, "Flags - 0x%x\n", PayloadCpuInfo[Index].F= lags)); + } + + return PayloadBootInfo; +} + +VOID +EFIAPI +DelegatedEventLoop ( + IN ARM_SVC_ARGS *EventCompleteSvcArgs + ) +{ + EFI_STATUS Status; + + while(TRUE) { + ArmCallSvc(EventCompleteSvcArgs); + + DEBUG ((DEBUG_INFO, "Received delegated event\n")); + DEBUG ((DEBUG_INFO, "X0 : 0x%x\n", (UINT32) EventCompleteSvcArgs->Arg= 0)); + DEBUG ((DEBUG_INFO, "X1 : 0x%x\n", (UINT32) EventCompleteSvcArgs->Arg= 1)); + DEBUG ((DEBUG_INFO, "X2 : 0x%x\n", (UINT32) EventCompleteSvcArgs->Arg= 2)); + DEBUG ((DEBUG_INFO, "X3 : 0x%x\n", (UINT32) EventCompleteSvcArgs->Arg= 3)); + + Status =3D CpuDriverEntryPoint( + EventCompleteSvcArgs->Arg0, + EventCompleteSvcArgs->Arg2, + EventCompleteSvcArgs->Arg1); + if (EFI_ERROR(Status)) { + DEBUG((DEBUG_ERROR, "Failed delegated event 0x%x, Status 0x%x\n", + EventCompleteSvcArgs->Arg0, Status)); + } + + EventCompleteSvcArgs->Arg0 =3D ARM_SVC_ID_SP_EVENT_COMPLETE_AARCH64; + EventCompleteSvcArgs->Arg1 =3D Status; + } +} + +STATIC +EFI_STATUS +GetSpmVersion () +{ + EFI_STATUS Status; + UINT16 SpmMajorVersion; + UINT16 SpmMinorVersion; + UINT32 SpmVersion; + ARM_SVC_ARGS SpmVersionArgs; + + SpmVersionArgs.Arg0 =3D ARM_SVC_ID_SPM_VERSION_AARCH32; + + ArmCallSvc (&SpmVersionArgs); + + SpmVersion =3D SpmVersionArgs.Arg0; + + SpmMajorVersion =3D ((SpmVersion & SPM_MAJOR_VER_MASK) >> SPM_MAJOR_VER_= SHIFT); + SpmMinorVersion =3D ((SpmVersion & SPM_MINOR_VER_MASK) >> 0); + + // Different major revision values indicate possibly incompatible functi= ons. + // For two revisions, A and B, for which the major revision values are + // identical, if the minor revision value of revision B is greater than + // the minor revision value of revision A, then every function in + // revision A must work in a compatible way with revision B. + // However, it is possible for revision B to have a higher + // function count than revision A. + if ((SpmMajorVersion =3D=3D SPM_MAJOR_VER) && + (SpmMinorVersion >=3D SPM_MINOR_VER)) + { + DEBUG ((DEBUG_INFO, "SPM Version: Major=3D0x%x, Minor=3D0x%x\n", + SpmMajorVersion, SpmMinorVersion)); + Status =3D EFI_SUCCESS; + } + else + { + DEBUG ((DEBUG_INFO, "Incompatible SPM Versions.\n Current Version: Maj= or=3D0x%x, Minor=3D0x%x.\n Expected: Major=3D0x%x, Minor>=3D0x%x.\n", + SpmMajorVersion, SpmMinorVersion, SPM_MAJOR_VER, SPM_MINOR_VER= )); + Status =3D EFI_UNSUPPORTED; + } + + return Status; +} + +/** + The entry point of Standalone MM Foundation. + + @param HobStart The pointer to the beginning of the HOB List. + +**/ +VOID +EFIAPI +_ModuleEntryPoint ( + IN VOID *SharedBufAddress, + IN UINT64 SharedBufSize, + IN UINT64 cookie1, + IN UINT64 cookie2 + ) +{ + PE_COFF_LOADER_IMAGE_CONTEXT ImageContext; + EFI_SECURE_PARTITION_BOOT_INFO *PayloadBootInfo; + ARM_SVC_ARGS InitMmFoundationSvcArgs =3D {0}; + EFI_STATUS Status; + UINT32 SectionHeaderOffset; + UINTN NumberOfSections; + VOID *HobStart; + VOID *TeData; + UINTN TeDataSize; + + Status =3D SerialPortInitialize (); + ASSERT_EFI_ERROR (Status); + + // Get Secure Partition Manager Version Information + Status =3D GetSpmVersion(); + if (EFI_ERROR(Status)) { + goto finish; + } + + PayloadBootInfo =3D GetAndPrintBootinformation(SharedBufAddress); + if (PayloadBootInfo =3D=3D NULL) { + Status =3D EFI_UNSUPPORTED; + goto finish; + } + + // Locate PE/COFF File information for the Standalone MM core module + Status =3D LocateStandaloneMmCorePeCoffData ( + (EFI_FIRMWARE_VOLUME_HEADER *) PayloadBootInfo->SpImageBa= se, + &TeData, + &TeDataSize); + if (EFI_ERROR(Status)) { + goto finish; + } + + // Obtain the PE/COFF Section information for the Standalone MM core mod= ule + Status =3D GetStandaloneMmCorePeCoffSections ( + TeData, + &ImageContext, + &SectionHeaderOffset, + &NumberOfSections); + if (EFI_ERROR(Status)) { + goto finish; + } + + // Update the memory access permissions of individual sections in the + // Standalone MM core module + Status =3D UpdateMmFoundationPeCoffPermissions( + &ImageContext, + SectionHeaderOffset, + NumberOfSections, + ArmSetMemoryRegionNoExec, + ArmSetMemoryRegionReadOnly, + ArmClearMemoryRegionReadOnly); + if (EFI_ERROR(Status)) { + goto finish; + } + + // + // Create Hoblist based upon boot information passed by privileged softw= are + // + HobStart =3D CreateHobListFromBootInfo(&CpuDriverEntryPoint, PayloadBoot= Info); + + // + // Call the MM Core entry point + // + ProcessModuleEntryPointList (HobStart); + + ASSERT_EFI_ERROR (CpuDriverEntryPoint); + DEBUG ((DEBUG_INFO, "Shared Cpu Driver EP 0x%lx\n", (UINT64) CpuDriverEn= tryPoint)); + +finish: + InitMmFoundationSvcArgs.Arg0 =3D ARM_SVC_ID_SP_EVENT_COMPLETE_AARCH64; + InitMmFoundationSvcArgs.Arg1 =3D Status; + DelegatedEventLoop(&InitMmFoundationSvcArgs); + ASSERT_EFI_ERROR(0); + +} diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneM= mCoreEntryPoint.inf b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/St= andaloneMmCoreEntryPoint.inf new file mode 100644 index 0000000000..9edc85d406 --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneMmCoreEn= tryPoint.inf @@ -0,0 +1,53 @@ +## @file +# Module entry point library for DXE core. +# +# Copyright (c) 2017, ARM Ltd. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php. +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D StandaloneMmCoreEntryPoint + FILE_GUID =3D C97AC593-109A-4C63-905C-675FDE2689E8 + MODULE_TYPE =3D MM_CORE_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + LIBRARY_CLASS =3D StandaloneMmCoreEntryPoint|MM_CORE_ST= ANDALONE + +# +# VALID_ARCHITECTURES =3D IA32 X64 IPF EBC (EBC is for build on= ly) +# + +[Sources.AARCH64] + Arm/StandaloneMmCoreEntryPoint.c + Arm/SetPermissions.c + Arm/CreateHobList.c + +[Packages] + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[Packages.AARCH64] + ArmPkg/ArmPkg.dec + ArmPlatformPkg/ArmPlatformPkg.dec + +[LibraryClasses] + ArmMmuLib + ArmSvcLib + BaseLib + DebugLib + +[Guids] + gMpInformationHobGuid + gEfiMmPeiMmramMemoryReserveGuid + gEfiStandaloneMmNonSecureBufferGuid + gEfiArmTfCpuDriverEpDescriptorGuid diff --git a/StandaloneMmPkg b/StandaloneMmPkg~HEAD similarity index 100% rename from StandaloneMmPkg rename to StandaloneMmPkg~HEAD --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 152302579622743.18894731297348; Fri, 6 Apr 2018 07:43:16 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 2B5CD226C7C42; Fri, 6 Apr 2018 07:43:15 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id C07BE2268525E for ; Fri, 6 Apr 2018 07:43:13 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 78C5D1529; Fri, 6 Apr 2018 07:43:13 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D23073F587; Fri, 6 Apr 2018 07:43:11 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:12 +0100 Message-Id: <20180406144223.10931-8-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 07/18] StandaloneMmPkg/FvLib: Add a common FV Library for management mode. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch implements a firmware volume library that can be used by the Standalone management mode core module to parse the firmware volume. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Include/Library/FvLib.h | 109 ++++++++++ StandaloneMmPkg/Library/FvLib/FvLib.c | 366 ++++++++++++++++++++++++++++= ++++ StandaloneMmPkg/Library/FvLib/FvLib.inf | 57 +++++ 3 files changed, 532 insertions(+) create mode 100644 StandaloneMmPkg/Include/Library/FvLib.h create mode 100644 StandaloneMmPkg/Library/FvLib/FvLib.c create mode 100644 StandaloneMmPkg/Library/FvLib/FvLib.inf diff --git a/StandaloneMmPkg/Include/Library/FvLib.h b/StandaloneMmPkg/Incl= ude/Library/FvLib.h new file mode 100644 index 0000000000..13e1ae2b01 --- /dev/null +++ b/StandaloneMmPkg/Include/Library/FvLib.h @@ -0,0 +1,109 @@ +/** @file + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef _FV_LIB_H_ +#define _FV_LIB_H_ + +#include +#include +#include + +/** + Given the input file pointer, search for the next matching file in the + FFS volume as defined by SearchType. The search starts from FileHeader i= nside + the Firmware Volume defined by FwVolHeader. + + @param SearchType Filter to find only files of this type. + Type EFI_FV_FILETYPE_ALL causes no filtering to be d= one. + @param FwVolHeader Pointer to the FV header of the volume to search. + This parameter must point to a valid FFS volume. + @param FileHeader Pointer to the current file from which to begin sear= ching. + This pointer will be updated upon return to reflect = the file found. + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +EFIAPI +FfsFindNextFile ( + IN EFI_FV_FILETYPE SearchType, + IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader, + IN OUT EFI_FFS_FILE_HEADER **FileHeader + ); + +/** + Given the input file pointer, search for the next matching section in the + FFS volume. + + @param SearchType Filter to find only sections of this type. + @param FfsFileHeader Pointer to the current file to search. + @param SectionHeader Pointer to the Section matching SectionType in Ffs= FileHeader. + NULL if section not found + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +FfsFindSection ( + IN EFI_SECTION_TYPE SectionType, + IN EFI_FFS_FILE_HEADER *FfsFileHeader, + IN OUT EFI_COMMON_SECTION_HEADER **SectionHeader + ); + +/** + Locates a section within a series of sections + with the specified section type. + + @param[in] Sections The sections to search + @param[in] SizeOfSections Total size of all sections + @param[in] SectionType The section type to locate + @param[out] FoundSection The FFS section if found + + @retval EFI_SUCCESS The file and section was found + @retval EFI_NOT_FOUND The file and section was not found + @retval EFI_VOLUME_CORRUPTED The firmware volume was corrupted +**/ +EFI_STATUS +EFIAPI +FindFfsSectionInSections ( + IN VOID *Sections, + IN UINTN SizeOfSections, + IN EFI_SECTION_TYPE SectionType, + OUT EFI_COMMON_SECTION_HEADER **FoundSection + ); + +/** + Given the input file pointer, search for the next matching section in the + FFS volume. + + @param SearchType Filter to find only sections of this type. + @param FfsFileHeader Pointer to the current file to search. + @param SectionData Pointer to the Section matching SectionType in F= fsFileHeader. + NULL if section not found + @param SectionDataSize The size of SectionData + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +EFIAPI +FfsFindSectionData ( + IN EFI_SECTION_TYPE SectionType, + IN EFI_FFS_FILE_HEADER *FfsFileHeader, + OUT VOID **SectionData, + OUT UINTN *SectionDataSize + ); + +#endif diff --git a/StandaloneMmPkg/Library/FvLib/FvLib.c b/StandaloneMmPkg/Librar= y/FvLib/FvLib.c new file mode 100644 index 0000000000..cacfc81338 --- /dev/null +++ b/StandaloneMmPkg/Library/FvLib/FvLib.c @@ -0,0 +1,366 @@ +/** @file + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#include + +#include +#include +#include + +#define GET_OCCUPIED_SIZE(ActualSize, Alignment) \ + (ActualSize) + (((Alignment) - ((ActualSize) & ((Alignment) - 1))) & ((A= lignment) - 1)) + +/** + Returns the highest bit set of the State field + + @param ErasePolarity Erase Polarity as defined by EFI_FVB_ERASE_POLAR= ITY + in the Attributes field. + @param FfsHeader Pointer to FFS File Header. + + @return the highest bit in the State field +**/ +EFI_FFS_FILE_STATE +GetFileState ( + IN UINT8 ErasePolarity, + IN EFI_FFS_FILE_HEADER *FfsHeader + ) +{ + EFI_FFS_FILE_STATE FileState; + EFI_FFS_FILE_STATE HighestBit; + + FileState =3D FfsHeader->State; + + if (ErasePolarity !=3D 0) { + FileState =3D (EFI_FFS_FILE_STATE)~FileState; + } + + HighestBit =3D 0x80; + while (HighestBit !=3D 0 && (HighestBit & FileState) =3D=3D 0) { + HighestBit >>=3D 1; + } + + return HighestBit; +} + +/** + Calculates the checksum of the header of a file. + + @param FileHeader Pointer to FFS File Header. + + @return Checksum of the header. +**/ +UINT8 +CalculateHeaderChecksum ( + IN EFI_FFS_FILE_HEADER *FileHeader + ) +{ + UINT8 *ptr; + UINTN Index; + UINT8 Sum; + + Sum =3D 0; + ptr =3D (UINT8 *) FileHeader; + + for (Index =3D 0; Index < sizeof (EFI_FFS_FILE_HEADER) - 3; Index +=3D 4= ) { + Sum =3D (UINT8) (Sum + ptr[Index]); + Sum =3D (UINT8) (Sum + ptr[Index + 1]); + Sum =3D (UINT8) (Sum + ptr[Index + 2]); + Sum =3D (UINT8) (Sum + ptr[Index + 3]); + } + + for (; Index < sizeof (EFI_FFS_FILE_HEADER); Index++) { + Sum =3D (UINT8) (Sum + ptr[Index]); + } + // + // State field (since this indicates the different state of file). + // + Sum =3D (UINT8) (Sum - FileHeader->State); + // + // Checksum field of the file is not part of the header checksum. + // + Sum =3D (UINT8) (Sum - FileHeader->IntegrityCheck.Checksum.File); + + return Sum; +} + +/** + Given the input file pointer, search for the next matching file in the + FFS volume as defined by SearchType. The search starts from FileHeader i= nside + the Firmware Volume defined by FwVolHeader. + + @param SearchType Filter to find only files of this type. + Type EFI_FV_FILETYPE_ALL causes no filtering to be d= one. + @param FwVolHeader Pointer to the FV header of the volume to search. + This parameter must point to a valid FFS volume. + @param FileHeader Pointer to the current file from which to begin sear= ching. + This pointer will be updated upon return to reflect = the file found. + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +EFIAPI +FfsFindNextFile ( + IN EFI_FV_FILETYPE SearchType, + IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader, + IN OUT EFI_FFS_FILE_HEADER **FileHeader + ) +{ + EFI_FFS_FILE_HEADER *FfsFileHeader; + UINT32 FileLength; + UINT32 FileOccupiedSize; + UINT32 FileOffset; + UINT64 FvLength; + UINT8 ErasePolarity; + UINT8 FileState; + + FvLength =3D FwVolHeader->FvLength; + if (FwVolHeader->Attributes & EFI_FVB2_ERASE_POLARITY) { + ErasePolarity =3D 1; + } else { + ErasePolarity =3D 0; + } + // + // If FileHeader is not specified (NULL) start with the first file in the + // firmware volume. Otherwise, start from the FileHeader. + // + if (*FileHeader =3D=3D NULL) { + FfsFileHeader =3D (EFI_FFS_FILE_HEADER *) ((UINT8 *) FwVolHeader + FwV= olHeader->HeaderLength); + } else { + // + // Length is 24 bits wide so mask upper 8 bits + // FileLength is adjusted to FileOccupiedSize as it is 8 byte aligned. + // + FileLength =3D FFS_FILE_SIZE(*FileHeader); + FileOccupiedSize =3D GET_OCCUPIED_SIZE (FileLength, 8); + FfsFileHeader =3D (EFI_FFS_FILE_HEADER *) ((UINT8 *) *FileHeader += FileOccupiedSize); + } + + FileOffset =3D (UINT32) ((UINT8 *) FfsFileHeader - (UINT8 *) FwVolHeader= ); + + while (FileOffset < (FvLength - sizeof (EFI_FFS_FILE_HEADER))) { + // + // Get FileState which is the highest bit of the State + // + FileState =3D GetFileState (ErasePolarity, FfsFileHeader); + + switch (FileState) { + + case EFI_FILE_HEADER_INVALID: + FileOffset +=3D sizeof (EFI_FFS_FILE_HEADER); + FfsFileHeader =3D (EFI_FFS_FILE_HEADER *) ((UINT8 *) FfsFileHeader += sizeof (EFI_FFS_FILE_HEADER)); + break; + + case EFI_FILE_DATA_VALID: + case EFI_FILE_MARKED_FOR_UPDATE: + if (CalculateHeaderChecksum (FfsFileHeader) =3D=3D 0) { + FileLength =3D FFS_FILE_SIZE(FfsFileHeader); + FileOccupiedSize =3D GET_OCCUPIED_SIZE (FileLength, 8); + + if ((SearchType =3D=3D FfsFileHeader->Type) || (SearchType =3D=3D = EFI_FV_FILETYPE_ALL)) { + + *FileHeader =3D FfsFileHeader; + + return EFI_SUCCESS; + } + + FileOffset +=3D FileOccupiedSize; + FfsFileHeader =3D (EFI_FFS_FILE_HEADER *) ((UINT8 *) FfsFileHeader= + FileOccupiedSize); + } else { + return EFI_NOT_FOUND; + } + break; + + case EFI_FILE_DELETED: + FileLength =3D FFS_FILE_SIZE(FfsFileHeader); + FileOccupiedSize =3D GET_OCCUPIED_SIZE (FileLength, 8); + FileOffset +=3D FileOccupiedSize; + FfsFileHeader =3D (EFI_FFS_FILE_HEADER *) ((UINT8 *) FfsFileHeader += FileOccupiedSize); + break; + + default: + return EFI_NOT_FOUND; + + } + } + + return EFI_NOT_FOUND; +} + +/** + Locates a section within a series of sections + with the specified section type. + + @param[in] Sections The sections to search + @param[in] SizeOfSections Total size of all sections + @param[in] SectionType The section type to locate + @param[out] FoundSection The FFS section if found + + @retval EFI_SUCCESS The file and section was found + @retval EFI_NOT_FOUND The file and section was not found + @retval EFI_VOLUME_CORRUPTED The firmware volume was corrupted +**/ +EFI_STATUS +EFIAPI +FindFfsSectionInSections ( + IN VOID *Sections, + IN UINTN SizeOfSections, + IN EFI_SECTION_TYPE SectionType, + OUT EFI_COMMON_SECTION_HEADER **FoundSection + ) +{ + EFI_PHYSICAL_ADDRESS CurrentAddress; + UINT32 Size; + EFI_PHYSICAL_ADDRESS EndOfSections; + EFI_COMMON_SECTION_HEADER *Section; + EFI_PHYSICAL_ADDRESS EndOfSection; + + // + // Loop through the FFS file sections + // + EndOfSection =3D (EFI_PHYSICAL_ADDRESS)(UINTN) Sections; + EndOfSections =3D EndOfSection + SizeOfSections; + for (;;) { + if (EndOfSection =3D=3D EndOfSections) { + break; + } + CurrentAddress =3D EndOfSection; + + Section =3D (EFI_COMMON_SECTION_HEADER*)(UINTN) CurrentAddress; +// printf ("Section->Type: 0x%08x\n", Section->Type); + + Size =3D SECTION_SIZE (Section); + if (Size < sizeof (*Section)) { + return EFI_VOLUME_CORRUPTED; + } + + EndOfSection =3D CurrentAddress + Size; + if (EndOfSection > EndOfSections) { + return EFI_VOLUME_CORRUPTED; + } + Size =3D GET_OCCUPIED_SIZE (Size, 4); + + // + // Look for the requested section type + // + if (Section->Type =3D=3D SectionType) { + *FoundSection =3D Section; + return EFI_SUCCESS; + } + } + + return EFI_NOT_FOUND; +} + +/** + Given the input file pointer, search for the next matching section in the + FFS volume. + + @param SearchType Filter to find only sections of this type. + @param FfsFileHeader Pointer to the current file to search. + @param SectionHeader Pointer to the Section matching SectionType in Ffs= FileHeader. + NULL if section not found + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +EFIAPI +FfsFindSection ( + IN EFI_SECTION_TYPE SectionType, + IN EFI_FFS_FILE_HEADER *FfsFileHeader, + IN OUT EFI_COMMON_SECTION_HEADER **SectionHeader + ) +{ + UINT32 FileSize; + EFI_COMMON_SECTION_HEADER *Section; + EFI_STATUS Status; + + // + // Size is 24 bits wide so mask upper 8 bits. + // Does not include FfsFileHeader header size + // FileSize is adjusted to FileOccupiedSize as it is 8 byte aligned. + // + Section =3D (EFI_COMMON_SECTION_HEADER *) (FfsFileHeader + 1); + FileSize =3D FFS_FILE_SIZE(FfsFileHeader); + FileSize -=3D sizeof (EFI_FFS_FILE_HEADER); + + Status =3D FindFfsSectionInSections ( + Section, + FileSize, + SectionType, + SectionHeader + ); + return Status; +} + +/** + Given the input file pointer, search for the next matching section in the + FFS volume. + + @param SearchType Filter to find only sections of this type. + @param FfsFileHeader Pointer to the current file to search. + @param SectionData Pointer to the Section matching SectionType in F= fsFileHeader. + NULL if section not found + @param SectionDataSize The size of SectionData + + @retval EFI_NOT_FOUND No files matching the search criteria were found + @retval EFI_SUCCESS +**/ +EFI_STATUS +EFIAPI +FfsFindSectionData ( + IN EFI_SECTION_TYPE SectionType, + IN EFI_FFS_FILE_HEADER *FfsFileHeader, + IN OUT VOID **SectionData, + IN OUT UINTN *SectionDataSize + ) +{ + UINT32 FileSize; + EFI_COMMON_SECTION_HEADER *Section; + UINT32 SectionLength; + UINT32 ParsedLength; + + // + // Size is 24 bits wide so mask upper 8 bits. + // Does not include FfsFileHeader header size + // FileSize is adjusted to FileOccupiedSize as it is 8 byte aligned. + // + Section =3D (EFI_COMMON_SECTION_HEADER *) (FfsFileHeader + 1); + FileSize =3D FFS_FILE_SIZE(FfsFileHeader); + FileSize -=3D sizeof (EFI_FFS_FILE_HEADER); + + *SectionData =3D NULL; + ParsedLength =3D 0; + while (ParsedLength < FileSize) { + if (Section->Type =3D=3D SectionType) { + *SectionData =3D (VOID *) (Section + 1); + *SectionDataSize =3D SECTION_SIZE(Section); + return EFI_SUCCESS; + } + // + // Size is 24 bits wide so mask upper 8 bits. + // SectionLength is adjusted it is 4 byte aligned. + // Go to the next section + // + SectionLength =3D SECTION_SIZE(Section); + SectionLength =3D GET_OCCUPIED_SIZE (SectionLength, 4); + + ParsedLength +=3D SectionLength; + Section =3D (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + Section= Length); + } + + return EFI_NOT_FOUND; +} diff --git a/StandaloneMmPkg/Library/FvLib/FvLib.inf b/StandaloneMmPkg/Libr= ary/FvLib/FvLib.inf new file mode 100644 index 0000000000..6df50ab364 --- /dev/null +++ b/StandaloneMmPkg/Library/FvLib/FvLib.inf @@ -0,0 +1,57 @@ +## @file +# +# Copyright (c) 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +## + +##########################################################################= ###### +# +# Defines Section - statements that will be processed to create a Makefile. +# +##########################################################################= ###### +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D FvLib + FILE_GUID =3D C20085E9-E3AB-4938-A727-C10935FEEE2B + MODULE_TYPE =3D BASE + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D FvLib + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D IA32 +# + +##########################################################################= ###### +# +# Sources Section - list of files that are required for the build to succe= ed. +# +##########################################################################= ###### + +[Sources] + FvLib.c + +##########################################################################= ###### +# +# Package Dependency Section - list of Package files that are required for +# this module. +# +##########################################################################= ###### + +[Packages] + MdePkg/MdePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + BaseLib + BaseMemoryLib + DebugLib --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025800345243.97241494804052; Fri, 6 Apr 2018 07:43:20 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 530B8226C7C52; Fri, 6 Apr 2018 07:43:19 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 74340226C7C4A for ; Fri, 6 Apr 2018 07:43:17 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 55AD81529; Fri, 6 Apr 2018 07:43:17 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AF4FD3F587; Fri, 6 Apr 2018 07:43:15 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:13 +0100 Message-Id: <20180406144223.10931-9-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 08/18] StandaloneMmPkg/MemLib: AARCH64 Specific instance of memory check library. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" MM memory check library library implementation. This library consumes MM_ACCESS_PROTOCOL to get MMRAM information. In order to use this library instance, the platform should produce all MMRAM range via MM_ACCESS_PROTOCOL, including the range for firmware (like MM Core and MM driver) and/or specific dedicated hardware. This patch provides services for MM Memory Operation. The management mode Mem Library provides function for checking if buffer is outside MMRAM and valid. It also provides functions for copy data from MMRAM to non-MMRAM, from non-MMRAM to MMRAM, from non-MMRAM to non-MMRAM, or set data in non-MMRAM. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Include/Library/MemLib.h | 140 ++++++++++++++ StandaloneMmPkg/Library/MemLib/Arm/MemLib.c | 276 ++++++++++++++++++++++++= ++++ StandaloneMmPkg/Library/MemLib/MemLib.inf | 47 +++++ 3 files changed, 463 insertions(+) create mode 100644 StandaloneMmPkg/Include/Library/MemLib.h create mode 100644 StandaloneMmPkg/Library/MemLib/Arm/MemLib.c create mode 100644 StandaloneMmPkg/Library/MemLib/MemLib.inf diff --git a/StandaloneMmPkg/Include/Library/MemLib.h b/StandaloneMmPkg/Inc= lude/Library/MemLib.h new file mode 100644 index 0000000000..3264f10010 --- /dev/null +++ b/StandaloneMmPkg/Include/Library/MemLib.h @@ -0,0 +1,140 @@ +/** @file + Provides services for MM Memory Operation. + + The MM Mem Library provides function for checking if buffer is outside M= MRAM and valid. + It also provides functions for copy data from MMRAM to non-MMRAM, from n= on-MMRAM to MMRAM, + from non-MMRAM to non-MMRAM, or set data in non-MMRAM. + + Copyright (c) 2015, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _MM_MEM_LIB_H_ +#define _MM_MEM_LIB_H_ + +/** + This function check if the buffer is valid per processor architecture an= d not overlap with MMRAM. + + @param Buffer The buffer start address to be checked. + @param Length The buffer length to be checked. + + @retval TRUE This buffer is valid per processor architecture and not ov= erlap with MMRAM. + @retval FALSE This buffer is not valid per processor architecture or ove= rlap with MMRAM. +**/ +BOOLEAN +EFIAPI +MmIsBufferOutsideMmValid ( + IN EFI_PHYSICAL_ADDRESS Buffer, + IN UINT64 Length + ); + +/** + Copies a source buffer (non-MMRAM) to a destination buffer (MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if source buffer is valid per processor architecture and not o= verlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it return EFI_SECURITY_VIOLATION. + The implementation must be reentrant. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMemToSmram ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ); + +/** + Copies a source buffer (MMRAM) to a destination buffer (NON-MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if destination buffer is valid per processor architecture and = not overlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + The implementation must be reentrant. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMemFromSmram ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ); + +/** + Copies a source buffer (NON-MMRAM) to a destination buffer (NON-MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if source buffer and destination buffer are valid per processo= r architecture and not overlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + The implementation must be reentrant, and it must handle the case where = source buffer overlaps destination buffer. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMem ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ); + +/** + Fills a target buffer (NON-MMRAM) with a byte value. + + This function fills a target buffer (non-MMRAM) with a byte value. + It checks if target buffer is valid per processor architecture and not o= verlap with MMRAM. + If the check passes, it fills memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + + @param Buffer The memory to set. + @param Length The number of bytes to set. + @param Value The value with which to fill Length bytes of Buffer. + + @retval EFI_SECURITY_VIOLATION The Buffer is invalid per processor archi= tecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is set. + +**/ +EFI_STATUS +EFIAPI +MmSetMem ( + OUT VOID *Buffer, + IN UINTN Length, + IN UINT8 Value + ); + +#endif diff --git a/StandaloneMmPkg/Library/MemLib/Arm/MemLib.c b/StandaloneMmPkg/= Library/MemLib/Arm/MemLib.c new file mode 100644 index 0000000000..432a45698b --- /dev/null +++ b/StandaloneMmPkg/Library/MemLib/Arm/MemLib.c @@ -0,0 +1,276 @@ +/** @file + Instance of MM memory check library. + + MM memory check library library implementation. This library consumes MM= _ACCESS_PROTOCOL + to get MMRAM information. In order to use this library instance, the pla= tform should produce + all MMRAM range via MM_ACCESS_PROTOCOL, including the range for firmware= (like MM Core + and MM driver) and/or specific dedicated hardware. + + Copyright (c) 2015, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + + +#include + +#include +#include +#include + +EFI_MMRAM_DESCRIPTOR *mMmMemLibInternalMmramRanges; +UINTN mMmMemLibInternalMmramCount; + +// +// Maximum support address used to check input buffer +// +EFI_PHYSICAL_ADDRESS mMmMemLibInternalMaximumSupportAddress =3D 0; + +/** + Calculate and save the maximum support address. + +**/ +VOID +MmMemLibInternalCalculateMaximumSupportAddress ( + VOID + ) +{ + UINT8 PhysicalAddressBits; + + PhysicalAddressBits =3D 36; + + // + // Save the maximum support address in one global variable + // + mMmMemLibInternalMaximumSupportAddress =3D (EFI_PHYSICAL_ADDRESS)(UINTN)= (LShiftU64 (1, PhysicalAddressBits) - 1); + DEBUG ((DEBUG_INFO, "mMmMemLibInternalMaximumSupportAddress =3D 0x%lx\n"= , mMmMemLibInternalMaximumSupportAddress)); +} + +/** + This function check if the buffer is valid per processor architecture an= d not overlap with MMRAM. + + @param Buffer The buffer start address to be checked. + @param Length The buffer length to be checked. + + @retval TRUE This buffer is valid per processor architecture and not ov= erlap with MMRAM. + @retval FALSE This buffer is not valid per processor architecture or ove= rlap with MMRAM. +**/ +BOOLEAN +EFIAPI +MmIsBufferOutsideMmValid ( + IN EFI_PHYSICAL_ADDRESS Buffer, + IN UINT64 Length + ) +{ + UINTN Index; + + // + // Check override. + // NOTE: (B:0->L:4G) is invalid for IA32, but (B:1->L:4G-1)/(B:4G-1->L:1= ) is valid. + // + if ((Length > mMmMemLibInternalMaximumSupportAddress) || + (Buffer > mMmMemLibInternalMaximumSupportAddress) || + ((Length !=3D 0) && (Buffer > (mMmMemLibInternalMaximumSupportAddres= s - (Length - 1)))) ) { + // + // Overflow happen + // + DEBUG (( + DEBUG_ERROR, + "MmIsBufferOutsideMmValid: Overflow: Buffer (0x%lx) - Length (0x%lx)= , MaximumSupportAddress (0x%lx)\n", + Buffer, + Length, + mMmMemLibInternalMaximumSupportAddress + )); + return FALSE; + } + + for (Index =3D 0; Index < mMmMemLibInternalMmramCount; Index ++) { + if (((Buffer >=3D mMmMemLibInternalMmramRanges[Index].CpuStart) && (Bu= ffer < mMmMemLibInternalMmramRanges[Index].CpuStart + mMmMemLibInternalMmra= mRanges[Index].PhysicalSize)) || + ((mMmMemLibInternalMmramRanges[Index].CpuStart >=3D Buffer) && (mM= mMemLibInternalMmramRanges[Index].CpuStart < Buffer + Length))) { + DEBUG (( + DEBUG_ERROR, + "MmIsBufferOutsideMmValid: Overlap: Buffer (0x%lx) - Length (0x%lx= ), ", + Buffer, + Length + )); + DEBUG (( + DEBUG_ERROR, + "CpuStart (0x%lx) - PhysicalSize (0x%lx)\n", + mMmMemLibInternalMmramRanges[Index].CpuStart, + mMmMemLibInternalMmramRanges[Index].PhysicalSize + )); + return FALSE; + } + } + + return TRUE; +} + +/** + Copies a source buffer (non-MMRAM) to a destination buffer (MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if source buffer is valid per processor architecture and not o= verlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it return EFI_SECURITY_VIOLATION. + The implementation must be reentrant. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMemToMmram ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ) +{ + if (!MmIsBufferOutsideMmValid ((EFI_PHYSICAL_ADDRESS)(UINTN)SourceBuffer= , Length)) { + DEBUG ((DEBUG_ERROR, "MmCopyMemToMmram: Security Violation: Source (0x= %x), Length (0x%x)\n", SourceBuffer, Length)); + return EFI_SECURITY_VIOLATION; + } + CopyMem (DestinationBuffer, SourceBuffer, Length); + return EFI_SUCCESS; +} + +/** + Copies a source buffer (MMRAM) to a destination buffer (NON-MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if destination buffer is valid per processor architecture and = not overlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + The implementation must be reentrant. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMemFromMmram ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ) +{ + if (!MmIsBufferOutsideMmValid ((EFI_PHYSICAL_ADDRESS)(UINTN)DestinationB= uffer, Length)) { + DEBUG ((DEBUG_ERROR, "MmCopyMemFromMmram: Security Violation: Destinat= ion (0x%x), Length (0x%x)\n", DestinationBuffer, Length)); + return EFI_SECURITY_VIOLATION; + } + CopyMem (DestinationBuffer, SourceBuffer, Length); + return EFI_SUCCESS; +} + +/** + Copies a source buffer (NON-MMRAM) to a destination buffer (NON-MMRAM). + + This function copies a source buffer (non-MMRAM) to a destination buffer= (MMRAM). + It checks if source buffer and destination buffer are valid per processo= r architecture and not overlap with MMRAM. + If the check passes, it copies memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + The implementation must be reentrant, and it must handle the case where = source buffer overlaps destination buffer. + + @param DestinationBuffer The pointer to the destination buffer of the= memory copy. + @param SourceBuffer The pointer to the source buffer of the memo= ry copy. + @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. + + @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is copied. + +**/ +EFI_STATUS +EFIAPI +MmCopyMem ( + OUT VOID *DestinationBuffer, + IN CONST VOID *SourceBuffer, + IN UINTN Length + ) +{ + if (!MmIsBufferOutsideMmValid ((EFI_PHYSICAL_ADDRESS)(UINTN)DestinationB= uffer, Length)) { + DEBUG ((DEBUG_ERROR, "MmCopyMem: Security Violation: Destination (0x%x= ), Length (0x%x)\n", DestinationBuffer, Length)); + return EFI_SECURITY_VIOLATION; + } + if (!MmIsBufferOutsideMmValid ((EFI_PHYSICAL_ADDRESS)(UINTN)SourceBuffer= , Length)) { + DEBUG ((DEBUG_ERROR, "MmCopyMem: Security Violation: Source (0x%x), Le= ngth (0x%x)\n", SourceBuffer, Length)); + return EFI_SECURITY_VIOLATION; + } + CopyMem (DestinationBuffer, SourceBuffer, Length); + return EFI_SUCCESS; +} + +/** + Fills a target buffer (NON-MMRAM) with a byte value. + + This function fills a target buffer (non-MMRAM) with a byte value. + It checks if target buffer is valid per processor architecture and not o= verlap with MMRAM. + If the check passes, it fills memory and returns EFI_SUCCESS. + If the check fails, it returns EFI_SECURITY_VIOLATION. + + @param Buffer The memory to set. + @param Length The number of bytes to set. + @param Value The value with which to fill Length bytes of Buffer. + + @retval EFI_SECURITY_VIOLATION The Buffer is invalid per processor archi= tecture or overlap with MMRAM. + @retval EFI_SUCCESS Memory is set. + +**/ +EFI_STATUS +EFIAPI +MmSetMem ( + OUT VOID *Buffer, + IN UINTN Length, + IN UINT8 Value + ) +{ + if (!MmIsBufferOutsideMmValid ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer, Leng= th)) { + DEBUG ((DEBUG_ERROR, "MmSetMem: Security Violation: Source (0x%x), Len= gth (0x%x)\n", Buffer, Length)); + return EFI_SECURITY_VIOLATION; + } + SetMem (Buffer, Length, Value); + return EFI_SUCCESS; +} + +/** + The constructor function initializes the Mm Mem library + + @param ImageHandle The firmware allocated handle for the EFI image. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The constructor always returns EFI_SUCCESS. + +**/ +EFI_STATUS +EFIAPI +MemLibConstructor ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ) +{ + + // + // Calculate and save maximum support address + // + MmMemLibInternalCalculateMaximumSupportAddress (); + + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Library/MemLib/MemLib.inf b/StandaloneMmPkg/Li= brary/MemLib/MemLib.inf new file mode 100644 index 0000000000..52b7c06397 --- /dev/null +++ b/StandaloneMmPkg/Library/MemLib/MemLib.inf @@ -0,0 +1,47 @@ +## @file +# Instance of MM memory check library. +# +# MM memory check library library implementation. This library consumes M= M_ACCESS_PROTOCOL +# to get MMRAM information. In order to use this library instance, the pl= atform should produce +# all MMRAM range via MM_ACCESS_PROTOCOL, including the range for firmwar= e (like MM Core +# and MM driver) and/or specific dedicated hardware. +# +# Copyright (c) 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D MemLib + FILE_GUID =3D EA355F14-6409-4716-829F-37B3BC7C7F26 + MODULE_TYPE =3D MM_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + LIBRARY_CLASS =3D MemLib|MM_STANDALONE MM_CORE_STANDALO= NE + CONSTRUCTOR =3D MemLibConstructor + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D AARCH64 +# + +[Sources.AARCH64] + Arm/MemLib.c + +[Packages] + MdePkg/MdePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + BaseMemoryLib + DebugLib --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025805575407.8054161095894; Fri, 6 Apr 2018 07:43:25 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 7D241226C7C41; Fri, 6 Apr 2018 07:43:24 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 5706E22685246 for ; Fri, 6 Apr 2018 07:43:22 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 386081529; Fri, 6 Apr 2018 07:43:22 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6E27A3F587; Fri, 6 Apr 2018 07:43:20 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:14 +0100 Message-Id: <20180406144223.10931-10-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 09/18] StandaloneMmPkg/MemoryAllocationLib: Add MM memory allocation library. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch implements management mode memory allocation services.The implementation borrows the MM Core Memory Allocation services as the primitive for memory allocation instead of using MM System Table services. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Include/Guid/MmCoreData.h | 132 +++ StandaloneMmPkg/Include/Guid/MmramMemoryReserve.h | 62 ++ .../MemoryAllocationLib/MemoryAllocationLib.c | 907 +++++++++++++++++= ++++ .../MemoryAllocationLib/MemoryAllocationLib.inf | 49 ++ .../MemoryAllocationLib/MemoryAllocationServices.h | 38 + 5 files changed, 1188 insertions(+) create mode 100644 StandaloneMmPkg/Include/Guid/MmCoreData.h create mode 100644 StandaloneMmPkg/Include/Guid/MmramMemoryReserve.h create mode 100644 StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAlloc= ationLib.c create mode 100644 StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAlloc= ationLib.inf create mode 100644 StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAlloc= ationServices.h diff --git a/StandaloneMmPkg/Include/Guid/MmCoreData.h b/StandaloneMmPkg/In= clude/Guid/MmCoreData.h new file mode 100644 index 0000000000..c0ac772014 --- /dev/null +++ b/StandaloneMmPkg/Include/Guid/MmCoreData.h @@ -0,0 +1,132 @@ +/** @file + MM Core data. + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+This program and the accompanying materials are licensed and made availabl= e under +the terms and conditions of the BSD License that accompanies this distribu= tion. +The full text of the license may be found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MM_CORE_DATA_H__ +#define __MM_CORE_DATA_H__ + +#define MM_CORE_DATA_HOB_GUID \ + { 0xa160bf99, 0x2aa4, 0x4d7d, { 0x99, 0x93, 0x89, 0x9c, 0xb1, 0x2d, 0xf3= , 0x76 }} + +extern EFI_GUID gMmCoreDataHobGuid; + +typedef struct { + // + // Address pointer to MM_CORE_PRIVATE_DATA + // + EFI_PHYSICAL_ADDRESS Address; +} MM_CORE_DATA_HOB_DATA; + + +/// +/// Define values for the communications buffer used when gEfiEventDxeDisp= atchGuid is +/// event signaled. This event is signaled by the DXE Core each time the = DXE Core +/// dispatcher has completed its work. When this event is signaled, the M= M Core +/// if notified, so the MM Core can dispatch MM drivers. If COMM_BUFFER_M= M_DISPATCH_ERROR +/// is returned in the communication buffer, then an error occurred dispat= ching MM +/// Drivers. If COMM_BUFFER_MM_DISPATCH_SUCCESS is returned, then the MM = Core +/// dispatched all the drivers it could. If COMM_BUFFER_MM_DISPATCH_RESTA= RT is +/// returned, then the MM Core just dispatched the MM Driver that register= ed +/// the MM Entry Point enabling the use of MM Mode. In this case, the MM = Core +/// should be notified again to dispatch more MM Drivers using MM Mode. +/// +#define COMM_BUFFER_MM_DISPATCH_ERROR 0x00 +#define COMM_BUFFER_MM_DISPATCH_SUCCESS 0x01 +#define COMM_BUFFER_MM_DISPATCH_RESTART 0x02 + +/// +/// Signature for the private structure shared between the MM IPL and the = MM Core +/// +#define MM_CORE_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('m', 'm', 'i', 'c') + +/// +/// Private structure that is used to share information between the MM IPL= and +/// the MM Core. This structure is allocated from memory of type EfiRunti= meServicesData. +/// Since runtime memory types are converted to available memory when a le= gacy boot +/// is performed, the MM Core must not access any fields of this structure= if a legacy +/// boot is performed. As a result, the MM IPL must create an event notif= ication +/// for the Legacy Boot event and notify the MM Core that a legacy boot is= being +/// performed. The MM Core can then use this information to filter access= es to +/// thos structure. +/// +typedef struct { + UINT64 Signature; + + /// + /// The number of MMRAM ranges passed from the MM IPL to the MM Core. T= he MM + /// Core uses these ranges of MMRAM to initialize the MM Core memory man= ager. + /// + UINT64 MmramRangeCount; + + /// + /// A table of MMRAM ranges passed from the MM IPL to the MM Core. The = MM + /// Core uses these ranges of MMRAM to initialize the MM Core memory man= ager. + /// + EFI_PHYSICAL_ADDRESS MmramRanges; + + /// + /// The MM Foundation Entry Point. The MM Core fills in this field when= the + /// MM Core is initialized. The MM IPL is responsbile for registering t= his entry + /// point with the MM Configuration Protocol. The MM Configuration Prot= ocol may + /// not be available at the time the MM IPL and MM Core are started, so = the MM IPL + /// sets up a protocol notification on the MM Configuration Protocol and= registers + /// the MM Foundation Entry Point as soon as the MM Configuration Protoc= ol is + /// available. + /// + EFI_PHYSICAL_ADDRESS MmEntryPoint; + + /// + /// Boolean flag set to TRUE while an MMI is being processed by the MM C= ore. + /// + BOOLEAN MmEntryPointRegistered; + + /// + /// Boolean flag set to TRUE while an MMI is being processed by the MM C= ore. + /// + BOOLEAN InMm; + + /// + /// This field is set by the MM Core then the MM Core is initialized. T= his field is + /// used by the MM Base 2 Protocol and MM Communication Protocol impleme= ntations in + /// the MM IPL. + /// + EFI_PHYSICAL_ADDRESS Mmst; + + /// + /// This field is used by the MM Communicatioon Protocol to pass a buffe= r into + /// a software MMI handler and for the software MMI handler to pass a bu= ffer back to + /// the caller of the MM Communication Protocol. + /// + EFI_PHYSICAL_ADDRESS CommunicationBuffer; + + /// + /// This field is used by the MM Communicatioon Protocol to pass the siz= e of a buffer, + /// in bytes, into a software MMI handler and for the software MMI handl= er to pass the + /// size, in bytes, of a buffer back to the caller of the MM Communicati= on Protocol. + /// + UINT64 BufferSize; + + /// + /// This field is used by the MM Communication Protocol to pass the retu= rn status from + /// a software MMI handler back to the caller of the MM Communication Pr= otocol. + /// + UINT64 ReturnStatus; + + EFI_PHYSICAL_ADDRESS MmCoreImageBase; + UINT64 MmCoreImageSize; + EFI_PHYSICAL_ADDRESS MmCoreEntryPoint; + + EFI_PHYSICAL_ADDRESS StandaloneBfvAddress; +} MM_CORE_PRIVATE_DATA; + +#endif diff --git a/StandaloneMmPkg/Include/Guid/MmramMemoryReserve.h b/Standalone= MmPkg/Include/Guid/MmramMemoryReserve.h new file mode 100644 index 0000000000..c4104b755d --- /dev/null +++ b/StandaloneMmPkg/Include/Guid/MmramMemoryReserve.h @@ -0,0 +1,62 @@ +/** @file + Definition of GUIDed HOB for reserving MMRAM regions. + + This file defines: + * the GUID used to identify the GUID HOB for reserving MMRAM regions. + * the data structure of MMRAM descriptor to describe MMRAM candidate reg= ions + * values of state of MMRAM candidate regions + * the GUID specific data structure of HOB for reserving MMRAM regions. + This GUIDed HOB can be used to convey the existence of the T-SEG reserva= tion and H-SEG usage + +Copyright (c) 2007 - 2010, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials are licensed and made availabl= e under +the terms and conditions of the BSD License that accompanies this distribu= tion. +The full text of the license may be found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + + @par Revision Reference: + GUIDs defined in MmCis spec version 0.9. + +**/ + +#ifndef _EFI_MM_PEI_MMRAM_MEMORY_RESERVE_H_ +#define _EFI_MM_PEI_MMRAM_MEMORY_RESERVE_H_ + +#define EFI_MM_PEI_MMRAM_MEMORY_RESERVE \ + { \ + 0x0703f912, 0xbf8d, 0x4e2a, {0xbe, 0x07, 0xab, 0x27, 0x25, 0x25, 0xc5,= 0x92 } \ + } + +/** +* GUID specific data structure of HOB for reserving MMRAM regions. +* +* Inconsistent with specification here: +* EFI_HOB_MMRAM_DESCRIPTOR_BLOCK has been changed to EFI_MMRAM_HOB_DESCRIP= TOR_BLOCK. +* This inconsistency is kept in code in order for backward compatibility. +**/ +typedef struct { + /// + /// Designates the number of possible regions in the system + /// that can be usable for MMRAM. + /// + /// Inconsistent with specification here: + /// In Framework MM CIS 0.91 specification, it defines the field type as= UINTN. + /// However, HOBs are supposed to be CPU neutral, so UINT32 should be us= ed instead. + /// + UINT32 NumberOfMmReservedRegions; + /// + /// Used throughout this protocol to describe the candidate + /// regions for MMRAM that are supported by this platform. + /// + EFI_MMRAM_DESCRIPTOR Descriptor[1]; +} EFI_MMRAM_HOB_DESCRIPTOR_BLOCK; + +extern EFI_GUID gEfiMmPeiSmramMemoryReserveGuid; + +#endif + diff --git a/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLi= b.c b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLib.c new file mode 100644 index 0000000000..c177a8f538 --- /dev/null +++ b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLib.c @@ -0,0 +1,907 @@ +/** @file + Support routines for memory allocation routines based on Standalone MM C= ore internal functions. + + Copyright (c) 2015, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include + +#include +#include +#include +#include +#include +#include "MemoryAllocationServices.h" + +EFI_MM_SYSTEM_TABLE *gMmst =3D NULL; + +/** + Allocates one or more 4KB pages of a certain memory type. + + Allocates the number of 4KB pages of a certain memory type and returns a= pointer to the allocated + buffer. The buffer returned is aligned on a 4KB boundary. If Pages is = 0, then NULL is returned. + If there is not enough memory remaining to satisfy the request, then NUL= L is returned. + + @param MemoryType The type of memory to allocate. + @param Pages The number of 4 KB pages to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalAllocatePages ( + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN Pages + ) +{ + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS Memory; + + if (Pages =3D=3D 0) { + return NULL; + } + + Status =3D gMmst->MmAllocatePages (AllocateAnyPages, MemoryType, Pages, = &Memory); + if (EFI_ERROR (Status)) { + return NULL; + } + return (VOID *) (UINTN) Memory; +} + +/** + Allocates one or more 4KB pages of type EfiBootServicesData. + + Allocates the number of 4KB pages of type EfiBootServicesData and return= s a pointer to the + allocated buffer. The buffer returned is aligned on a 4KB boundary. If= Pages is 0, then NULL + is returned. If there is not enough memory remaining to satisfy the req= uest, then NULL is + returned. + + @param Pages The number of 4 KB pages to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocatePages ( + IN UINTN Pages + ) +{ + return InternalAllocatePages (EfiRuntimeServicesData, Pages); +} + +/** + Allocates one or more 4KB pages of type EfiRuntimeServicesData. + + Allocates the number of 4KB pages of type EfiRuntimeServicesData and ret= urns a pointer to the + allocated buffer. The buffer returned is aligned on a 4KB boundary. If= Pages is 0, then NULL + is returned. If there is not enough memory remaining to satisfy the req= uest, then NULL is + returned. + + @param Pages The number of 4 KB pages to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateRuntimePages ( + IN UINTN Pages + ) +{ + return InternalAllocatePages (EfiRuntimeServicesData, Pages); +} + +/** + Allocates one or more 4KB pages of type EfiReservedMemoryType. + + Allocates the number of 4KB pages of type EfiReservedMemoryType and retu= rns a pointer to the + allocated buffer. The buffer returned is aligned on a 4KB boundary. If= Pages is 0, then NULL + is returned. If there is not enough memory remaining to satisfy the req= uest, then NULL is + returned. + + @param Pages The number of 4 KB pages to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateReservedPages ( + IN UINTN Pages + ) +{ + return NULL; +} + +/** + Frees one or more 4KB pages that were previously allocated with one of t= he page allocation + functions in the Memory Allocation Library. + + Frees the number of 4KB pages specified by Pages from the buffer specifi= ed by Buffer. Buffer + must have been allocated on a previous call to the page allocation servi= ces of the Memory + Allocation Library. If it is not possible to free allocated pages, then= this function will + perform no actions. + + If Buffer was not allocated with a page allocation function in the Memor= y Allocation Library, + then ASSERT(). + If Pages is zero, then ASSERT(). + + @param Buffer Pointer to the buffer of pages to free. + @param Pages The number of 4 KB pages to free. + +**/ +VOID +EFIAPI +FreePages ( + IN VOID *Buffer, + IN UINTN Pages + ) +{ + EFI_STATUS Status; + + ASSERT (Pages !=3D 0); + Status =3D gMmst->MmFreePages ((EFI_PHYSICAL_ADDRESS) (UINTN) Buffer, Pa= ges); + ASSERT_EFI_ERROR (Status); +} + +/** + Allocates one or more 4KB pages of a certain memory type at a specified = alignment. + + Allocates the number of 4KB pages specified by Pages of a certain memory= type with an alignment + specified by Alignment. The allocated buffer is returned. If Pages is = 0, then NULL is returned. + If there is not enough memory at the specified alignment remaining to sa= tisfy the request, then + NULL is returned. + If Alignment is not a power of two and Alignment is not zero, then ASSER= T(). + If Pages plus EFI_SIZE_TO_PAGES (Alignment) overflows, then ASSERT(). + + @param MemoryType The type of memory to allocate. + @param Pages The number of 4 KB pages to allocate. + @param Alignment The requested alignment of the allocation.= Must be a power of two. + If Alignment is zero, then byte alignment = is used. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalAllocateAlignedPages ( + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN Pages, + IN UINTN Alignment + ) +{ + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS Memory; + UINTN AlignedMemory; + UINTN AlignmentMask; + UINTN UnalignedPages; + UINTN RealPages; + + // + // Alignment must be a power of two or zero. + // + ASSERT ((Alignment & (Alignment - 1)) =3D=3D 0); + + if (Pages =3D=3D 0) { + return NULL; + } + if (Alignment > EFI_PAGE_SIZE) { + // + // Calculate the total number of pages since alignment is larger than = page size. + // + AlignmentMask =3D Alignment - 1; + RealPages =3D Pages + EFI_SIZE_TO_PAGES (Alignment); + // + // Make sure that Pages plus EFI_SIZE_TO_PAGES (Alignment) does not ov= erflow. + // + ASSERT (RealPages > Pages); + + Status =3D gMmst->MmAllocatePages (AllocateAnyPages, MemoryTyp= e, RealPages, &Memory); + if (EFI_ERROR (Status)) { + return NULL; + } + AlignedMemory =3D ((UINTN) Memory + AlignmentMask) & ~AlignmentMask; + UnalignedPages =3D EFI_SIZE_TO_PAGES (AlignedMemory - (UINTN) Memory); + if (UnalignedPages > 0) { + // + // Free first unaligned page(s). + // + Status =3D gMmst->MmFreePages (Memory, UnalignedPages); + ASSERT_EFI_ERROR (Status); + } + Memory =3D (EFI_PHYSICAL_ADDRESS) (AlignedMemory + EFI_PAGES_T= O_SIZE (Pages)); + UnalignedPages =3D RealPages - Pages - UnalignedPages; + if (UnalignedPages > 0) { + // + // Free last unaligned page(s). + // + Status =3D gMmst->MmFreePages (Memory, UnalignedPages); + ASSERT_EFI_ERROR (Status); + } + } else { + // + // Do not over-allocate pages in this case. + // + Status =3D gMmst->MmAllocatePages (AllocateAnyPages, MemoryType, Pages= , &Memory); + if (EFI_ERROR (Status)) { + return NULL; + } + AlignedMemory =3D (UINTN) Memory; + } + return (VOID *) AlignedMemory; +} + +/** + Allocates one or more 4KB pages of type EfiBootServicesData at a specifi= ed alignment. + + Allocates the number of 4KB pages specified by Pages of type EfiBootServ= icesData with an + alignment specified by Alignment. The allocated buffer is returned. If= Pages is 0, then NULL is + returned. If there is not enough memory at the specified alignment rema= ining to satisfy the + request, then NULL is returned. + + If Alignment is not a power of two and Alignment is not zero, then ASSER= T(). + If Pages plus EFI_SIZE_TO_PAGES (Alignment) overflows, then ASSERT(). + + @param Pages The number of 4 KB pages to allocate. + @param Alignment The requested alignment of the allocation.= Must be a power of two. + If Alignment is zero, then byte alignment = is used. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateAlignedPages ( + IN UINTN Pages, + IN UINTN Alignment + ) +{ + return InternalAllocateAlignedPages (EfiRuntimeServicesData, Pages, Alig= nment); +} + +/** + Allocates one or more 4KB pages of type EfiRuntimeServicesData at a spec= ified alignment. + + Allocates the number of 4KB pages specified by Pages of type EfiRuntimeS= ervicesData with an + alignment specified by Alignment. The allocated buffer is returned. If= Pages is 0, then NULL is + returned. If there is not enough memory at the specified alignment rema= ining to satisfy the + request, then NULL is returned. + + If Alignment is not a power of two and Alignment is not zero, then ASSER= T(). + If Pages plus EFI_SIZE_TO_PAGES (Alignment) overflows, then ASSERT(). + + @param Pages The number of 4 KB pages to allocate. + @param Alignment The requested alignment of the allocation.= Must be a power of two. + If Alignment is zero, then byte alignment = is used. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateAlignedRuntimePages ( + IN UINTN Pages, + IN UINTN Alignment + ) +{ + return InternalAllocateAlignedPages (EfiRuntimeServicesData, Pages, Alig= nment); +} + +/** + Allocates one or more 4KB pages of type EfiReservedMemoryType at a speci= fied alignment. + + Allocates the number of 4KB pages specified by Pages of type EfiReserved= MemoryType with an + alignment specified by Alignment. The allocated buffer is returned. If= Pages is 0, then NULL is + returned. If there is not enough memory at the specified alignment rema= ining to satisfy the + request, then NULL is returned. + + If Alignment is not a power of two and Alignment is not zero, then ASSER= T(). + If Pages plus EFI_SIZE_TO_PAGES (Alignment) overflows, then ASSERT(). + + @param Pages The number of 4 KB pages to allocate. + @param Alignment The requested alignment of the allocation.= Must be a power of two. + If Alignment is zero, then byte alignment = is used. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateAlignedReservedPages ( + IN UINTN Pages, + IN UINTN Alignment + ) +{ + return NULL; +} + +/** + Frees one or more 4KB pages that were previously allocated with one of t= he aligned page + allocation functions in the Memory Allocation Library. + + Frees the number of 4KB pages specified by Pages from the buffer specifi= ed by Buffer. Buffer + must have been allocated on a previous call to the aligned page allocati= on services of the Memory + Allocation Library. If it is not possible to free allocated pages, then= this function will + perform no actions. + + If Buffer was not allocated with an aligned page allocation function in = the Memory Allocation + Library, then ASSERT(). + If Pages is zero, then ASSERT(). + + @param Buffer Pointer to the buffer of pages to free. + @param Pages The number of 4 KB pages to free. + +**/ +VOID +EFIAPI +FreeAlignedPages ( + IN VOID *Buffer, + IN UINTN Pages + ) +{ + EFI_STATUS Status; + + ASSERT (Pages !=3D 0); + Status =3D gMmst->MmFreePages ((EFI_PHYSICAL_ADDRESS) (UINTN) Buffer, Pa= ges); + ASSERT_EFI_ERROR (Status); +} + +/** + Allocates a buffer of a certain pool type. + + Allocates the number bytes specified by AllocationSize of a certain pool= type and returns a + pointer to the allocated buffer. If AllocationSize is 0, then a valid b= uffer of 0 size is + returned. If there is not enough memory remaining to satisfy the reques= t, then NULL is returned. + + @param MemoryType The type of memory to allocate. + @param AllocationSize The number of bytes to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalAllocatePool ( + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN AllocationSize + ) +{ + EFI_STATUS Status; + VOID *Memory; + + Memory =3D NULL; + + Status =3D gMmst->MmAllocatePool (MemoryType, AllocationSize, &Memory); + if (EFI_ERROR (Status)) { + Memory =3D NULL; + } + return Memory; +} + +/** + Allocates a buffer of type EfiBootServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiBootSe= rvicesData and returns a + pointer to the allocated buffer. If AllocationSize is 0, then a valid b= uffer of 0 size is + returned. If there is not enough memory remaining to satisfy the reques= t, then NULL is returned. + + @param AllocationSize The number of bytes to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocatePool ( + IN UINTN AllocationSize + ) +{ + return InternalAllocatePool (EfiRuntimeServicesData, AllocationSize); +} + +/** + Allocates a buffer of type EfiRuntimeServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiRuntim= eServicesData and returns + a pointer to the allocated buffer. If AllocationSize is 0, then a valid= buffer of 0 size is + returned. If there is not enough memory remaining to satisfy the reques= t, then NULL is returned. + + @param AllocationSize The number of bytes to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateRuntimePool ( + IN UINTN AllocationSize + ) +{ + return InternalAllocatePool (EfiRuntimeServicesData, AllocationSize); +} + +/** + Allocates a buffer of type EfiReservedMemoryType. + + Allocates the number bytes specified by AllocationSize of type EfiReserv= edMemoryType and returns + a pointer to the allocated buffer. If AllocationSize is 0, then a valid= buffer of 0 size is + returned. If there is not enough memory remaining to satisfy the reques= t, then NULL is returned. + + @param AllocationSize The number of bytes to allocate. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateReservedPool ( + IN UINTN AllocationSize + ) +{ + return NULL; +} + +/** + Allocates and zeros a buffer of a certain pool type. + + Allocates the number bytes specified by AllocationSize of a certain pool= type, clears the buffer + with zeros, and returns a pointer to the allocated buffer. If Allocatio= nSize is 0, then a valid + buffer of 0 size is returned. If there is not enough memory remaining t= o satisfy the request, + then NULL is returned. + + @param PoolType The type of memory to allocate. + @param AllocationSize The number of bytes to allocate and zero. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalAllocateZeroPool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN AllocationSize + ) +{ + VOID *Memory; + + Memory =3D InternalAllocatePool (PoolType, AllocationSize); + if (Memory !=3D NULL) { + Memory =3D ZeroMem (Memory, AllocationSize); + } + return Memory; +} + +/** + Allocates and zeros a buffer of type EfiBootServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiBootSe= rvicesData, clears the + buffer with zeros, and returns a pointer to the allocated buffer. If Al= locationSize is 0, then a + valid buffer of 0 size is returned. If there is not enough memory remai= ning to satisfy the + request, then NULL is returned. + + @param AllocationSize The number of bytes to allocate and zero. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateZeroPool ( + IN UINTN AllocationSize + ) +{ + return InternalAllocateZeroPool (EfiRuntimeServicesData, AllocationSize); +} + +/** + Allocates and zeros a buffer of type EfiRuntimeServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiRuntim= eServicesData, clears the + buffer with zeros, and returns a pointer to the allocated buffer. If Al= locationSize is 0, then a + valid buffer of 0 size is returned. If there is not enough memory remai= ning to satisfy the + request, then NULL is returned. + + @param AllocationSize The number of bytes to allocate and zero. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateRuntimeZeroPool ( + IN UINTN AllocationSize + ) +{ + return InternalAllocateZeroPool (EfiRuntimeServicesData, AllocationSize); +} + +/** + Allocates and zeros a buffer of type EfiReservedMemoryType. + + Allocates the number bytes specified by AllocationSize of type EfiReserv= edMemoryType, clears the + buffer with zeros, and returns a pointer to the allocated buffer. If Al= locationSize is 0, then a + valid buffer of 0 size is returned. If there is not enough memory remai= ning to satisfy the + request, then NULL is returned. + + @param AllocationSize The number of bytes to allocate and zero. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateReservedZeroPool ( + IN UINTN AllocationSize + ) +{ + return NULL; +} + +/** + Copies a buffer to an allocated buffer of a certain pool type. + + Allocates the number bytes specified by AllocationSize of a certain pool= type, copies + AllocationSize bytes from Buffer to the newly allocated buffer, and retu= rns a pointer to the + allocated buffer. If AllocationSize is 0, then a valid buffer of 0 size= is returned. If there + is not enough memory remaining to satisfy the request, then NULL is retu= rned. + If Buffer is NULL, then ASSERT(). + If AllocationSize is greater than (MAX_ADDRESS - Buffer + 1), then ASSER= T(). + + @param PoolType The type of pool to allocate. + @param AllocationSize The number of bytes to allocate and zero. + @param Buffer The buffer to copy to the allocated buffer. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalAllocateCopyPool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN AllocationSize, + IN CONST VOID *Buffer + ) +{ + VOID *Memory; + + ASSERT (Buffer !=3D NULL); + ASSERT (AllocationSize <=3D (MAX_ADDRESS - (UINTN) Buffer + 1)); + + Memory =3D InternalAllocatePool (PoolType, AllocationSize); + if (Memory !=3D NULL) { + Memory =3D CopyMem (Memory, Buffer, AllocationSize); + } + return Memory; +} + +/** + Copies a buffer to an allocated buffer of type EfiBootServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiBootSe= rvicesData, copies + AllocationSize bytes from Buffer to the newly allocated buffer, and retu= rns a pointer to the + allocated buffer. If AllocationSize is 0, then a valid buffer of 0 size= is returned. If there + is not enough memory remaining to satisfy the request, then NULL is retu= rned. + + If Buffer is NULL, then ASSERT(). + If AllocationSize is greater than (MAX_ADDRESS - Buffer + 1), then ASSER= T(). + + @param AllocationSize The number of bytes to allocate and zero. + @param Buffer The buffer to copy to the allocated buffer. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateCopyPool ( + IN UINTN AllocationSize, + IN CONST VOID *Buffer + ) +{ + return InternalAllocateCopyPool (EfiRuntimeServicesData, AllocationSize,= Buffer); +} + +/** + Copies a buffer to an allocated buffer of type EfiRuntimeServicesData. + + Allocates the number bytes specified by AllocationSize of type EfiRuntim= eServicesData, copies + AllocationSize bytes from Buffer to the newly allocated buffer, and retu= rns a pointer to the + allocated buffer. If AllocationSize is 0, then a valid buffer of 0 size= is returned. If there + is not enough memory remaining to satisfy the request, then NULL is retu= rned. + + If Buffer is NULL, then ASSERT(). + If AllocationSize is greater than (MAX_ADDRESS - Buffer + 1), then ASSER= T(). + + @param AllocationSize The number of bytes to allocate and zero. + @param Buffer The buffer to copy to the allocated buffer. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateRuntimeCopyPool ( + IN UINTN AllocationSize, + IN CONST VOID *Buffer + ) +{ + return InternalAllocateCopyPool (EfiRuntimeServicesData, AllocationSize,= Buffer); +} + +/** + Copies a buffer to an allocated buffer of type EfiReservedMemoryType. + + Allocates the number bytes specified by AllocationSize of type EfiReserv= edMemoryType, copies + AllocationSize bytes from Buffer to the newly allocated buffer, and retu= rns a pointer to the + allocated buffer. If AllocationSize is 0, then a valid buffer of 0 size= is returned. If there + is not enough memory remaining to satisfy the request, then NULL is retu= rned. + + If Buffer is NULL, then ASSERT(). + If AllocationSize is greater than (MAX_ADDRESS - Buffer + 1), then ASSER= T(). + + @param AllocationSize The number of bytes to allocate and zero. + @param Buffer The buffer to copy to the allocated buffer. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +AllocateReservedCopyPool ( + IN UINTN AllocationSize, + IN CONST VOID *Buffer + ) +{ + return NULL; +} + +/** + Reallocates a buffer of a specified memory type. + + Allocates and zeros the number bytes specified by NewSize from memory of= the type + specified by PoolType. If OldBuffer is not NULL, then the smaller of Ol= dSize and + NewSize bytes are copied from OldBuffer to the newly allocated buffer, a= nd + OldBuffer is freed. A pointer to the newly allocated buffer is returned. + If NewSize is 0, then a valid buffer of 0 size is returned. If there i= s not + enough memory remaining to satisfy the request, then NULL is returned. + + If the allocation of the new buffer is successful and the smaller of New= Size and OldSize + is greater than (MAX_ADDRESS - OldBuffer + 1), then ASSERT(). + + @param PoolType The type of pool to allocate. + @param OldSize The size, in bytes, of OldBuffer. + @param NewSize The size, in bytes, of the buffer to reallocate. + @param OldBuffer The buffer to copy to the allocated buffer. This= is an optional + parameter that may be NULL. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +InternalReallocatePool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN OldSize, + IN UINTN NewSize, + IN VOID *OldBuffer OPTIONAL + ) +{ + VOID *NewBuffer; + + NewBuffer =3D InternalAllocateZeroPool (PoolType, NewSize); + if (NewBuffer !=3D NULL && OldBuffer !=3D NULL) { + CopyMem (NewBuffer, OldBuffer, MIN (OldSize, NewSize)); + FreePool (OldBuffer); + } + return NewBuffer; +} + +/** + Reallocates a buffer of type EfiBootServicesData. + + Allocates and zeros the number bytes specified by NewSize from memory of= type + EfiBootServicesData. If OldBuffer is not NULL, then the smaller of OldS= ize and + NewSize bytes are copied from OldBuffer to the newly allocated buffer, a= nd + OldBuffer is freed. A pointer to the newly allocated buffer is returned. + If NewSize is 0, then a valid buffer of 0 size is returned. If there i= s not + enough memory remaining to satisfy the request, then NULL is returned. + + If the allocation of the new buffer is successful and the smaller of New= Size and OldSize + is greater than (MAX_ADDRESS - OldBuffer + 1), then ASSERT(). + + @param OldSize The size, in bytes, of OldBuffer. + @param NewSize The size, in bytes, of the buffer to reallocate. + @param OldBuffer The buffer to copy to the allocated buffer. This= is an optional + parameter that may be NULL. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +ReallocatePool ( + IN UINTN OldSize, + IN UINTN NewSize, + IN VOID *OldBuffer OPTIONAL + ) +{ + return InternalReallocatePool (EfiRuntimeServicesData, OldSize, NewSize,= OldBuffer); +} + +/** + Reallocates a buffer of type EfiRuntimeServicesData. + + Allocates and zeros the number bytes specified by NewSize from memory of= type + EfiRuntimeServicesData. If OldBuffer is not NULL, then the smaller of O= ldSize and + NewSize bytes are copied from OldBuffer to the newly allocated buffer, a= nd + OldBuffer is freed. A pointer to the newly allocated buffer is returned. + If NewSize is 0, then a valid buffer of 0 size is returned. If there i= s not + enough memory remaining to satisfy the request, then NULL is returned. + + If the allocation of the new buffer is successful and the smaller of New= Size and OldSize + is greater than (MAX_ADDRESS - OldBuffer + 1), then ASSERT(). + + @param OldSize The size, in bytes, of OldBuffer. + @param NewSize The size, in bytes, of the buffer to reallocate. + @param OldBuffer The buffer to copy to the allocated buffer. This= is an optional + parameter that may be NULL. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +ReallocateRuntimePool ( + IN UINTN OldSize, + IN UINTN NewSize, + IN VOID *OldBuffer OPTIONAL + ) +{ + return InternalReallocatePool (EfiRuntimeServicesData, OldSize, NewSize,= OldBuffer); +} + +/** + Reallocates a buffer of type EfiReservedMemoryType. + + Allocates and zeros the number bytes specified by NewSize from memory of= type + EfiReservedMemoryType. If OldBuffer is not NULL, then the smaller of Ol= dSize and + NewSize bytes are copied from OldBuffer to the newly allocated buffer, a= nd + OldBuffer is freed. A pointer to the newly allocated buffer is returned. + If NewSize is 0, then a valid buffer of 0 size is returned. If there i= s not + enough memory remaining to satisfy the request, then NULL is returned. + + If the allocation of the new buffer is successful and the smaller of New= Size and OldSize + is greater than (MAX_ADDRESS - OldBuffer + 1), then ASSERT(). + + @param OldSize The size, in bytes, of OldBuffer. + @param NewSize The size, in bytes, of the buffer to reallocate. + @param OldBuffer The buffer to copy to the allocated buffer. This= is an optional + parameter that may be NULL. + + @return A pointer to the allocated buffer or NULL if allocation fails. + +**/ +VOID * +EFIAPI +ReallocateReservedPool ( + IN UINTN OldSize, + IN UINTN NewSize, + IN VOID *OldBuffer OPTIONAL + ) +{ + return NULL; +} + +/** + Frees a buffer that was previously allocated with one of the pool alloca= tion functions in the + Memory Allocation Library. + + Frees the buffer specified by Buffer. Buffer must have been allocated o= n a previous call to the + pool allocation services of the Memory Allocation Library. If it is not= possible to free pool + resources, then this function will perform no actions. + + If Buffer was not allocated with a pool allocation function in the Memor= y Allocation Library, + then ASSERT(). + + @param Buffer Pointer to the buffer to free. + +**/ +VOID +EFIAPI +FreePool ( + IN VOID *Buffer + ) +{ + EFI_STATUS Status; + + Status =3D gMmst->MmFreePool (Buffer); + ASSERT_EFI_ERROR (Status); +} + +/** + The constructor function calls MmInitializeMemoryServices to initialize + memory in MMRAM and caches EFI_MM_SYSTEM_TABLE pointer. + + @param ImageHandle The firmware allocated handle for the EFI image. + @param SystemTable A pointer to the Management mode System Table. + + @retval EFI_SUCCESS The constructor always returns EFI_SUCCESS. + +**/ +EFI_STATUS +EFIAPI +MemoryAllocationLibConstructor ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ) +{ + MM_CORE_PRIVATE_DATA *MmCorePrivate; + EFI_HOB_GUID_TYPE *GuidHob; + MM_CORE_DATA_HOB_DATA *DataInHob; + VOID *HobStart; + EFI_MMRAM_HOB_DESCRIPTOR_BLOCK *MmramRangesHobData; + EFI_MMRAM_DESCRIPTOR *MmramRanges; + UINT32 MmramRangeCount; + EFI_HOB_GUID_TYPE *MmramRangesHob; + + HobStart =3D GetHobList (); + DEBUG ((DEBUG_INFO, "StandaloneMmCoreMemoryAllocationLibConstructor - 0x= %x\n", HobStart)); + + // + // Extract MM Core Private context from the Hob. If absent search for + // a Hob containing the MMRAM ranges + // + GuidHob =3D GetNextGuidHob (&gMmCoreDataHobGuid, HobStart); + if (GuidHob =3D=3D NULL) { + MmramRangesHob =3D GetNextGuidHob (&gEfiMmPeiMmramMemoryReserveGuid, H= obStart); + if (MmramRangesHob =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + + MmramRangesHobData =3D GET_GUID_HOB_DATA (MmramRangesHob); + if (MmramRangesHobData =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + + MmramRanges =3D MmramRangesHobData->Descriptor; + if (MmramRanges =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + + MmramRangeCount =3D MmramRangesHobData->NumberOfMmReservedRegions; + if (MmramRanges =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + + } else { + DataInHob =3D GET_GUID_HOB_DATA (GuidHob); + MmCorePrivate =3D (MM_CORE_PRIVATE_DATA *)(UINTN)DataInHob->Address; + MmramRanges =3D (EFI_MMRAM_DESCRIPTOR *)(UINTN)MmCorePrivate->Mmra= mRanges; + MmramRangeCount =3D MmCorePrivate->MmramRangeCount; + } + + { + UINTN Index; + + DEBUG ((DEBUG_INFO, "MmramRangeCount - 0x%x\n", MmramRangeCount)); + for (Index =3D 0; Index < MmramRangeCount; Index++) { + DEBUG ((DEBUG_INFO, "MmramRanges[%d]: 0x%016lx - 0x%016lx\n", Index,= MmramRanges[Index].CpuStart, MmramRanges[Index].PhysicalSize)); + } + } + + // + // Initialize memory service using free MMRAM + // + DEBUG ((DEBUG_INFO, "MmInitializeMemoryServices\n")); + MmInitializeMemoryServices ((UINTN)MmramRangeCount, (VOID *)(UINTN)Mmram= Ranges); + + // Initialize MM Services Table + gMmst =3D MmSystemTable; + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLi= b.inf b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLib.inf new file mode 100644 index 0000000000..068607f90e --- /dev/null +++ b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLib.inf @@ -0,0 +1,49 @@ +## @file +# Memory Allocation Library instance dedicated to MM Core. +# The implementation borrows the MM Core Memory Allocation services as the= primitive +# for memory allocation instead of using MM System Table servces in an ind= irect way. +# It is assumed that this library instance must be linked with MM Core in = this package. +# +# Copyright (c) 2010 - 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D MemoryAllocationLib + FILE_GUID =3D DCDCBE1D-E760-4E1D-85B4-96E3F0439C41 + MODULE_TYPE =3D MM_CORE_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + LIBRARY_CLASS =3D MemoryAllocationLib|MM_CORE_STANDALONE + CONSTRUCTOR =3D MemoryAllocationLibConstructor + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D IA32 X64 +# + +[Sources] + MemoryAllocationLib.c + MemoryAllocationServices.h + +[Packages] + MdePkg/MdePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + BaseMemoryLib + DebugLib + HobLib + +[Guids] + gEfiMmPeiMmramMemoryReserveGuid diff --git a/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationSe= rvices.h b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationServ= ices.h new file mode 100644 index 0000000000..eb4f4c3984 --- /dev/null +++ b/StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationServices.h @@ -0,0 +1,38 @@ +/** @file + Contains function prototypes for Memory Services in the MM Core. + + This header file borrows the StandaloneMmCore Memory Allocation services= as the primitive + for memory allocation. + + Copyright (c) 2008 - 2015, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _PI_MM_CORE_MEMORY_ALLOCATION_SERVICES_H_ +#define _PI_MM_CORE_MEMORY_ALLOCATION_SERVICES_H_ + +#include + +/** + Called to initialize the memory service. + + @param MmramRangeCount Number of MMRAM Regions + @param MmramRanges Pointer to MMRAM Descriptors + +**/ +VOID +MmInitializeMemoryServices ( + IN UINTN MmramRangeCount, + IN EFI_MMRAM_DESCRIPTOR *MmramRanges + ); + +#endif --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025808031528.5811838203176; Fri, 6 Apr 2018 07:43:28 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id A808722620E60; Fri, 6 Apr 2018 07:43:26 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 0337122685246 for ; Fri, 6 Apr 2018 07:43:25 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D71E4164F; Fri, 6 Apr 2018 07:43:25 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3BCAE3F587; Fri, 6 Apr 2018 07:43:24 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:15 +0100 Message-Id: <20180406144223.10931-11-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 10/18] StandaloneMmPkg/HobLib: Add AARCH64 Specific HOB Library for management mode. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The Standalone MM environment is initialized during the SEC phase on ARM Standard Platforms. The MM Core driver implements an entry point module which is architecture specific and runs prior to the generic core driver code. The former creates a Hob list that the latter consumes. This happens in the same phase. This patch implements a Hob library that can be used by the entry point module to produce a Hob list and by the core driver code to consume it. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Library/HobLib/Arm/HobLib.c | 697 ++++++++++++++++++++++++= ++++ StandaloneMmPkg/Library/HobLib/HobLib.inf | 45 ++ 2 files changed, 742 insertions(+) create mode 100644 StandaloneMmPkg/Library/HobLib/Arm/HobLib.c create mode 100644 StandaloneMmPkg/Library/HobLib/HobLib.inf diff --git a/StandaloneMmPkg/Library/HobLib/Arm/HobLib.c b/StandaloneMmPkg/= Library/HobLib/Arm/HobLib.c new file mode 100644 index 0000000000..62abf47f95 --- /dev/null +++ b/StandaloneMmPkg/Library/HobLib/Arm/HobLib.c @@ -0,0 +1,697 @@ +/** @file + HOB Library implementation for DxeCore driver. + +Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.
+Copyright (c) 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#include + +#include +#include +#include + +#include + +// +// Cache copy of HobList pointer. +// +VOID *gHobList =3D NULL; + +/** + Returns the pointer to the HOB list. + + This function returns the pointer to first HOB in the list. + For PEI phase, the PEI service GetHobList() can be used to retrieve the = pointer + to the HOB list. For the DXE phase, the HOB list pointer can be retriev= ed through + the EFI System Table by looking up theHOB list GUID in the System Config= uration Table. + Since the System Configuration Table does not exist that the time the DX= E Core is + launched, the DXE Core uses a global variable from the DXE Core Entry Po= int Library + to manage the pointer to the HOB list. + + If the pointer to the HOB list is NULL, then ASSERT(). + + @return The pointer to the HOB list. + +**/ +VOID * +EFIAPI +GetHobList ( + VOID + ) +{ + ASSERT (gHobList !=3D NULL); + return gHobList; +} + +/** + Returns the next instance of a HOB type from the starting HOB. + + This function searches the first instance of a HOB type from the startin= g HOB pointer. + If there does not exist such HOB type from the starting HOB pointer, it = will return NULL. + In contrast with macro GET_NEXT_HOB(), this function does not skip the s= tarting HOB pointer + unconditionally: it returns HobStart back if HobStart itself meets the r= equirement; + caller is required to use GET_NEXT_HOB() if it wishes to skip current Ho= bStart. + + If HobStart is NULL, then ASSERT(). + + @param Type The HOB type to return. + @param HobStart The starting HOB pointer to search from. + + @return The next instance of a HOB type from the starting HOB. + +**/ +VOID * +EFIAPI +GetNextHob ( + IN UINT16 Type, + IN CONST VOID *HobStart + ) +{ + EFI_PEI_HOB_POINTERS Hob; + + ASSERT (HobStart !=3D NULL); + + Hob.Raw =3D (UINT8 *) HobStart; + // + // Parse the HOB list until end of list or matching type is found. + // + while (!END_OF_HOB_LIST (Hob)) { + if (Hob.Header->HobType =3D=3D Type) { + return Hob.Raw; + } + Hob.Raw =3D GET_NEXT_HOB (Hob); + } + return NULL; +} + +/** + Returns the first instance of a HOB type among the whole HOB list. + + This function searches the first instance of a HOB type among the whole = HOB list. + If there does not exist such HOB type in the HOB list, it will return NU= LL. + + If the pointer to the HOB list is NULL, then ASSERT(). + + @param Type The HOB type to return. + + @return The next instance of a HOB type from the starting HOB. + +**/ +VOID * +EFIAPI +GetFirstHob ( + IN UINT16 Type + ) +{ + VOID *HobList; + + HobList =3D GetHobList (); + return GetNextHob (Type, HobList); +} + +/** + Returns the next instance of the matched GUID HOB from the starting HOB. + + This function searches the first instance of a HOB from the starting HOB= pointer. + Such HOB should satisfy two conditions: + its HOB type is EFI_HOB_TYPE_GUID_EXTENSION, and its GUID Name equals to= the input Guid. + If such a HOB from the starting HOB pointer does not exist, it will retu= rn NULL. + Caller is required to apply GET_GUID_HOB_DATA () and GET_GUID_HOB_DATA_S= IZE () + to extract the data section and its size information, respectively. + In contrast with macro GET_NEXT_HOB(), this function does not skip the s= tarting HOB pointer + unconditionally: it returns HobStart back if HobStart itself meets the r= equirement; + caller is required to use GET_NEXT_HOB() if it wishes to skip current Ho= bStart. + + If Guid is NULL, then ASSERT(). + If HobStart is NULL, then ASSERT(). + + @param Guid The GUID to match with in the HOB list. + @param HobStart A pointer to a Guid. + + @return The next instance of the matched GUID HOB from the starting HOB. + +**/ +VOID * +EFIAPI +GetNextGuidHob ( + IN CONST EFI_GUID *Guid, + IN CONST VOID *HobStart + ) +{ + EFI_PEI_HOB_POINTERS GuidHob; + + GuidHob.Raw =3D (UINT8 *) HobStart; + while ((GuidHob.Raw =3D GetNextHob (EFI_HOB_TYPE_GUID_EXTENSION, GuidHob= .Raw)) !=3D NULL) { + if (CompareGuid (Guid, &GuidHob.Guid->Name)) { + break; + } + GuidHob.Raw =3D GET_NEXT_HOB (GuidHob); + } + return GuidHob.Raw; +} + +/** + Returns the first instance of the matched GUID HOB among the whole HOB l= ist. + + This function searches the first instance of a HOB among the whole HOB l= ist. + Such HOB should satisfy two conditions: + its HOB type is EFI_HOB_TYPE_GUID_EXTENSION and its GUID Name equals to = the input Guid. + If such a HOB from the starting HOB pointer does not exist, it will retu= rn NULL. + Caller is required to apply GET_GUID_HOB_DATA () and GET_GUID_HOB_DATA_S= IZE () + to extract the data section and its size information, respectively. + + If the pointer to the HOB list is NULL, then ASSERT(). + If Guid is NULL, then ASSERT(). + + @param Guid The GUID to match with in the HOB list. + + @return The first instance of the matched GUID HOB among the whole HOB l= ist. + +**/ +VOID * +EFIAPI +GetFirstGuidHob ( + IN CONST EFI_GUID *Guid + ) +{ + VOID *HobList; + + HobList =3D GetHobList (); + return GetNextGuidHob (Guid, HobList); +} + +/** + Get the system boot mode from the HOB list. + + This function returns the system boot mode information from the + PHIT HOB in HOB list. + + If the pointer to the HOB list is NULL, then ASSERT(). + + @param VOID + + @return The Boot Mode. + +**/ +EFI_BOOT_MODE +EFIAPI +GetBootModeHob ( + VOID + ) +{ + EFI_HOB_HANDOFF_INFO_TABLE *HandOffHob; + + HandOffHob =3D (EFI_HOB_HANDOFF_INFO_TABLE *) GetHobList (); + + return HandOffHob->BootMode; +} + + +/** + + +**/ +EFI_HOB_HANDOFF_INFO_TABLE* +HobConstructor ( + IN VOID *EfiMemoryBegin, + IN UINTN EfiMemoryLength, + IN VOID *EfiFreeMemoryBottom, + IN VOID *EfiFreeMemoryTop + ) +{ + EFI_HOB_HANDOFF_INFO_TABLE *Hob; + EFI_HOB_GENERIC_HEADER *HobEnd; + + Hob =3D EfiFreeMemoryBottom; + HobEnd =3D (EFI_HOB_GENERIC_HEADER *)(Hob+1); + + Hob->Header.HobType =3D EFI_HOB_TYPE_HANDOFF; + Hob->Header.HobLength =3D sizeof(EFI_HOB_HANDOFF_INFO_TABLE); + Hob->Header.Reserved =3D 0; + + HobEnd->HobType =3D EFI_HOB_TYPE_END_OF_HOB_LIST; + HobEnd->HobLength =3D sizeof(EFI_HOB_GENERIC_HEADER); + HobEnd->Reserved =3D 0; + + Hob->Version =3D EFI_HOB_HANDOFF_TABLE_VERSION; + Hob->BootMode =3D BOOT_WITH_FULL_CONFIGURATION; + + Hob->EfiMemoryTop =3D (UINTN)EfiMemoryBegin + EfiMemoryLength; + Hob->EfiMemoryBottom =3D (UINTN)EfiMemoryBegin; + Hob->EfiFreeMemoryTop =3D (UINTN)EfiFreeMemoryTop; + Hob->EfiFreeMemoryBottom =3D (EFI_PHYSICAL_ADDRESS)(UINTN)(HobEnd+1); + Hob->EfiEndOfHobList =3D (EFI_PHYSICAL_ADDRESS)(UINTN)HobEnd; + + gHobList =3D Hob; + + return Hob; +} + +VOID * +CreateHob ( + IN UINT16 HobType, + IN UINT16 HobLength + ) +{ + EFI_HOB_HANDOFF_INFO_TABLE *HandOffHob; + EFI_HOB_GENERIC_HEADER *HobEnd; + EFI_PHYSICAL_ADDRESS FreeMemory; + VOID *Hob; + + HandOffHob =3D GetHobList (); + + HobLength =3D (UINT16)((HobLength + 0x7) & (~0x7)); + + FreeMemory =3D HandOffHob->EfiFreeMemoryTop - HandOffHob->EfiFreeMemoryB= ottom; + + if (FreeMemory < HobLength) { + return NULL; + } + + Hob =3D (VOID*) (UINTN) HandOffHob->EfiEndOfHobList; + ((EFI_HOB_GENERIC_HEADER*) Hob)->HobType =3D HobType; + ((EFI_HOB_GENERIC_HEADER*) Hob)->HobLength =3D HobLength; + ((EFI_HOB_GENERIC_HEADER*) Hob)->Reserved =3D 0; + + HobEnd =3D (EFI_HOB_GENERIC_HEADER*) ((UINTN)Hob + HobLength); + HandOffHob->EfiEndOfHobList =3D (EFI_PHYSICAL_ADDRESS) (UINTN) HobEnd; + + HobEnd->HobType =3D EFI_HOB_TYPE_END_OF_HOB_LIST; + HobEnd->HobLength =3D sizeof(EFI_HOB_GENERIC_HEADER); + HobEnd->Reserved =3D 0; + HobEnd++; + HandOffHob->EfiFreeMemoryBottom =3D (EFI_PHYSICAL_ADDRESS) (UINTN) HobEn= d; + + return Hob; +} + +/** + Builds a HOB for a loaded PE32 module. + + This function builds a HOB for a loaded PE32 module. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If ModuleName is NULL, then ASSERT(). + If there is no additional space for HOB creation, then ASSERT(). + + @param ModuleName The GUID File Name of the module. + @param MemoryAllocationModule The 64 bit physical address of the modul= e. + @param ModuleLength The length of the module in bytes. + @param EntryPoint The 64 bit physical address of the modul= e entry point. + +**/ +VOID +EFIAPI +BuildModuleHob ( + IN CONST EFI_GUID *ModuleName, + IN EFI_PHYSICAL_ADDRESS MemoryAllocationModule, + IN UINT64 ModuleLength, + IN EFI_PHYSICAL_ADDRESS EntryPoint + ) +{ + EFI_HOB_MEMORY_ALLOCATION_MODULE *Hob; + + ASSERT (((MemoryAllocationModule & (EFI_PAGE_SIZE - 1)) =3D=3D 0) && + ((ModuleLength & (EFI_PAGE_SIZE - 1)) =3D=3D 0)); + + Hob =3D CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMOR= Y_ALLOCATION_MODULE)); + + CopyGuid (&(Hob->MemoryAllocationHeader.Name), &gEfiHobMemoryAllocModule= Guid); + Hob->MemoryAllocationHeader.MemoryBaseAddress =3D MemoryAllocationModule; + Hob->MemoryAllocationHeader.MemoryLength =3D ModuleLength; + Hob->MemoryAllocationHeader.MemoryType =3D EfiBootServicesCode; + + // + // Zero the reserved space to match HOB spec + // + ZeroMem (Hob->MemoryAllocationHeader.Reserved, sizeof (Hob->MemoryAlloca= tionHeader.Reserved)); + + CopyGuid (&Hob->ModuleName, ModuleName); + Hob->EntryPoint =3D EntryPoint; +} + +/** + Builds a HOB that describes a chunk of system memory. + + This function builds a HOB that describes a chunk of system memory. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() because PEI HOB is read-only for DXE pha= se. + + If there is no additional space for HOB creation, then ASSERT(). + + @param ResourceType The type of resource described by this HOB. + @param ResourceAttribute The resource attributes of the memory descri= bed by this HOB. + @param PhysicalStart The 64 bit physical address of memory descri= bed by this HOB. + @param NumberOfBytes The length of the memory described by this H= OB in bytes. + +**/ +VOID +EFIAPI +BuildResourceDescriptorHob ( + IN EFI_RESOURCE_TYPE ResourceType, + IN EFI_RESOURCE_ATTRIBUTE_TYPE ResourceAttribute, + IN EFI_PHYSICAL_ADDRESS PhysicalStart, + IN UINT64 NumberOfBytes + ) +{ + EFI_HOB_RESOURCE_DESCRIPTOR *Hob; + + Hob =3D CreateHob (EFI_HOB_TYPE_RESOURCE_DESCRIPTOR, sizeof (EFI_HOB_RES= OURCE_DESCRIPTOR)); + ASSERT(Hob !=3D NULL); + + Hob->ResourceType =3D ResourceType; + Hob->ResourceAttribute =3D ResourceAttribute; + Hob->PhysicalStart =3D PhysicalStart; + Hob->ResourceLength =3D NumberOfBytes; +} + +/** + Builds a GUID HOB with a certain data length. + + This function builds a customized HOB tagged with a GUID for identificat= ion + and returns the start address of GUID HOB data so that caller can fill t= he customized data. + The HOB Header and Name field is already stripped. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If Guid is NULL, then ASSERT(). + If there is no additional space for HOB creation, then ASSERT(). + If DataLength >=3D (0x10000 - sizeof (EFI_HOB_GUID_TYPE)), then ASSERT(). + + @param Guid The GUID to tag the customized HOB. + @param DataLength The size of the data payload for the GUID HOB. + + @return The start address of GUID HOB data. + +**/ +VOID * +EFIAPI +BuildGuidHob ( + IN CONST EFI_GUID *Guid, + IN UINTN DataLength + ) +{ + EFI_HOB_GUID_TYPE *Hob; + + // + // Make sure that data length is not too long. + // + ASSERT (DataLength <=3D (0xffff - sizeof (EFI_HOB_GUID_TYPE))); + + Hob =3D CreateHob (EFI_HOB_TYPE_GUID_EXTENSION, (UINT16) (sizeof (EFI_HO= B_GUID_TYPE) + DataLength)); + CopyGuid (&Hob->Name, Guid); + return Hob + 1; +} + + +/** + Copies a data buffer to a newly-built HOB. + + This function builds a customized HOB tagged with a GUID for identificat= ion, + copies the input data to the HOB data field and returns the start addres= s of the GUID HOB data. + The HOB Header and Name field is already stripped. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If Guid is NULL, then ASSERT(). + If Data is NULL and DataLength > 0, then ASSERT(). + If there is no additional space for HOB creation, then ASSERT(). + If DataLength >=3D (0x10000 - sizeof (EFI_HOB_GUID_TYPE)), then ASSERT(). + + @param Guid The GUID to tag the customized HOB. + @param Data The data to be copied into the data field of the G= UID HOB. + @param DataLength The size of the data payload for the GUID HOB. + + @return The start address of GUID HOB data. + +**/ +VOID * +EFIAPI +BuildGuidDataHob ( + IN CONST EFI_GUID *Guid, + IN VOID *Data, + IN UINTN DataLength + ) +{ + VOID *HobData; + + ASSERT (Data !=3D NULL || DataLength =3D=3D 0); + + HobData =3D BuildGuidHob (Guid, DataLength); + + return CopyMem (HobData, Data, DataLength); +} + +/** + Builds a Firmware Volume HOB. + + This function builds a Firmware Volume HOB. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() because PEI HOB is read-only for DXE pha= se. + + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The base address of the Firmware Volume. + @param Length The size of the Firmware Volume in bytes. + +**/ +VOID +EFIAPI +BuildFvHob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + EFI_HOB_FIRMWARE_VOLUME *Hob; + + Hob =3D CreateHob (EFI_HOB_TYPE_FV, sizeof (EFI_HOB_FIRMWARE_VOLUME)); + + Hob->BaseAddress =3D BaseAddress; + Hob->Length =3D Length; +} + + +/** + Builds a EFI_HOB_TYPE_FV2 HOB. + + This function builds a EFI_HOB_TYPE_FV2 HOB. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The base address of the Firmware Volume. + @param Length The size of the Firmware Volume in bytes. + @param FvName The name of the Firmware Volume. + @param FileName The name of the file. + +**/ +VOID +EFIAPI +BuildFv2Hob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length, + IN CONST EFI_GUID *FvName, + IN CONST EFI_GUID *FileName + ) +{ + EFI_HOB_FIRMWARE_VOLUME2 *Hob; + + Hob =3D CreateHob (EFI_HOB_TYPE_FV2, sizeof (EFI_HOB_FIRMWARE_VOLUME2)); + + Hob->BaseAddress =3D BaseAddress; + Hob->Length =3D Length; + CopyGuid (&Hob->FvName, FvName); + CopyGuid (&Hob->FileName, FileName); +} + + +/** + Builds a HOB for the CPU. + + This function builds a HOB for the CPU. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If there is no additional space for HOB creation, then ASSERT(). + + @param SizeOfMemorySpace The maximum physical memory addressability o= f the processor. + @param SizeOfIoSpace The maximum physical I/O addressability of t= he processor. + +**/ +VOID +EFIAPI +BuildCpuHob ( + IN UINT8 SizeOfMemorySpace, + IN UINT8 SizeOfIoSpace + ) +{ + EFI_HOB_CPU *Hob; + + Hob =3D CreateHob (EFI_HOB_TYPE_CPU, sizeof (EFI_HOB_CPU)); + + Hob->SizeOfMemorySpace =3D SizeOfMemorySpace; + Hob->SizeOfIoSpace =3D SizeOfIoSpace; + + // + // Zero the reserved space to match HOB spec + // + ZeroMem (Hob->Reserved, sizeof (Hob->Reserved)); +} + +/** + Builds a HOB for the memory allocation. + + This function builds a HOB for the memory allocation. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The 64 bit physical address of the memory. + @param Length The length of the memory allocation in bytes. + @param MemoryType Type of memory allocated by this HOB. + +**/ +VOID +EFIAPI +BuildMemoryAllocationHob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length, + IN EFI_MEMORY_TYPE MemoryType + ) +{ + EFI_HOB_MEMORY_ALLOCATION *Hob; + + ASSERT (((BaseAddress & (EFI_PAGE_SIZE - 1)) =3D=3D 0) && + ((Length & (EFI_PAGE_SIZE - 1)) =3D=3D 0)); + + Hob =3D CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMOR= Y_ALLOCATION)); + + ZeroMem (&(Hob->AllocDescriptor.Name), sizeof (EFI_GUID)); + Hob->AllocDescriptor.MemoryBaseAddress =3D BaseAddress; + Hob->AllocDescriptor.MemoryLength =3D Length; + Hob->AllocDescriptor.MemoryType =3D MemoryType; + // + // Zero the reserved space to match HOB spec + // + ZeroMem (Hob->AllocDescriptor.Reserved, sizeof (Hob->AllocDescriptor.Res= erved)); +} + +/** + Builds a HOB that describes a chunk of system memory with Owner GUID. + + This function builds a HOB that describes a chunk of system memory. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + + If there is no additional space for HOB creation, then ASSERT(). + + @param ResourceType The type of resource described by this HOB. + @param ResourceAttribute The resource attributes of the memory descri= bed by this HOB. + @param PhysicalStart The 64 bit physical address of memory descri= bed by this HOB. + @param NumberOfBytes The length of the memory described by this H= OB in bytes. + @param OwnerGUID GUID for the owner of this resource. + +**/ +VOID +EFIAPI +BuildResourceDescriptorWithOwnerHob ( + IN EFI_RESOURCE_TYPE ResourceType, + IN EFI_RESOURCE_ATTRIBUTE_TYPE ResourceAttribute, + IN EFI_PHYSICAL_ADDRESS PhysicalStart, + IN UINT64 NumberOfBytes, + IN EFI_GUID *OwnerGUID + ) +{ + // + // PEI HOB is read only for DXE phase + // + ASSERT (FALSE); +} + +/** + Builds a Capsule Volume HOB. + + This function builds a Capsule Volume HOB. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() because PEI HOB is read-only for DXE pha= se. + + If the platform does not support Capsule Volume HOBs, then ASSERT(). + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The base address of the Capsule Volume. + @param Length The size of the Capsule Volume in bytes. + +**/ +VOID +EFIAPI +BuildCvHob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + // + // PEI HOB is read only for DXE phase + // + ASSERT (FALSE); +} + + +/** + Builds a HOB for the BSP store. + + This function builds a HOB for BSP store. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() because PEI HOB is read-only for DXE pha= se. + + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The 64 bit physical address of the BSP. + @param Length The length of the BSP store in bytes. + @param MemoryType Type of memory allocated by this HOB. + +**/ +VOID +EFIAPI +BuildBspStoreHob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length, + IN EFI_MEMORY_TYPE MemoryType + ) +{ + // + // PEI HOB is read only for DXE phase + // + ASSERT (FALSE); +} + +/** + Builds a HOB for the Stack. + + This function builds a HOB for the stack. + It can only be invoked during PEI phase; + for DXE phase, it will ASSERT() since PEI HOB is read-only for DXE phase. + If there is no additional space for HOB creation, then ASSERT(). + + @param BaseAddress The 64 bit physical address of the Stack. + @param Length The length of the stack in bytes. + +**/ +VOID +EFIAPI +BuildStackHob ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ) +{ + // + // PEI HOB is read only for DXE phase + // + ASSERT (FALSE); +} diff --git a/StandaloneMmPkg/Library/HobLib/HobLib.inf b/StandaloneMmPkg/Li= brary/HobLib/HobLib.inf new file mode 100644 index 0000000000..42273b6d66 --- /dev/null +++ b/StandaloneMmPkg/Library/HobLib/HobLib.inf @@ -0,0 +1,45 @@ +## @file +# Instance of HOB Library for DXE Core. +# +# HOB Library implementation for the DXE Core. Does not have a constructor. +# Uses gHobList defined in the DXE Core Entry Point Library. +# +# Copyright (c) 2007 - 2014, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php. +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D HobLib + FILE_GUID =3D CF56EF2C-68D8-4BD5-9A8B-8A7BFCFF751C + MODULE_TYPE =3D MM_CORE_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + LIBRARY_CLASS =3D HobLib|MM_CORE_STANDALONE MM_STANDALO= NE + +# +# VALID_ARCHITECTURES =3D AARCH64 +# + +[Sources.AARCH64] + Arm/HobLib.c + +[Packages] + MdePkg/MdePkg.dec + + +[LibraryClasses] + BaseMemoryLib + DebugLib + +[Guids] + gEfiHobListGuid ## CONSUMES ## SystemTable --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025813963543.9523080930109; Fri, 6 Apr 2018 07:43:33 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id E90E022620E6B; Fri, 6 Apr 2018 07:43:30 -0700 (PDT) Received: from foss.arm.com (foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 65E8422620E65 for ; Fri, 6 Apr 2018 07:43:30 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1D56D1529; Fri, 6 Apr 2018 07:43:30 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 997AE3F587; Fri, 6 Apr 2018 07:43:28 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:16 +0100 Message-Id: <20180406144223.10931-12-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 11/18] StandaloneMmPkg: MM driver entry point library. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch implements module entry point library for Standalone management mode (MM) Drivers. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh Acked-by: Achin Gupta --- .../Include/Library/MmDriverStandaloneEntryPoint.h | 148 +++++++++++++++++= ++++ .../StandaloneMmDriverEntryPoint.c | 102 ++++++++++++++ .../StandaloneMmDriverEntryPoint.inf | 41 ++++++ 3 files changed, 291 insertions(+) create mode 100644 StandaloneMmPkg/Include/Library/MmDriverStandaloneEntry= Point.h create mode 100644 StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/St= andaloneMmDriverEntryPoint.c create mode 100644 StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/St= andaloneMmDriverEntryPoint.inf diff --git a/StandaloneMmPkg/Include/Library/MmDriverStandaloneEntryPoint.h= b/StandaloneMmPkg/Include/Library/MmDriverStandaloneEntryPoint.h new file mode 100644 index 0000000000..6fb9224e2e --- /dev/null +++ b/StandaloneMmPkg/Include/Library/MmDriverStandaloneEntryPoint.h @@ -0,0 +1,148 @@ +/** @file + Module entry point library for UEFI drivers, DXE Drivers, DXE Runtime Dr= ivers, + and DXE SMM Drivers. + +Copyright (c) 2006 - 2008, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MODULE_ENTRY_POINT_H__ +#define __MODULE_ENTRY_POINT_H__ + +/// +///Declare the PI Specification Revision that this driver requires to exec= ute correctly. +/// +extern CONST UINT32 _gMmRevision; + +/** + The entry point of PE/COFF Image for a DXE Driver, DXE Runtime Driver, D= XE SMM Driver, or UEFI Driver. + + This function is the entry point for a DXE Driver, DXE Runtime Driver, D= XE SMM Driver, + or UEFI Driver. This function must call ProcessLibraryConstructorList()= and + ProcessModuleEntryPointList(). If the return status from ProcessModuleEn= tryPointList() + is an error status, then ProcessLibraryDestructorList() must be called. = The return value + from ProcessModuleEntryPointList() is returned. If _gDriverUnloadImageCo= unt is greater + than zero, then an unload handler must be registered for this image and = the unload handler + must invoke ProcessModuleUnloadList(). + If _gUefiDriverRevision is not zero and SystemTable->Hdr.Revision is les= s than _gUefiDriverRevison, + then return EFI_INCOMPATIBLE_VERSION. + + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The DXE Driver, DXE Runtime Driver, D= XE SMM Driver, + or UEFI Driver exited normally. + @retval EFI_INCOMPATIBLE_VERSION _gUefiDriverRevision is greater than = SystemTable->Hdr.Revision. + @retval Other Return value from ProcessModuleEntryP= ointList(). + +**/ +EFI_STATUS +EFIAPI +_ModuleEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Required by the EBC compiler and identical in functionality to _ModuleEn= tryPoint(). + + This function is required to call _ModuleEntryPoint() passing in ImageHa= ndle, and SystemTable. + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The DXE Driver, DXE Runtime Driver, D= XE SMM Driver, + or UEFI Driver exited normally. + @retval EFI_INCOMPATIBLE_VERSION _gUefiDriverRevision is greater than = SystemTable->Hdr.Revision. + @retval Other Return value from ProcessModuleEntryP= ointList(). +**/ +EFI_STATUS +EFIAPI +EfiMain ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Autogenerated function that calls the library constructors for all of th= e module's + dependent libraries. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of library constructors for the set of libra= ry instances + that a module depends on. This includes library instances that a module= depends on + directly and library instances that a module depends on indirectly throu= gh other libraries. + This function is autogenerated by build tools and those build tools are = responsible + for collecting the set of library instances, determine which ones have c= onstructors, + and calling the library constructors in the proper order based upon each= of the library + instances own dependencies. + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + +**/ +VOID +EFIAPI +ProcessLibraryConstructorList ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Autogenerated function that calls the library descructors for all of the= module's + dependent libraries. + + This function may be called by _ModuleEntryPoint() or ExitDriver(). + This function calls the set of library destructors for the set of librar= y instances + that a module depends on. This includes library instances that a module = depends on + directly and library instances that a module depends on indirectly throu= gh other libraries. + This function is autogenerated by build tools and those build tools are = responsible for + collecting the set of library instances, determine which ones have destr= uctors, and calling + the library destructors in the proper order based upon each of the libra= ry instances own dependencies. + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + +**/ +VOID +EFIAPI +ProcessLibraryDestructorList ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + + +/** + Autogenerated function that calls a set of module entry points. + + This function must be called by _ModuleEntryPoint(). + This function calls the set of module entry points. + This function is autogenerated by build tools and those build tools are = responsible + for collecting the module entry points and calling them in a specified o= rder. + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The DXE Driver, DXE Runtime Driver, DXE SMM Drive= r, or UEFI Driver executed normally. + @retval !EFI_SUCCESS The DXE Driver, DXE Runtime Driver, DXE SMM Drive= r, or UEFI Driver failed to execute normally. +**/ +EFI_STATUS +EFIAPI +ProcessModuleEntryPointList ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + +#endif diff --git a/StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/Standalon= eMmDriverEntryPoint.c b/StandaloneMmPkg/Library/StandaloneMmDriverEntryPoin= t/StandaloneMmDriverEntryPoint.c new file mode 100644 index 0000000000..84b3d9cd08 --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/StandaloneMmDriv= erEntryPoint.c @@ -0,0 +1,102 @@ +/** @file + Entry point to a Standalone SMM driver. + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016-2017, ARM Ltd. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + + + +#include + +#include +#include + +VOID +EFIAPI +ProcessLibraryConstructorList ( + IN EFI_HANDLE ImageHandle, + IN IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + +EFI_STATUS +EFIAPI +ProcessModuleEntryPointList ( + IN EFI_HANDLE ImageHandle, + IN IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + +VOID +EFIAPI +ProcessLibraryDestructorList ( + IN EFI_HANDLE ImageHandle, + IN IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + +/** + The entry point of PE/COFF Image for a DXE Driver, DXE Runtime Driver, D= XE SMM + Driver, or UEFI Driver. + + This function is the entry point for a DXE Driver, DXE Runtime Driver, D= XE SMM Driver, + or UEFI Driver. This function must call ProcessLibraryConstructorList()= and + ProcessModuleEntryPointList(). If the return status from ProcessModuleEn= tryPointList() + is an error status, then ProcessLibraryDestructorList() must be called. = The return + value from ProcessModuleEntryPointList() is returned. If _gDriverUnloadI= mageCount + is greater than zero, then an unload handler must be registered for this= image + and the unload handler must invoke ProcessModuleUnloadList(). + If _gUefiDriverRevision is not zero and SystemTable->Hdr.Revision is les= s than + _gUefiDriverRevison, then return EFI_INCOMPATIBLE_VERSION. + + + @param ImageHandle The image handle of the DXE Driver, DXE Runtime Dri= ver, + DXE SMM Driver, or UEFI Driver. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The DXE Driver, DXE Runtime Driver, D= XE SMM + Driver, or UEFI Driver exited normall= y. + @retval EFI_INCOMPATIBLE_VERSION _gUefiDriverRevision is greater than + SystemTable->Hdr.Revision. + @retval Other Return value from ProcessModuleEntryP= ointList(). + +**/ +EFI_STATUS +EFIAPI +_ModuleEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ) +{ + EFI_STATUS Status; + + // + // Call constructor for all libraries + // + ProcessLibraryConstructorList (ImageHandle, MmSystemTable); + + // + // Call the driver entry point + // + Status =3D ProcessModuleEntryPointList (ImageHandle, MmSystemTable); + + // + // If all of the drivers returned errors, then invoke all of the library= destructors + // + if (EFI_ERROR (Status)) { + ProcessLibraryDestructorList (ImageHandle, MmSystemTable); + } + + // + // Return the cumulative return status code from all of the driver entry= points + // + return Status; +} + diff --git a/StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/Standalon= eMmDriverEntryPoint.inf b/StandaloneMmPkg/Library/StandaloneMmDriverEntryPo= int/StandaloneMmDriverEntryPoint.inf new file mode 100644 index 0000000000..564a3f14c8 --- /dev/null +++ b/StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/StandaloneMmDriv= erEntryPoint.inf @@ -0,0 +1,41 @@ +## @file +# Module entry point library for Standalone SMM driver. +# +# Copyright (c) 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016-2017, ARM Ltd. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php. +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D StandaloneMmDriverEntryPoint + FILE_GUID =3D BBC33478-98F8-4B78-B29D-574D681B7E43 + MODULE_TYPE =3D MM_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + LIBRARY_CLASS =3D StandaloneMmDriverEntryPoint|MM_STAND= ALONE + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D IA32 X64 IPF EBC +# + +[Sources] + StandaloneMmDriverEntryPoint.c + +[Packages] + MdePkg/MdePkg.dec + +[LibraryClasses] + BaseLib + DebugLib + --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025817555333.0121505988427; Fri, 6 Apr 2018 07:43:37 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 1CEA622620E70; Fri, 6 Apr 2018 07:43:35 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 2D8C222620E6A for ; Fri, 6 Apr 2018 07:43:33 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D966C1529; Fri, 6 Apr 2018 07:43:33 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3E02C3F587; Fri, 6 Apr 2018 07:43:32 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:17 +0100 Message-Id: <20180406144223.10931-13-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 12/18] StandaloneMmPkg/CpuMm: Add CPU driver suitable for ARM Platforms. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch adds a simple CPU driver that exports the EFI_MM_CONFIGURATION_PROTOCOL to allow registration of the Standalone MM Foundation entry point. It preserves the existing notification mechanism for the configuration protocol. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Drivers/CpuMm/Arm/Entry.S | 33 +++ StandaloneMmPkg/Drivers/CpuMm/Arm/EventHandle.c | 231 +++++++++++++++++= ++++ StandaloneMmPkg/Drivers/CpuMm/Arm/Init.c | 229 +++++++++++++++++= +++ .../CpuMm/Arm/PiMmStandloneArmTfCpuDriver.h | 89 ++++++++ .../CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf | 60 ++++++ StandaloneMmPkg/Drivers/CpuMm/Arm/StateSave.c | 51 +++++ StandaloneMmPkg/Include/Guid/MpInformation.h | 41 ++++ 7 files changed, 734 insertions(+) create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/Entry.S create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/EventHandle.c create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/Init.c create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpu= Driver.h create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpu= Driver.inf create mode 100644 StandaloneMmPkg/Drivers/CpuMm/Arm/StateSave.c create mode 100644 StandaloneMmPkg/Include/Guid/MpInformation.h diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/Entry.S b/StandaloneMmPkg/Dr= ivers/CpuMm/Arm/Entry.S new file mode 100644 index 0000000000..0b6e1c330d --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/Entry.S @@ -0,0 +1,33 @@ +// +// Copyright (c) 2017, ARM Limited. All rights reserved. +// +// This program and the accompanying materials +// are licensed and made available under the terms and conditions of the = BSD License +// which accompanies this distribution. The full text of the license may= be found at +// http://opensource.org/licenses/bsd-license.php +// +// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR I= MPLIED. +// +// + +#include +#include +#include + +.text +.align 3 + +GCC_ASM_IMPORT(PiMmStandloneArmTfCpuDriverEntry) +GCC_ASM_EXPORT(_PiMmStandloneArmTfCpuDriverEntry) + +// Stub entry point to ensure that the stacks are completely unwound before +// signalling completion of event handling +ASM_PFX(_PiMmStandloneArmTfCpuDriverEntry): + bl PiMmStandloneArmTfCpuDriverEntry + mov x1, x0 + mov x0, #(ARM_SMC_ID_MM_EVENT_COMPLETE_AARCH64 & 0xffff) + movk x0, #((ARM_SMC_ID_MM_EVENT_COMPLETE_AARCH64 >> 16) & 0xffff), lsl = #16 + svc #0 +LoopForever: + b LoopForever diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/EventHandle.c b/StandaloneMm= Pkg/Drivers/CpuMm/Arm/EventHandle.c new file mode 100644 index 0000000000..7b19f53ecb --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/EventHandle.c @@ -0,0 +1,231 @@ +/** @file + + Copyright (c) 2016 HP Development Company, L.P. + Copyright (c) 2016 - 2017, ARM Limited. All rights reserved. + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include +#include + + +#include +#include +#include +#include +#include + +#include // for EFI_SYSTEM_CONTEXT + +#include +#include + +#include + +#include "PiMmStandloneArmTfCpuDriver.h" + +EFI_STATUS +EFIAPI +MmFoundationEntryRegister( + IN CONST EFI_MM_CONFIGURATION_PROTOCOL *This, + IN EFI_MM_ENTRY_POINT MmEntryPoint + ); + +// +// On ARM platforms every event is expected to have a GUID associated with +// it. It will be used by the MM Entry point to find the handler for the +// event. It will either be populated in a EFI_MM_COMMUNICATE_HEADER by the +// caller of the event (e.g. MM_COMMUNICATE SMC) or by the CPU driver +// (e.g. during an asynchronous event). In either case, this context is +// maintained in an array which has an entry for each CPU. The pointer to = this +// array is held in PerCpuGuidedEventContext. Memory is allocated once the +// number of CPUs in the system are made known through the +// MP_INFORMATION_HOB_DATA. +// +EFI_MM_COMMUNICATE_HEADER **PerCpuGuidedEventContext =3D NULL; + +// +// When an event is received by the CPU driver, it could correspond to a u= nique +// GUID (e.g. interrupt events) or to multiple GUIDs (e.g. MM_COMMUNICATE +// SMC). A table is used by the CPU driver to find the GUID corresponding = to the +// event id in case there is a 1:1 mapping between the two. If an event id= has +// multiple GUIDs associated with it then such an entry will not be found = in +// this table. +// +// TODO: Currently NULL since there are no asynchronous events +static EFI_GUID *EventIdToGuidLookupTable =3D NULL; + +// Descriptor with whereabouts of memory used for communication with the n= ormal world +EFI_MMRAM_DESCRIPTOR mNsCommBuffer; + +MP_INFORMATION_HOB_DATA *mMpInformationHobData; + +EFI_MM_CONFIGURATION_PROTOCOL mMmConfig =3D { + 0, + MmFoundationEntryRegister +}; + +static EFI_MM_ENTRY_POINT mMmEntryPoint =3D NULL; + +EFI_STATUS +PiMmStandloneArmTfCpuDriverEntry ( + IN UINTN EventId, + IN UINTN CpuNumber, + IN UINTN NsCommBufferAddr + ) +{ + EFI_MM_COMMUNICATE_HEADER *GuidedEventContext =3D NULL; + EFI_MM_ENTRY_CONTEXT MmEntryPointContext =3D {0}; + EFI_STATUS Status; + UINTN NsCommBufferSize; + + DEBUG ((DEBUG_INFO, "Received event - 0x%x on cpu %d\n", EventId, CpuNum= ber)); + + // + // ARM TF passes SMC FID of the MM_COMMUNICATE interface as the Event ID= upon + // receipt of a synchronous MM request. Use the Event ID to distinguish + // between synchronous and asynchronous events. + // + if (ARM_SMC_ID_MM_COMMUNICATE_AARCH64 !=3D EventId) { + // Found a GUID, allocate memory to populate a communication buffer + // with the GUID in it + Status =3D mMmst->MmAllocatePool(EfiRuntimeServicesData, sizeof(EFI_MM= _COMMUNICATE_HEADER), (VOID **) &GuidedEventContext); + if (Status !=3D EFI_SUCCESS) { + DEBUG ((DEBUG_INFO, "Mem alloc failed - 0x%x\n", EventId)); + return Status; + } + + // Copy the GUID + CopyGuid(&GuidedEventContext->HeaderGuid, &EventIdToGuidLookupTable[Ev= entId]); + + // Message Length is 0 'cause of the assumption mentioned above + GuidedEventContext->MessageLength =3D 0; + } else { + // TODO: Perform parameter validation of NsCommBufferAddr + + // This event id is the parent of multiple GUIDed handlers. Retrieve + // the specific GUID from the communication buffer passed by the + // caller. + + if (NsCommBufferAddr && (NsCommBufferAddr < mNsCommBuffer.PhysicalStar= t)) + return EFI_INVALID_PARAMETER; + + // Find out the size of the buffer passed + NsCommBufferSize =3D ((EFI_MM_COMMUNICATE_HEADER *) NsCommBufferAddr)-= >MessageLength + + sizeof(((EFI_MM_COMMUNICATE_HEADER *)NsCommBufferA= ddr)->MessageLength) + + sizeof(((EFI_MM_COMMUNICATE_HEADER *)NsCommBufferA= ddr)->HeaderGuid); + + // Alternative approach in case EL3 has preallocated the non-secure + // buffer. MM Foundation is told about the buffer through the Hoblist + // and is responsible for performing the bounds check. + if (NsCommBufferAddr + NsCommBufferSize >=3D + mNsCommBuffer.PhysicalStart + mNsCommBuffer.PhysicalSize) + return EFI_INVALID_PARAMETER; + + + // Now that the secure world can see the normal world buffer, allocate + // memory to copy the communication buffer to the secure world. + Status =3D mMmst->MmAllocatePool(EfiRuntimeServicesData, NsCommBufferS= ize, (VOID **) &GuidedEventContext); + if (Status !=3D EFI_SUCCESS) { + DEBUG ((DEBUG_INFO, "Mem alloc failed - 0x%x\n", EventId)); + // TODO: Unmap secure memory before exiting to the normal world + return Status; + } + + // X1 contains the VA of the normal world memory accessible from + // S-EL0 + CopyMem(GuidedEventContext, (CONST VOID *) NsCommBufferAddr, NsCommBuf= ferSize); + } + + // Stash the pointer to the allocated Event Context for this CPU + PerCpuGuidedEventContext[CpuNumber] =3D GuidedEventContext; + + // TODO: Populate entire entry point context with valid information + MmEntryPointContext.CurrentlyExecutingCpu =3D CpuNumber; + MmEntryPointContext.NumberOfCpus =3D mMpInformationHobData->NumberOfProc= essors; + + // Populate the MM system table with MP and state information + mMmst->CurrentlyExecutingCpu =3D CpuNumber; + mMmst->NumberOfCpus =3D mMpInformationHobData->NumberOfProcessors; + mMmst->CpuSaveStateSize =3D 0; + mMmst->CpuSaveState =3D NULL; + + mMmEntryPoint(&MmEntryPointContext); + + // Free the memory allocation done earlier and reset the per-cpu context + // TODO: Check for the return status of the FreePool API + ASSERT (GuidedEventContext); + CopyMem ((VOID *)NsCommBufferAddr, (CONST VOID *) GuidedEventContext, Ns= CommBufferSize); + mMmst->MmFreePool((VOID *) GuidedEventContext); + PerCpuGuidedEventContext[CpuNumber] =3D NULL; + + return Status; +} + +EFI_STATUS +EFIAPI +MmFoundationEntryRegister( + IN CONST EFI_MM_CONFIGURATION_PROTOCOL *This, + IN EFI_MM_ENTRY_POINT MmEntryPoint + ) { + // store the entry point in a global + mMmEntryPoint =3D MmEntryPoint; + return EFI_SUCCESS; +} + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +PiMmCpuTpFwRootMmiHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_STATUS Status; + UINTN CpuNumber; + + ASSERT (Context =3D=3D NULL); + ASSERT (CommBuffer =3D=3D NULL); + ASSERT (CommBufferSize =3D=3D NULL); + + CpuNumber =3D mMmst->CurrentlyExecutingCpu; + if (!PerCpuGuidedEventContext[CpuNumber]) + return EFI_NOT_FOUND; + + DEBUG ((DEBUG_INFO, "CommBuffer - 0x%x, CommBufferSize - 0x%x\n", + PerCpuGuidedEventContext[CpuNumber], + PerCpuGuidedEventContext[CpuNumber]->MessageLength)); + + Status =3D mMmst->MmiManage(&PerCpuGuidedEventContext[CpuNumber]->Header= Guid, + NULL, + PerCpuGuidedEventContext[CpuNumber]->Data, + &PerCpuGuidedEventContext[CpuNumber]->MessageLength); + + if (Status !=3D EFI_SUCCESS) { + DEBUG ((DEBUG_WARN, "Unable to manage Guided Event - %d\n", Status)); + } + + return Status; +} diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/Init.c b/StandaloneMmPkg/Dri= vers/CpuMm/Arm/Init.c new file mode 100644 index 0000000000..9b48ea15c1 --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/Init.c @@ -0,0 +1,229 @@ +/** @file + + Copyright (c) 2008 - 2009, Apple Inc. All rights reserved.
+ Copyright (c) 2011, ARM Limited. All rights reserved. + Copyright (c) 2016 HP Development Company, L.P. + Copyright (c) 2016-2017, ARM Limited. All rights reserved. + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include +#include +#include +#include +#include +#include +#include +#include + +#include // for EFI_SYSTEM_CONTEXT + +#include +#include + + +#include "PiMmStandloneArmTfCpuDriver.h" + +// GUID to identify HOB with whereabouts of communication buffer with Norm= al +// World +extern EFI_GUID gEfiStandaloneMmNonSecureBufferGuid; + +// GUID to identify HOB where the entry point of this CPU driver will be +// populated to allow the entry point driver to invoke it upon receipt of = an +// event +extern EFI_GUID gEfiArmTfCpuDriverEpDescriptorGuid; + +// +// Private copy of the MM system table for future use +// +EFI_MM_SYSTEM_TABLE *mMmst =3D NULL; + +// +// Globals used to initialize the protocol +// +static EFI_HANDLE mMmCpuHandle =3D NULL; + +EFI_STATUS +GetGuidedHobData ( + IN VOID *HobList, + IN CONST EFI_GUID *HobGuid, + OUT VOID **HobData) +{ + EFI_HOB_GUID_TYPE *Hob; + + if (!HobList || !HobGuid || !HobData) + return EFI_INVALID_PARAMETER; + + Hob =3D GetNextGuidHob (HobGuid, HobList); + if (!Hob) + return EFI_NOT_FOUND; + + *HobData =3D GET_GUID_HOB_DATA (Hob); + if (!HobData) + return EFI_NOT_FOUND; + + return EFI_SUCCESS; +} + +EFI_STATUS +PiMmStandloneArmTfCpuDriverInitialize ( + IN EFI_HANDLE ImageHandle, // not actual imagehandle + IN EFI_MM_SYSTEM_TABLE *SystemTable // not actual systemtable + ) +{ + ARM_TF_CPU_DRIVER_EP_DESCRIPTOR *CpuDriverEntryPointDesc; + EFI_CONFIGURATION_TABLE *ConfigurationTable; + MP_INFORMATION_HOB_DATA *MpInformationHobData; + EFI_MMRAM_DESCRIPTOR *NsCommBufMmramRange; + EFI_STATUS Status; + EFI_HANDLE DispatchHandle; + UINT32 MpInfoSize; + UINTN Index; + UINTN ArraySize; + VOID *HobStart; + + ASSERT (SystemTable !=3D NULL); + mMmst =3D SystemTable; + + // publish the MM config protocol so the MM core can register its entry = point + Status =3D mMmst->MmInstallProtocolInterface (&mMmCpuHandle, + &gEfiMmConfigurationProtocol= Guid, + EFI_NATIVE_INTERFACE, + &mMmConfig); + if (EFI_ERROR(Status)) { + return Status; + } + + // publish the MM CPU save state protocol + Status =3D mMmst->MmInstallProtocolInterface (&mMmCpuHandle, + &gEfiMmCpuProtocolGuid, EFI_NATIVE_INTERFACE, &mMmCpuState); + if (EFI_ERROR(Status)) { + return Status; + } + + // register the root MMI handler + Status =3D mMmst->MmiHandlerRegister (PiMmCpuTpFwRootMmiHandler, + NULL, + &DispatchHandle); + if (EFI_ERROR(Status)) { + return Status; + } + + // Retrieve the Hoblist from the MMST to extract the details of the NS + // communication buffer that has been reserved by S-EL1/EL3 + ConfigurationTable =3D mMmst->MmConfigurationTable; + for (Index =3D 0; Index < mMmst->NumberOfTableEntries; Index++) { + if (CompareGuid (&gEfiHobListGuid, &(ConfigurationTable[Index].VendorG= uid))) { + break; + } + } + + // Bail out if the Hoblist could not be found + // TODO: This could also mean that + // the normal world will never interact synchronously with the MM enviro= nment + if (Index >=3D mMmst->NumberOfTableEntries) { + DEBUG ((DEBUG_INFO, "Hoblist not found - 0x%x\n", Index)); + return EFI_OUT_OF_RESOURCES; + } + + HobStart =3D ConfigurationTable[Index].VendorTable; + + // + // Locate the HOB with the buffer to populate the entry point of this dr= iver + // + Status =3D GetGuidedHobData ( + HobStart, + &gEfiArmTfCpuDriverEpDescriptorGuid, + (VOID **) &CpuDriverEntryPointDesc); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "ArmTfCpuDriverEpDesc HOB data extraction failed -= 0x%x\n", Status)); + return Status; + } + + // Share the entry point of the CPU driver + DEBUG ((DEBUG_INFO, "Sharing Cpu Driver EP *0x%lx =3D 0x%lx\n", + (UINT64) CpuDriverEntryPointDesc->ArmTfCpuDriverEpPtr, + (UINT64) PiMmStandloneArmTfCpuDriverEntry)); + *(CpuDriverEntryPointDesc->ArmTfCpuDriverEpPtr) =3D PiMmStandloneArmTfCp= uDriverEntry; + + // Find the descriptor that contains the whereabouts of the buffer for + // communication with the Normal world. + Status =3D GetGuidedHobData ( + HobStart, + &gEfiStandaloneMmNonSecureBufferGuid, + (VOID **) &NsCommBufMmramRange); + if (EFI_ERROR(Status)) { + DEBUG ((DEBUG_INFO, "NsCommBufMmramRange HOB data extraction failed - = 0x%x\n", Status)); + return Status; + } + + DEBUG ((DEBUG_INFO, "mNsCommBuffer.PhysicalStart - 0x%lx\n", (UINT64) Ns= CommBufMmramRange->PhysicalStart)); + DEBUG ((DEBUG_INFO, "mNsCommBuffer.PhysicalSize - 0x%lx\n", (UINT64) NsC= ommBufMmramRange->PhysicalSize)); + + CopyMem (&mNsCommBuffer, NsCommBufMmramRange, sizeof(EFI_MMRAM_DESCRIPTO= R)); + DEBUG ((DEBUG_INFO, "mNsCommBuffer: 0x%016lx - 0x%lx\n", mNsCommBuffer.C= puStart, mNsCommBuffer.PhysicalSize)); + + // + // Extract the MP information from the Hoblist + // + Status =3D GetGuidedHobData (HobStart, + &gMpInformationHobGuid, + (VOID **) &MpInformationHobData); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "MpInformationHob extraction failed - 0x%x\n", Sta= tus)); + return Status; + } + + // + // Allocate memory for the MP information and copy over the MP informati= on + // passed by Trusted Firmware. Use the number of processors passed in th= e HOB + // to copy the processor information + // + MpInfoSize =3D sizeof (MP_INFORMATION_HOB_DATA) + + (sizeof (EFI_PROCESSOR_INFORMATION) * + MpInformationHobData->NumberOfProcessors); + Status =3D mMmst->MmAllocatePool (EfiRuntimeServicesData, + MpInfoSize, + (void **) &mMpInformationHobData); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "mMpInformationHobData mem alloc failed - 0x%x\n",= Status)); + return Status; + } + + CopyMem (mMpInformationHobData, MpInformationHobData, MpInfoSize); + + // Print MP information + DEBUG ((DEBUG_INFO, "mMpInformationHobData: 0x%016lx - 0x%lx\n", + mMpInformationHobData->NumberOfProcessors, + mMpInformationHobData->NumberOfEnabledProcessors)); + for (Index =3D 0; Index < mMpInformationHobData->NumberOfProcessors; Ind= ex++) { + DEBUG ((DEBUG_INFO, "mMpInformationHobData[0x%lx]: %d, %d, %d\n", + mMpInformationHobData->ProcessorInfoBuffer[Index].ProcessorId, + mMpInformationHobData->ProcessorInfoBuffer[Index].Location.Pac= kage, + mMpInformationHobData->ProcessorInfoBuffer[Index].Location.Cor= e, + mMpInformationHobData->ProcessorInfoBuffer[Index].Location.Thr= ead)); + } + + // + // Allocate memory for a table to hold pointers to a + // EFI_MM_COMMUNICATE_HEADER for each CPU + // + ArraySize =3D sizeof (EFI_MM_COMMUNICATE_HEADER *) * + mMpInformationHobData->NumberOfEnabledProcessors; + Status =3D mMmst->MmAllocatePool (EfiRuntimeServicesData, + ArraySize, + (VOID **) &PerCpuGuidedEventContext); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "PerCpuGuidedEventContext mem alloc failed - 0x%x\= n", Status)); + return Status; + } + return Status; +} diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.= h b/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.h new file mode 100644 index 0000000000..17cefd171c --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.h @@ -0,0 +1,89 @@ +/** @file + Private header with declarations and definitions specific to the MM Stan= dalone + CPU driver + + Copyright (c) 2017, ARM Limited. All rights reserved. + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _ARM_TF_CPU_DRIVER_H_ +#define _ARM_TF_CPU_DRIVER_H_ + +#include +#include +#include +#include + +// +// Common declarations and definitions +// +#define EVENT_ID_MM_COMMUNICATE_SMC 0x10 + +// +// CPU driver initialization specific declarations +// +extern EFI_MM_SYSTEM_TABLE *mMmst; + +// +// CPU State Save protocol specific declarations +// +extern EFI_MM_CPU_PROTOCOL mMmCpuState; + +EFI_STATUS +EFIAPI +MmReadSaveState ( + IN CONST EFI_MM_CPU_PROTOCOL *This, + IN UINTN Width, + IN EFI_MM_SAVE_STATE_REGISTER Register, + IN UINTN CpuIndex, + OUT VOID *Buffer + ); + +EFI_STATUS +EFIAPI +MmWriteSaveState ( + IN CONST EFI_MM_CPU_PROTOCOL *This, + IN UINTN Width, + IN EFI_MM_SAVE_STATE_REGISTER Register, + IN UINTN CpuIndex, + IN CONST VOID *Buffer + ); + +// +// MM event handling specific declarations +// +extern EFI_MM_COMMUNICATE_HEADER **PerCpuGuidedEventContext; +extern EFI_MMRAM_DESCRIPTOR mNsCommBuffer; +extern MP_INFORMATION_HOB_DATA *mMpInformationHobData; +extern EFI_MM_CONFIGURATION_PROTOCOL mMmConfig; + +EFI_STATUS +PiMmStandloneArmTfCpuDriverEntry ( + IN UINTN EventId, + IN UINTN CpuNumber, + IN UINTN NsCommBufferAddr + ); + +EFI_STATUS +EFIAPI +PiMmCpuTpFwRootMmiHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +EFI_STATUS _PiMmStandloneArmTfCpuDriverEntry ( + IN UINTN EventId, + IN UINTN CpuNumber, + IN UINTN NsCommBufferAddr + ); + +#endif diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.= inf b/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf new file mode 100644 index 0000000000..baf6d957bb --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf @@ -0,0 +1,60 @@ +#/** @file +# +# Standalone MM CPU driver for ARM Standard Platforms +# +# Copyright (c) 2009, Apple Inc. All rights reserved.
+# Copyright (c) 2016 HP Development Company, L.P. +# Copyright (c) 2017, ARM Limited. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +#**/ + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D PiMmStandloneArmTfCpuDriver + FILE_GUID =3D 58F7A62B-6280-42A7-BC38-10535A64A92C + MODULE_TYPE =3D MM_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + ENTRY_POINT =3D PiMmStandloneArmTfCpuDriverInitialize + +[Sources] + Init.c + EventHandle.c + StateSave.c + +[Packages] + ArmPkg/ArmPkg.dec + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + ArmLib + ArmSvcLib + BaseMemoryLib + DebugLib + HobLib + StandaloneMmDriverEntryPoint + +[Protocols] + gEfiMmConfigurationProtocolGuid # PROTOCOL ALWAYS= _PRODUCED + gEfiMmCpuProtocolGuid # PROTOCOL ALWAYS= _PRODUCED + +[Guids] + gEfiHobListGuid + gEfiMmPeiMmramMemoryReserveGuid + gZeroGuid + gMpInformationHobGuid + gEfiStandaloneMmNonSecureBufferGuid + gEfiArmTfCpuDriverEpDescriptorGuid + +[Depex] + TRUE diff --git a/StandaloneMmPkg/Drivers/CpuMm/Arm/StateSave.c b/StandaloneMmPk= g/Drivers/CpuMm/Arm/StateSave.c new file mode 100644 index 0000000000..c5155e1b31 --- /dev/null +++ b/StandaloneMmPkg/Drivers/CpuMm/Arm/StateSave.c @@ -0,0 +1,51 @@ +/** @file + + Copyright (c) 2016 HP Development Company, L.P. + Copyright (c) 2016-2017, ARM Limited. All rights reserved. + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include +#include +#include + +#include "PiMmStandloneArmTfCpuDriver.h" + +EFI_MM_CPU_PROTOCOL mMmCpuState =3D { + MmReadSaveState, + MmWriteSaveState +}; + +EFI_STATUS +EFIAPI +MmReadSaveState( + IN CONST EFI_MM_CPU_PROTOCOL *This, + IN UINTN Width, + IN EFI_MM_SAVE_STATE_REGISTER Register, + IN UINTN CpuIndex, + OUT VOID *Buffer + ) { + // todo: implement + return EFI_UNSUPPORTED; +} + +EFI_STATUS +EFIAPI +MmWriteSaveState( + IN CONST EFI_MM_CPU_PROTOCOL *This, + IN UINTN Width, + IN EFI_MM_SAVE_STATE_REGISTER Register, + IN UINTN CpuIndex, + IN CONST VOID *Buffer + ) { + // todo: implement + return EFI_UNSUPPORTED; +} diff --git a/StandaloneMmPkg/Include/Guid/MpInformation.h b/StandaloneMmPkg= /Include/Guid/MpInformation.h new file mode 100644 index 0000000000..4e9a3c04ec --- /dev/null +++ b/StandaloneMmPkg/Include/Guid/MpInformation.h @@ -0,0 +1,41 @@ +/** @file + EFI MP information protocol provides a lightweight MP_SERVICES_PROTOCOL. + + MP information protocol only provides static information of MP processor. + + Copyright (c) 2009, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _MP_INFORMATION_H_ +#define _MP_INFORMATION_H_ + +#include +#include +#include + +#define MP_INFORMATION_GUID \ + { \ + 0xba33f15d, 0x4000, 0x45c1, {0x8e, 0x88, 0xf9, 0x16, 0x92, 0xd4, 0x57,= 0xe3} \ + } + +#pragma pack(1) +typedef struct { + UINT64 NumberOfProcessors; + UINT64 NumberOfEnabledProcessors; + EFI_PROCESSOR_INFORMATION ProcessorInfoBuffer[]; +} MP_INFORMATION_HOB_DATA; +#pragma pack() + +extern EFI_GUID gMpInformationHobGuid; + +#endif --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:51 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025822565384.6727722364993; Fri, 6 Apr 2018 07:43:42 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 46A8622620E73; Fri, 6 Apr 2018 07:43:41 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 68ED622620E65 for ; Fri, 6 Apr 2018 07:43:39 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 471211529; Fri, 6 Apr 2018 07:43:39 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 131433F587; Fri, 6 Apr 2018 07:43:36 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:18 +0100 Message-Id: <20180406144223.10931-14-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 13/18] StandaloneMmPkg/Core: Implementation of Standalone MM Core Module. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Management Mode (MM) is a generic term used to describe a secure execution environment provided by the CPU and related silicon that is entered when the CPU detects a MMI. For x86 systems, this can be implemented with System Management Mode (SMM). For ARM systems, this can be implemented with TrustZone (TZ). A MMI can be a CPU instruction or interrupt. Upon detection of a MMI, a CPU will jump to the MM Entry Point and save some portion of its state (the "save state") such that execution can be resumed. The MMI can be generated synchronously by software or asynchronously by a hardware event. Each MMI source can be detected, cleared and disabled. Some systems provide for special memory (Management Mode RAM or MMRAM) which is set aside for software running in MM. Usually the MMRAM is hidden during normal CPU execution, but this is not required. Usually, after MMRAM is hidden it cannot be exposed until the next system reset. The MM Core Interface Specification describes three pieces of the PI Management Mode architecture: 1. MM Dispatch During DXE, the DXE Foundation works with the MM Foundation to schedule MM drivers for execution in the discovered firmware volumes. 2. MM Initialization MM related code opens MMRAM, creates the MMRAM memory map, and launches the MM Foundation, which provides the necessary services to launch MM-related drivers. Then, sometime before boot, MMRAM is closed and locked. This piece may be completed during the SEC, PEI or DXE phases. 3. MMI Management When an MMI generated, the MM environment is created and then the MMI sources are detected and MMI handlers called. This patch implements the MM Core. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Core/Dependency.c | 389 +++++++ StandaloneMmPkg/Core/Dispatcher.c | 1071 ++++++++++++++++= ++++ StandaloneMmPkg/Core/FwVol.c | 104 ++ StandaloneMmPkg/Core/Handle.c | 533 ++++++++++ StandaloneMmPkg/Core/InstallConfigurationTable.c | 178 ++++ StandaloneMmPkg/Core/Locate.c | 496 +++++++++ StandaloneMmPkg/Core/Mmi.c | 337 ++++++ StandaloneMmPkg/Core/Notify.c | 203 ++++ StandaloneMmPkg/Core/Page.c | 384 +++++++ StandaloneMmPkg/Core/Pool.c | 287 ++++++ StandaloneMmPkg/Core/StandaloneMmCore.c | 708 +++++++++++++ StandaloneMmPkg/Core/StandaloneMmCore.h | 903 +++++++++++++++++ StandaloneMmPkg/Core/StandaloneMmCore.inf | 80 ++ StandaloneMmPkg/Core/StandaloneMmCorePrivateData.h | 66 ++ StandaloneMmPkg/Include/Guid/MmFvDispatch.h | 38 + StandaloneMmPkg/Include/StandaloneMm.h | 36 + 16 files changed, 5813 insertions(+) create mode 100644 StandaloneMmPkg/Core/Dependency.c create mode 100644 StandaloneMmPkg/Core/Dispatcher.c create mode 100644 StandaloneMmPkg/Core/FwVol.c create mode 100644 StandaloneMmPkg/Core/Handle.c create mode 100644 StandaloneMmPkg/Core/InstallConfigurationTable.c create mode 100644 StandaloneMmPkg/Core/Locate.c create mode 100644 StandaloneMmPkg/Core/Mmi.c create mode 100644 StandaloneMmPkg/Core/Notify.c create mode 100644 StandaloneMmPkg/Core/Page.c create mode 100644 StandaloneMmPkg/Core/Pool.c create mode 100644 StandaloneMmPkg/Core/StandaloneMmCore.c create mode 100644 StandaloneMmPkg/Core/StandaloneMmCore.h create mode 100644 StandaloneMmPkg/Core/StandaloneMmCore.inf create mode 100644 StandaloneMmPkg/Core/StandaloneMmCorePrivateData.h create mode 100644 StandaloneMmPkg/Include/Guid/MmFvDispatch.h create mode 100644 StandaloneMmPkg/Include/StandaloneMm.h diff --git a/StandaloneMmPkg/Core/Dependency.c b/StandaloneMmPkg/Core/Depen= dency.c new file mode 100644 index 0000000000..e501369130 --- /dev/null +++ b/StandaloneMmPkg/Core/Dependency.c @@ -0,0 +1,389 @@ +/** @file + MM Driver Dispatcher Dependency Evaluator + + This routine evaluates a dependency expression (DEPENDENCY_EXPRESSION) t= o determine + if a driver can be scheduled for execution. The criteria for + schedulability is that the dependency expression is satisfied. + + Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +/// +/// EFI_DEP_REPLACE_TRUE - Used to dynamically patch the dependency expres= sion +/// to save time. A EFI_DEP_PUSH is evaluated one = an +/// replaced with EFI_DEP_REPLACE_TRUE. If PI spec'= s Vol 2 +/// Driver Execution Environment Core Interface use= 0xff +/// as new DEPEX opcode. EFI_DEP_REPLACE_TRUE shoul= d be +/// defined to a new value that is not conflicting = with PI spec. +/// +#define EFI_DEP_REPLACE_TRUE 0xff + +/// +/// Define the initial size of the dependency expression evaluation stack +/// +#define DEPEX_STACK_SIZE_INCREMENT 0x1000 + +// +// Global stack used to evaluate dependency expressions +// +BOOLEAN *mDepexEvaluationStack =3D NULL; +BOOLEAN *mDepexEvaluationStackEnd =3D NULL; +BOOLEAN *mDepexEvaluationStackPointer =3D NULL; + +/** + Grow size of the Depex stack + + @retval EFI_SUCCESS Stack successfully growed. + @retval EFI_OUT_OF_RESOURCES There is not enough system memory to grow = the stack. + +**/ +EFI_STATUS +GrowDepexStack ( + VOID + ) +{ + BOOLEAN *NewStack; + UINTN Size; + + Size =3D DEPEX_STACK_SIZE_INCREMENT; + if (mDepexEvaluationStack !=3D NULL) { + Size =3D Size + (mDepexEvaluationStackEnd - mDepexEvaluationStack); + } + + NewStack =3D AllocatePool (Size * sizeof (BOOLEAN)); + if (NewStack =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + if (mDepexEvaluationStack !=3D NULL) { + // + // Copy to Old Stack to the New Stack + // + CopyMem ( + NewStack, + mDepexEvaluationStack, + (mDepexEvaluationStackEnd - mDepexEvaluationStack) * sizeof (BOOLEAN) + ); + + // + // Free The Old Stack + // + FreePool (mDepexEvaluationStack); + } + + // + // Make the Stack pointer point to the old data in the new stack + // + mDepexEvaluationStackPointer =3D NewStack + (mDepexEvaluationStackPointe= r - mDepexEvaluationStack); + mDepexEvaluationStack =3D NewStack; + mDepexEvaluationStackEnd =3D NewStack + Size; + + return EFI_SUCCESS; +} + +/** + Push an element onto the Boolean Stack. + + @param Value BOOLEAN to push. + + @retval EFI_SUCCESS The value was pushed onto the stack. + @retval EFI_OUT_OF_RESOURCES There is not enough system memory to grow = the stack. + +**/ +EFI_STATUS +PushBool ( + IN BOOLEAN Value + ) +{ + EFI_STATUS Status; + + // + // Check for a stack overflow condition + // + if (mDepexEvaluationStackPointer =3D=3D mDepexEvaluationStackEnd) { + // + // Grow the stack + // + Status =3D GrowDepexStack (); + if (EFI_ERROR (Status)) { + return Status; + } + } + + // + // Push the item onto the stack + // + *mDepexEvaluationStackPointer =3D Value; + mDepexEvaluationStackPointer++; + + return EFI_SUCCESS; +} + +/** + Pop an element from the Boolean stack. + + @param Value BOOLEAN to pop. + + @retval EFI_SUCCESS The value was popped onto the stack. + @retval EFI_ACCESS_DENIED The pop operation underflowed the stack. + +**/ +EFI_STATUS +PopBool ( + OUT BOOLEAN *Value + ) +{ + // + // Check for a stack underflow condition + // + if (mDepexEvaluationStackPointer =3D=3D mDepexEvaluationStack) { + return EFI_ACCESS_DENIED; + } + + // + // Pop the item off the stack + // + mDepexEvaluationStackPointer--; + *Value =3D *mDepexEvaluationStackPointer; + return EFI_SUCCESS; +} + +/** + This is the POSTFIX version of the dependency evaluator. This code does + not need to handle Before or After, as it is not valid to call this + routine in this case. POSTFIX means all the math is done on top of the s= tack. + + @param DriverEntry DriverEntry element to update. + + @retval TRUE If driver is ready to run. + @retval FALSE If driver is not ready to run or some fata= l error + was found. + +**/ +BOOLEAN +MmIsSchedulable ( + IN EFI_MM_DRIVER_ENTRY *DriverEntry + ) +{ + EFI_STATUS Status; + UINT8 *Iterator; + BOOLEAN Operator; + BOOLEAN Operator2; + EFI_GUID DriverGuid; + VOID *Interface; + + Operator =3D FALSE; + Operator2 =3D FALSE; + + if (DriverEntry->After || DriverEntry->Before) { + // + // If Before or After Depex skip as MmInsertOnScheduledQueueWhileProce= ssingBeforeAndAfter () + // processes them. + // + return FALSE; + } + + DEBUG ((DEBUG_DISPATCH, "Evaluate MM DEPEX for FFS(%g)\n", &DriverEntry-= >FileName)); + + if (DriverEntry->Depex =3D=3D NULL) { + // + // A NULL Depex means that the MM driver is not built correctly. + // All MM drivers must have a valid depex expressiion. + // + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Depex is empty)\n")); + ASSERT (FALSE); + return FALSE; + } + + // + // Clean out memory leaks in Depex Boolean stack. Leaks are only caused = by + // incorrectly formed DEPEX expressions + // + mDepexEvaluationStackPointer =3D mDepexEvaluationStack; + + + Iterator =3D DriverEntry->Depex; + + while (TRUE) { + // + // Check to see if we are attempting to fetch dependency expression in= structions + // past the end of the dependency expression. + // + if (((UINTN)Iterator - (UINTN)DriverEntry->Depex) >=3D DriverEntry->De= pexSize) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Attempt to fetch past e= nd of depex)\n")); + return FALSE; + } + + // + // Look at the opcode of the dependency expression instruction. + // + switch (*Iterator) { + case EFI_DEP_BEFORE: + case EFI_DEP_AFTER: + // + // For a well-formed Dependency Expression, the code should never ge= t here. + // The BEFORE and AFTER are processed prior to this routine's invoca= tion. + // If the code flow arrives at this point, there was a BEFORE or AFT= ER + // that were not the first opcodes. + // + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected BEFORE or AF= TER opcode)\n")); + ASSERT (FALSE); + + case EFI_DEP_PUSH: + // + // Push operator is followed by a GUID. Test to see if the GUID prot= ocol + // is installed and push the boolean result on the stack. + // + CopyMem (&DriverGuid, Iterator + 1, sizeof (EFI_GUID)); + + Status =3D MmLocateProtocol (&DriverGuid, NULL, &Interface); + if (EFI_ERROR (Status) && (mEfiSystemTable !=3D NULL)) { + // + // For MM Driver, it may depend on uefi protocols + // + Status =3D mEfiSystemTable->BootServices->LocateProtocol (&DriverG= uid, NULL, &Interface); + } + + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " PUSH GUID(%g) =3D FALSE\n", &DriverGuid= )); + Status =3D PushBool (FALSE); + } else { + DEBUG ((DEBUG_DISPATCH, " PUSH GUID(%g) =3D TRUE\n", &DriverGuid)= ); + *Iterator =3D EFI_DEP_REPLACE_TRUE; + Status =3D PushBool (TRUE); + } + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Iterator +=3D sizeof (EFI_GUID); + break; + + case EFI_DEP_AND: + DEBUG ((DEBUG_DISPATCH, " AND\n")); + Status =3D PopBool (&Operator); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Status =3D PopBool (&Operator2); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Status =3D PushBool ((BOOLEAN)(Operator && Operator2)); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + break; + + case EFI_DEP_OR: + DEBUG ((DEBUG_DISPATCH, " OR\n")); + Status =3D PopBool (&Operator); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Status =3D PopBool (&Operator2); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Status =3D PushBool ((BOOLEAN)(Operator || Operator2)); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + break; + + case EFI_DEP_NOT: + DEBUG ((DEBUG_DISPATCH, " NOT\n")); + Status =3D PopBool (&Operator); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Status =3D PushBool ((BOOLEAN)(!Operator)); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + break; + + case EFI_DEP_TRUE: + DEBUG ((DEBUG_DISPATCH, " TRUE\n")); + Status =3D PushBool (TRUE); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + break; + + case EFI_DEP_FALSE: + DEBUG ((DEBUG_DISPATCH, " FALSE\n")); + Status =3D PushBool (FALSE); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + break; + + case EFI_DEP_END: + DEBUG ((DEBUG_DISPATCH, " END\n")); + Status =3D PopBool (&Operator); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + DEBUG ((DEBUG_DISPATCH, " RESULT =3D %a\n", Operator ? "TRUE" : "FA= LSE")); + return Operator; + + case EFI_DEP_REPLACE_TRUE: + CopyMem (&DriverGuid, Iterator + 1, sizeof (EFI_GUID)); + DEBUG ((DEBUG_DISPATCH, " PUSH GUID(%g) =3D TRUE\n", &DriverGuid)); + Status =3D PushBool (TRUE); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unexpected error)\n")= ); + return FALSE; + } + + Iterator +=3D sizeof (EFI_GUID); + break; + + default: + DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Unknown opcode)\n")); + goto Done; + } + + // + // Skip over the Dependency Op Code we just processed in the switch. + // The math is done out of order, but it should not matter. That is + // we may add in the sizeof (EFI_GUID) before we account for the OP Co= de. + // This is not an issue, since we just need the correct end result. You + // need to be careful using Iterator in the loop as it's intermediate = value + // may be strange. + // + Iterator++; + } + +Done: + return FALSE; +} diff --git a/StandaloneMmPkg/Core/Dispatcher.c b/StandaloneMmPkg/Core/Dispa= tcher.c new file mode 100644 index 0000000000..af18fa7eaa --- /dev/null +++ b/StandaloneMmPkg/Core/Dispatcher.c @@ -0,0 +1,1071 @@ +/** @file + MM Driver Dispatcher. + + Step #1 - When a FV protocol is added to the system every driver in the = FV + is added to the mDiscoveredList. The Before, and After Depex a= re + pre-processed as drivers are added to the mDiscoveredList. If = an Apriori + file exists in the FV those drivers are addeded to the + mScheduledQueue. The mFvHandleList is used to make sure a + FV is only processed once. + + Step #2 - Dispatch. Remove driver from the mScheduledQueue and load and + start it. After mScheduledQueue is drained check the + mDiscoveredList to see if any item has a Depex that is ready to + be placed on the mScheduledQueue. + + Step #3 - Adding to the mScheduledQueue requires that you process Before + and After dependencies. This is done recursively as the call t= o add + to the mScheduledQueue checks for Before and recursively adds + all Befores. It then addes the item that was passed in and then + processess the After dependecies by recursively calling the ro= utine. + + Dispatcher Rules: + The rules for the dispatcher are similar to the DXE dispatcher. + + The rules for DXE dispatcher are in chapter 10 of the DXE CIS. Figure 10= -3 + is the state diagram for the DXE dispatcher + + Depex - Dependency Expresion. + + Copyright (c) 2014, Hewlett-Packard Development Company, L.P. + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +// +// MM Dispatcher Data structures +// +#define KNOWN_HANDLE_SIGNATURE SIGNATURE_32('k','n','o','w') +typedef struct { + UINTN Signature; + LIST_ENTRY Link; // mFvHandleList + EFI_HANDLE Handle; +} KNOWN_HANDLE; + +// +// Function Prototypes +// + +EFI_STATUS +MmCoreFfsFindMmDriver ( + IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader + ); + +/** + Insert InsertedDriverEntry onto the mScheduledQueue. To do this you + must add any driver with a before dependency on InsertedDriverEntry firs= t. + You do this by recursively calling this routine. After all the Befores a= re + processed you can add InsertedDriverEntry to the mScheduledQueue. + Then you can add any driver with an After dependency on InsertedDriverEn= try + by recursively calling this routine. + + @param InsertedDriverEntry The driver to insert on the ScheduledLink = Queue + +**/ +VOID +MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter ( + IN EFI_MM_DRIVER_ENTRY *InsertedDriverEntry + ); + +// +// The Driver List contains one copy of every driver that has been discove= red. +// Items are never removed from the driver list. List of EFI_MM_DRIVER_ENT= RY +// +LIST_ENTRY mDiscoveredList =3D INITIALIZE_LIST_HEAD_VARIABLE (mDiscovered= List); + +// +// Queue of drivers that are ready to dispatch. This queue is a subset of = the +// mDiscoveredList.list of EFI_MM_DRIVER_ENTRY. +// +LIST_ENTRY mScheduledQueue =3D INITIALIZE_LIST_HEAD_VARIABLE (mScheduledQ= ueue); + +// +// List of handles who's Fv's have been parsed and added to the mFwDriverL= ist. +// +LIST_ENTRY mFvHandleList =3D INITIALIZE_LIST_HEAD_VARIABLE (mFvHandleList= ); + +// +// Flag for the MM Dispacher. TRUE if dispatcher is execuing. +// +BOOLEAN gDispatcherRunning =3D FALSE; + +// +// Flag for the MM Dispacher. TRUE if there is one or more MM drivers rea= dy to be dispatched +// +BOOLEAN gRequestDispatch =3D FALSE; + +// +// The global variable is defined for Loading modules at fixed address fea= ture to track the MM code +// memory range usage. It is a bit mapped array in which every bit indicat= es the correspoding +// memory page available or not. +// +GLOBAL_REMOVE_IF_UNREFERENCED UINT64 *mMmCodeMemoryRange= UsageBitMap=3DNULL; + +/** + To check memory usage bit map array to figure out if the memory range in= which the image will be loaded is available or not. If + memory range is avaliable, the function will mark the correponding bits = to 1 which indicates the memory range is used. + The function is only invoked when load modules at fixed address feature = is enabled. + + @param ImageBase The base addres the image will be loade= d at. + @param ImageSize The size of the image + + @retval EFI_SUCCESS The memory range the image will be load= ed in is available + @retval EFI_NOT_FOUND The memory range the image will be load= ed in is not available +**/ +EFI_STATUS +CheckAndMarkFixLoadingMemoryUsageBitMap ( + IN EFI_PHYSICAL_ADDRESS ImageBase, + IN UINTN ImageSize + ) +{ + UINT32 MmCodePageNumber; + UINT64 MmCodeSize; + EFI_PHYSICAL_ADDRESS MmCodeBase; + UINTN BaseOffsetPageNumber; + UINTN TopOffsetPageNumber; + UINTN Index; + // + // Build tool will calculate the smm code size and then patch the PcdLo= adFixAddressMmCodePageNumber + // + MmCodePageNumber =3D 0; + MmCodeSize =3D EFI_PAGES_TO_SIZE (MmCodePageNumber); + MmCodeBase =3D gLoadModuleAtFixAddressMmramBase; + + // + // If the memory usage bit map is not initialized, do it. Every bit in= the array + // indicate the status of the corresponding memory page, available or n= ot + // + if (mMmCodeMemoryRangeUsageBitMap =3D=3D NULL) { + mMmCodeMemoryRangeUsageBitMap =3D AllocateZeroPool(((MmCodePageNumber= / 64) + 1)*sizeof(UINT64)); + } + // + // If the Dxe code memory range is not allocated or the bit map array a= llocation failed, return EFI_NOT_FOUND + // + if (mMmCodeMemoryRangeUsageBitMap =3D=3D NULL) { + return EFI_NOT_FOUND; + } + // + // see if the memory range for loading the image is in the MM code rang= e. + // + if (MmCodeBase + MmCodeSize < ImageBase + ImageSize || MmCodeBase > I= mageBase) { + return EFI_NOT_FOUND; + } + // + // Test if the memory is avalaible or not. + // + BaseOffsetPageNumber =3D (UINTN)EFI_SIZE_TO_PAGES((UINT32)(ImageBase - = MmCodeBase)); + TopOffsetPageNumber =3D (UINTN)EFI_SIZE_TO_PAGES((UINT32)(ImageBase + = ImageSize - MmCodeBase)); + for (Index =3D BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index= ++) { + if ((mMmCodeMemoryRangeUsageBitMap[Index / 64] & LShiftU64(1, (Index = % 64))) !=3D 0) { + // + // This page is already used. + // + return EFI_NOT_FOUND; + } + } + + // + // Being here means the memory range is available. So mark the bits fo= r the memory range + // + for (Index =3D BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index= ++) { + mMmCodeMemoryRangeUsageBitMap[Index / 64] |=3D LShiftU64(1, (Index % = 64)); + } + return EFI_SUCCESS; +} +/** + Get the fixed loading address from image header assigned by build tool. = This function only be called + when Loading module at Fixed address feature enabled. + + @param ImageContext Pointer to the image context structure= that describes the PE/COFF + image that needs to be examined by thi= s function. + @retval EFI_SUCCESS An fixed loading address is assigned t= o this image by build tools . + @retval EFI_NOT_FOUND The image has no assigned fixed loaddi= ng address. + +**/ +EFI_STATUS +GetPeCoffImageFixLoadingAssignedAddress( + IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext + ) +{ + UINTN SectionHeaderOffset; + EFI_STATUS Status; + EFI_IMAGE_SECTION_HEADER SectionHeader; + EFI_IMAGE_OPTIONAL_HEADER_UNION *ImgHdr; + EFI_PHYSICAL_ADDRESS FixLoadingAddress; + UINT16 Index; + UINTN Size; + UINT16 NumberOfSections; + UINT64 ValueInSectionHeader; + + FixLoadingAddress =3D 0; + Status =3D EFI_NOT_FOUND; + + // + // Get PeHeader pointer + // + ImgHdr =3D (EFI_IMAGE_OPTIONAL_HEADER_UNION *)((CHAR8* )ImageContext->Ha= ndle + ImageContext->PeCoffHeaderOffset); + SectionHeaderOffset =3D ImageContext->PeCoffHeaderOffset + + sizeof (UINT32) + + sizeof (EFI_IMAGE_FILE_HEADER) + + ImgHdr->Pe32.FileHeader.SizeOfOptionalHeader; + NumberOfSections =3D ImgHdr->Pe32.FileHeader.NumberOfSections; + + // + // Get base address from the first section header that doesn't point to = code section. + // + for (Index =3D 0; Index < NumberOfSections; Index++) { + // + // Read section header from file + // + Size =3D sizeof (EFI_IMAGE_SECTION_HEADER); + Status =3D ImageContext->ImageRead ( + ImageContext->Handle, + SectionHeaderOffset, + &Size, + &SectionHeader + ); + if (EFI_ERROR (Status)) { + return Status; + } + + Status =3D EFI_NOT_FOUND; + + if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_CNT_CODE) =3D=3D 0)= { + // + // Build tool will save the address in PointerToRelocations & Pointe= rToLineNumbers fields in the first section header + // that doesn't point to code section in image header.So there is an= assumption that when the feature is enabled, + // if a module with a loading address assigned by tools, the Pointer= ToRelocations & PointerToLineNumbers fields + // should not be Zero, or else, these 2 fields should be set to Zero + // + ValueInSectionHeader =3D ReadUnaligned64((UINT64*)&SectionHeader.Poi= nterToRelocations); + if (ValueInSectionHeader !=3D 0) { + // + // Found first section header that doesn't point to code section i= n which build tool saves the + // offset to SMRAM base as image base in PointerToRelocations & Po= interToLineNumbers fields + // + FixLoadingAddress =3D (EFI_PHYSICAL_ADDRESS)(gLoadModuleAtFixAddre= ssMmramBase + (INT64)ValueInSectionHeader); + // + // Check if the memory range is available. + // + Status =3D CheckAndMarkFixLoadingMemoryUsageBitMap (FixLoadingAddr= ess, (UINTN)(ImageContext->ImageSize + ImageContext->SectionAlignment)); + if (!EFI_ERROR(Status)) { + // + // The assigned address is valid. Return the specified loading a= ddress + // + ImageContext->ImageAddress =3D FixLoadingAddress; + } + } + break; + } + SectionHeaderOffset +=3D sizeof (EFI_IMAGE_SECTION_HEADER); + } + DEBUG ((DEBUG_INFO|DEBUG_LOAD, "LOADING MODULE FIXED INFO: Loading modul= e at fixed address %x, Status =3D %r\n", FixLoadingAddress, Status)); + return Status; +} +/** + Loads an EFI image into SMRAM. + + @param DriverEntry EFI_MM_DRIVER_ENTRY instance + + @return EFI_STATUS + +**/ +EFI_STATUS +EFIAPI +MmLoadImage ( + IN OUT EFI_MM_DRIVER_ENTRY *DriverEntry + ) +{ + VOID *Buffer; + UINTN PageCount; + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS DstBuffer; + PE_COFF_LOADER_IMAGE_CONTEXT ImageContext; + + DEBUG ((DEBUG_INFO, "MmLoadImage - %g\n", &DriverEntry->FileName)); + + Buffer =3D AllocateCopyPool (DriverEntry->Pe32DataSize, DriverEntry->Pe3= 2Data); + if (Buffer =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + Status =3D EFI_SUCCESS; + + // + // Initialize ImageContext + // + ImageContext.Handle =3D Buffer; + ImageContext.ImageRead =3D PeCoffLoaderImageReadFromMemory; + + // + // Get information about the image being loaded + // + Status =3D PeCoffLoaderGetImageInfo (&ImageContext); + if (EFI_ERROR (Status)) { + if (Buffer !=3D NULL) { + MmFreePool (Buffer); + } + return Status; + } + + PageCount =3D (UINTN)EFI_SIZE_TO_PAGES((UINTN)ImageContext.ImageSize + I= mageContext.SectionAlignment); + DstBuffer =3D (UINTN)(-1); + + Status =3D MmAllocatePages ( + AllocateMaxAddress, + EfiRuntimeServicesCode, + PageCount, + &DstBuffer + ); + if (EFI_ERROR (Status)) { + if (Buffer !=3D NULL) { + MmFreePool (Buffer); + } + return Status; + } + + ImageContext.ImageAddress =3D (EFI_PHYSICAL_ADDRESS)DstBuffer; + + // + // Align buffer on section boundry + // + ImageContext.ImageAddress +=3D ImageContext.SectionAlignment - 1; + ImageContext.ImageAddress &=3D ~((EFI_PHYSICAL_ADDRESS)(ImageContext.Sec= tionAlignment - 1)); + + // + // Load the image to our new buffer + // + Status =3D PeCoffLoaderLoadImage (&ImageContext); + if (EFI_ERROR (Status)) { + if (Buffer !=3D NULL) { + MmFreePool (Buffer); + } + MmFreePages (DstBuffer, PageCount); + return Status; + } + + // + // Relocate the image in our new buffer + // + Status =3D PeCoffLoaderRelocateImage (&ImageContext); + if (EFI_ERROR (Status)) { + if (Buffer !=3D NULL) { + MmFreePool (Buffer); + } + MmFreePages (DstBuffer, PageCount); + return Status; + } + + // + // Flush the instruction cache so the image data are written before we e= xecute it + // + InvalidateInstructionCacheRange ((VOID *)(UINTN) ImageContext.ImageAddre= ss, (UINTN) ImageContext.ImageSize); + + // + // Save Image EntryPoint in DriverEntry + // + DriverEntry->ImageEntryPoint =3D ImageContext.EntryPoint; + DriverEntry->ImageBuffer =3D DstBuffer; + DriverEntry->NumberOfPage =3D PageCount; + + if (mEfiSystemTable !=3D NULL) { + Status =3D mEfiSystemTable->BootServices->AllocatePool (EfiBootService= sData, sizeof (EFI_LOADED_IMAGE_PROTOCOL), (VOID **)&DriverEntry->LoadedIma= ge); + if (EFI_ERROR (Status)) { + if (Buffer !=3D NULL) { + MmFreePool (Buffer); + } + MmFreePages (DstBuffer, PageCount); + return Status; + } + + ZeroMem (DriverEntry->LoadedImage, sizeof (EFI_LOADED_IMAGE_PROTOCOL)); + // + // Fill in the remaining fields of the Loaded Image Protocol instance. + // Note: ImageBase is an SMRAM address that can not be accessed outsid= e of SMRAM if SMRAM window is closed. + // + DriverEntry->LoadedImage->Revision =3D EFI_LOADED_IMAGE_PROTOCOL_= REVISION; + DriverEntry->LoadedImage->ParentHandle =3D NULL; + DriverEntry->LoadedImage->SystemTable =3D mEfiSystemTable; + DriverEntry->LoadedImage->DeviceHandle =3D NULL; + DriverEntry->LoadedImage->FilePath =3D NULL; + + DriverEntry->LoadedImage->ImageBase =3D (VOID *)(UINTN)DriverEntry= ->ImageBuffer; + DriverEntry->LoadedImage->ImageSize =3D ImageContext.ImageSize; + DriverEntry->LoadedImage->ImageCodeType =3D EfiRuntimeServicesCode; + DriverEntry->LoadedImage->ImageDataType =3D EfiRuntimeServicesData; + + // + // Create a new image handle in the UEFI handle database for the MM Dr= iver + // + DriverEntry->ImageHandle =3D NULL; + Status =3D mEfiSystemTable->BootServices->InstallMultipleProtocolInter= faces ( + &DriverEntry->ImageHandle, + &gEfiLoadedImageProtocolGuid, DriverEntry->LoadedImage, + NULL + ); + } + + // + // Print the load address and the PDB file name if it is available + // + + DEBUG_CODE_BEGIN (); + + UINTN Index; + UINTN StartIndex; + CHAR8 EfiFileName[256]; + + + DEBUG ((DEBUG_INFO | DEBUG_LOAD, + "Loading MM driver at 0x%11p EntryPoint=3D0x%11p ", + (VOID *)(UINTN) ImageContext.ImageAddress, + FUNCTION_ENTRY_POINT (ImageContext.EntryPoint))); + + + // + // Print Module Name by Pdb file path. + // Windows and Unix style file path are all trimmed correctly. + // + if (ImageContext.PdbPointer !=3D NULL) { + StartIndex =3D 0; + for (Index =3D 0; ImageContext.PdbPointer[Index] !=3D 0; Index++) { + if ((ImageContext.PdbPointer[Index] =3D=3D '\\') || (ImageContext.= PdbPointer[Index] =3D=3D '/')) { + StartIndex =3D Index + 1; + } + } + // + // Copy the PDB file name to our temporary string, and replace .pdb = with .efi + // The PDB file name is limited in the range of 0~255. + // If the length is bigger than 255, trim the redudant characters to= avoid overflow in array boundary. + // + for (Index =3D 0; Index < sizeof (EfiFileName) - 4; Index++) { + EfiFileName[Index] =3D ImageContext.PdbPointer[Index + StartIndex]; + if (EfiFileName[Index] =3D=3D 0) { + EfiFileName[Index] =3D '.'; + } + if (EfiFileName[Index] =3D=3D '.') { + EfiFileName[Index + 1] =3D 'e'; + EfiFileName[Index + 2] =3D 'f'; + EfiFileName[Index + 3] =3D 'i'; + EfiFileName[Index + 4] =3D 0; + break; + } + } + + if (Index =3D=3D sizeof (EfiFileName) - 4) { + EfiFileName[Index] =3D 0; + } + DEBUG ((DEBUG_INFO | DEBUG_LOAD, "%a", EfiFileName)); // &Image->Ima= geContext.PdbPointer[StartIndex])); + } + DEBUG ((DEBUG_INFO | DEBUG_LOAD, "\n")); + + DEBUG_CODE_END (); + + // + // Free buffer allocated by Fv->ReadSection. + // + // The UEFI Boot Services FreePool() function must be used because Fv->R= eadSection + // used the UEFI Boot Services AllocatePool() function + // + MmFreePool(Buffer); + return Status; +} + +/** + Preprocess dependency expression and update DriverEntry to reflect the + state of Before and After dependencies. If DriverEntry->Before + or DriverEntry->After is set it will never be cleared. + + @param DriverEntry DriverEntry element to update . + + @retval EFI_SUCCESS It always works. + +**/ +EFI_STATUS +MmPreProcessDepex ( + IN EFI_MM_DRIVER_ENTRY *DriverEntry + ) +{ + UINT8 *Iterator; + + Iterator =3D DriverEntry->Depex; + DriverEntry->Dependent =3D TRUE; + + if (*Iterator =3D=3D EFI_DEP_BEFORE) { + DriverEntry->Before =3D TRUE; + } else if (*Iterator =3D=3D EFI_DEP_AFTER) { + DriverEntry->After =3D TRUE; + } + + if (DriverEntry->Before || DriverEntry->After) { + CopyMem (&DriverEntry->BeforeAfterGuid, Iterator + 1, sizeof (EFI_GUID= )); + } + + return EFI_SUCCESS; +} + +/** + Read Depex and pre-process the Depex for Before and After. If Section Ex= traction + protocol returns an error via ReadSection defer the reading of the Depex. + + @param DriverEntry Driver to work on. + + @retval EFI_SUCCESS Depex read and preprossesed + @retval EFI_PROTOCOL_ERROR The section extraction protocol returned a= n error + and Depex reading needs to be retried. + @retval Error DEPEX not found. + +**/ +EFI_STATUS +MmGetDepexSectionAndPreProccess ( + IN EFI_MM_DRIVER_ENTRY *DriverEntry + ) +{ + EFI_STATUS Status; + + // + // Data already read + // + if (DriverEntry->Depex =3D=3D NULL) { + Status =3D EFI_NOT_FOUND; + } else { + Status =3D EFI_SUCCESS; + } + if (EFI_ERROR (Status)) { + if (Status =3D=3D EFI_PROTOCOL_ERROR) { + // + // The section extraction protocol failed so set protocol error flag + // + DriverEntry->DepexProtocolError =3D TRUE; + } else { + // + // If no Depex assume depend on all architectural protocols + // + DriverEntry->Depex =3D NULL; + DriverEntry->Dependent =3D TRUE; + DriverEntry->DepexProtocolError =3D FALSE; + } + } else { + // + // Set Before and After state information based on Depex + // Driver will be put in Dependent state + // + MmPreProcessDepex (DriverEntry); + DriverEntry->DepexProtocolError =3D FALSE; + } + + return Status; +} + +/** + This is the main Dispatcher for MM and it exits when there are no more + drivers to run. Drain the mScheduledQueue and load and start a PE + image for each driver. Search the mDiscoveredList to see if any driver c= an + be placed on the mScheduledQueue. If no drivers are placed on the + mScheduledQueue exit the function. + + @retval EFI_SUCCESS All of the MM Drivers that could be dispat= ched + have been run and the MM Entry Point has b= een + registered. + @retval EFI_NOT_READY The MM Driver that registered the MM Entry= Point + was just dispatched. + @retval EFI_NOT_FOUND There are no MM Drivers available to be di= spatched. + @retval EFI_ALREADY_STARTED The MM Dispatcher is already running + +**/ +EFI_STATUS +MmDispatcher ( + VOID + ) +{ + EFI_STATUS Status; + LIST_ENTRY *Link; + EFI_MM_DRIVER_ENTRY *DriverEntry; + BOOLEAN ReadyToRun; + BOOLEAN PreviousMmEntryPointRegistered; + + DEBUG ((DEBUG_INFO, "MmDispatcher\n")); + + if (!gRequestDispatch) { + DEBUG ((DEBUG_INFO, " !gRequestDispatch\n")); + return EFI_NOT_FOUND; + } + + if (gDispatcherRunning) { + DEBUG ((DEBUG_INFO, " gDispatcherRunning\n")); + // + // If the dispatcher is running don't let it be restarted. + // + return EFI_ALREADY_STARTED; + } + + gDispatcherRunning =3D TRUE; + + do { + // + // Drain the Scheduled Queue + // + DEBUG ((DEBUG_INFO, " Drain the Scheduled Queue\n")); + while (!IsListEmpty (&mScheduledQueue)) { + DriverEntry =3D CR ( + mScheduledQueue.ForwardLink, + EFI_MM_DRIVER_ENTRY, + ScheduledLink, + EFI_MM_DRIVER_ENTRY_SIGNATURE + ); + DEBUG ((DEBUG_INFO, " DriverEntry (Scheduled) - %g\n", &DriverEntry= ->FileName)); + + // + // Load the MM Driver image into memory. If the Driver was transitio= ned from + // Untrused to Scheduled it would have already been loaded so we may= need to + // skip the LoadImage + // + if (DriverEntry->ImageHandle =3D=3D NULL) { + Status =3D MmLoadImage (DriverEntry); + + // + // Update the driver state to reflect that it's been loaded + // + if (EFI_ERROR (Status)) { + // + // The MM Driver could not be loaded, and do not attempt to load= or start it again. + // Take driver from Scheduled to Initialized. + // + DriverEntry->Initialized =3D TRUE; + DriverEntry->Scheduled =3D FALSE; + RemoveEntryList (&DriverEntry->ScheduledLink); + + // + // If it's an error don't try the StartImage + // + continue; + } + } + + DriverEntry->Scheduled =3D FALSE; + DriverEntry->Initialized =3D TRUE; + RemoveEntryList (&DriverEntry->ScheduledLink); + + /*REPORT_STATUS_CODE_WITH_EXTENDED_DATA ( + EFI_PROGRESS_CODE, + EFI_SOFTWARE_MM_DRIVER | EFI_SW_PC_INIT_BEGIN, + &DriverEntry->ImageHandle, + sizeof (DriverEntry->ImageHandle) + );*/ + + // + // Cache state of MmEntryPointRegistered before calling entry point + // + PreviousMmEntryPointRegistered =3D gMmCorePrivate->MmEntryPointRegis= tered; + + // + // For each MM driver, pass NULL as ImageHandle + // + if (mEfiSystemTable =3D=3D NULL) { + DEBUG ((DEBUG_INFO, "StartImage - 0x%x (Standalone Mode)\n", Drive= rEntry->ImageEntryPoint)); + Status =3D ((MM_IMAGE_ENTRY_POINT)(UINTN)DriverEntry->ImageEntryPo= int)(DriverEntry->ImageHandle, &gMmCoreMmst); + } else { + DEBUG ((DEBUG_INFO, "StartImage - 0x%x (Tradition Mode)\n", Driver= Entry->ImageEntryPoint)); + Status =3D ((EFI_IMAGE_ENTRY_POINT)(UINTN)DriverEntry->ImageEntryP= oint)(DriverEntry->ImageHandle, mEfiSystemTable); + } + if (EFI_ERROR(Status)){ + DEBUG ((DEBUG_INFO, "StartImage Status - %r\n", Status)); + MmFreePages(DriverEntry->ImageBuffer, DriverEntry->NumberOfPage); + } + + /*REPORT_STATUS_CODE_WITH_EXTENDED_DATA ( + EFI_PROGRESS_CODE, + EFI_SOFTWARE_MM_DRIVER | EFI_SW_PC_INIT_END, + &DriverEntry->ImageHandle, + sizeof (DriverEntry->ImageHandle) + );*/ + + if (!PreviousMmEntryPointRegistered && gMmCorePrivate->MmEntryPointR= egistered) { + // + // Return immediately if the MM Entry Point was registered by the = MM + // Driver that was just dispatched. The MM IPL will reinvoke the = MM + // Core Dispatcher. This is required so MM Mode may be enabled as= soon + // as all the dependent MM Drivers for MM Mode have been dispatche= d. + // Once the MM Entry Point has been registered, then MM Mode will = be + // used. + // + gRequestDispatch =3D TRUE; + gDispatcherRunning =3D FALSE; + return EFI_NOT_READY; + } + } + + // + // Search DriverList for items to place on Scheduled Queue + // + DEBUG ((DEBUG_INFO, " Search DriverList for items to place on Schedul= ed Queue\n")); + ReadyToRun =3D FALSE; + for (Link =3D mDiscoveredList.ForwardLink; Link !=3D &mDiscoveredList;= Link =3D Link->ForwardLink) { + DriverEntry =3D CR (Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_E= NTRY_SIGNATURE); + DEBUG ((DEBUG_INFO, " DriverEntry (Discovered) - %g\n", &DriverEntr= y->FileName)); + + if (DriverEntry->DepexProtocolError){ + // + // If Section Extraction Protocol did not let the Depex be read be= fore retry the read + // + Status =3D MmGetDepexSectionAndPreProccess (DriverEntry); + } + + if (DriverEntry->Dependent) { + if (MmIsSchedulable (DriverEntry)) { + MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEnt= ry); + ReadyToRun =3D TRUE; + } + } + } + } while (ReadyToRun); + + // + // If there is no more MM driver to dispatch, stop the dispatch request + // + DEBUG ((DEBUG_INFO, " no more MM driver to dispatch, stop the dispatch = request\n")); + gRequestDispatch =3D FALSE; + for (Link =3D mDiscoveredList.ForwardLink; Link !=3D &mDiscoveredList; L= ink =3D Link->ForwardLink) { + DriverEntry =3D CR (Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENT= RY_SIGNATURE); + DEBUG ((DEBUG_INFO, " DriverEntry (Discovered) - %g\n", &DriverEntry-= >FileName)); + + if (!DriverEntry->Initialized){ + // + // We have MM driver pending to dispatch + // + gRequestDispatch =3D TRUE; + break; + } + } + + gDispatcherRunning =3D FALSE; + + return EFI_SUCCESS; +} + +/** + Insert InsertedDriverEntry onto the mScheduledQueue. To do this you + must add any driver with a before dependency on InsertedDriverEntry firs= t. + You do this by recursively calling this routine. After all the Befores a= re + processed you can add InsertedDriverEntry to the mScheduledQueue. + Then you can add any driver with an After dependency on InsertedDriverEn= try + by recursively calling this routine. + + @param InsertedDriverEntry The driver to insert on the ScheduledLink = Queue + +**/ +VOID +MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter ( + IN EFI_MM_DRIVER_ENTRY *InsertedDriverEntry + ) +{ + LIST_ENTRY *Link; + EFI_MM_DRIVER_ENTRY *DriverEntry; + + // + // Process Before Dependency + // + for (Link =3D mDiscoveredList.ForwardLink; Link !=3D &mDiscoveredList; L= ink =3D Link->ForwardLink) { + DriverEntry =3D CR(Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTR= Y_SIGNATURE); + if (DriverEntry->Before && DriverEntry->Dependent && DriverEntry !=3D = InsertedDriverEntry) { + DEBUG ((DEBUG_DISPATCH, "Evaluate MM DEPEX for FFS(%g)\n", &DriverEn= try->FileName)); + DEBUG ((DEBUG_DISPATCH, " BEFORE FFS(%g) =3D ", &DriverEntry->Befor= eAfterGuid)); + if (CompareGuid (&InsertedDriverEntry->FileName, &DriverEntry->Befor= eAfterGuid)) { + // + // Recursively process BEFORE + // + DEBUG ((DEBUG_DISPATCH, "TRUE\n END\n RESULT =3D TRUE\n")); + MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEntry= ); + } else { + DEBUG ((DEBUG_DISPATCH, "FALSE\n END\n RESULT =3D FALSE\n")); + } + } + } + + // + // Convert driver from Dependent to Scheduled state + // + + InsertedDriverEntry->Dependent =3D FALSE; + InsertedDriverEntry->Scheduled =3D TRUE; + InsertTailList (&mScheduledQueue, &InsertedDriverEntry->ScheduledLink); + + + // + // Process After Dependency + // + for (Link =3D mDiscoveredList.ForwardLink; Link !=3D &mDiscoveredList; L= ink =3D Link->ForwardLink) { + DriverEntry =3D CR(Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTR= Y_SIGNATURE); + if (DriverEntry->After && DriverEntry->Dependent && DriverEntry !=3D I= nsertedDriverEntry) { + DEBUG ((DEBUG_DISPATCH, "Evaluate MM DEPEX for FFS(%g)\n", &DriverEn= try->FileName)); + DEBUG ((DEBUG_DISPATCH, " AFTER FFS(%g) =3D ", &DriverEntry->Before= AfterGuid)); + if (CompareGuid (&InsertedDriverEntry->FileName, &DriverEntry->Befor= eAfterGuid)) { + // + // Recursively process AFTER + // + DEBUG ((DEBUG_DISPATCH, "TRUE\n END\n RESULT =3D TRUE\n")); + MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEntry= ); + } else { + DEBUG ((DEBUG_DISPATCH, "FALSE\n END\n RESULT =3D FALSE\n")); + } + } + } +} + +/** + Return TRUE if the Fv has been processed, FALSE if not. + + @param FvHandle The handle of a FV that's being tested + + @retval TRUE Fv protocol on FvHandle has been processed + @retval FALSE Fv protocol on FvHandle has not yet been + processed + +**/ +BOOLEAN +FvHasBeenProcessed ( + IN EFI_HANDLE FvHandle + ) +{ + LIST_ENTRY *Link; + KNOWN_HANDLE *KnownHandle; + + for (Link =3D mFvHandleList.ForwardLink; Link !=3D &mFvHandleList; Link = =3D Link->ForwardLink) { + KnownHandle =3D CR(Link, KNOWN_HANDLE, Link, KNOWN_HANDLE_SIGNATURE); + if (KnownHandle->Handle =3D=3D FvHandle) { + return TRUE; + } + } + return FALSE; +} + +/** + Remember that Fv protocol on FvHandle has had it's drivers placed on the + mDiscoveredList. This fucntion adds entries on the mFvHandleList. Items = are + never removed/freed from the mFvHandleList. + + @param FvHandle The handle of a FV that has been processed + +**/ +VOID +FvIsBeingProcesssed ( + IN EFI_HANDLE FvHandle + ) +{ + KNOWN_HANDLE *KnownHandle; + + DEBUG ((DEBUG_INFO, "FvIsBeingProcesssed - 0x%08x\n", FvHandle)); + + KnownHandle =3D AllocatePool (sizeof (KNOWN_HANDLE)); + ASSERT (KnownHandle !=3D NULL); + + KnownHandle->Signature =3D KNOWN_HANDLE_SIGNATURE; + KnownHandle->Handle =3D FvHandle; + InsertTailList (&mFvHandleList, &KnownHandle->Link); +} + +/** + Add an entry to the mDiscoveredList. Allocate memory to store the Driver= Entry, + and initilize any state variables. Read the Depex from the FV and store = it + in DriverEntry. Pre-process the Depex to set the Before and After state. + The Discovered list is never free'ed and contains booleans that represen= t the + other possible MM driver states. + + @param Fv Fv protocol, needed to read Depex info out= of + FLASH. + @param FvHandle Handle for Fv, needed in the + EFI_MM_DRIVER_ENTRY so that the PE image c= an be + read out of the FV at a later time. + @param DriverName Name of driver to add to mDiscoveredList. + + @retval EFI_SUCCESS If driver was added to the mDiscoveredList. + @retval EFI_ALREADY_STARTED The driver has already been started. Only = one + DriverName may be active in the system at = any one + time. + +**/ +EFI_STATUS +MmAddToDriverList ( + IN EFI_HANDLE FvHandle, + IN VOID *Pe32Data, + IN UINTN Pe32DataSize, + IN VOID *Depex, + IN UINTN DepexSize, + IN EFI_GUID *DriverName + ) +{ + EFI_MM_DRIVER_ENTRY *DriverEntry; + + DEBUG ((DEBUG_INFO, "MmAddToDriverList - %g (0x%08x)\n", DriverName, Pe3= 2Data)); + + // + // Create the Driver Entry for the list. ZeroPool initializes lots of va= riables to + // NULL or FALSE. + // + DriverEntry =3D AllocateZeroPool (sizeof (EFI_MM_DRIVER_ENTRY)); + ASSERT (DriverEntry !=3D NULL); + + DriverEntry->Signature =3D EFI_MM_DRIVER_ENTRY_SIGNATURE; + CopyGuid (&DriverEntry->FileName, DriverName); + DriverEntry->FvHandle =3D FvHandle; + DriverEntry->Pe32Data =3D Pe32Data; + DriverEntry->Pe32DataSize =3D Pe32DataSize; + DriverEntry->Depex =3D Depex; + DriverEntry->DepexSize =3D DepexSize; + + MmGetDepexSectionAndPreProccess (DriverEntry); + + InsertTailList (&mDiscoveredList, &DriverEntry->Link); + gRequestDispatch =3D TRUE; + + return EFI_SUCCESS; +} + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + Event notification that is fired every time a FV dispatch protocol is ad= ded. + More than one protocol may have been added when this event is fired, so = you + must loop on MmLocateHandle () to see how many protocols were added and + do the following to each FV: + If the Fv has already been processed, skip it. If the Fv has not been + processed then mark it as being processed, as we are about to process it. + Read the Fv and add any driver in the Fv to the mDiscoveredList.The + mDiscoveredList is never free'ed and contains variables that define + the other states the MM driver transitions to.. + While you are at it read the A Priori file into memory. + Place drivers in the A Priori list onto the mScheduledQueue. + + @param DispatchHandle The unique handle assigned to this handler by Sm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmDriverDispatchHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_STATUS Status; + + DEBUG ((DEBUG_INFO, "MmDriverDispatchHandler\n")); + + // + // Execute the MM Dispatcher on any newly discovered FVs and previously + // discovered MM drivers that have been discovered but not dispatched. + // + Status =3D MmDispatcher (); + + // + // Check to see if CommBuffer and CommBufferSize are valid + // + if (CommBuffer !=3D NULL && CommBufferSize !=3D NULL) { + if (*CommBufferSize > 0) { + if (Status =3D=3D EFI_NOT_READY) { + // + // If a the MM Core Entry Point was just registered, then set flag= to + // request the MM Dispatcher to be restarted. + // + *(UINT8 *)CommBuffer =3D COMM_BUFFER_MM_DISPATCH_RESTART; + } else if (!EFI_ERROR (Status)) { + // + // Set the flag to show that the MM Dispatcher executed without er= rors + // + *(UINT8 *)CommBuffer =3D COMM_BUFFER_MM_DISPATCH_SUCCESS; + } else { + // + // Set the flag to show that the MM Dispatcher encountered an error + // + *(UINT8 *)CommBuffer =3D COMM_BUFFER_MM_DISPATCH_ERROR; + } + } + } + + return EFI_SUCCESS; +} + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Sm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmFvDispatchHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_STATUS Status; + EFI_MM_COMMUNICATE_FV_DISPATCH_DATA *CommunicationFvDispatchData; + EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader; + + DEBUG ((DEBUG_INFO, "MmFvDispatchHandler\n")); + + CommunicationFvDispatchData =3D CommBuffer; + + DEBUG ((DEBUG_INFO, " Dispatch - 0x%016lx - 0x%016lx\n", CommunicationF= vDispatchData->Address, CommunicationFvDispatchData->Size)); + + FwVolHeader =3D (EFI_FIRMWARE_VOLUME_HEADER *)(UINTN)CommunicationFvDisp= atchData->Address; + + MmCoreFfsFindMmDriver (FwVolHeader); + + // + // Execute the MM Dispatcher on any newly discovered FVs and previously + // discovered MM drivers that have been discovered but not dispatched. + // + Status =3D MmDispatcher (); + + return Status; +} + +/** + Traverse the discovered list for any drivers that were discovered but no= t loaded + because the dependency experessions evaluated to false. + +**/ +VOID +MmDisplayDiscoveredNotDispatched ( + VOID + ) +{ + LIST_ENTRY *Link; + EFI_MM_DRIVER_ENTRY *DriverEntry; + + for (Link =3D mDiscoveredList.ForwardLink;Link !=3D&mDiscoveredList; Lin= k =3D Link->ForwardLink) { + DriverEntry =3D CR(Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTR= Y_SIGNATURE); + if (DriverEntry->Dependent) { + DEBUG ((DEBUG_LOAD, "MM Driver %g was discovered but not loaded!!\n"= , &DriverEntry->FileName)); + } + } +} diff --git a/StandaloneMmPkg/Core/FwVol.c b/StandaloneMmPkg/Core/FwVol.c new file mode 100644 index 0000000000..901c58bc53 --- /dev/null +++ b/StandaloneMmPkg/Core/FwVol.c @@ -0,0 +1,104 @@ +/**@file + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+This program and the accompanying materials +are licensed and made available under the terms and conditions of the BSD = License +which accompanies this distribution. The full text of the license may be = found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#include "StandaloneMmCore.h" +#include + +// +// List of file types supported by dispatcher +// +EFI_FV_FILETYPE mMmFileTypes[] =3D { + EFI_FV_FILETYPE_MM, + 0xE, //EFI_FV_FILETYPE_MM_STANDALONE, + // + // Note: DXE core will process the FV image file, so skip it in MM = core + // EFI_FV_FILETYPE_FIRMWARE_VOLUME_IMAGE + // +}; + +EFI_STATUS +MmAddToDriverList ( + IN EFI_HANDLE FvHandle, + IN VOID *Pe32Data, + IN UINTN Pe32DataSize, + IN VOID *Depex, + IN UINTN DepexSize, + IN EFI_GUID *DriverName + ); + +BOOLEAN +FvHasBeenProcessed ( + IN EFI_HANDLE FvHandle + ); + +VOID +FvIsBeingProcesssed ( + IN EFI_HANDLE FvHandle + ); + +EFI_STATUS +MmCoreFfsFindMmDriver ( + IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader + ) +/*++ + +Routine Description: + Given the pointer to the Firmware Volume Header find the + MM driver and return it's PE32 image. + +Arguments: + FwVolHeader - Pointer to memory mapped FV + +Returns: + other - Failure + +--*/ +{ + EFI_STATUS Status; + EFI_STATUS DepexStatus; + EFI_FFS_FILE_HEADER *FileHeader; + EFI_FV_FILETYPE FileType; + VOID *Pe32Data; + UINTN Pe32DataSize; + VOID *Depex; + UINTN DepexSize; + UINTN Index; + + DEBUG((DEBUG_INFO, "MmCoreFfsFindMmDriver - 0x%x\n", FwVolHeader)); + + if (FvHasBeenProcessed (FwVolHeader)) { + return EFI_SUCCESS; + } + + FvIsBeingProcesssed (FwVolHeader); + + for (Index =3D 0; Index < sizeof(mMmFileTypes) / sizeof(mMmFileTypes[0])= ; Index++) { + DEBUG((DEBUG_INFO, "Check MmFileTypes - 0x%x\n", mMmFileTypes[Index])); + FileType =3D mMmFileTypes[Index]; + FileHeader =3D NULL; + do { + Status =3D FfsFindNextFile(FileType, FwVolHeader, &FileHeader); + if (!EFI_ERROR(Status)) { + Status =3D FfsFindSectionData(EFI_SECTION_PE32, FileHeader, &Pe32D= ata, &Pe32DataSize); + DEBUG((DEBUG_INFO, "Find PE data - 0x%x\n", Pe32Data)); + DepexStatus =3D FfsFindSectionData(EFI_SECTION_MM_DEPEX, FileHeade= r, &Depex, &DepexSize); + if (!EFI_ERROR(DepexStatus)) { + MmAddToDriverList(FwVolHeader, Pe32Data, Pe32DataSize, Depex, De= pexSize, &FileHeader->Name); + } + } + } while (!EFI_ERROR(Status)); + } + + return Status; +} diff --git a/StandaloneMmPkg/Core/Handle.c b/StandaloneMmPkg/Core/Handle.c new file mode 100644 index 0000000000..01832f4bbe --- /dev/null +++ b/StandaloneMmPkg/Core/Handle.c @@ -0,0 +1,533 @@ +/** @file + SMM handle & protocol handling. + + Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +// +// mProtocolDatabase - A list of all protocols in the system. (simple= list for now) +// gHandleList - A list of all the handles in the system +// +LIST_ENTRY mProtocolDatabase =3D INITIALIZE_LIST_HEAD_VARIABLE (mProtoco= lDatabase); +LIST_ENTRY gHandleList =3D INITIALIZE_LIST_HEAD_VARIABLE (gHandleL= ist); + +/** + Check whether a handle is a valid EFI_HANDLE + + @param UserHandle The handle to check + + @retval EFI_INVALID_PARAMETER The handle is NULL or not a valid EFI_HAN= DLE. + @retval EFI_SUCCESS The handle is valid EFI_HANDLE. + +**/ +EFI_STATUS +MmValidateHandle ( + IN EFI_HANDLE UserHandle + ) +{ + IHANDLE *Handle; + + Handle =3D (IHANDLE *)UserHandle; + if (Handle =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + if (Handle->Signature !=3D EFI_HANDLE_SIGNATURE) { + return EFI_INVALID_PARAMETER; + } + return EFI_SUCCESS; +} + +/** + Finds the protocol entry for the requested protocol. + + @param Protocol The ID of the protocol + @param Create Create a new entry if not found + + @return Protocol entry + +**/ +PROTOCOL_ENTRY * +MmFindProtocolEntry ( + IN EFI_GUID *Protocol, + IN BOOLEAN Create + ) +{ + LIST_ENTRY *Link; + PROTOCOL_ENTRY *Item; + PROTOCOL_ENTRY *ProtEntry; + + // + // Search the database for the matching GUID + // + + ProtEntry =3D NULL; + for (Link =3D mProtocolDatabase.ForwardLink; + Link !=3D &mProtocolDatabase; + Link =3D Link->ForwardLink) { + + Item =3D CR(Link, PROTOCOL_ENTRY, AllEntries, PROTOCOL_ENTRY_SIGNATURE= ); + if (CompareGuid (&Item->ProtocolID, Protocol)) { + // + // This is the protocol entry + // + ProtEntry =3D Item; + break; + } + } + + // + // If the protocol entry was not found and Create is TRUE, then + // allocate a new entry + // + if ((ProtEntry =3D=3D NULL) && Create) { + ProtEntry =3D AllocatePool (sizeof(PROTOCOL_ENTRY)); + if (ProtEntry !=3D NULL) { + // + // Initialize new protocol entry structure + // + ProtEntry->Signature =3D PROTOCOL_ENTRY_SIGNATURE; + CopyGuid ((VOID *)&ProtEntry->ProtocolID, Protocol); + InitializeListHead (&ProtEntry->Protocols); + InitializeListHead (&ProtEntry->Notify); + + // + // Add it to protocol database + // + InsertTailList (&mProtocolDatabase, &ProtEntry->AllEntries); + } + } + return ProtEntry; +} + +/** + Finds the protocol instance for the requested handle and protocol. + Note: This function doesn't do parameters checking, it's caller's respon= sibility + to pass in valid parameters. + + @param Handle The handle to search the protocol on + @param Protocol GUID of the protocol + @param Interface The interface for the protocol being sear= ched + + @return Protocol instance (NULL: Not found) + +**/ +PROTOCOL_INTERFACE * +MmFindProtocolInterface ( + IN IHANDLE *Handle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ) +{ + PROTOCOL_INTERFACE *Prot; + PROTOCOL_ENTRY *ProtEntry; + LIST_ENTRY *Link; + + Prot =3D NULL; + + // + // Lookup the protocol entry for this protocol ID + // + ProtEntry =3D MmFindProtocolEntry (Protocol, FALSE); + if (ProtEntry !=3D NULL) { + // + // Look at each protocol interface for any matches + // + for (Link =3D Handle->Protocols.ForwardLink; Link !=3D &Handle->Protoc= ols; Link=3DLink->ForwardLink) { + // + // If this protocol interface matches, remove it + // + Prot =3D CR(Link, PROTOCOL_INTERFACE, Link, PROTOCOL_INTERFACE_SIGNA= TURE); + if (Prot->Interface =3D=3D Interface && Prot->Protocol =3D=3D ProtEn= try) { + break; + } + Prot =3D NULL; + } + } + return Prot; +} + +/** + Wrapper function to MmInstallProtocolInterfaceNotify. This is the publi= c API which + Calls the private one which contains a BOOLEAN parameter for notificatio= ns + + @param UserHandle The handle to install the protocol handle= r on, + or NULL if a new handle is to be allocated + @param Protocol The protocol to add to the handle + @param InterfaceType Indicates whether Interface is supplied in + native form. + @param Interface The interface for the protocol being added + + @return Status code + +**/ +EFI_STATUS +EFIAPI +MmInstallProtocolInterface ( + IN OUT EFI_HANDLE *UserHandle, + IN EFI_GUID *Protocol, + IN EFI_INTERFACE_TYPE InterfaceType, + IN VOID *Interface + ) +{ + return MmInstallProtocolInterfaceNotify ( + UserHandle, + Protocol, + InterfaceType, + Interface, + TRUE + ); +} + +/** + Installs a protocol interface into the boot services environment. + + @param UserHandle The handle to install the protocol handle= r on, + or NULL if a new handle is to be allocated + @param Protocol The protocol to add to the handle + @param InterfaceType Indicates whether Interface is supplied in + native form. + @param Interface The interface for the protocol being added + @param Notify indicates whether notify the notification= list + for this protocol + + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate + @retval EFI_SUCCESS Protocol interface successfully installed + +**/ +EFI_STATUS +MmInstallProtocolInterfaceNotify ( + IN OUT EFI_HANDLE *UserHandle, + IN EFI_GUID *Protocol, + IN EFI_INTERFACE_TYPE InterfaceType, + IN VOID *Interface, + IN BOOLEAN Notify + ) +{ + PROTOCOL_INTERFACE *Prot; + PROTOCOL_ENTRY *ProtEntry; + IHANDLE *Handle; + EFI_STATUS Status; + VOID *ExistingInterface; + + // + // returns EFI_INVALID_PARAMETER if InterfaceType is invalid. + // Also added check for invalid UserHandle and Protocol pointers. + // + if (UserHandle =3D=3D NULL || Protocol =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (InterfaceType !=3D EFI_NATIVE_INTERFACE) { + return EFI_INVALID_PARAMETER; + } + + // + // Print debug message + // + DEBUG((DEBUG_LOAD | DEBUG_INFO, "MmInstallProtocolInterface: %g %p\n", P= rotocol, Interface)); + + Status =3D EFI_OUT_OF_RESOURCES; + Prot =3D NULL; + Handle =3D NULL; + + if (*UserHandle !=3D NULL) { + Status =3D MmHandleProtocol (*UserHandle, Protocol, (VOID **)&Existing= Interface); + if (!EFI_ERROR (Status)) { + return EFI_INVALID_PARAMETER; + } + } + + // + // Lookup the Protocol Entry for the requested protocol + // + ProtEntry =3D MmFindProtocolEntry (Protocol, TRUE); + if (ProtEntry =3D=3D NULL) { + goto Done; + } + + // + // Allocate a new protocol interface structure + // + Prot =3D AllocateZeroPool (sizeof(PROTOCOL_INTERFACE)); + if (Prot =3D=3D NULL) { + Status =3D EFI_OUT_OF_RESOURCES; + goto Done; + } + + // + // If caller didn't supply a handle, allocate a new one + // + Handle =3D (IHANDLE *)*UserHandle; + if (Handle =3D=3D NULL) { + Handle =3D AllocateZeroPool (sizeof(IHANDLE)); + if (Handle =3D=3D NULL) { + Status =3D EFI_OUT_OF_RESOURCES; + goto Done; + } + + // + // Initialize new handler structure + // + Handle->Signature =3D EFI_HANDLE_SIGNATURE; + InitializeListHead (&Handle->Protocols); + + // + // Add this handle to the list global list of all handles + // in the system + // + InsertTailList (&gHandleList, &Handle->AllHandles); + } + + Status =3D MmValidateHandle (Handle); + if (EFI_ERROR (Status)) { + goto Done; + } + + // + // Each interface that is added must be unique + // + ASSERT (MmFindProtocolInterface (Handle, Protocol, Interface) =3D=3D NUL= L); + + // + // Initialize the protocol interface structure + // + Prot->Signature =3D PROTOCOL_INTERFACE_SIGNATURE; + Prot->Handle =3D Handle; + Prot->Protocol =3D ProtEntry; + Prot->Interface =3D Interface; + + // + // Add this protocol interface to the head of the supported + // protocol list for this handle + // + InsertHeadList (&Handle->Protocols, &Prot->Link); + + // + // Add this protocol interface to the tail of the + // protocol entry + // + InsertTailList (&ProtEntry->Protocols, &Prot->ByProtocol); + + // + // Notify the notification list for this protocol + // + if (Notify) { + MmNotifyProtocol (Prot); + } + Status =3D EFI_SUCCESS; + +Done: + if (!EFI_ERROR (Status)) { + // + // Return the new handle back to the caller + // + *UserHandle =3D Handle; + } else { + // + // There was an error, clean up + // + if (Prot !=3D NULL) { + FreePool (Prot); + } + } + return Status; +} + +/** + Uninstalls all instances of a protocol:interfacer from a handle. + If the last protocol interface is remove from the handle, the + handle is freed. + + @param UserHandle The handle to remove the protocol handler= from + @param Protocol The protocol, of protocol:interface, to r= emove + @param Interface The interface, of protocol:interface, to = remove + + @retval EFI_INVALID_PARAMETER Protocol is NULL. + @retval EFI_SUCCESS Protocol interface successfully uninstall= ed. + +**/ +EFI_STATUS +EFIAPI +MmUninstallProtocolInterface ( + IN EFI_HANDLE UserHandle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ) +{ + EFI_STATUS Status; + IHANDLE *Handle; + PROTOCOL_INTERFACE *Prot; + + // + // Check that Protocol is valid + // + if (Protocol =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // + // Check that UserHandle is a valid handle + // + Status =3D MmValidateHandle (UserHandle); + if (EFI_ERROR (Status)) { + return Status; + } + + // + // Check that Protocol exists on UserHandle, and Interface matches the i= nterface in the database + // + Prot =3D MmFindProtocolInterface (UserHandle, Protocol, Interface); + if (Prot =3D=3D NULL) { + return EFI_NOT_FOUND; + } + + // + // Remove the protocol interface from the protocol + // + Status =3D EFI_NOT_FOUND; + Handle =3D (IHANDLE *)UserHandle; + Prot =3D MmRemoveInterfaceFromProtocol (Handle, Protocol, Interface); + + if (Prot !=3D NULL) { + // + // Remove the protocol interface from the handle + // + RemoveEntryList (&Prot->Link); + + // + // Free the memory + // + Prot->Signature =3D 0; + FreePool (Prot); + Status =3D EFI_SUCCESS; + } + + // + // If there are no more handlers for the handle, free the handle + // + if (IsListEmpty (&Handle->Protocols)) { + Handle->Signature =3D 0; + RemoveEntryList (&Handle->AllHandles); + FreePool (Handle); + } + return Status; +} + +/** + Locate a certain GUID protocol interface in a Handle's protocols. + + @param UserHandle The handle to obtain the protocol interfa= ce on + @param Protocol The GUID of the protocol + + @return The requested protocol interface for the handle + +**/ +PROTOCOL_INTERFACE * +MmGetProtocolInterface ( + IN EFI_HANDLE UserHandle, + IN EFI_GUID *Protocol + ) +{ + EFI_STATUS Status; + PROTOCOL_ENTRY *ProtEntry; + PROTOCOL_INTERFACE *Prot; + IHANDLE *Handle; + LIST_ENTRY *Link; + + Status =3D MmValidateHandle (UserHandle); + if (EFI_ERROR (Status)) { + return NULL; + } + + Handle =3D (IHANDLE *)UserHandle; + + // + // Look at each protocol interface for a match + // + for (Link =3D Handle->Protocols.ForwardLink; Link !=3D &Handle->Protocol= s; Link =3D Link->ForwardLink) { + Prot =3D CR(Link, PROTOCOL_INTERFACE, Link, PROTOCOL_INTERFACE_SIGNATU= RE); + ProtEntry =3D Prot->Protocol; + if (CompareGuid (&ProtEntry->ProtocolID, Protocol)) { + return Prot; + } + } + return NULL; +} + +/** + Queries a handle to determine if it supports a specified protocol. + + @param UserHandle The handle being queried. + @param Protocol The published unique identifier of the pr= otocol. + @param Interface Supplies the address where a pointer to t= he + corresponding Protocol Interface is retur= ned. + + @retval EFI_SUCCESS The interface information for the specifi= ed protocol was returned. + @retval EFI_UNSUPPORTED The device does not support the specified= protocol. + @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.. + @retval EFI_INVALID_PARAMETER Protocol is NULL. + @retval EFI_INVALID_PARAMETER Interface is NULL. + +**/ +EFI_STATUS +EFIAPI +MmHandleProtocol ( + IN EFI_HANDLE UserHandle, + IN EFI_GUID *Protocol, + OUT VOID **Interface + ) +{ + EFI_STATUS Status; + PROTOCOL_INTERFACE *Prot; + + // + // Check for invalid Protocol + // + if (Protocol =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // + // Check for invalid Interface + // + if (Interface =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } else { + *Interface =3D NULL; + } + + // + // Check for invalid UserHandle + // + Status =3D MmValidateHandle (UserHandle); + if (EFI_ERROR (Status)) { + return Status; + } + + // + // Look at each protocol interface for a match + // + Prot =3D MmGetProtocolInterface (UserHandle, Protocol); + if (Prot =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + + // + // This is the protocol interface entry for this protocol + // + *Interface =3D Prot->Interface; + + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Core/InstallConfigurationTable.c b/StandaloneM= mPkg/Core/InstallConfigurationTable.c new file mode 100644 index 0000000000..3a31c63f94 --- /dev/null +++ b/StandaloneMmPkg/Core/InstallConfigurationTable.c @@ -0,0 +1,178 @@ +/** @file + System Management System Table Services MmInstallConfigurationTable serv= ice + + Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +#define CONFIG_TABLE_SIZE_INCREASED 0x10 + +UINTN mMmSystemTableAllocateSize =3D 0; + +/** + The MmInstallConfigurationTable() function is used to maintain the list + of configuration tables that are stored in the System Management System + Table. The list is stored as an array of (GUID, Pointer) pairs. The li= st + must be allocated from pool memory with PoolType set to EfiRuntimeServic= esData. + + @param SystemTable A pointer to the SMM System Table (SMST). + @param Guid A pointer to the GUID for the entry to add, upd= ate, or remove. + @param Table A pointer to the buffer of the table to add. + @param TableSize The size of the table to install. + + @retval EFI_SUCCESS The (Guid, Table) pair was added, updated,= or removed. + @retval EFI_INVALID_PARAMETER Guid is not valid. + @retval EFI_NOT_FOUND An attempt was made to delete a non-existe= nt entry. + @retval EFI_OUT_OF_RESOURCES There is not enough memory available to co= mplete the operation. + +**/ +EFI_STATUS +EFIAPI +MmInstallConfigurationTable ( + IN CONST EFI_MM_SYSTEM_TABLE *SystemTable, + IN CONST EFI_GUID *Guid, + IN VOID *Table, + IN UINTN TableSize + ) +{ + UINTN Index; + EFI_CONFIGURATION_TABLE *ConfigurationTable; + EFI_CONFIGURATION_TABLE *OldTable; + + // + // If Guid is NULL, then this operation cannot be performed + // + if (Guid =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + ConfigurationTable =3D gMmCoreMmst.MmConfigurationTable; + + // + // Search all the table for an entry that matches Guid + // + for (Index =3D 0; Index < gMmCoreMmst.NumberOfTableEntries; Index++) { + if (CompareGuid (Guid, &(ConfigurationTable[Index].VendorGuid))) { + break; + } + } + + if (Index < gMmCoreMmst.NumberOfTableEntries) { + // + // A match was found, so this is either a modify or a delete operation + // + if (Table !=3D NULL) { + // + // If Table is not NULL, then this is a modify operation. + // Modify the table entry and return. + // + ConfigurationTable[Index].VendorTable =3D Table; + return EFI_SUCCESS; + } + + // + // A match was found and Table is NULL, so this is a delete operation. + // + gMmCoreMmst.NumberOfTableEntries--; + + // + // Copy over deleted entry + // + CopyMem ( + &(ConfigurationTable[Index]), + &(ConfigurationTable[Index + 1]), + (gMmCoreMmst.NumberOfTableEntries - Index) * sizeof (EFI_CONFIGURATI= ON_TABLE) + ); + + } else { + // + // No matching GUIDs were found, so this is an add operation. + // + if (Table =3D=3D NULL) { + // + // If Table is NULL on an add operation, then return an error. + // + return EFI_NOT_FOUND; + } + + // + // Assume that Index =3D=3D gMmCoreMmst.NumberOfTableEntries + // + if ((Index * sizeof (EFI_CONFIGURATION_TABLE)) >=3D mMmSystemTableAllo= cateSize) { + // + // Allocate a table with one additional entry. + // + mMmSystemTableAllocateSize +=3D (CONFIG_TABLE_SIZE_INCREASED * sizeo= f (EFI_CONFIGURATION_TABLE)); + ConfigurationTable =3D AllocatePool (mMmSystemTableAllocateSize); + if (ConfigurationTable =3D=3D NULL) { + // + // If a new table could not be allocated, then return an error. + // + return EFI_OUT_OF_RESOURCES; + } + + if (gMmCoreMmst.MmConfigurationTable !=3D NULL) { + // + // Copy the old table to the new table. + // + CopyMem ( + ConfigurationTable, + gMmCoreMmst.MmConfigurationTable, + Index * sizeof (EFI_CONFIGURATION_TABLE) + ); + + // + // Record the old table pointer. + // + OldTable =3D gMmCoreMmst.MmConfigurationTable; + + // + // As the MmInstallConfigurationTable() may be re-entered by FreeP= ool() in + // its calling stack, updating System table to the new table point= er must + // be done before calling FreePool() to free the old table. + // It can make sure the gMmCoreMmst.MmConfigurationTable point to = the new + // table and avoid the errors of use-after-free to the old table b= y the + // reenter of MmInstallConfigurationTable() in FreePool()'s callin= g stack. + // + gMmCoreMmst.MmConfigurationTable =3D ConfigurationTable; + + // + // Free the old table after updating System Table to the new table= pointer. + // + FreePool (OldTable); + } else { + // + // Update System Table + // + gMmCoreMmst.MmConfigurationTable =3D ConfigurationTable; + } + } + + // + // Fill in the new entry + // + CopyGuid ((VOID *)&ConfigurationTable[Index].VendorGuid, Guid); + ConfigurationTable[Index].VendorTable =3D Table; + + // + // This is an add operation, so increment the number of table entries + // + gMmCoreMmst.NumberOfTableEntries++; + } + + // + // CRC-32 field is ignorable for SMM System Table and should be set to z= ero + // + + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Core/Locate.c b/StandaloneMmPkg/Core/Locate.c new file mode 100644 index 0000000000..6a90575f99 --- /dev/null +++ b/StandaloneMmPkg/Core/Locate.c @@ -0,0 +1,496 @@ +/** @file + Locate handle functions + + Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +// +// ProtocolRequest - Last LocateHandle request ID +// +UINTN mEfiLocateHandleRequest =3D 0; + +// +// Internal prototypes +// + +typedef struct { + EFI_GUID *Protocol; + VOID *SearchKey; + LIST_ENTRY *Position; + PROTOCOL_ENTRY *ProtEntry; +} LOCATE_POSITION; + +typedef +IHANDLE * +(* CORE_GET_NEXT) ( + IN OUT LOCATE_POSITION *Position, + OUT VOID **Interface + ); + +/** + Routine to get the next Handle, when you are searching for all handles. + + @param Position Information about which Handle to seach f= or. + @param Interface Return the interface structure for the ma= tching + protocol. + + @return An pointer to IHANDLE if the next Position is not the end of the= list. + Otherwise,NULL is returned. + +**/ +IHANDLE * +MmGetNextLocateAllHandles ( + IN OUT LOCATE_POSITION *Position, + OUT VOID **Interface + ) +{ + IHANDLE *Handle; + + // + // Next handle + // + Position->Position =3D Position->Position->ForwardLink; + + // + // If not at the end of the list, get the handle + // + Handle =3D NULL; + *Interface =3D NULL; + if (Position->Position !=3D &gHandleList) { + Handle =3D CR (Position->Position, IHANDLE, AllHandles, EFI_HANDLE_SIG= NATURE); + } + return Handle; +} + +/** + Routine to get the next Handle, when you are searching for register prot= ocol + notifies. + + @param Position Information about which Handle to seach f= or. + @param Interface Return the interface structure for the ma= tching + protocol. + + @return An pointer to IHANDLE if the next Position is not the end of the= list. + Otherwise,NULL is returned. + +**/ +IHANDLE * +MmGetNextLocateByRegisterNotify ( + IN OUT LOCATE_POSITION *Position, + OUT VOID **Interface + ) +{ + IHANDLE *Handle; + PROTOCOL_NOTIFY *ProtNotify; + PROTOCOL_INTERFACE *Prot; + LIST_ENTRY *Link; + + Handle =3D NULL; + *Interface =3D NULL; + ProtNotify =3D Position->SearchKey; + + // + // If this is the first request, get the next handle + // + if (ProtNotify !=3D NULL) { + ASSERT(ProtNotify->Signature =3D=3D PROTOCOL_NOTIFY_SIGNATURE); + Position->SearchKey =3D NULL; + + // + // If not at the end of the list, get the next handle + // + Link =3D ProtNotify->Position->ForwardLink; + if (Link !=3D &ProtNotify->Protocol->Protocols) { + Prot =3D CR (Link, PROTOCOL_INTERFACE, ByProtocol, PROTOCOL_INTERFAC= E_SIGNATURE); + Handle =3D Prot->Handle; + *Interface =3D Prot->Interface; + } + } + return Handle; +} + +/** + Routine to get the next Handle, when you are searching for a given proto= col. + + @param Position Information about which Handle to seach f= or. + @param Interface Return the interface structure for the ma= tching + protocol. + + @return An pointer to IHANDLE if the next Position is not the end of the= list. + Otherwise,NULL is returned. + +**/ +IHANDLE * +MmGetNextLocateByProtocol ( + IN OUT LOCATE_POSITION *Position, + OUT VOID **Interface + ) +{ + IHANDLE *Handle; + LIST_ENTRY *Link; + PROTOCOL_INTERFACE *Prot; + + Handle =3D NULL; + *Interface =3D NULL; + for (; ;) { + // + // Next entry + // + Link =3D Position->Position->ForwardLink; + Position->Position =3D Link; + + // + // If not at the end, return the handle + // + if (Link =3D=3D &Position->ProtEntry->Protocols) { + Handle =3D NULL; + break; + } + + // + // Get the handle + // + Prot =3D CR(Link, PROTOCOL_INTERFACE, ByProtocol, PROTOCOL_INTERFACE_S= IGNATURE); + Handle =3D Prot->Handle; + *Interface =3D Prot->Interface; + + // + // If this handle has not been returned this request, then + // return it now + // + if (Handle->LocateRequest !=3D mEfiLocateHandleRequest) { + Handle->LocateRequest =3D mEfiLocateHandleRequest; + break; + } + } + return Handle; +} + +/** + Return the first Protocol Interface that matches the Protocol GUID. If + Registration is pasased in return a Protocol Instance that was just add + to the system. If Retistration is NULL return the first Protocol Interfa= ce + you find. + + @param Protocol The protocol to search for + @param Registration Optional Registration Key returned from + RegisterProtocolNotify() + @param Interface Return the Protocol interface (instance). + + @retval EFI_SUCCESS If a valid Interface is returned + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_NOT_FOUND Protocol interface not found + +**/ +EFI_STATUS +EFIAPI +MmLocateProtocol ( + IN EFI_GUID *Protocol, + IN VOID *Registration OPTIONAL, + OUT VOID **Interface + ) +{ + EFI_STATUS Status; + LOCATE_POSITION Position; + PROTOCOL_NOTIFY *ProtNotify; + IHANDLE *Handle; + + if ((Interface =3D=3D NULL) || (Protocol =3D=3D NULL)) { + return EFI_INVALID_PARAMETER; + } + + *Interface =3D NULL; + Status =3D EFI_SUCCESS; + + // + // Set initial position + // + Position.Protocol =3D Protocol; + Position.SearchKey =3D Registration; + Position.Position =3D &gHandleList; + + mEfiLocateHandleRequest +=3D 1; + + if (Registration =3D=3D NULL) { + // + // Look up the protocol entry and set the head pointer + // + Position.ProtEntry =3D MmFindProtocolEntry (Protocol, FALSE); + if (Position.ProtEntry =3D=3D NULL) { + return EFI_NOT_FOUND; + } + Position.Position =3D &Position.ProtEntry->Protocols; + + Handle =3D MmGetNextLocateByProtocol (&Position, Interface); + } else { + Handle =3D MmGetNextLocateByRegisterNotify (&Position, Interface); + } + + if (Handle =3D=3D NULL) { + Status =3D EFI_NOT_FOUND; + } else if (Registration !=3D NULL) { + // + // If this is a search by register notify and a handle was + // returned, update the register notification position + // + ProtNotify =3D Registration; + ProtNotify->Position =3D ProtNotify->Position->ForwardLink; + } + + return Status; +} + +/** + Locates the requested handle(s) and returns them in Buffer. + + @param SearchType The type of search to perform to locate t= he + handles + @param Protocol The protocol to search for + @param SearchKey Dependant on SearchType + @param BufferSize On input the size of Buffer. On output t= he + size of data returned. + @param Buffer The buffer to return the results in + + @retval EFI_BUFFER_TOO_SMALL Buffer too small, required buffer size is + returned in BufferSize. + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_SUCCESS Successfully found the requested handle(s= ) and + returns them in Buffer. + +**/ +EFI_STATUS +EFIAPI +MmLocateHandle ( + IN EFI_LOCATE_SEARCH_TYPE SearchType, + IN EFI_GUID *Protocol OPTIONAL, + IN VOID *SearchKey OPTIONAL, + IN OUT UINTN *BufferSize, + OUT EFI_HANDLE *Buffer + ) +{ + EFI_STATUS Status; + LOCATE_POSITION Position; + PROTOCOL_NOTIFY *ProtNotify; + CORE_GET_NEXT GetNext; + UINTN ResultSize; + IHANDLE *Handle; + IHANDLE **ResultBuffer; + VOID *Interface; + + if (BufferSize =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if ((*BufferSize > 0) && (Buffer =3D=3D NULL)) { + return EFI_INVALID_PARAMETER; + } + + GetNext =3D NULL; + + // + // Set initial position + // + Position.Protocol =3D Protocol; + Position.SearchKey =3D SearchKey; + Position.Position =3D &gHandleList; + + ResultSize =3D 0; + ResultBuffer =3D (IHANDLE **) Buffer; + Status =3D EFI_SUCCESS; + + // + // Get the search function based on type + // + switch (SearchType) { + case AllHandles: + GetNext =3D MmGetNextLocateAllHandles; + break; + + case ByRegisterNotify: + GetNext =3D MmGetNextLocateByRegisterNotify; + // + // Must have SearchKey for locate ByRegisterNotify + // + if (SearchKey =3D=3D NULL) { + Status =3D EFI_INVALID_PARAMETER; + } + break; + + case ByProtocol: + GetNext =3D MmGetNextLocateByProtocol; + if (Protocol =3D=3D NULL) { + Status =3D EFI_INVALID_PARAMETER; + break; + } + // + // Look up the protocol entry and set the head pointer + // + Position.ProtEntry =3D MmFindProtocolEntry (Protocol, FALSE); + if (Position.ProtEntry =3D=3D NULL) { + Status =3D EFI_NOT_FOUND; + break; + } + Position.Position =3D &Position.ProtEntry->Protocols; + break; + + default: + Status =3D EFI_INVALID_PARAMETER; + break; + } + + if (EFI_ERROR(Status)) { + return Status; + } + + // + // Enumerate out the matching handles + // + mEfiLocateHandleRequest +=3D 1; + for (; ;) { + // + // Get the next handle. If no more handles, stop + // + Handle =3D GetNext (&Position, &Interface); + if (NULL =3D=3D Handle) { + break; + } + + // + // Increase the resulting buffer size, and if this handle + // fits return it + // + ResultSize +=3D sizeof(Handle); + if (ResultSize <=3D *BufferSize) { + *ResultBuffer =3D Handle; + ResultBuffer +=3D 1; + } + } + + // + // If the result is a zero length buffer, then there were no + // matching handles + // + if (ResultSize =3D=3D 0) { + Status =3D EFI_NOT_FOUND; + } else { + // + // Return the resulting buffer size. If it's larger than what + // was passed, then set the error code + // + if (ResultSize > *BufferSize) { + Status =3D EFI_BUFFER_TOO_SMALL; + } + + *BufferSize =3D ResultSize; + + if (SearchType =3D=3D ByRegisterNotify && !EFI_ERROR(Status)) { + ASSERT (SearchKey !=3D NULL); + // + // If this is a search by register notify and a handle was + // returned, update the register notification position + // + ProtNotify =3D SearchKey; + ProtNotify->Position =3D ProtNotify->Position->ForwardLink; + } + } + + return Status; +} + +/** + Function returns an array of handles that support the requested protocol + in a buffer allocated from pool. This is a version of MmLocateHandle() + that allocates a buffer for the caller. + + @param SearchType Specifies which handle(s) are to be retur= ned. + @param Protocol Provides the protocol to search by. Th= is + parameter is only valid for SearchType + ByProtocol. + @param SearchKey Supplies the search key depending on the + SearchType. + @param NumberHandles The number of handles returned in Buffer. + @param Buffer A pointer to the buffer to return the req= uested + array of handles that support Protocol. + + @retval EFI_SUCCESS The result array of handles was returned. + @retval EFI_NOT_FOUND No handles match the search. + @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store = the + matching results. + @retval EFI_INVALID_PARAMETER One or more parameters are not valid. + +**/ +EFI_STATUS +EFIAPI +MmLocateHandleBuffer ( + IN EFI_LOCATE_SEARCH_TYPE SearchType, + IN EFI_GUID *Protocol OPTIONAL, + IN VOID *SearchKey OPTIONAL, + IN OUT UINTN *NumberHandles, + OUT EFI_HANDLE **Buffer + ) +{ + EFI_STATUS Status; + UINTN BufferSize; + + if (NumberHandles =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (Buffer =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + BufferSize =3D 0; + *NumberHandles =3D 0; + *Buffer =3D NULL; + Status =3D MmLocateHandle ( + SearchType, + Protocol, + SearchKey, + &BufferSize, + *Buffer + ); + // + // LocateHandleBuffer() returns incorrect status code if SearchType is + // invalid. + // + // Add code to correctly handle expected errors from MmLocateHandle(). + // + if (EFI_ERROR(Status) && Status !=3D EFI_BUFFER_TOO_SMALL) { + if (Status !=3D EFI_INVALID_PARAMETER) { + Status =3D EFI_NOT_FOUND; + } + return Status; + } + + *Buffer =3D AllocatePool (BufferSize); + if (*Buffer =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + Status =3D MmLocateHandle ( + SearchType, + Protocol, + SearchKey, + &BufferSize, + *Buffer + ); + + *NumberHandles =3D BufferSize / sizeof(EFI_HANDLE); + if (EFI_ERROR(Status)) { + *NumberHandles =3D 0; + } + + return Status; +} diff --git a/StandaloneMmPkg/Core/Mmi.c b/StandaloneMmPkg/Core/Mmi.c new file mode 100644 index 0000000000..29aba7b53d --- /dev/null +++ b/StandaloneMmPkg/Core/Mmi.c @@ -0,0 +1,337 @@ +/** @file + MMI management. + + Copyright (c) 2009 - 2013, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +// +// MM_HANDLER_STATE_NOTIFIER +// + +// +// MM_HANDLER - used for each MM handler +// + +#define MMI_ENTRY_SIGNATURE SIGNATURE_32('m','m','i','e') + + typedef struct { + UINTN Signature; + LIST_ENTRY AllEntries; // All entries + + EFI_GUID HandlerType; // Type of interrupt + LIST_ENTRY MmiHandlers; // All handlers +} MMI_ENTRY; + +#define MMI_HANDLER_SIGNATURE SIGNATURE_32('m','m','i','h') + + typedef struct { + UINTN Signature; + LIST_ENTRY Link; // Link on MMI_ENTRY.MmiHandl= ers + EFI_MM_HANDLER_ENTRY_POINT Handler; // The mm handler's entry poi= nt + MMI_ENTRY *MmiEntry; +} MMI_HANDLER; + +LIST_ENTRY mRootMmiHandlerList =3D INITIALIZE_LIST_HEAD_VARIABLE (mRootMm= iHandlerList); +LIST_ENTRY mMmiEntryList =3D INITIALIZE_LIST_HEAD_VARIABLE (mMmiEnt= ryList); + +/** + Finds the MMI entry for the requested handler type. + + @param HandlerType The type of the interrupt + @param Create Create a new entry if not found + + @return MMI entry + +**/ +MMI_ENTRY * +EFIAPI +MmCoreFindMmiEntry ( + IN EFI_GUID *HandlerType, + IN BOOLEAN Create + ) +{ + LIST_ENTRY *Link; + MMI_ENTRY *Item; + MMI_ENTRY *MmiEntry; + + // + // Search the MMI entry list for the matching GUID + // + MmiEntry =3D NULL; + for (Link =3D mMmiEntryList.ForwardLink; + Link !=3D &mMmiEntryList; + Link =3D Link->ForwardLink) { + + Item =3D CR (Link, MMI_ENTRY, AllEntries, MMI_ENTRY_SIGNATURE); + if (CompareGuid (&Item->HandlerType, HandlerType)) { + // + // This is the MMI entry + // + MmiEntry =3D Item; + break; + } + } + + // + // If the protocol entry was not found and Create is TRUE, then + // allocate a new entry + // + if ((MmiEntry =3D=3D NULL) && Create) { + MmiEntry =3D AllocatePool (sizeof(MMI_ENTRY)); + if (MmiEntry !=3D NULL) { + // + // Initialize new MMI entry structure + // + MmiEntry->Signature =3D MMI_ENTRY_SIGNATURE; + CopyGuid ((VOID *)&MmiEntry->HandlerType, HandlerType); + InitializeListHead (&MmiEntry->MmiHandlers); + + // + // Add it to MMI entry list + // + InsertTailList (&mMmiEntryList, &MmiEntry->AllEntries); + } + } + return MmiEntry; +} + +/** + Manage MMI of a particular type. + + @param HandlerType Points to the handler type or NULL for root MMI h= andlers. + @param Context Points to an optional context buffer. + @param CommBuffer Points to the optional communication buffer. + @param CommBufferSize Points to the size of the optional communication = buffer. + + @retval EFI_WARN_INTERRUPT_SOURCE_PENDING Interrupt source was processe= d successfully but not quiesced. + @retval EFI_INTERRUPT_PENDING One or more MMI sources could= not be quiesced. + @retval EFI_NOT_FOUND Interrupt source was not hand= led or quiesced. + @retval EFI_SUCCESS Interrupt source was handled = and quiesced. + +**/ +EFI_STATUS +EFIAPI +MmiManage ( + IN CONST EFI_GUID *HandlerType, + IN CONST VOID *Context OPTIONAL, + IN OUT VOID *CommBuffer OPTIONAL, + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + LIST_ENTRY *Link; + LIST_ENTRY *Head; + MMI_ENTRY *MmiEntry; + MMI_HANDLER *MmiHandler; + BOOLEAN SuccessReturn; + EFI_STATUS Status; + + Status =3D EFI_NOT_FOUND; + SuccessReturn =3D FALSE; + if (HandlerType =3D=3D NULL) { + // + // Root MMI handler + // + + Head =3D &mRootMmiHandlerList; + } else { + // + // Non-root MMI handler + // + MmiEntry =3D MmCoreFindMmiEntry ((EFI_GUID *) HandlerType, FALSE); + if (MmiEntry =3D=3D NULL) { + // + // There is no handler registered for this interrupt source + // + return Status; + } + + Head =3D &MmiEntry->MmiHandlers; + } + + for (Link =3D Head->ForwardLink; Link !=3D Head; Link =3D Link->ForwardL= ink) { + MmiHandler =3D CR (Link, MMI_HANDLER, Link, MMI_HANDLER_SIGNATURE); + + Status =3D MmiHandler->Handler ( + (EFI_HANDLE) MmiHandler, + Context, + CommBuffer, + CommBufferSize + ); + + switch (Status) { + case EFI_INTERRUPT_PENDING: + // + // If a handler returns EFI_INTERRUPT_PENDING and HandlerType is not= NULL then + // no additional handlers will be processed and EFI_INTERRUPT_PENDIN= G will be returned. + // + if (HandlerType !=3D NULL) { + return EFI_INTERRUPT_PENDING; + } + break; + + case EFI_SUCCESS: + // + // If at least one of the handlers returns EFI_SUCCESS then the func= tion will return + // EFI_SUCCESS. If a handler returns EFI_SUCCESS and HandlerType is = not NULL then no + // additional handlers will be processed. + // + if (HandlerType !=3D NULL) { + return EFI_SUCCESS; + } + SuccessReturn =3D TRUE; + break; + + case EFI_WARN_INTERRUPT_SOURCE_QUIESCED: + // + // If at least one of the handlers returns EFI_WARN_INTERRUPT_SOURCE= _QUIESCED + // then the function will return EFI_SUCCESS. + // + SuccessReturn =3D TRUE; + break; + + case EFI_WARN_INTERRUPT_SOURCE_PENDING: + // + // If all the handlers returned EFI_WARN_INTERRUPT_SOURCE_PENDING + // then EFI_WARN_INTERRUPT_SOURCE_PENDING will be returned. + // + break; + + default: + // + // Unexpected status code returned. + // + ASSERT (FALSE); + break; + } + } + + if (SuccessReturn) { + Status =3D EFI_SUCCESS; + } + + return Status; +} + +/** + Registers a handler to execute within MM. + + @param Handler Handler service funtion pointer. + @param HandlerType Points to the handler type or NULL for root MMI h= andlers. + @param DispatchHandle On return, contains a unique handle which can be = used to later unregister the handler function. + + @retval EFI_SUCCESS Handler register success. + @retval EFI_INVALID_PARAMETER Handler or DispatchHandle is NULL. + +**/ +EFI_STATUS +EFIAPI +MmiHandlerRegister ( + IN EFI_MM_HANDLER_ENTRY_POINT Handler, + IN CONST EFI_GUID *HandlerType OPTIONAL, + OUT EFI_HANDLE *DispatchHandle + ) +{ + MMI_HANDLER *MmiHandler; + MMI_ENTRY *MmiEntry; + LIST_ENTRY *List; + + if (Handler =3D=3D NULL || DispatchHandle =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + MmiHandler =3D AllocateZeroPool (sizeof (MMI_HANDLER)); + if (MmiHandler =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + MmiHandler->Signature =3D MMI_HANDLER_SIGNATURE; + MmiHandler->Handler =3D Handler; + + if (HandlerType =3D=3D NULL) { + // + // This is root MMI handler + // + MmiEntry =3D NULL; + List =3D &mRootMmiHandlerList; + } else { + // + // None root MMI handler + // + MmiEntry =3D MmCoreFindMmiEntry ((EFI_GUID *) HandlerType, TRUE); + if (MmiEntry =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + List =3D &MmiEntry->MmiHandlers; + } + + MmiHandler->MmiEntry =3D MmiEntry; + InsertTailList (List, &MmiHandler->Link); + + *DispatchHandle =3D (EFI_HANDLE) MmiHandler; + + return EFI_SUCCESS; +} + +/** + Unregister a handler in MM. + + @param DispatchHandle The handle that was specified when the handler w= as registered. + + @retval EFI_SUCCESS Handler function was successfully unregist= ered. + @retval EFI_INVALID_PARAMETER DispatchHandle does not refer to a valid h= andle. + +**/ +EFI_STATUS +EFIAPI +MmiHandlerUnRegister ( + IN EFI_HANDLE DispatchHandle + ) +{ + MMI_HANDLER *MmiHandler; + MMI_ENTRY *MmiEntry; + + MmiHandler =3D (MMI_HANDLER *) DispatchHandle; + + if (MmiHandler =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (MmiHandler->Signature !=3D MMI_HANDLER_SIGNATURE) { + return EFI_INVALID_PARAMETER; + } + + MmiEntry =3D MmiHandler->MmiEntry; + + RemoveEntryList (&MmiHandler->Link); + FreePool (MmiHandler); + + if (MmiEntry =3D=3D NULL) { + // + // This is root MMI handler + // + return EFI_SUCCESS; + } + + if (IsListEmpty (&MmiEntry->MmiHandlers)) { + // + // No handler registered for this interrupt now, remove the MMI_ENTRY + // + RemoveEntryList (&MmiEntry->AllEntries); + + FreePool (MmiEntry); + } + + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Core/Notify.c b/StandaloneMmPkg/Core/Notify.c new file mode 100644 index 0000000000..d5fc8f50d1 --- /dev/null +++ b/StandaloneMmPkg/Core/Notify.c @@ -0,0 +1,203 @@ +/** @file + Support functions for UEFI protocol notification infrastructure. + + Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +/** + Signal event for every protocol in protocol entry. + + @param Prot Protocol interface + +**/ +VOID +MmNotifyProtocol ( + IN PROTOCOL_INTERFACE *Prot + ) +{ + PROTOCOL_ENTRY *ProtEntry; + PROTOCOL_NOTIFY *ProtNotify; + LIST_ENTRY *Link; + + ProtEntry =3D Prot->Protocol; + for (Link=3DProtEntry->Notify.ForwardLink; Link !=3D &ProtEntry->Notify;= Link=3DLink->ForwardLink) { + ProtNotify =3D CR(Link, PROTOCOL_NOTIFY, Link, PROTOCOL_NOTIFY_SIGNATU= RE); + ProtNotify->Function (&ProtEntry->ProtocolID, Prot->Interface, Prot->H= andle); + } +} + +/** + Removes Protocol from the protocol list (but not the handle list). + + @param Handle The handle to remove protocol on. + @param Protocol GUID of the protocol to be moved + @param Interface The interface of the protocol + + @return Protocol Entry + +**/ +PROTOCOL_INTERFACE * +MmRemoveInterfaceFromProtocol ( + IN IHANDLE *Handle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ) +{ + PROTOCOL_INTERFACE *Prot; + PROTOCOL_NOTIFY *ProtNotify; + PROTOCOL_ENTRY *ProtEntry; + LIST_ENTRY *Link; + + Prot =3D MmFindProtocolInterface (Handle, Protocol, Interface); + if (Prot !=3D NULL) { + + ProtEntry =3D Prot->Protocol; + + // + // If there's a protocol notify location pointing to this entry, back = it up one + // + for(Link =3D ProtEntry->Notify.ForwardLink; Link !=3D &ProtEntry->Noti= fy; Link=3DLink->ForwardLink) { + ProtNotify =3D CR(Link, PROTOCOL_NOTIFY, Link, PROTOCOL_NOTIFY_SIGNA= TURE); + + if (ProtNotify->Position =3D=3D &Prot->ByProtocol) { + ProtNotify->Position =3D Prot->ByProtocol.BackLink; + } + } + + // + // Remove the protocol interface entry + // + RemoveEntryList (&Prot->ByProtocol); + } + + return Prot; +} + +/** + Add a new protocol notification record for the request protocol. + + @param Protocol The requested protocol to add the notify + registration + @param Function Points to the notification function + @param Registration Returns the registration record + + @retval EFI_SUCCESS Successfully returned the registration re= cord + that has been added or unhooked + @retval EFI_INVALID_PARAMETER Protocol is NULL or Registration is NULL + @retval EFI_OUT_OF_RESOURCES Not enough memory resource to finish the = request + @retval EFI_NOT_FOUND If the registration is not found when Fun= ction =3D=3D NULL + +**/ +EFI_STATUS +EFIAPI +MmRegisterProtocolNotify ( + IN CONST EFI_GUID *Protocol, + IN EFI_MM_NOTIFY_FN Function, + OUT VOID **Registration + ) +{ + PROTOCOL_ENTRY *ProtEntry; + PROTOCOL_NOTIFY *ProtNotify; + LIST_ENTRY *Link; + EFI_STATUS Status; + + if (Protocol =3D=3D NULL || Registration =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (Function =3D=3D NULL) { + // + // Get the protocol entry per Protocol + // + ProtEntry =3D MmFindProtocolEntry ((EFI_GUID *) Protocol, FALSE); + if (ProtEntry !=3D NULL) { + ProtNotify =3D (PROTOCOL_NOTIFY * )*Registration; + for (Link =3D ProtEntry->Notify.ForwardLink; + Link !=3D &ProtEntry->Notify; + Link =3D Link->ForwardLink) { + // + // Compare the notification record + // + if (ProtNotify =3D=3D (CR(Link, PROTOCOL_NOTIFY, Link, PROTOCOL_NO= TIFY_SIGNATURE))){ + // + // If Registration is an existing registration, then unhook it + // + ProtNotify->Signature =3D 0; + RemoveEntryList (&ProtNotify->Link); + FreePool (ProtNotify); + return EFI_SUCCESS; + } + } + } + // + // If the registration is not found + // + return EFI_NOT_FOUND; + } + + ProtNotify =3D NULL; + + // + // Get the protocol entry to add the notification too + // + ProtEntry =3D MmFindProtocolEntry ((EFI_GUID *) Protocol, TRUE); + if (ProtEntry !=3D NULL) { + // + // Find whether notification already exist + // + for (Link =3D ProtEntry->Notify.ForwardLink; + Link !=3D &ProtEntry->Notify; + Link =3D Link->ForwardLink) { + + ProtNotify =3D CR(Link, PROTOCOL_NOTIFY, Link, PROTOCOL_NOTIFY_SIGNA= TURE); + if (CompareGuid (&ProtNotify->Protocol->ProtocolID, Protocol) && + (ProtNotify->Function =3D=3D Function)) { + + // + // Notification already exist + // + *Registration =3D ProtNotify; + + return EFI_SUCCESS; + } + } + + // + // Allocate a new notification record + // + ProtNotify =3D AllocatePool (sizeof(PROTOCOL_NOTIFY)); + if (ProtNotify !=3D NULL) { + ProtNotify->Signature =3D PROTOCOL_NOTIFY_SIGNATURE; + ProtNotify->Protocol =3D ProtEntry; + ProtNotify->Function =3D Function; + // + // Start at the ending + // + ProtNotify->Position =3D ProtEntry->Protocols.BackLink; + + InsertTailList (&ProtEntry->Notify, &ProtNotify->Link); + } + } + + // + // Done. If we have a protocol notify entry, then return it. + // Otherwise, we must have run out of resources trying to add one + // + Status =3D EFI_OUT_OF_RESOURCES; + if (ProtNotify !=3D NULL) { + *Registration =3D ProtNotify; + Status =3D EFI_SUCCESS; + } + return Status; +} diff --git a/StandaloneMmPkg/Core/Page.c b/StandaloneMmPkg/Core/Page.c new file mode 100644 index 0000000000..ba3e7cea74 --- /dev/null +++ b/StandaloneMmPkg/Core/Page.c @@ -0,0 +1,384 @@ +/** @file + MM Memory page management functions. + + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +#define NEXT_MEMORY_DESCRIPTOR(MemoryDescriptor, Size) \ + ((EFI_MEMORY_DESCRIPTOR *)((UINT8 *)(MemoryDescriptor) + (Size))) + +#define TRUNCATE_TO_PAGES(a) ((a) >> EFI_PAGE_SHIFT) + +LIST_ENTRY mMmMemoryMap =3D INITIALIZE_LIST_HEAD_VARIABLE (mMmMemoryMap); + +UINTN mMapKey; + +/** + Internal Function. Allocate n pages from given free page node. + + @param Pages The free page node. + @param NumberOfPages Number of pages to be allocated. + @param MaxAddress Request to allocate memory below this add= ress. + + @return Memory address of allocated pages. + +**/ +UINTN +InternalAllocPagesOnOneNode ( + IN OUT FREE_PAGE_LIST *Pages, + IN UINTN NumberOfPages, + IN UINTN MaxAddress + ) +{ + UINTN Top; + UINTN Bottom; + FREE_PAGE_LIST *Node; + + Top =3D TRUNCATE_TO_PAGES (MaxAddress + 1 - (UINTN)Pages); + if (Top > Pages->NumberOfPages) { + Top =3D Pages->NumberOfPages; + } + Bottom =3D Top - NumberOfPages; + + if (Top < Pages->NumberOfPages) { + Node =3D (FREE_PAGE_LIST*)((UINTN)Pages + EFI_PAGES_TO_SIZE (Top)); + Node->NumberOfPages =3D Pages->NumberOfPages - Top; + InsertHeadList (&Pages->Link, &Node->Link); + } + + if (Bottom > 0) { + Pages->NumberOfPages =3D Bottom; + } else { + RemoveEntryList (&Pages->Link); + } + + return (UINTN)Pages + EFI_PAGES_TO_SIZE (Bottom); +} + +/** + Internal Function. Allocate n pages from free page list below MaxAddress. + + @param FreePageList The free page node. + @param NumberOfPages Number of pages to be allocated. + @param MaxAddress Request to allocate memory below this add= ress. + + @return Memory address of allocated pages. + +**/ +UINTN +InternalAllocMaxAddress ( + IN OUT LIST_ENTRY *FreePageList, + IN UINTN NumberOfPages, + IN UINTN MaxAddress + ) +{ + LIST_ENTRY *Node; + FREE_PAGE_LIST *Pages; + + for (Node =3D FreePageList->BackLink; Node !=3D FreePageList; Node =3D N= ode->BackLink) { + Pages =3D BASE_CR (Node, FREE_PAGE_LIST, Link); + if (Pages->NumberOfPages >=3D NumberOfPages && + (UINTN)Pages + EFI_PAGES_TO_SIZE (NumberOfPages) - 1 <=3D MaxAddre= ss) { + return InternalAllocPagesOnOneNode (Pages, NumberOfPages, MaxAddress= ); + } + } + return (UINTN)(-1); +} + +/** + Internal Function. Allocate n pages from free page list at given address. + + @param FreePageList The free page node. + @param NumberOfPages Number of pages to be allocated. + @param MaxAddress Request to allocate memory below this add= ress. + + @return Memory address of allocated pages. + +**/ +UINTN +InternalAllocAddress ( + IN OUT LIST_ENTRY *FreePageList, + IN UINTN NumberOfPages, + IN UINTN Address + ) +{ + UINTN EndAddress; + LIST_ENTRY *Node; + FREE_PAGE_LIST *Pages; + + if ((Address & EFI_PAGE_MASK) !=3D 0) { + return ~Address; + } + + EndAddress =3D Address + EFI_PAGES_TO_SIZE (NumberOfPages); + for (Node =3D FreePageList->BackLink; Node!=3D FreePageList; Node =3D No= de->BackLink) { + Pages =3D BASE_CR (Node, FREE_PAGE_LIST, Link); + if ((UINTN)Pages <=3D Address) { + if ((UINTN)Pages + EFI_PAGES_TO_SIZE (Pages->NumberOfPages) < EndAdd= ress) { + break; + } + return InternalAllocPagesOnOneNode (Pages, NumberOfPages, EndAddress= ); + } + } + return ~Address; +} + +/** + Allocates pages from the memory map. + + @param Type The type of allocation to perform. + @param MemoryType The type of memory to turn the allocated = pages + into. + @param NumberOfPages The number of pages to allocate. + @param Memory A pointer to receive the base allocated m= emory + address. + + @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined= in spec. + @retval EFI_NOT_FOUND Could not allocate pages match the requir= ement. + @retval EFI_OUT_OF_RESOURCES No enough pages to allocate. + @retval EFI_SUCCESS Pages successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmInternalAllocatePages ( + IN EFI_ALLOCATE_TYPE Type, + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN NumberOfPages, + OUT EFI_PHYSICAL_ADDRESS *Memory + ) +{ + UINTN RequestedAddress; + + if (MemoryType !=3D EfiRuntimeServicesCode && + MemoryType !=3D EfiRuntimeServicesData) { + return EFI_INVALID_PARAMETER; + } + + if (NumberOfPages > TRUNCATE_TO_PAGES ((UINTN)-1) + 1) { + return EFI_OUT_OF_RESOURCES; + } + + // + // We don't track memory type in MM + // + RequestedAddress =3D (UINTN)*Memory; + switch (Type) { + case AllocateAnyPages: + RequestedAddress =3D (UINTN)(-1); + case AllocateMaxAddress: + *Memory =3D InternalAllocMaxAddress ( + &mMmMemoryMap, + NumberOfPages, + RequestedAddress + ); + if (*Memory =3D=3D (UINTN)-1) { + return EFI_OUT_OF_RESOURCES; + } + break; + case AllocateAddress: + *Memory =3D InternalAllocAddress ( + &mMmMemoryMap, + NumberOfPages, + RequestedAddress + ); + if (*Memory !=3D RequestedAddress) { + return EFI_NOT_FOUND; + } + break; + default: + return EFI_INVALID_PARAMETER; + } + return EFI_SUCCESS; +} + +/** + Allocates pages from the memory map. + + @param Type The type of allocation to perform. + @param MemoryType The type of memory to turn the allocated = pages + into. + @param NumberOfPages The number of pages to allocate. + @param Memory A pointer to receive the base allocated m= emory + address. + + @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined= in spec. + @retval EFI_NOT_FOUND Could not allocate pages match the requir= ement. + @retval EFI_OUT_OF_RESOURCES No enough pages to allocate. + @retval EFI_SUCCESS Pages successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmAllocatePages ( + IN EFI_ALLOCATE_TYPE Type, + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN NumberOfPages, + OUT EFI_PHYSICAL_ADDRESS *Memory + ) +{ + EFI_STATUS Status; + + Status =3D MmInternalAllocatePages (Type, MemoryType, NumberOfPages, Mem= ory); + return Status; +} + +/** + Internal Function. Merge two adjacent nodes. + + @param First The first of two nodes to merge. + + @return Pointer to node after merge (if success) or pointer to next node= (if fail). + +**/ +FREE_PAGE_LIST * +InternalMergeNodes ( + IN FREE_PAGE_LIST *First + ) +{ + FREE_PAGE_LIST *Next; + + Next =3D BASE_CR (First->Link.ForwardLink, FREE_PAGE_LIST, Link); + ASSERT ( + TRUNCATE_TO_PAGES ((UINTN)Next - (UINTN)First) >=3D First->NumberOfPag= es); + + if (TRUNCATE_TO_PAGES ((UINTN)Next - (UINTN)First) =3D=3D First->NumberO= fPages) { + First->NumberOfPages +=3D Next->NumberOfPages; + RemoveEntryList (&Next->Link); + Next =3D First; + } + return Next; +} + +/** + Frees previous allocated pages. + + @param Memory Base address of memory being freed. + @param NumberOfPages The number of pages to free. + + @retval EFI_NOT_FOUND Could not find the entry that covers the = range. + @retval EFI_INVALID_PARAMETER Address not aligned. + @return EFI_SUCCESS Pages successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmInternalFreePages ( + IN EFI_PHYSICAL_ADDRESS Memory, + IN UINTN NumberOfPages + ) +{ + LIST_ENTRY *Node; + FREE_PAGE_LIST *Pages; + + if ((Memory & EFI_PAGE_MASK) !=3D 0) { + return EFI_INVALID_PARAMETER; + } + + Pages =3D NULL; + Node =3D mMmMemoryMap.ForwardLink; + while (Node !=3D &mMmMemoryMap) { + Pages =3D BASE_CR (Node, FREE_PAGE_LIST, Link); + if (Memory < (UINTN)Pages) { + break; + } + Node =3D Node->ForwardLink; + } + + if (Node !=3D &mMmMemoryMap && + Memory + EFI_PAGES_TO_SIZE (NumberOfPages) > (UINTN)Pages) { + return EFI_INVALID_PARAMETER; + } + + if (Node->BackLink !=3D &mMmMemoryMap) { + Pages =3D BASE_CR (Node->BackLink, FREE_PAGE_LIST, Link); + if ((UINTN)Pages + EFI_PAGES_TO_SIZE (Pages->NumberOfPages) > Memory) { + return EFI_INVALID_PARAMETER; + } + } + + Pages =3D (FREE_PAGE_LIST*)(UINTN)Memory; + Pages->NumberOfPages =3D NumberOfPages; + InsertTailList (Node, &Pages->Link); + + if (Pages->Link.BackLink !=3D &mMmMemoryMap) { + Pages =3D InternalMergeNodes ( + BASE_CR (Pages->Link.BackLink, FREE_PAGE_LIST, Link) + ); + } + + if (Node !=3D &mMmMemoryMap) { + InternalMergeNodes (Pages); + } + + return EFI_SUCCESS; +} + +/** + Frees previous allocated pages. + + @param Memory Base address of memory being freed. + @param NumberOfPages The number of pages to free. + + @retval EFI_NOT_FOUND Could not find the entry that covers the = range. + @retval EFI_INVALID_PARAMETER Address not aligned. + @return EFI_SUCCESS Pages successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmFreePages ( + IN EFI_PHYSICAL_ADDRESS Memory, + IN UINTN NumberOfPages + ) +{ + EFI_STATUS Status; + + Status =3D MmInternalFreePages (Memory, NumberOfPages); + return Status; +} + +/** + Add free MMRAM region for use by memory service. + + @param MemBase Base address of memory region. + @param MemLength Length of the memory region. + @param Type Memory type. + @param Attributes Memory region state. + +**/ +VOID +MmAddMemoryRegion ( + IN EFI_PHYSICAL_ADDRESS MemBase, + IN UINT64 MemLength, + IN EFI_MEMORY_TYPE Type, + IN UINT64 Attributes + ) +{ + UINTN AlignedMemBase; + + // + // Do not add memory regions that is already allocated, needs testing, o= r needs ECC initialization + // + if ((Attributes & (EFI_ALLOCATED | EFI_NEEDS_TESTING | EFI_NEEDS_ECC_INI= TIALIZATION)) !=3D 0) { + return; + } + + // + // Align range on an EFI_PAGE_SIZE boundary + // + AlignedMemBase =3D (UINTN)(MemBase + EFI_PAGE_MASK) & ~EFI_PAGE_MASK; + MemLength -=3D AlignedMemBase - MemBase; + MmFreePages (AlignedMemBase, TRUNCATE_TO_PAGES ((UINTN)MemLength)); +} diff --git a/StandaloneMmPkg/Core/Pool.c b/StandaloneMmPkg/Core/Pool.c new file mode 100644 index 0000000000..bdf1258381 --- /dev/null +++ b/StandaloneMmPkg/Core/Pool.c @@ -0,0 +1,287 @@ +/** @file + SMM Memory pool management functions. + + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +LIST_ENTRY mMmPoolLists[MAX_POOL_INDEX]; +// +// To cache the MMRAM base since when Loading modules At fixed address fea= ture is enabled, +// all module is assigned an offset relative the MMRAM base in build time. +// +GLOBAL_REMOVE_IF_UNREFERENCED EFI_PHYSICAL_ADDRESS gLoadModuleAtFix= AddressMmramBase =3D 0; + +/** + Called to initialize the memory service. + + @param MmramRangeCount Number of MMRAM Regions + @param MmramRanges Pointer to MMRAM Descriptors + +**/ +VOID +MmInitializeMemoryServices ( + IN UINTN MmramRangeCount, + IN EFI_MMRAM_DESCRIPTOR *MmramRanges + ) +{ + UINTN Index; + + // + // Initialize Pool list + // + for (Index =3D sizeof (mMmPoolLists) / sizeof (*mMmPoolLists); Index > 0= ;) { + InitializeListHead (&mMmPoolLists[--Index]); + } + + + // + // Initialize free MMRAM regions + // + for (Index =3D 0; Index < MmramRangeCount; Index++) { + // + // BUGBUG: Add legacy MMRAM region is buggy. + // + if (MmramRanges[Index].CpuStart < BASE_1MB) { + continue; + } + DEBUG ((DEBUG_INFO, "MmAddMemoryRegion %d : 0x%016lx - 0x%016lx\n", In= dex, MmramRanges[Index].CpuStart, MmramRanges[Index].PhysicalSize)); + MmAddMemoryRegion ( + MmramRanges[Index].CpuStart, + MmramRanges[Index].PhysicalSize, + EfiConventionalMemory, + MmramRanges[Index].RegionState + ); + } + +} + +/** + Internal Function. Allocate a pool by specified PoolIndex. + + @param PoolIndex Index which indicate the Pool size. + @param FreePoolHdr The returned Free pool. + + @retval EFI_OUT_OF_RESOURCES Allocation failed. + @retval EFI_SUCCESS Pool successfully allocated. + +**/ +EFI_STATUS +InternalAllocPoolByIndex ( + IN UINTN PoolIndex, + OUT FREE_POOL_HEADER **FreePoolHdr + ) +{ + EFI_STATUS Status; + FREE_POOL_HEADER *Hdr; + EFI_PHYSICAL_ADDRESS Address; + + ASSERT (PoolIndex <=3D MAX_POOL_INDEX); + Status =3D EFI_SUCCESS; + Hdr =3D NULL; + if (PoolIndex =3D=3D MAX_POOL_INDEX) { + Status =3D MmInternalAllocatePages (AllocateAnyPages, EfiRuntimeServic= esData, EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1), &Address); + if (EFI_ERROR (Status)) { + return EFI_OUT_OF_RESOURCES; + } + Hdr =3D (FREE_POOL_HEADER *) (UINTN) Address; + } else if (!IsListEmpty (&mMmPoolLists[PoolIndex])) { + Hdr =3D BASE_CR (GetFirstNode (&mMmPoolLists[PoolIndex]), FREE_POOL_HE= ADER, Link); + RemoveEntryList (&Hdr->Link); + } else { + Status =3D InternalAllocPoolByIndex (PoolIndex + 1, &Hdr); + if (!EFI_ERROR (Status)) { + Hdr->Header.Size >>=3D 1; + Hdr->Header.Available =3D TRUE; + InsertHeadList (&mMmPoolLists[PoolIndex], &Hdr->Link); + Hdr =3D (FREE_POOL_HEADER*)((UINT8*)Hdr + Hdr->Header.Size); + } + } + + if (!EFI_ERROR (Status)) { + Hdr->Header.Size =3D MIN_POOL_SIZE << PoolIndex; + Hdr->Header.Available =3D FALSE; + } + + *FreePoolHdr =3D Hdr; + return Status; +} + +/** + Internal Function. Free a pool by specified PoolIndex. + + @param FreePoolHdr The pool to free. + + @retval EFI_SUCCESS Pool successfully freed. + +**/ +EFI_STATUS +InternalFreePoolByIndex ( + IN FREE_POOL_HEADER *FreePoolHdr + ) +{ + UINTN PoolIndex; + + ASSERT ((FreePoolHdr->Header.Size & (FreePoolHdr->Header.Size - 1)) =3D= =3D 0); + ASSERT (((UINTN)FreePoolHdr & (FreePoolHdr->Header.Size - 1)) =3D=3D 0); + ASSERT (FreePoolHdr->Header.Size >=3D MIN_POOL_SIZE); + + PoolIndex =3D (UINTN) (HighBitSet32 ((UINT32)FreePoolHdr->Header.Size) -= MIN_POOL_SHIFT); + FreePoolHdr->Header.Available =3D TRUE; + ASSERT (PoolIndex < MAX_POOL_INDEX); + InsertHeadList (&mMmPoolLists[PoolIndex], &FreePoolHdr->Link); + return EFI_SUCCESS; +} + +/** + Allocate pool of a particular type. + + @param PoolType Type of pool to allocate. + @param Size The amount of pool to allocate. + @param Buffer The address to return a pointer to the al= located + pool. + + @retval EFI_INVALID_PARAMETER PoolType not valid. + @retval EFI_OUT_OF_RESOURCES Size exceeds max pool size or allocation = failed. + @retval EFI_SUCCESS Pool successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmInternalAllocatePool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN Size, + OUT VOID **Buffer + ) +{ + POOL_HEADER *PoolHdr; + FREE_POOL_HEADER *FreePoolHdr; + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS Address; + UINTN PoolIndex; + + if (PoolType !=3D EfiRuntimeServicesCode && + PoolType !=3D EfiRuntimeServicesData) { + return EFI_INVALID_PARAMETER; + } + + Size +=3D sizeof (*PoolHdr); + if (Size > MAX_POOL_SIZE) { + Size =3D EFI_SIZE_TO_PAGES (Size); + Status =3D MmInternalAllocatePages (AllocateAnyPages, PoolType, Size, = &Address); + if (EFI_ERROR (Status)) { + return Status; + } + + PoolHdr =3D (POOL_HEADER*)(UINTN)Address; + PoolHdr->Size =3D EFI_PAGES_TO_SIZE (Size); + PoolHdr->Available =3D FALSE; + *Buffer =3D PoolHdr + 1; + return Status; + } + + Size =3D (Size + MIN_POOL_SIZE - 1) >> MIN_POOL_SHIFT; + PoolIndex =3D (UINTN) HighBitSet32 ((UINT32)Size); + if ((Size & (Size - 1)) !=3D 0) { + PoolIndex++; + } + + Status =3D InternalAllocPoolByIndex (PoolIndex, &FreePoolHdr); + if (!EFI_ERROR(Status)) { + *Buffer =3D &FreePoolHdr->Header + 1; + } + return Status; +} + +/** + Allocate pool of a particular type. + + @param PoolType Type of pool to allocate. + @param Size The amount of pool to allocate. + @param Buffer The address to return a pointer to the al= located + pool. + + @retval EFI_INVALID_PARAMETER PoolType not valid. + @retval EFI_OUT_OF_RESOURCES Size exceeds max pool size or allocation = failed. + @retval EFI_SUCCESS Pool successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmAllocatePool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN Size, + OUT VOID **Buffer + ) +{ + EFI_STATUS Status; + + Status =3D MmInternalAllocatePool (PoolType, Size, Buffer); + return Status; +} + +/** + Frees pool. + + @param Buffer The allocated pool entry to free. + + @retval EFI_INVALID_PARAMETER Buffer is not a valid value. + @retval EFI_SUCCESS Pool successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmInternalFreePool ( + IN VOID *Buffer + ) +{ + FREE_POOL_HEADER *FreePoolHdr; + + if (Buffer =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + FreePoolHdr =3D (FREE_POOL_HEADER*)((POOL_HEADER*)Buffer - 1); + ASSERT (!FreePoolHdr->Header.Available); + + if (FreePoolHdr->Header.Size > MAX_POOL_SIZE) { + ASSERT (((UINTN)FreePoolHdr & EFI_PAGE_MASK) =3D=3D 0); + ASSERT ((FreePoolHdr->Header.Size & EFI_PAGE_MASK) =3D=3D 0); + return MmInternalFreePages ( + (EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr, + EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size) + ); + } + return InternalFreePoolByIndex (FreePoolHdr); +} + +/** + Frees pool. + + @param Buffer The allocated pool entry to free. + + @retval EFI_INVALID_PARAMETER Buffer is not a valid value. + @retval EFI_SUCCESS Pool successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmFreePool ( + IN VOID *Buffer + ) +{ + EFI_STATUS Status; + + Status =3D MmInternalFreePool (Buffer); + return Status; +} diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.c b/StandaloneMmPkg/Core= /StandaloneMmCore.c new file mode 100644 index 0000000000..0bb99b9710 --- /dev/null +++ b/StandaloneMmPkg/Core/StandaloneMmCore.c @@ -0,0 +1,708 @@ +/** @file + MM Core Main Entry Point + + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include "StandaloneMmCore.h" + +EFI_STATUS +MmCoreFfsFindMmDriver ( + IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader + ); + +EFI_STATUS +MmDispatcher ( + VOID + ); + +// +// Globals used to initialize the protocol +// +EFI_HANDLE mMmCpuHandle =3D NULL; + +// +// Physical pointer to private structure shared between MM IPL and the MM = Core +// +MM_CORE_PRIVATE_DATA *gMmCorePrivate; + +// +// MM Core global variable for MM System Table. Only accessed as a physic= al structure in MMRAM. +// +EFI_MM_SYSTEM_TABLE gMmCoreMmst =3D { + + // The table header for the MMST. + { + MM_MMST_SIGNATURE, + EFI_MM_SYSTEM_TABLE_REVISION, + sizeof (gMmCoreMmst.Hdr) + }, + // MmFirmwareVendor + NULL, + // MmFirmwareRevision + 0, + // MmInstallConfigurationTable + MmInstallConfigurationTable, + // I/O Service + { + { + (EFI_MM_CPU_IO) MmEfiNotAvailableYetArg5, // MmMemRead + (EFI_MM_CPU_IO) MmEfiNotAvailableYetArg5 // MmMemWrite + }, + { + (EFI_MM_CPU_IO) MmEfiNotAvailableYetArg5, // MmIoRead + (EFI_MM_CPU_IO) MmEfiNotAvailableYetArg5 // MmIoWrite + } + }, + // Runtime memory services + MmAllocatePool, + MmFreePool, + MmAllocatePages, + MmFreePages, + // MP service + NULL, // MmStartupThisAp + 0, // CurrentlyExecutingCpu + 0, // NumberOfCpus + NULL, // CpuSaveStateSize + NULL, // CpuSaveState + 0, // NumberOfTableEntries + NULL, // MmConfigurationTable + MmInstallProtocolInterface, + MmUninstallProtocolInterface, + MmHandleProtocol, + MmRegisterProtocolNotify, + MmLocateHandle, + MmLocateProtocol, + MmiManage, + MmiHandlerRegister, + MmiHandlerUnRegister +}; + +// +// Flag to determine if the platform has performed a legacy boot. +// If this flag is TRUE, then the runtime code and runtime data associated= with the +// MM IPL are converted to free memory, so the MM Core must guarantee that= is +// does not touch of the code/data associated with the MM IPL if this flag= is TRUE. +// +BOOLEAN mInLegacyBoot =3D FALSE; + +// +// Table of MMI Handlers that are registered by the MM Core when it is ini= tialized +// +MM_CORE_MMI_HANDLERS mMmCoreMmiHandlers[] =3D { + { MmFvDispatchHandler, &gMmFvDispatchGuid, NULL, TRU= E }, + { MmDriverDispatchHandler, &gEfiEventDxeDispatchGuid, NULL, TRU= E }, + { MmReadyToLockHandler, &gEfiDxeMmReadyToLockProtocolGuid, NULL, TRU= E }, + { MmEndOfDxeHandler, &gEfiEndOfDxeEventGroupGuid, NULL, FAL= SE }, + { MmLegacyBootHandler, &gEfiEventLegacyBootGuid, NULL, FAL= SE }, + { MmExitBootServiceHandler,&gEfiEventExitBootServicesGuid, NULL, FAL= SE }, + { MmReadyToBootHandler, &gEfiEventReadyToBootGuid, NULL, FAL= SE }, + { NULL, NULL, NULL, FAL= SE }, +}; + +EFI_SYSTEM_TABLE *mEfiSystemTable; +UINTN mMmramRangeCount; +EFI_MMRAM_DESCRIPTOR *mMmramRanges; + +/** + Place holder function until all the MM System Table Service are availabl= e. + + Note: This function is only used by MMRAM invocation. It is never used = by DXE invocation. + + @param Arg1 Undefined + @param Arg2 Undefined + @param Arg3 Undefined + @param Arg4 Undefined + @param Arg5 Undefined + + @return EFI_NOT_AVAILABLE_YET + +**/ +EFI_STATUS +EFIAPI +MmEfiNotAvailableYetArg5 ( + UINTN Arg1, + UINTN Arg2, + UINTN Arg3, + UINTN Arg4, + UINTN Arg5 + ) +{ + // + // This function should never be executed. If it does, then the archite= ctural protocols + // have not been designed correctly. + // + return EFI_NOT_AVAILABLE_YET; +} + +/** + Software MMI handler that is called when a Legacy Boot event is signaled= . The MM + Core uses this signal to know that a Legacy Boot has been performed and = that + gMmCorePrivate that is shared between the UEFI and MM execution environm= ents can + not be accessed from MM anymore since that structure is considered free = memory by + a legacy OS. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmLegacyBootHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_HANDLE MmHandle; + EFI_STATUS Status =3D EFI_SUCCESS; + + if (!mInLegacyBoot) { + MmHandle =3D NULL; + Status =3D MmInstallProtocolInterface ( + &MmHandle, + &gEfiEventLegacyBootGuid, + EFI_NATIVE_INTERFACE, + NULL + ); + } + mInLegacyBoot =3D TRUE; + return Status; +} + +/** + Software MMI handler that is called when a ExitBoot Service event is sig= naled. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmExitBootServiceHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_HANDLE MmHandle; + EFI_STATUS Status =3D EFI_SUCCESS; + STATIC BOOLEAN mInExitBootServices =3D FALSE; + + if (!mInExitBootServices) { + MmHandle =3D NULL; + Status =3D MmInstallProtocolInterface ( + &MmHandle, + &gEfiEventExitBootServicesGuid, + EFI_NATIVE_INTERFACE, + NULL + ); + } + mInExitBootServices =3D TRUE; + return Status; +} + +/** + Software MMI handler that is called when a ExitBoot Service event is sig= naled. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmReadyToBootHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_HANDLE MmHandle; + EFI_STATUS Status =3D EFI_SUCCESS; + STATIC BOOLEAN mInReadyToBoot =3D FALSE; + + if (!mInReadyToBoot) { + MmHandle =3D NULL; + Status =3D MmInstallProtocolInterface ( + &MmHandle, + &gEfiEventReadyToBootGuid, + EFI_NATIVE_INTERFACE, + NULL + ); + } + mInReadyToBoot =3D TRUE; + return Status; +} + +/** + Software MMI handler that is called when the DxeMmReadyToLock protocol i= s added + or if gEfiEventReadyToBootGuid is signaled. This function unregisters t= he + Software SMIs that are nor required after MMRAM is locked and installs t= he + MM Ready To Lock Protocol so MM Drivers are informed that MMRAM is about + to be locked. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmReadyToLockHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_STATUS Status; + UINTN Index; + EFI_HANDLE MmHandle; + + DEBUG ((DEBUG_INFO, "MmReadyToLockHandler\n")); + + // + // Unregister MMI Handlers that are no longer required after the MM driv= er dispatch is stopped + // + for (Index =3D 0; mMmCoreMmiHandlers[Index].HandlerType !=3D NULL; Index= ++) { + if (mMmCoreMmiHandlers[Index].UnRegister) { + MmiHandlerUnRegister (mMmCoreMmiHandlers[Index].DispatchHandle); + } + } + + // + // Install MM Ready to lock protocol + // + MmHandle =3D NULL; + Status =3D MmInstallProtocolInterface ( + &MmHandle, + &gEfiMmReadyToLockProtocolGuid, + EFI_NATIVE_INTERFACE, + NULL + ); + + // + // Make sure MM CPU I/O 2 Protocol has been installed into the handle da= tabase + // + //Status =3D MmLocateProtocol (&EFI_MM_CPU_IO_PROTOCOL_GUID, NULL, &Inte= rface); + + // + // Print a message on a debug build if the MM CPU I/O 2 Protocol is not = installed + // + //if (EFI_ERROR (Status)) { + //DEBUG ((DEBUG_ERROR, "\nSMM: SmmCpuIo Arch Protocol not present!!\= n")); + //} + + + // + // Assert if the CPU I/O 2 Protocol is not installed + // + //ASSERT_EFI_ERROR (Status); + + // + // Display any drivers that were not dispatched because dependency expre= ssion + // evaluated to false if this is a debug build + // + //MmDisplayDiscoveredNotDispatched (); + + return Status; +} + +/** + Software MMI handler that is called when the EndOfDxe event is signaled. + This function installs the MM EndOfDxe Protocol so MM Drivers are inform= ed that + platform code will invoke 3rd part code. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmEndOfDxeHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_STATUS Status; + EFI_HANDLE MmHandle; + + DEBUG ((DEBUG_INFO, "MmEndOfDxeHandler\n")); + // + // Install MM EndOfDxe protocol + // + MmHandle =3D NULL; + Status =3D MmInstallProtocolInterface ( + &MmHandle, + &gEfiMmEndOfDxeProtocolGuid, + EFI_NATIVE_INTERFACE, + NULL + ); + return Status; +} + + + +/** + The main entry point to MM Foundation. + + Note: This function is only used by MMRAM invocation. It is never used = by DXE invocation. + + @param MmEntryContext Processor information and functionality + needed by MM Foundation. + +**/ +VOID +EFIAPI +MmEntryPoint ( + IN CONST EFI_MM_ENTRY_CONTEXT *MmEntryContext +) +{ + EFI_STATUS Status; + EFI_MM_COMMUNICATE_HEADER *CommunicateHeader; + BOOLEAN InLegacyBoot; + + DEBUG ((DEBUG_INFO, "MmEntryPoint ...\n")); + + // + // Update MMST using the context + // + CopyMem (&gMmCoreMmst.MmStartupThisAp, MmEntryContext, sizeof (EFI_MM_EN= TRY_CONTEXT)); + + // + // Call platform hook before Mm Dispatch + // + //PlatformHookBeforeMmDispatch (); + + // + // If a legacy boot has occured, then make sure gMmCorePrivate is not ac= cessed + // + InLegacyBoot =3D mInLegacyBoot; + if (!InLegacyBoot) { + // + // TBD: Mark the InMm flag as TRUE + // + gMmCorePrivate->InMm =3D TRUE; + + // + // Check to see if this is a Synchronous MMI sent through the MM Commu= nication + // Protocol or an Asynchronous MMI + // + if (gMmCorePrivate->CommunicationBuffer !=3D 0) { + // + // Synchronous MMI for MM Core or request from Communicate protocol + // + if (!MmIsBufferOutsideMmValid ((UINTN)gMmCorePrivate->CommunicationB= uffer, gMmCorePrivate->BufferSize)) { + // + // If CommunicationBuffer is not in valid address scope, return EF= I_INVALID_PARAMETER + // + gMmCorePrivate->CommunicationBuffer =3D 0; + gMmCorePrivate->ReturnStatus =3D EFI_INVALID_PARAMETER; + } else { + CommunicateHeader =3D (EFI_MM_COMMUNICATE_HEADER *)(UINTN)gMmCoreP= rivate->CommunicationBuffer; + gMmCorePrivate->BufferSize -=3D OFFSET_OF (EFI_MM_COMMUNICATE_HEAD= ER, Data); + //DEBUG ((DEBUG_INFO, "CommunicateHeader->HeaderGuid - %g\n", &Com= municateHeader->HeaderGuid)); + Status =3D MmiManage ( + &CommunicateHeader->HeaderGuid, + NULL, + CommunicateHeader->Data, + (UINTN *)&gMmCorePrivate->BufferSize + ); + // + // Update CommunicationBuffer, BufferSize and ReturnStatus + // Communicate service finished, reset the pointer to CommBuffer t= o NULL + // + gMmCorePrivate->BufferSize +=3D OFFSET_OF (EFI_MM_COMMUNICATE_HEAD= ER, Data); + gMmCorePrivate->CommunicationBuffer =3D 0; + gMmCorePrivate->ReturnStatus =3D (Status =3D=3D EFI_SUCCESS) ? EFI= _SUCCESS : EFI_NOT_FOUND; + } + } + } + + // + // Process Asynchronous MMI sources + // + MmiManage (NULL, NULL, NULL, NULL); + + // + // TBD: Do not use private data structure ? + // + + // + // If a legacy boot has occured, then make sure gMmCorePrivate is not ac= cessed + // + if (!InLegacyBoot) { + // + // Clear the InMm flag as we are going to leave MM + // + gMmCorePrivate->InMm =3D FALSE; + } + + DEBUG ((DEBUG_INFO, "MmEntryPoint Done\n")); +} + +EFI_STATUS +EFIAPI +MmConfigurationMmNotify ( + IN CONST EFI_GUID *Protocol, + IN VOID *Interface, + IN EFI_HANDLE Handle + ) +{ + EFI_STATUS Status; + EFI_MM_CONFIGURATION_PROTOCOL *MmConfiguration; + + DEBUG ((DEBUG_INFO, "MmConfigurationMmNotify(%g) - %x\n", Protocol, Inte= rface)); + + MmConfiguration =3D Interface; + + // + // Register the MM Entry Point provided by the MM Core with the MM COnfi= guration protocol + // + Status =3D MmConfiguration->RegisterMmEntry (MmConfiguration, (EFI_MM_EN= TRY_POINT)(UINTN)gMmCorePrivate->MmEntryPoint); + ASSERT_EFI_ERROR (Status); + + // + // Set flag to indicate that the MM Entry Point has been registered which + // means that MMIs are now fully operational. + // + gMmCorePrivate->MmEntryPointRegistered =3D TRUE; + + // + // Print debug message showing MM Core entry point address. + // + DEBUG ((DEBUG_INFO, "MM Core registered MM Entry Point address %p\n", (V= OID *)(UINTN)gMmCorePrivate->MmEntryPoint)); + return EFI_SUCCESS; +} + +UINTN +GetHobListSize ( + IN VOID *HobStart + ) +{ + EFI_PEI_HOB_POINTERS Hob; + + ASSERT (HobStart !=3D NULL); + + Hob.Raw =3D (UINT8 *) HobStart; + while (!END_OF_HOB_LIST (Hob)) { + Hob.Raw =3D GET_NEXT_HOB (Hob); + } + // + // Need plus END_OF_HOB_LIST + // + return (UINTN)Hob.Raw - (UINTN)HobStart + sizeof(EFI_HOB_GENERIC_HEADER); +} + +/** + The Entry Point for MM Core + + Install DXE Protocols and reload MM Core into MMRAM and register MM Core + EntryPoint on the MMI vector. + + Note: This function is called for both DXE invocation and MMRAM invocati= on. + + @param ImageHandle The firmware allocated handle for the EFI image. + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The entry point is executed successfully. + @retval Other Some error occurred when executing this entry poi= nt. + +**/ +EFI_STATUS +EFIAPI +StandaloneMmMain ( + IN VOID *HobStart + ) +{ + EFI_STATUS Status; + UINTN Index; + VOID *MmHobStart; + UINTN HobSize; + VOID *Registration; + EFI_HOB_GUID_TYPE *GuidHob; + MM_CORE_DATA_HOB_DATA *DataInHob; + EFI_HOB_GUID_TYPE *MmramRangesHob; + EFI_MMRAM_HOB_DESCRIPTOR_BLOCK *MmramRangesHobData; + EFI_MMRAM_DESCRIPTOR *MmramRanges; + UINT32 MmramRangeCount; + EFI_HOB_FIRMWARE_VOLUME *BfvHob; + + ProcessLibraryConstructorList (HobStart, &gMmCoreMmst); + + DEBUG ((DEBUG_INFO, "MmMain - 0x%x\n", HobStart)); + + // + // Determine if the caller has passed a reference to a MM_CORE_PRIVATE_D= ATA + // structure in the Hoblist. This choice will govern how boot informatio= n is + // extracted later. + // + GuidHob =3D GetNextGuidHob (&gMmCoreDataHobGuid, HobStart); + if (GuidHob =3D=3D NULL) { + // + // Allocate and zero memory for a MM_CORE_PRIVATE_DATA table and then + // initialise it + // + gMmCorePrivate =3D (MM_CORE_PRIVATE_DATA *) AllocateRuntimePages(EFI_S= IZE_TO_PAGES(sizeof(MM_CORE_PRIVATE_DATA))); + SetMem ((VOID *)(UINTN)gMmCorePrivate, sizeof(MM_CORE_PRIVATE_DATA), 0= ); + gMmCorePrivate->Signature =3D MM_CORE_PRIVATE_DATA_SIGNATURE; + gMmCorePrivate->MmEntryPointRegistered =3D FALSE; + gMmCorePrivate->InMm =3D FALSE; + gMmCorePrivate->ReturnStatus =3D EFI_SUCCESS; + + // + // Extract the MMRAM ranges from the MMRAM descriptor HOB + // + MmramRangesHob =3D GetNextGuidHob (&gEfiMmPeiMmramMemoryReserveGuid, H= obStart); + if (MmramRangesHob =3D=3D NULL) + return EFI_UNSUPPORTED; + + MmramRangesHobData =3D GET_GUID_HOB_DATA (MmramRangesHob); + ASSERT (MmramRangesHobData !=3D NULL); + MmramRanges =3D MmramRangesHobData->Descriptor; + MmramRangeCount =3D MmramRangesHobData->NumberOfMmReservedRegions; + ASSERT (MmramRanges); + ASSERT (MmramRangeCount); + + // + // Copy the MMRAM ranges into MM_CORE_PRIVATE_DATA table just in case = any + // code relies on them being present there + // + gMmCorePrivate->MmramRangeCount =3D MmramRangeCount; + gMmCorePrivate->MmramRanges =3D (EFI_PHYSICAL_ADDRESS)(UINTN)AllocateP= ool (MmramRangeCount * sizeof(EFI_MMRAM_DESCRIPTOR)); + ASSERT (gMmCorePrivate->MmramRanges !=3D 0); + CopyMem ((VOID *)(UINTN)gMmCorePrivate->MmramRanges, + MmramRanges, + MmramRangeCount * sizeof(EFI_MMRAM_DESCRIPTOR)); + } else { + DataInHob =3D GET_GUID_HOB_DATA (GuidHob); + gMmCorePrivate =3D (MM_CORE_PRIVATE_DATA *)(UINTN)DataInHob->Address; + MmramRanges =3D (EFI_MMRAM_DESCRIPTOR *)(UINTN)gMmCorePrivate->Mmr= amRanges; + MmramRangeCount =3D gMmCorePrivate->MmramRangeCount; + } + + // + // Print the MMRAM ranges passed by the caller + // + DEBUG ((DEBUG_INFO, "MmramRangeCount - 0x%x\n", MmramRangeCount)); + for (Index =3D 0; Index < MmramRangeCount; Index++) { + DEBUG ((DEBUG_INFO, "MmramRanges[%d]: 0x%016lx - 0x%lx\n", Index, + MmramRanges[Index].CpuStart, + MmramRanges[Index].PhysicalSize)); + } + + // + // Copy the MMRAM ranges into private MMRAM + // + mMmramRangeCount =3D MmramRangeCount; + DEBUG ((DEBUG_INFO, "mMmramRangeCount - 0x%x\n", mMmramRangeCount)); + mMmramRanges =3D AllocatePool (mMmramRangeCount * sizeof (EFI_MMRAM_DESC= RIPTOR)); + DEBUG ((DEBUG_INFO, "mMmramRanges - 0x%x\n", mMmramRanges)); + ASSERT (mMmramRanges !=3D NULL); + CopyMem (mMmramRanges, (VOID *)(UINTN)MmramRanges, mMmramRangeCount * si= zeof (EFI_MMRAM_DESCRIPTOR)); + + // + // Get Boot Firmware Volume address from the BFV Hob + // + BfvHob =3D GetFirstHob (EFI_HOB_TYPE_FV); + if (BfvHob !=3D NULL) { + DEBUG ((DEBUG_INFO, "BFV address - 0x%x\n", BfvHob->BaseAddress)); + DEBUG ((DEBUG_INFO, "BFV size - 0x%x\n", BfvHob->Length)); + gMmCorePrivate->StandaloneBfvAddress =3D BfvHob->BaseAddress; + } + + gMmCorePrivate->Mmst =3D (EFI_PHYSICAL_ADDRESS)(UINTN)&gMmCoreM= mst; + gMmCorePrivate->MmEntryPoint =3D (EFI_PHYSICAL_ADDRESS)(UINTN)MmEntryPoi= nt; + + // + // No need to initialize memory service. + // It is done in constructor of StandaloneMmCoreMemoryAllocationLib(), + // so that the library linked with StandaloneMmCore can use AllocatePool= () in constuctor. + // + + DEBUG ((DEBUG_INFO, "MmInstallConfigurationTable For HobList\n")); + // + // Install HobList + // + HobSize =3D GetHobListSize (HobStart); + DEBUG ((DEBUG_INFO, "HobSize - 0x%x\n", HobSize)); + MmHobStart =3D AllocatePool (HobSize); + DEBUG ((DEBUG_INFO, "MmHobStart - 0x%x\n", MmHobStart)); + ASSERT (MmHobStart !=3D NULL); + CopyMem (MmHobStart, HobStart, HobSize); + Status =3D MmInstallConfigurationTable (&gMmCoreMmst, &gEfiHobListGuid, = MmHobStart, HobSize); + ASSERT_EFI_ERROR (Status); + + // + // Register notification for EFI_MM_CONFIGURATION_PROTOCOL registration = and + // use it to register the MM Foundation entrypoint + // + DEBUG ((DEBUG_INFO, "MmRegisterProtocolNotify - MmConfigurationMmProtoco= l\n")); + Status =3D MmRegisterProtocolNotify ( + &gEfiMmConfigurationProtocolGuid, + MmConfigurationMmNotify, + &Registration + ); + ASSERT_EFI_ERROR (Status); + + // + // Dispatch standalone BFV + // + DEBUG ((DEBUG_INFO, "Mm Dispatch StandaloneBfvAddress - 0x%08x\n", gMmCo= rePrivate->StandaloneBfvAddress)); + if (gMmCorePrivate->StandaloneBfvAddress !=3D 0) { + MmCoreFfsFindMmDriver ((EFI_FIRMWARE_VOLUME_HEADER *)(UINTN)gMmCorePri= vate->StandaloneBfvAddress); + MmDispatcher (); + } + + // + // Register all handlers in the core table + // + for (Index =3D 0; mMmCoreMmiHandlers[Index].HandlerType !=3D NULL; Index= ++) { + Status =3D MmiHandlerRegister(mMmCoreMmiHandlers[Index].Handler, + mMmCoreMmiHandlers[Index].HandlerType, + &mMmCoreMmiHandlers[Index].DispatchHandle); + DEBUG ((DEBUG_INFO, "MmiHandlerRegister - GUID %g - Status %d\n", mMmC= oreMmiHandlers[Index].HandlerType, Status)); + } + + DEBUG ((DEBUG_INFO, "MmMain Done!\n")); + + return EFI_SUCCESS; +} diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.h b/StandaloneMmPkg/Core= /StandaloneMmCore.h new file mode 100644 index 0000000000..53921b7844 --- /dev/null +++ b/StandaloneMmPkg/Core/StandaloneMmCore.h @@ -0,0 +1,903 @@ +/** @file + The internal header file includes the common header files, defines + internal structure and functions used by MmCore module. + + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ + This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _MM_CORE_H_ +#define _MM_CORE_H_ + +#include +#include + +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include +#include +//#include +#include +#include + +#include "StandaloneMmCorePrivateData.h" + +// +// Used to build a table of MMI Handlers that the MM Core registers +// +typedef struct { + EFI_MM_HANDLER_ENTRY_POINT Handler; + EFI_GUID *HandlerType; + EFI_HANDLE DispatchHandle; + BOOLEAN UnRegister; +} MM_CORE_MMI_HANDLERS; + +// +// Structure for recording the state of an MM Driver +// +#define EFI_MM_DRIVER_ENTRY_SIGNATURE SIGNATURE_32('s', 'd','r','v') + +typedef struct { + UINTN Signature; + LIST_ENTRY Link; // mDriverList + + LIST_ENTRY ScheduledLink; // mScheduledQueue + + EFI_HANDLE FvHandle; + EFI_GUID FileName; + VOID *Pe32Data; + UINTN Pe32DataSize; + + VOID *Depex; + UINTN DepexSize; + + BOOLEAN Before; + BOOLEAN After; + EFI_GUID BeforeAfterGuid; + + BOOLEAN Dependent; + BOOLEAN Scheduled; + BOOLEAN Initialized; + BOOLEAN DepexProtocolError; + + EFI_HANDLE ImageHandle; + EFI_LOADED_IMAGE_PROTOCOL *LoadedImage; + // + // Image EntryPoint in MMRAM + // + PHYSICAL_ADDRESS ImageEntryPoint; + // + // Image Buffer in MMRAM + // + PHYSICAL_ADDRESS ImageBuffer; + // + // Image Page Number + // + UINTN NumberOfPage; +} EFI_MM_DRIVER_ENTRY; + +#define EFI_HANDLE_SIGNATURE SIGNATURE_32('h','n','d','l') + +/// +/// IHANDLE - contains a list of protocol handles +/// +typedef struct { + UINTN Signature; + /// All handles list of IHANDLE + LIST_ENTRY AllHandles; + /// List of PROTOCOL_INTERFACE's for this handle + LIST_ENTRY Protocols; + UINTN LocateRequest; +} IHANDLE; + +#define ASSERT_IS_HANDLE(a) ASSERT((a)->Signature =3D=3D EFI_HANDLE_SIGNA= TURE) + +#define PROTOCOL_ENTRY_SIGNATURE SIGNATURE_32('p','r','t','e') + +/// +/// PROTOCOL_ENTRY - each different protocol has 1 entry in the protocol +/// database. Each handler that supports this protocol is listed, along +/// with a list of registered notifies. +/// +typedef struct { + UINTN Signature; + /// Link Entry inserted to mProtocolDatabase + LIST_ENTRY AllEntries; + /// ID of the protocol + EFI_GUID ProtocolID; + /// All protocol interfaces + LIST_ENTRY Protocols; + /// Registerd notification handlers + LIST_ENTRY Notify; +} PROTOCOL_ENTRY; + +#define PROTOCOL_INTERFACE_SIGNATURE SIGNATURE_32('p','i','f','c') + +/// +/// PROTOCOL_INTERFACE - each protocol installed on a handle is tracked +/// with a protocol interface structure +/// +typedef struct { + UINTN Signature; + /// Link on IHANDLE.Protocols + LIST_ENTRY Link; + /// Back pointer + IHANDLE *Handle; + /// Link on PROTOCOL_ENTRY.Protocols + LIST_ENTRY ByProtocol; + /// The protocol ID + PROTOCOL_ENTRY *Protocol; + /// The interface value + VOID *Interface; +} PROTOCOL_INTERFACE; + +#define PROTOCOL_NOTIFY_SIGNATURE SIGNATURE_32('p','r','t','n') + +/// +/// PROTOCOL_NOTIFY - used for each register notification for a protocol +/// +typedef struct { + UINTN Signature; + PROTOCOL_ENTRY *Protocol; + /// All notifications for this protocol + LIST_ENTRY Link; + /// Notification function + EFI_MM_NOTIFY_FN Function; + /// Last position notified + LIST_ENTRY *Position; +} PROTOCOL_NOTIFY; + +// +// MM Core Global Variables +// +extern MM_CORE_PRIVATE_DATA *gMmCorePrivate; +extern EFI_MM_SYSTEM_TABLE gMmCoreMmst; +extern LIST_ENTRY gHandleList; +extern EFI_PHYSICAL_ADDRESS gLoadModuleAtFixAddressMmramBase; + +/** + Called to initialize the memory service. + + @param MmramRangeCount Number of MMRAM Regions + @param MmramRanges Pointer to MMRAM Descriptors + +**/ +VOID +MmInitializeMemoryServices ( + IN UINTN MmramRangeCount, + IN EFI_MMRAM_DESCRIPTOR *MmramRanges + ); + +/** + The MmInstallConfigurationTable() function is used to maintain the list + of configuration tables that are stored in the System Management System + Table. The list is stored as an array of (GUID, Pointer) pairs. The li= st + must be allocated from pool memory with PoolType set to EfiRuntimeServic= esData. + + @param SystemTable A pointer to the MM System Table (SMST). + @param Guid A pointer to the GUID for the entry to add, upd= ate, or remove. + @param Table A pointer to the buffer of the table to add. + @param TableSize The size of the table to install. + + @retval EFI_SUCCESS The (Guid, Table) pair was added, updated,= or removed. + @retval EFI_INVALID_PARAMETER Guid is not valid. + @retval EFI_NOT_FOUND An attempt was made to delete a non-existe= nt entry. + @retval EFI_OUT_OF_RESOURCES There is not enough memory available to co= mplete the operation. + +**/ +EFI_STATUS +EFIAPI +MmInstallConfigurationTable ( + IN CONST EFI_MM_SYSTEM_TABLE *SystemTable, + IN CONST EFI_GUID *Guid, + IN VOID *Table, + IN UINTN TableSize + ); + +/** + Wrapper function to MmInstallProtocolInterfaceNotify. This is the publi= c API which + Calls the private one which contains a BOOLEAN parameter for notificatio= ns + + @param UserHandle The handle to install the protocol handle= r on, + or NULL if a new handle is to be allocated + @param Protocol The protocol to add to the handle + @param InterfaceType Indicates whether Interface is supplied in + native form. + @param Interface The interface for the protocol being added + + @return Status code + +**/ +EFI_STATUS +EFIAPI +MmInstallProtocolInterface ( + IN OUT EFI_HANDLE *UserHandle, + IN EFI_GUID *Protocol, + IN EFI_INTERFACE_TYPE InterfaceType, + IN VOID *Interface + ); + +/** + Allocates pages from the memory map. + + @param Type The type of allocation to perform + @param MemoryType The type of memory to turn the allocated = pages + into + @param NumberOfPages The number of pages to allocate + @param Memory A pointer to receive the base allocated m= emory + address + + @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined= in spec. + @retval EFI_NOT_FOUND Could not allocate pages match the requir= ement. + @retval EFI_OUT_OF_RESOURCES No enough pages to allocate. + @retval EFI_SUCCESS Pages successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmAllocatePages ( + IN EFI_ALLOCATE_TYPE Type, + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN NumberOfPages, + OUT EFI_PHYSICAL_ADDRESS *Memory + ); + +/** + Allocates pages from the memory map. + + @param Type The type of allocation to perform + @param MemoryType The type of memory to turn the allocated = pages + into + @param NumberOfPages The number of pages to allocate + @param Memory A pointer to receive the base allocated m= emory + address + + @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined= in spec. + @retval EFI_NOT_FOUND Could not allocate pages match the requir= ement. + @retval EFI_OUT_OF_RESOURCES No enough pages to allocate. + @retval EFI_SUCCESS Pages successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmInternalAllocatePages ( + IN EFI_ALLOCATE_TYPE Type, + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN NumberOfPages, + OUT EFI_PHYSICAL_ADDRESS *Memory + ); + +/** + Frees previous allocated pages. + + @param Memory Base address of memory being freed + @param NumberOfPages The number of pages to free + + @retval EFI_NOT_FOUND Could not find the entry that covers the = range + @retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or N= umberOfPages is zero. + @return EFI_SUCCESS Pages successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmFreePages ( + IN EFI_PHYSICAL_ADDRESS Memory, + IN UINTN NumberOfPages + ); + +/** + Frees previous allocated pages. + + @param Memory Base address of memory being freed + @param NumberOfPages The number of pages to free + + @retval EFI_NOT_FOUND Could not find the entry that covers the = range + @retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or N= umberOfPages is zero. + @return EFI_SUCCESS Pages successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmInternalFreePages ( + IN EFI_PHYSICAL_ADDRESS Memory, + IN UINTN NumberOfPages + ); + +/** + Allocate pool of a particular type. + + @param PoolType Type of pool to allocate + @param Size The amount of pool to allocate + @param Buffer The address to return a pointer to the al= located + pool + + @retval EFI_INVALID_PARAMETER PoolType not valid + @retval EFI_OUT_OF_RESOURCES Size exceeds max pool size or allocation = failed. + @retval EFI_SUCCESS Pool successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmAllocatePool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN Size, + OUT VOID **Buffer + ); + +/** + Allocate pool of a particular type. + + @param PoolType Type of pool to allocate + @param Size The amount of pool to allocate + @param Buffer The address to return a pointer to the al= located + pool + + @retval EFI_INVALID_PARAMETER PoolType not valid + @retval EFI_OUT_OF_RESOURCES Size exceeds max pool size or allocation = failed. + @retval EFI_SUCCESS Pool successfully allocated. + +**/ +EFI_STATUS +EFIAPI +MmInternalAllocatePool ( + IN EFI_MEMORY_TYPE PoolType, + IN UINTN Size, + OUT VOID **Buffer + ); + +/** + Frees pool. + + @param Buffer The allocated pool entry to free + + @retval EFI_INVALID_PARAMETER Buffer is not a valid value. + @retval EFI_SUCCESS Pool successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmFreePool ( + IN VOID *Buffer + ); + +/** + Frees pool. + + @param Buffer The allocated pool entry to free + + @retval EFI_INVALID_PARAMETER Buffer is not a valid value. + @retval EFI_SUCCESS Pool successfully freed. + +**/ +EFI_STATUS +EFIAPI +MmInternalFreePool ( + IN VOID *Buffer + ); + +/** + Installs a protocol interface into the boot services environment. + + @param UserHandle The handle to install the protocol handle= r on, + or NULL if a new handle is to be allocated + @param Protocol The protocol to add to the handle + @param InterfaceType Indicates whether Interface is supplied in + native form. + @param Interface The interface for the protocol being added + @param Notify indicates whether notify the notification= list + for this protocol + + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate + @retval EFI_SUCCESS Protocol interface successfully installed + +**/ +EFI_STATUS +MmInstallProtocolInterfaceNotify ( + IN OUT EFI_HANDLE *UserHandle, + IN EFI_GUID *Protocol, + IN EFI_INTERFACE_TYPE InterfaceType, + IN VOID *Interface, + IN BOOLEAN Notify + ); + +/** + Uninstalls all instances of a protocol:interfacer from a handle. + If the last protocol interface is remove from the handle, the + handle is freed. + + @param UserHandle The handle to remove the protocol handler= from + @param Protocol The protocol, of protocol:interface, to r= emove + @param Interface The interface, of protocol:interface, to = remove + + @retval EFI_INVALID_PARAMETER Protocol is NULL. + @retval EFI_SUCCESS Protocol interface successfully uninstall= ed. + +**/ +EFI_STATUS +EFIAPI +MmUninstallProtocolInterface ( + IN EFI_HANDLE UserHandle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ); + +/** + Queries a handle to determine if it supports a specified protocol. + + @param UserHandle The handle being queried. + @param Protocol The published unique identifier of the pr= otocol. + @param Interface Supplies the address where a pointer to t= he + corresponding Protocol Interface is retur= ned. + + @return The requested protocol interface for the handle + +**/ +EFI_STATUS +EFIAPI +MmHandleProtocol ( + IN EFI_HANDLE UserHandle, + IN EFI_GUID *Protocol, + OUT VOID **Interface + ); + +/** + Add a new protocol notification record for the request protocol. + + @param Protocol The requested protocol to add the notify + registration + @param Function Points to the notification function + @param Registration Returns the registration record + + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_SUCCESS Successfully returned the registration re= cord + that has been added + +**/ +EFI_STATUS +EFIAPI +MmRegisterProtocolNotify ( + IN CONST EFI_GUID *Protocol, + IN EFI_MM_NOTIFY_FN Function, + OUT VOID **Registration + ); + +/** + Locates the requested handle(s) and returns them in Buffer. + + @param SearchType The type of search to perform to locate t= he + handles + @param Protocol The protocol to search for + @param SearchKey Dependant on SearchType + @param BufferSize On input the size of Buffer. On output t= he + size of data returned. + @param Buffer The buffer to return the results in + + @retval EFI_BUFFER_TOO_SMALL Buffer too small, required buffer size is + returned in BufferSize. + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_SUCCESS Successfully found the requested handle(s= ) and + returns them in Buffer. + +**/ +EFI_STATUS +EFIAPI +MmLocateHandle ( + IN EFI_LOCATE_SEARCH_TYPE SearchType, + IN EFI_GUID *Protocol OPTIONAL, + IN VOID *SearchKey OPTIONAL, + IN OUT UINTN *BufferSize, + OUT EFI_HANDLE *Buffer + ); + +/** + Return the first Protocol Interface that matches the Protocol GUID. If + Registration is pasased in return a Protocol Instance that was just add + to the system. If Retistration is NULL return the first Protocol Interfa= ce + you find. + + @param Protocol The protocol to search for + @param Registration Optional Registration Key returned from + RegisterProtocolNotify() + @param Interface Return the Protocol interface (instance). + + @retval EFI_SUCCESS If a valid Interface is returned + @retval EFI_INVALID_PARAMETER Invalid parameter + @retval EFI_NOT_FOUND Protocol interface not found + +**/ +EFI_STATUS +EFIAPI +MmLocateProtocol ( + IN EFI_GUID *Protocol, + IN VOID *Registration OPTIONAL, + OUT VOID **Interface + ); + +/** + Manage MMI of a particular type. + + @param HandlerType Points to the handler type or NULL for root MMI h= andlers. + @param Context Points to an optional context buffer. + @param CommBuffer Points to the optional communication buffer. + @param CommBufferSize Points to the size of the optional communication = buffer. + + @retval EFI_SUCCESS Interrupt source was processe= d successfully but not quiesced. + @retval EFI_INTERRUPT_PENDING One or more MMI sources could= not be quiesced. + @retval EFI_WARN_INTERRUPT_SOURCE_PENDING Interrupt source was not hand= led or quiesced. + @retval EFI_WARN_INTERRUPT_SOURCE_QUIESCED Interrupt source was handled = and quiesced. + +**/ +EFI_STATUS +EFIAPI +MmiManage ( + IN CONST EFI_GUID *HandlerType, + IN CONST VOID *Context OPTIONAL, + IN OUT VOID *CommBuffer OPTIONAL, + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + Registers a handler to execute within MM. + + @param Handler Handler service funtion pointer. + @param HandlerType Points to the handler type or NULL for root MMI h= andlers. + @param DispatchHandle On return, contains a unique handle which can be = used to later unregister the handler function. + + @retval EFI_SUCCESS Handler register success. + @retval EFI_INVALID_PARAMETER Handler or DispatchHandle is NULL. + +**/ +EFI_STATUS +EFIAPI +MmiHandlerRegister ( + IN EFI_MM_HANDLER_ENTRY_POINT Handler, + IN CONST EFI_GUID *HandlerType OPTIONAL, + OUT EFI_HANDLE *DispatchHandle + ); + +/** + Unregister a handler in MM. + + @param DispatchHandle The handle that was specified when the handler w= as registered. + + @retval EFI_SUCCESS Handler function was successfully unregist= ered. + @retval EFI_INVALID_PARAMETER DispatchHandle does not refer to a valid h= andle. + +**/ +EFI_STATUS +EFIAPI +MmiHandlerUnRegister ( + IN EFI_HANDLE DispatchHandle + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmDriverDispatchHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmFvDispatchHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmLegacyBootHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmExitBootServiceHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmReadyToBootHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmReadyToLockHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + This function is the main entry point for an MM handler dispatch + or communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. + + @return Status Code + +**/ +EFI_STATUS +EFIAPI +MmEndOfDxeHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + +/** + Place holder function until all the MM System Table Service are availabl= e. + + @param Arg1 Undefined + @param Arg2 Undefined + @param Arg3 Undefined + @param Arg4 Undefined + @param Arg5 Undefined + + @return EFI_NOT_AVAILABLE_YET + +**/ +EFI_STATUS +EFIAPI +MmEfiNotAvailableYetArg5 ( + UINTN Arg1, + UINTN Arg2, + UINTN Arg3, + UINTN Arg4, + UINTN Arg5 + ); + +// +//Functions used during debug buils +// + +/** + Traverse the discovered list for any drivers that were discovered but no= t loaded + because the dependency expressions evaluated to false. + +**/ +VOID +MmDisplayDiscoveredNotDispatched ( + VOID + ); + +/** + Add free MMRAM region for use by memory service. + + @param MemBase Base address of memory region. + @param MemLength Length of the memory region. + @param Type Memory type. + @param Attributes Memory region state. + +**/ +VOID +MmAddMemoryRegion ( + IN EFI_PHYSICAL_ADDRESS MemBase, + IN UINT64 MemLength, + IN EFI_MEMORY_TYPE Type, + IN UINT64 Attributes + ); + +/** + Finds the protocol entry for the requested protocol. + + @param Protocol The ID of the protocol + @param Create Create a new entry if not found + + @return Protocol entry + +**/ +PROTOCOL_ENTRY * +MmFindProtocolEntry ( + IN EFI_GUID *Protocol, + IN BOOLEAN Create + ); + +/** + Signal event for every protocol in protocol entry. + + @param Prot Protocol interface + +**/ +VOID +MmNotifyProtocol ( + IN PROTOCOL_INTERFACE *Prot + ); + +/** + Finds the protocol instance for the requested handle and protocol. + Note: This function doesn't do parameters checking, it's caller's respon= sibility + to pass in valid parameters. + + @param Handle The handle to search the protocol on + @param Protocol GUID of the protocol + @param Interface The interface for the protocol being sear= ched + + @return Protocol instance (NULL: Not found) + +**/ +PROTOCOL_INTERFACE * +MmFindProtocolInterface ( + IN IHANDLE *Handle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ); + +/** + Removes Protocol from the protocol list (but not the handle list). + + @param Handle The handle to remove protocol on. + @param Protocol GUID of the protocol to be moved + @param Interface The interface of the protocol + + @return Protocol Entry + +**/ +PROTOCOL_INTERFACE * +MmRemoveInterfaceFromProtocol ( + IN IHANDLE *Handle, + IN EFI_GUID *Protocol, + IN VOID *Interface + ); + +/** + This is the POSTFIX version of the dependency evaluator. This code does + not need to handle Before or After, as it is not valid to call this + routine in this case. POSTFIX means all the math is done on top of the s= tack. + + @param DriverEntry DriverEntry element to update. + + @retval TRUE If driver is ready to run. + @retval FALSE If driver is not ready to run or some fata= l error + was found. + +**/ +BOOLEAN +MmIsSchedulable ( + IN EFI_MM_DRIVER_ENTRY *DriverEntry + ); + +/** + Dump MMRAM information. + +**/ +VOID +DumpMmramInfo ( + VOID + ); + +extern UINTN mMmramRangeCount; +extern EFI_MMRAM_DESCRIPTOR *mMmramRanges; +extern EFI_SYSTEM_TABLE *mEfiSystemTable; + +#endif diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.inf b/StandaloneMmPkg/Co= re/StandaloneMmCore.inf new file mode 100644 index 0000000000..c5eaa14ba3 --- /dev/null +++ b/StandaloneMmPkg/Core/StandaloneMmCore.inf @@ -0,0 +1,80 @@ +## @file +# This module provide an SMM CIS compliant implementation of SMM Core. +# +# Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the BS= D License +# which accompanies this distribution. The full text of the license may be= found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D StandaloneMmCore + FILE_GUID =3D 6E14B6FD-3600-4DD6-A17A-206B3B6DCE16 + MODULE_TYPE =3D MM_CORE_STANDALONE + VERSION_STRING =3D 1.0 + PI_SPECIFICATION_VERSION =3D 0x00010032 + ENTRY_POINT =3D StandaloneMmMain + +# VALID_ARCHITECTURES =3D IA32 X64 AARCH64 + +[Sources] + StandaloneMmCore.c + StandaloneMmCore.h + StandaloneMmCorePrivateData.h + Page.c + Pool.c + Handle.c + Locate.c + Notify.c + Dependency.c + Dispatcher.c + Mmi.c + InstallConfigurationTable.c + FwVol.c + +[Packages] + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + BaseLib + BaseMemoryLib + CacheMaintenanceLib + DebugLib + FvLib + HobLib + MemoryAllocationLib + MemLib + PeCoffLib + ReportStatusCodeLib + StandaloneMmCoreEntryPoint + +[Protocols] + gEfiDxeMmReadyToLockProtocolGuid ## UNDEFINED # SmiHandlerRe= gister + gEfiMmReadyToLockProtocolGuid ## PRODUCES + gEfiMmEndOfDxeProtocolGuid ## PRODUCES + gEfiLoadedImageProtocolGuid ## PRODUCES + gEfiMmConfigurationProtocolGuid ## CONSUMES + +[Guids] + gAprioriGuid ## SOMETIMES_CONSUMES ##= File + gEfiEventDxeDispatchGuid ## PRODUCES ##= GUID # SmiHandlerRegister + gEfiEndOfDxeEventGroupGuid ## PRODUCES ##= GUID # SmiHandlerRegister + ## SOMETIMES_CONSUMES ## GUID # Locate protocol + ## SOMETIMES_PRODUCES ## GUID # SmiHandlerRegister + gEdkiiMemoryProfileGuid + gZeroGuid ## SOMETIMES_CONSUMES ##= GUID + gEfiHobListGuid + gMmCoreDataHobGuid + gMmFvDispatchGuid + gEfiEventLegacyBootGuid + gEfiEventExitBootServicesGuid + gEfiEventReadyToBootGuid diff --git a/StandaloneMmPkg/Core/StandaloneMmCorePrivateData.h b/Standalon= eMmPkg/Core/StandaloneMmCorePrivateData.h new file mode 100644 index 0000000000..faedf3ff2d --- /dev/null +++ b/StandaloneMmPkg/Core/StandaloneMmCorePrivateData.h @@ -0,0 +1,66 @@ +/** @file + The internal header file that declared a data structure that is shared + between the MM IPL and the MM Core. + + Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ This program and the accompanying materials are licensed and made availa= ble + under the terms and conditions of the BSD License which accompanies this + distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#ifndef _STANDALONE_MM_CORE_PRIVATE_DATA_H_ +#define _STANDALONE_MM_CORE_PRIVATE_DATA_H_ + +#include + +// +// Page management +// + +typedef struct { + LIST_ENTRY Link; + UINTN NumberOfPages; +} FREE_PAGE_LIST; + +extern LIST_ENTRY mMmMemoryMap; + +// +// Pool management +// + +// +// MIN_POOL_SHIFT must not be less than 5 +// +#define MIN_POOL_SHIFT 6 +#define MIN_POOL_SIZE (1 << MIN_POOL_SHIFT) + +// +// MAX_POOL_SHIFT must not be less than EFI_PAGE_SHIFT - 1 +// +#define MAX_POOL_SHIFT (EFI_PAGE_SHIFT - 1) +#define MAX_POOL_SIZE (1 << MAX_POOL_SHIFT) + +// +// MAX_POOL_INDEX are calculated by maximum and minimum pool sizes +// +#define MAX_POOL_INDEX (MAX_POOL_SHIFT - MIN_POOL_SHIFT + 1) + +typedef struct { + UINTN Size; + BOOLEAN Available; +} POOL_HEADER; + +typedef struct { + POOL_HEADER Header; + LIST_ENTRY Link; +} FREE_POOL_HEADER; + +extern LIST_ENTRY mMmPoolLists[MAX_POOL_INDEX]; + +#endif diff --git a/StandaloneMmPkg/Include/Guid/MmFvDispatch.h b/StandaloneMmPkg/= Include/Guid/MmFvDispatch.h new file mode 100644 index 0000000000..fb194d3474 --- /dev/null +++ b/StandaloneMmPkg/Include/Guid/MmFvDispatch.h @@ -0,0 +1,38 @@ +/** @file + GUIDs for MM Event. + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials are licensed and made availabl= e under +the terms and conditions of the BSD License that accompanies this distribu= tion. +The full text of the license may be found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MM_FV_DISPATCH_H__ +#define __MM_FV_DISPATCH_H__ + +#define MM_FV_DISPATCH_GUID \ + { 0xb65694cc, 0x9e3, 0x4c3b, { 0xb5, 0xcd, 0x5, 0xf4, 0x4d, 0x3c, 0xdb, = 0xff }} + +extern EFI_GUID gMmFvDispatchGuid; + +#pragma pack(1) +typedef struct { + EFI_PHYSICAL_ADDRESS Address; + UINT64 Size; +} EFI_MM_COMMUNICATE_FV_DISPATCH_DATA; + +typedef struct { + EFI_GUID HeaderGuid; + UINTN MessageLength; + EFI_MM_COMMUNICATE_FV_DISPATCH_DATA Data; +} EFI_MM_COMMUNICATE_FV_DISPATCH; +#pragma pack() + +#endif diff --git a/StandaloneMmPkg/Include/StandaloneMm.h b/StandaloneMmPkg/Inclu= de/StandaloneMm.h new file mode 100644 index 0000000000..0e420315bb --- /dev/null +++ b/StandaloneMmPkg/Include/StandaloneMm.h @@ -0,0 +1,36 @@ +/** @file + Standalone MM. + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+ +This program and the accompanying materials +are licensed and made available under the terms and conditions +of the BSD License which accompanies this distribution. The +full text of the license may be found at +http://opensource.org/licenses/bsd-license.php + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef _STANDALONE_MM_H_ +#define _STANDALONE_MM_H_ + +#include + +typedef +EFI_STATUS +(EFIAPI *MM_IMAGE_ENTRY_POINT) ( + IN EFI_HANDLE ImageHandle, + IN EFI_MM_SYSTEM_TABLE *MmSystemTable + ); + +typedef +EFI_STATUS +(EFIAPI *STANDALONE_MM_FOUNDATION_ENTRY_POINT) ( + IN VOID *HobStart + ); + +#endif --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:52 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025826658500.32798947435106; Fri, 6 Apr 2018 07:43:46 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 7468D22620E76; Fri, 6 Apr 2018 07:43:45 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id BDA8022620E64 for ; Fri, 6 Apr 2018 07:43:43 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9EA141529; Fri, 6 Apr 2018 07:43:43 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 047683F587; Fri, 6 Apr 2018 07:43:41 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:19 +0100 Message-Id: <20180406144223.10931-15-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 14/18] StandaloneMmPkg: Describe the declaration, definition and fdf files. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch describes the package declarations, definitions and firmware device files for creating standalone management mode image with core/foundation and drivers. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/StandaloneMmPkg.dec | 47 +++++++++ StandaloneMmPkg/StandaloneMmPkg.dsc | 132 ++++++++++++++++++++++++++ StandaloneMmPkg/StandaloneMmPkg.fdf | 184 ++++++++++++++++++++++++++++++++= ++++ 3 files changed, 363 insertions(+) create mode 100644 StandaloneMmPkg/StandaloneMmPkg.dec create mode 100644 StandaloneMmPkg/StandaloneMmPkg.dsc create mode 100644 StandaloneMmPkg/StandaloneMmPkg.fdf diff --git a/StandaloneMmPkg/StandaloneMmPkg.dec b/StandaloneMmPkg/Standalo= neMmPkg.dec new file mode 100644 index 0000000000..36521bb039 --- /dev/null +++ b/StandaloneMmPkg/StandaloneMmPkg.dec @@ -0,0 +1,47 @@ +## @file +# This package is a platform package that provide platform module/library +# required by Standalone MM platform. +# +# Copyright (c) 2016-2017, ARM Ltd. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the BS= D License +# which accompanies this distribution. The full text of the license may be= found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +# +# + +[Defines] + DEC_SPECIFICATION =3D 0x0001001A + PACKAGE_NAME =3D StandaloneMmPkg + PACKAGE_GUID =3D 2AE82968-7769-4A85-A5BC-A0954CE54A5C + PACKAGE_VERSION =3D 1.0 + +[Includes] + Include + +[LibraryClasses] + +[Guids] + gStandaloneMmPkgTokenSpaceGuid =3D { 0x18fe7632, 0xf5c8, 0x4e6= 3, { 0x8d, 0xe8, 0x17, 0xa5, 0x5c, 0x59, 0x13, 0xbd }} + gMpInformationHobGuid =3D { 0xba33f15d, 0x4000, 0x45c= 1, { 0x8e, 0x88, 0xf9, 0x16, 0x92, 0xd4, 0x57, 0xe3 }} + gMmFvDispatchGuid =3D { 0xb65694cc, 0x09e3, 0x4c3= b, { 0xb5, 0xcd, 0x05, 0xf4, 0x4d, 0x3c, 0xdb, 0xff }} + + ## Include/Guid/MmCoreData.h + gMmCoreDataHobGuid =3D { 0xa160bf99, 0x2aa4, 0x4d7= d, { 0x99, 0x93, 0x89, 0x9c, 0xb1, 0x2d, 0xf3, 0x76 }} + + ## Include/Guid/MmramMemoryReserve.h + gEfiMmPeiMmramMemoryReserveGuid =3D { 0x0703f912, 0xbf8d, 0x4e2= a, { 0xbe, 0x07, 0xab, 0x27, 0x25, 0x25, 0xc5, 0x92 }} + + gEfiStandaloneMmNonSecureBufferGuid =3D { 0xf00497e3, 0xbfa2, 0x41a= 1, { 0x9d, 0x29, 0x54, 0xc2, 0xe9, 0x37, 0x21, 0xc5 }} + gEfiArmTfCpuDriverEpDescriptorGuid =3D { 0x6ecbd5a1, 0xc0f8, 0x470= 2, { 0x83, 0x01, 0x4f, 0xc2, 0xc5, 0x47, 0x0a, 0x51 }} + +[PcdsFeatureFlag] + gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable|FALSE|BOOLEAN|0x000= 00001 + +[Protocols] + gEfiMmConfigurationProtocolGuid =3D { 0xc109319, 0xc149, 0x450e= , { 0xa3, 0xe3, 0xb9, 0xba, 0xdd, 0x9d, 0xc3, 0xa4 }} + diff --git a/StandaloneMmPkg/StandaloneMmPkg.dsc b/StandaloneMmPkg/Standalo= neMmPkg.dsc new file mode 100644 index 0000000000..8cc996f6b0 --- /dev/null +++ b/StandaloneMmPkg/StandaloneMmPkg.dsc @@ -0,0 +1,132 @@ +## @file +# Standalone MM Platform. +# +# Copyright (c) 2015, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the= BSD License +# which accompanies this distribution. The full text of the license may= be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR = IMPLIED. +# +## + +##########################################################################= ###### +# +# Defines Section - statements that will be processed to create a Makefile. +# +##########################################################################= ###### +[Defines] + PLATFORM_NAME =3D StandaloneMm + PLATFORM_GUID =3D 9A4BBA60-B4F9-47C7-9258-3BD77CAE9322 + PLATFORM_VERSION =3D 1.0 + DSC_SPECIFICATION =3D 0x00010011 + OUTPUT_DIRECTORY =3D Build/StandaloneMmPkg + SUPPORTED_ARCHITECTURES =3D IA32|X64|AARCH64 + BUILD_TARGETS =3D DEBUG|RELEASE + SKUID_IDENTIFIER =3D DEFAULT + FLASH_DEFINITION =3D StandaloneMmPkg/StandaloneMmPkg.fdf + DEFINE DEBUG_MESSAGE =3D TRUE + + # LzmaF86 + DEFINE COMPRESSION_TOOL_GUID =3D D42AE6BD-1352-4bfb-909A-CA72A6EAE889 + +##########################################################################= ###### +# +# Library Class section - list of all Library Classes needed by this Platf= orm. +# +##########################################################################= ###### +[LibraryClasses] + # + # Basic + # + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseD= ebugPrintErrorLevelLib.inf + FvLib|StandaloneMmPkg/Library/FvLib/FvLib.inf + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf + MemoryAllocationLib|StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAl= locationLib.inf + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf + ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseRepor= tStatusCodeLibNull.inf + + # + # Entry point + # + StandaloneMmDriverEntryPoint|StandaloneMmPkg/Library/StandaloneMmDriverE= ntryPoint/StandaloneMmDriverEntryPoint.inf + +[LibraryClasses.AARCH64] + ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf + ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf + ArmSvcLib|ArmPkg/Library/ArmSvcLib/ArmSvcLib.inf + CacheMaintenanceLib|ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMainte= nanceLib.inf + HobLib|StandaloneMmPkg/Library/HobLib/HobLib.inf + MemLib|StandaloneMmPkg/Library/MemLib/MemLib.inf + PeCoffExtraActionLib|ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCof= fExtraActionLib.inf + PL011UartLib|ArmPlatformPkg/Library/PL011UartLib/PL011UartLib.inf + # ARM PL011 UART Driver + SerialPortLib|ArmPlatformPkg/Library/PL011SerialPortLib/PL011SerialPortL= ib.inf + + StandaloneMmCoreEntryPoint|StandaloneMmPkg/Library/StandaloneMmCoreEntry= Point/StandaloneMmCoreEntryPoint.inf + +##########################################################################= ###### +# +# Pcd Section - list of all EDK II PCD Entries defined by this Platform +# +##########################################################################= ###### +[PcdsFeatureFlag] + gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable|TRUE + +[PcdsFixedAtBuild] + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x800000CF + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0xff + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x0f + +[PcdsFixedAtBuild.AARCH64] + ## PL011 - Serial Terminal + gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterBase|0x1c0b0000 + gEfiMdePkgTokenSpaceGuid.PcdUartDefaultBaudRate|115200 + +##########################################################################= ######################### +# +# Components Section - list of the modules and components that will be pro= cessed by compilation +# tools and the EDK II tools to generate PE32/PE32+/C= off image files. +# +# Note: The EDK II DSC file is not used to specify how compiled binary ima= ges get placed +# into firmware volume images. This section is just a list of module= s to compile from +# source into UEFI-compliant binaries. +# It is the FDF file that contains information on combining binary f= iles into firmware +# volume images, whose concept is beyond UEFI and is described in PI= specification. +# Binary modules do not need to be listed in this section, as they s= hould be +# specified in the FDF file. For example: Shell binary (Shell_Full.e= fi), FAT binary (Fat.efi), +# Logo (Logo.bmp), and etc. +# There may also be modules listed in this section that are not requ= ired in the FDF file, +# When a module listed here is excluded from FDF file, then UEFI-com= pliant binary will be +# generated for it, but the binary will not be put into any firmware= volume. +# +##########################################################################= ######################### +[Components.common] + # + # MM Core + # + StandaloneMmPkg/Core/StandaloneMmCore.inf + +[Components.AARCH64] + StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf + +##########################################################################= ######################### +# +# BuildOptions Section - Define the module specific tool chain flags that = should be used as +# the default flags for a module. These flags are a= ppended to any +# standard flags that are defined by the build proc= ess. They can be +# applied for any modules or only those modules wit= h the specific +# module style (EDK or EDKII) specified in [Compone= nts] section. +# +##########################################################################= ######################### +[BuildOptions.Common] +GCC:*_*_*_DLINK_FLAGS =3D -z common-page-size=3D0x1000 diff --git a/StandaloneMmPkg/StandaloneMmPkg.fdf b/StandaloneMmPkg/Standalo= neMmPkg.fdf new file mode 100644 index 0000000000..7a22a51b4c --- /dev/null +++ b/StandaloneMmPkg/StandaloneMmPkg.fdf @@ -0,0 +1,184 @@ +# +# Copyright (c) 2011 - 2017, ARM Limited. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# + +##########################################################################= ###### +# +# FD Section +# The [FD] Section is made up of the definition statements and a +# description of what goes into the Flash Device Image. Each FD section +# defines one flash "device" image. A flash device image may be one of +# the following: Removable media bootable image (like a boot floppy +# image,) an Option ROM image (that would be "flashed" into an add-in +# card,) a System "Flash" image (that would be burned into a system's +# flash) or an Update ("Capsule") image that will be used to update and +# existing system flash. +# +##########################################################################= ###### + +[FD.] +!ifdef ARM_FVP_RUN_NORFLASH +BaseAddress =3D 0x08000000|gArmTokenSpaceGuid.PcdFdBaseAddress # The ba= se address of the Firmware in Flash0. +!else +BaseAddress =3D 0xff200000|gArmTokenSpaceGuid.PcdFdBaseAddress # UEFI i= n DRAM + 128MB. +!endif +Size =3D 0x00e00000|gArmTokenSpaceGuid.PcdFdSize # The si= ze in bytes of the device (64MiB). +ErasePolarity =3D 1 + +# This one is tricky, it must be: BlockSize * NumBlocks =3D Size +BlockSize =3D 0x00001000 +NumBlocks =3D 0x0e00 + +0x00000000|0x00280000 +gArmTokenSpaceGuid.PcdFvBaseAddress|gArmTokenSpaceGuid.PcdFvSize +FV =3D FVMAIN_COMPACT + +[FV.FVMAIN_COMPACT] +FvAlignment =3D 16 +ERASE_POLARITY =3D 1 +MEMORY_MAPPED =3D TRUE +STICKY_WRITE =3D TRUE +LOCK_CAP =3D TRUE +LOCK_STATUS =3D TRUE +WRITE_DISABLED_CAP =3D TRUE +WRITE_ENABLED_CAP =3D TRUE +WRITE_STATUS =3D TRUE +WRITE_LOCK_CAP =3D TRUE +WRITE_LOCK_STATUS =3D TRUE +READ_DISABLED_CAP =3D TRUE +READ_ENABLED_CAP =3D TRUE +READ_STATUS =3D TRUE +READ_LOCK_CAP =3D TRUE +READ_LOCK_STATUS =3D TRUE + +INF StandaloneMmPkg/Core/StandaloneMmCore.inf +INF StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf + +##########################################################################= ###### +# +# Rules are use with the [FV] section's module INF type to define +# how an FFS file is created for a given INF file. The following Rule are = the default +# rules for the different module type. User can add the customized rules t= o define the +# content of the FFS file. +# +##########################################################################= ###### + + +##########################################################################= ## +# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section = # +##########################################################################= ## +# +#[Rule.Common.DXE_DRIVER] +# FILE DRIVER =3D $(NAMED_GUID) { +# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_= NAME).depex +# COMPRESS PI_STD { +# GUIDED { +# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi +# UI STRING=3D"$(MODULE_NAME)" Optional +# VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_N= UMBER) +# } +# } +# } +# +##########################################################################= ## + +[Rule.Common.SEC] + FILE SEC =3D $(NAMED_GUID) RELOCS_STRIPPED FIXED { + TE TE Align =3D Auto $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.MM_CORE_STANDALONE] + FILE SEC =3D $(NAMED_GUID) RELOCS_STRIPPED FIXED { + PE32 PE32 Align =3D Auto $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.MM_STANDALONE] + FILE MM_STANDALONE =3D $(NAMED_GUID) { + SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } + +[Rule.Common.PEI_CORE] + FILE PEI_CORE =3D $(NAMED_GUID) FIXED { + TE TE Align =3D Auto $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING =3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM] + FILE PEIM =3D $(NAMED_GUID) FIXED { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + TE TE Align =3D Auto $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM.TIANOCOMPRESSED] + FILE PEIM =3D $(NAMED_GUID) DEBUG_MYTOOLS_IA32 { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED =3D TR= UE { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + } + +[Rule.Common.DXE_CORE] + FILE DXE_CORE =3D $(NAMED_GUID) { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.UEFI_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_RUNTIME_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.UEFI_APPLICATION] + FILE APPLICATION =3D $(NAMED_GUID) { + UI STRING =3D"$(MODULE_NAME)" Optional + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.UEFI_DRIVER.BINARY] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional |.depex + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } + +[Rule.Common.UEFI_APPLICATION.BINARY] + FILE APPLICATION =3D $(NAMED_GUID) { + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } + +[Rule.Common.USER_DEFINED.ACPITABLE] + FILE FREEFORM =3D $(NAMED_GUID) { + RAW ASL |.aml + } --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:52 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025831058955.6020370441989; Fri, 6 Apr 2018 07:43:51 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 9A88D22620E7A; Fri, 6 Apr 2018 07:43:49 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 9F1AE22620E64 for ; Fri, 6 Apr 2018 07:43:47 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 57C991529; Fri, 6 Apr 2018 07:43:47 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D3FA23F587; Fri, 6 Apr 2018 07:43:45 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:20 +0100 Message-Id: <20180406144223.10931-16-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 15/18] ArmPkg: Extra action to update permissions for S-ELO MM Image. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The Standalone MM drivers runs in S-EL0 in AArch64 on ARM Standard Platforms and is deployed during SEC phase. The memory allocated to the Standalone MM drivers should be marked as RO+X. During PE/COFF Image section parsing, this patch implements extra action "UpdatePeCoffPermissions" to request the privileged firmware in EL3 to update the permissions. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- .../DebugPeCoffExtraActionLib.c | 185 +++++++++++++++++= ++-- .../DebugPeCoffExtraActionLib.inf | 7 + 2 files changed, 181 insertions(+), 11 deletions(-) diff --git a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActio= nLib.c b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib= .c index f298e58cdf..c87aaf05c7 100644 --- a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c +++ b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c @@ -15,14 +15,165 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EIT= HER EXPRESS OR IMPLIED. **/ =20 #include -#include =20 +#include #include -#include #include +#include +#include +#include #include #include =20 +typedef RETURN_STATUS (*REGION_PERMISSION_UPDATE_FUNC) ( + IN EFI_PHYSICAL_ADDRESS BaseAddress, + IN UINT64 Length + ); + +STATIC +RETURN_STATUS +UpdatePeCoffPermissions ( + IN CONST PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext, + IN REGION_PERMISSION_UPDATE_FUNC NoExecUpdater, + IN REGION_PERMISSION_UPDATE_FUNC ReadOnlyUpdater + ) +{ + RETURN_STATUS Status; + EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION Hdr; + EFI_IMAGE_OPTIONAL_HEADER_UNION HdrData; + UINTN Size; + UINTN ReadSize; + UINT32 SectionHeaderOffset; + UINTN NumberOfSections; + UINTN Index; + EFI_IMAGE_SECTION_HEADER SectionHeader; + PE_COFF_LOADER_IMAGE_CONTEXT TmpContext; + EFI_PHYSICAL_ADDRESS Base; + + // + // We need to copy ImageContext since PeCoffLoaderGetImageInfo () + // will mangle the ImageAddress field + // + CopyMem (&TmpContext, ImageContext, sizeof (TmpContext)); + + if (TmpContext.PeCoffHeaderOffset =3D=3D 0) { + Status =3D PeCoffLoaderGetImageInfo (&TmpContext); + if (RETURN_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, + "%a: PeCoffLoaderGetImageInfo () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + } + + if (TmpContext.IsTeImage && + TmpContext.ImageAddress =3D=3D ImageContext->ImageAddress) { + DEBUG ((DEBUG_INFO, "%a: ignoring XIP TE image at 0x%lx\n", __FUNCTION= __, + ImageContext->ImageAddress)); + return RETURN_SUCCESS; + } + + if (TmpContext.SectionAlignment < EFI_PAGE_SIZE) { + // + // The sections need to be at least 4 KB aligned, since that is the + // granularity at which we can tighten permissions. So just clear the + // noexec permissions on the entire region. + // + if (!TmpContext.IsTeImage) { + DEBUG ((DEBUG_WARN, + "%a: non-TE Image at 0x%lx has SectionAlignment < 4 KB (%lu)\n", + __FUNCTION__, ImageContext->ImageAddress, TmpContext.SectionAlignm= ent)); + } + Base =3D ImageContext->ImageAddress & ~(EFI_PAGE_SIZE - 1); + Size =3D ImageContext->ImageAddress - Base + ImageContext->ImageSize; + return NoExecUpdater (Base, ALIGN_VALUE (Size, EFI_PAGE_SIZE)); + } + + // + // Read the PE/COFF Header. For PE32 (32-bit) this will read in too much + // data, but that should not hurt anything. Hdr.Pe32->OptionalHeader.Mag= ic + // determines if this is a PE32 or PE32+ image. The magic is in the same + // location in both images. + // + Hdr.Union =3D &HdrData; + Size =3D sizeof (EFI_IMAGE_OPTIONAL_HEADER_UNION); + ReadSize =3D Size; + Status =3D TmpContext.ImageRead (TmpContext.Handle, + TmpContext.PeCoffHeaderOffset, &Size, Hdr.Pe32); + if (RETURN_ERROR (Status) || (Size !=3D ReadSize)) { + DEBUG ((DEBUG_ERROR, + "%a: TmpContext.ImageRead () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + + ASSERT (Hdr.Pe32->Signature =3D=3D EFI_IMAGE_NT_SIGNATURE); + + SectionHeaderOffset =3D TmpContext.PeCoffHeaderOffset + sizeof (UINT32) + + sizeof (EFI_IMAGE_FILE_HEADER); + NumberOfSections =3D (UINTN)(Hdr.Pe32->FileHeader.NumberOfSections); + + switch (Hdr.Pe32->OptionalHeader.Magic) { + case EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC: + SectionHeaderOffset +=3D Hdr.Pe32->FileHeader.SizeOfOptionalHeader; + break; + case EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC: + SectionHeaderOffset +=3D Hdr.Pe32Plus->FileHeader.SizeOfOptionalHead= er; + break; + default: + ASSERT (FALSE); + } + + // + // Iterate over the sections + // + for (Index =3D 0; Index < NumberOfSections; Index++) { + // + // Read section header from file + // + Size =3D sizeof (EFI_IMAGE_SECTION_HEADER); + ReadSize =3D Size; + Status =3D TmpContext.ImageRead (TmpContext.Handle, SectionHeaderOffse= t, + &Size, &SectionHeader); + if (RETURN_ERROR (Status) || (Size !=3D ReadSize)) { + DEBUG ((DEBUG_ERROR, + "%a: TmpContext.ImageRead () failed (Status =3D %r)\n", + __FUNCTION__, Status)); + return Status; + } + + Base =3D TmpContext.ImageAddress + SectionHeader.VirtualAddress; + + if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_MEM_EXECUTE) =3D=3D= 0) { + + if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_MEM_WRITE) =3D=3D= 0 && + TmpContext.ImageType !=3D EFI_IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER= ) { + + DEBUG ((DEBUG_INFO, + "%a: Mapping section %d of image at 0x%lx with RO-XN permissions= and size 0x%x\n", + __FUNCTION__, Index, Base, SectionHeader.Misc.VirtualSize)); + ReadOnlyUpdater (Base, SectionHeader.Misc.VirtualSize); + } else { + DEBUG ((DEBUG_WARN, + "%a: Mapping section %d of image at 0x%lx with RW-XN permissions= and size 0x%x\n", + __FUNCTION__, Index, Base, SectionHeader.Misc.VirtualSize)); + } + } else { + DEBUG ((DEBUG_INFO, + "%a: Mapping section %d of image at 0x%lx with RO-XN permissions= and size 0x%x\n", + __FUNCTION__, Index, Base, SectionHeader.Misc.VirtualSize)); + ReadOnlyUpdater (Base, SectionHeader.Misc.VirtualSize); + + DEBUG ((DEBUG_INFO, + "%a: Mapping section %d of image at 0x%lx with RO-X permissions = and size 0x%x\n", + __FUNCTION__, Index, Base, SectionHeader.Misc.VirtualSize)); + NoExecUpdater (Base, SectionHeader.Misc.VirtualSize); + } + + SectionHeaderOffset +=3D sizeof (EFI_IMAGE_SECTION_HEADER); + } + return RETURN_SUCCESS; +} =20 /** If the build is done on cygwin the paths are cygpaths. @@ -83,23 +234,29 @@ PeCoffLoaderRelocateImageExtraAction ( CHAR8 Temp[512]; #endif =20 + if (PcdGetBool(PcdStandaloneMmEnable) =3D=3D TRUE) + { + UpdatePeCoffPermissions (ImageContext, ArmClearMemoryRegionNoExec, + ArmSetMemoryRegionReadOnly); + } + if (ImageContext->PdbPointer) { #ifdef __CC_ARM #if (__ARMCC_VERSION < 500000) // Print out the command for the RVD debugger to load symbols for this= image - DEBUG ((EFI_D_LOAD | EFI_D_INFO, "load /a /ni /np %a &0x%p\n", DeCygwi= nPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Imag= eContext->ImageAddress + ImageContext->SizeOfHeaders))); + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "load /a /ni /np %a &0x%p\n", DeCygwi= nPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Imag= eContext->ImageAddress + ImageContext->SizeOfHeaders))); #else // Print out the command for the DS-5 to load symbols for this image - DEBUG ((EFI_D_LOAD | EFI_D_INFO, "add-symbol-file %a 0x%p\n", DeCygwin= PathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Image= Context->ImageAddress + ImageContext->SizeOfHeaders))); + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "add-symbol-file %a 0x%p\n", DeCygwin= PathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Image= Context->ImageAddress + ImageContext->SizeOfHeaders))); #endif #elif __GNUC__ // This may not work correctly if you generate PE/COFF directlyas then= the Offset would not be required - DEBUG ((EFI_D_LOAD | EFI_D_INFO, "add-symbol-file %a 0x%p\n", DeCygwin= PathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Image= Context->ImageAddress + ImageContext->SizeOfHeaders))); + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "add-symbol-file %a 0x%p\n", DeCygwin= PathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(Image= Context->ImageAddress + ImageContext->SizeOfHeaders))); #else - DEBUG ((EFI_D_LOAD | EFI_D_INFO, "Loading driver at 0x%11p EntryPoint= =3D0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress, FUNCTION_ENTRY_PO= INT (ImageContext->EntryPoint))); + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Loading driver at 0x%11p EntryPoint= =3D0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress, FUNCTION_ENTRY_PO= INT (ImageContext->EntryPoint))); #endif } else { - DEBUG ((EFI_D_LOAD | EFI_D_INFO, "Loading driver at 0x%11p EntryPoint= =3D0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress, FUNCTION_ENTRY_PO= INT (ImageContext->EntryPoint))); + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Loading driver at 0x%11p EntryPoint= =3D0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress, FUNCTION_ENTRY_PO= INT (ImageContext->EntryPoint))); } } =20 @@ -125,17 +282,23 @@ PeCoffLoaderUnloadImageExtraAction ( CHAR8 Temp[512]; #endif =20 + if (PcdGetBool(PcdStandaloneMmEnable) =3D=3D TRUE) + { + UpdatePeCoffPermissions (ImageContext, ArmSetMemoryRegionNoExec, + ArmClearMemoryRegionReadOnly); + } + if (ImageContext->PdbPointer) { #ifdef __CC_ARM // Print out the command for the RVD debugger to load symbols for this= image - DEBUG ((EFI_D_ERROR, "unload symbols_only %a\n", DeCygwinPathIfNeeded = (ImageContext->PdbPointer, Temp, sizeof (Temp)))); + DEBUG ((DEBUG_ERROR, "unload symbols_only %a\n", DeCygwinPathIfNeeded = (ImageContext->PdbPointer, Temp, sizeof (Temp)))); #elif __GNUC__ // This may not work correctly if you generate PE/COFF directlyas then= the Offset would not be required - DEBUG ((EFI_D_ERROR, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfN= eeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext= ->ImageAddress + ImageContext->SizeOfHeaders))); + DEBUG ((DEBUG_ERROR, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfN= eeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext= ->ImageAddress + ImageContext->SizeOfHeaders))); #else - DEBUG ((EFI_D_ERROR, "Unloading %a\n", ImageContext->PdbPointer)); + DEBUG ((DEBUG_ERROR, "Unloading %a\n", ImageContext->PdbPointer)); #endif } else { - DEBUG ((EFI_D_ERROR, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) I= mageContext->ImageAddress)); + DEBUG ((DEBUG_ERROR, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) I= mageContext->ImageAddress)); } } diff --git a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActio= nLib.inf b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionL= ib.inf index c1f717e5bd..38bf3993ae 100644 --- a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.inf +++ b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.inf @@ -33,7 +33,14 @@ DebugPeCoffExtraActionLib.c =20 [Packages] + ArmPkg/ArmPkg.dec MdePkg/MdePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[FeaturePcd] + gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable =20 [LibraryClasses] + ArmMmuLib DebugLib + PcdLib --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:52 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025834908497.7733189495317; Fri, 6 Apr 2018 07:43:54 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id C098122620E7E; Fri, 6 Apr 2018 07:43:51 -0700 (PDT) Received: from foss.arm.com (foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id 66AB422620E72 for ; Fri, 6 Apr 2018 07:43:51 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 471231529; Fri, 6 Apr 2018 07:43:51 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C45453F587; Fri, 6 Apr 2018 07:43:49 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:21 +0100 Message-Id: <20180406144223.10931-17-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 16/18] BaseTools/AutoGen: Update header file for MM modules. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch corrects the Module Type Header file for Management Mode(MM) as specified in PI v1.6 Specification. Also, it updates parameter for auto generated template functions from EFI_SMM_SYSTEM_TABLE2 to EFI_MM_SYSTEM_TABLE. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- BaseTools/Source/Python/AutoGen/GenC.py | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/BaseTools/Source/Python/AutoGen/GenC.py b/BaseTools/Source/Pyt= hon/AutoGen/GenC.py index 4d9ea1b2a8..8601e4ee70 100644 --- a/BaseTools/Source/Python/AutoGen/GenC.py +++ b/BaseTools/Source/Python/AutoGen/GenC.py @@ -270,7 +270,7 @@ EFI_STATUS EFIAPI ${Function} ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable ); ${END} """) @@ -283,7 +283,7 @@ EFI_STATUS EFIAPI ProcessModuleEntryPointList ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable ) =20 { @@ -297,7 +297,7 @@ EFI_STATUS EFIAPI ProcessModuleEntryPointList ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable ) =20 { @@ -312,7 +312,7 @@ EFI_STATUS EFIAPI ProcessModuleEntryPointList ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable ) =20 { @@ -680,7 +680,7 @@ EFI_STATUS EFIAPI ${Function} ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable );${END} """), } @@ -760,7 +760,7 @@ VOID EFIAPI ProcessLibrary${Type}List ( IN EFI_HANDLE ImageHandle, - IN EFI_SMM_SYSTEM_TABLE2 *MmSystemTable + IN EFI_MM_SYSTEM_TABLE *MmSystemTable ) { ${BEGIN} EFI_STATUS Status; @@ -784,8 +784,8 @@ gModuleTypeHeaderFile =3D { "UEFI_DRIVER" : ["Uefi.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/UefiBootServicesTableLib.h", "Library/UefiDriverEntryPoin= t.h"], "UEFI_APPLICATION" : ["Uefi.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/UefiBootServicesTableLib.h", "Library/UefiApplicationEntr= yPoint.h"], "SMM_CORE" : ["PiDxe.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/UefiDriverEntryPoint.h"], - "MM_STANDALONE" : ["PiSmm.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/SmmDriverStandaloneEntryPoint.h"], - "MM_CORE_STANDALONE" : ["PiSmm.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/SmmCoreStandaloneEntryPoint.h"], + "MM_STANDALONE" : ["PiMm.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/MmDriverStandaloneEntryPoint.h"], + "MM_CORE_STANDALONE": ["PiMm.h", "Library/BaseLib.h", "Library/Debu= gLib.h", "Library/MmCoreStandaloneEntryPoint.h"], "USER_DEFINED" : [gBasicHeaderFile] } =20 --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:52 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1523025839046193.31677511004443; Fri, 6 Apr 2018 07:43:59 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id E87D422620E81; Fri, 6 Apr 2018 07:43:57 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id C199922620E79 for ; Fri, 6 Apr 2018 07:43:56 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A20351529; Fri, 6 Apr 2018 07:43:56 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2AB613F587; Fri, 6 Apr 2018 07:43:55 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:22 +0100 Message-Id: <20180406144223.10931-18-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 17/18] StandaloneMmPkg: Add application to test MM communication protocol. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch adds a simple application that uses the MM communication protocol to pass a copy of the UEFI system table to the MM environment in the secure world. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- .../Application/MmCommTestApp/MmCommTest.c | 81 ++++++++++++++++++= ++++ .../Application/MmCommTestApp/MmCommTest.h | 37 ++++++++++ .../Application/MmCommTestApp/MmCommTest.inf | 57 +++++++++++++++ 3 files changed, 175 insertions(+) create mode 100644 StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.c create mode 100644 StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.h create mode 100644 StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.inf diff --git a/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.c b/Stand= aloneMmPkg/Application/MmCommTestApp/MmCommTest.c new file mode 100644 index 0000000000..efbafdde62 --- /dev/null +++ b/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.c @@ -0,0 +1,81 @@ +/** @file + This sample application demos how to communicate + with secure partition using MM communication protocol + + Copyright (c) 2006 - 2008, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ + +#include +#include +#include +#include +#include +#include +#include + +#include "MmCommTest.h" + +#include + +#include + +EFI_MM_COMMUNICATION_PROTOCOL *mMmCommunication =3D NULL; + +EFI_STATUS +MmIplNotifyCommTest ( + VOID + ) +{ + EFI_MM_COMMUNICATE_TEST MmCommTest; + UINTN Size; + + DEBUG ((DEBUG_INFO, "MmIplNotifyCommTest\n")); + + CopyGuid (&MmCommTest.HeaderGuid, &gMmCommTestGuid); + CopyMem (&MmCommTest.Data.EfiSystemTable, gST, sizeof (EFI_SYSTEM_TABLE)= ); + MmCommTest.MessageLength =3D sizeof (EFI_MM_COMMUNICATE_TEST_DATA); + + // + // Generate the MM_COMMUNICATE SMC and return the result + // + Size =3D sizeof (MmCommTest); + return mMmCommunication->Communicate (NULL, &MmCommTest, &Size); +} + +/** + The user Entry Point for Application. The user code starts with this fun= ction + as the real entry point for the application. + + @param[in] ImageHandle The firmware allocated handle for the EFI imag= e. + @param[in] SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The entry point is executed successfully. + @retval other Some error occurs when executing this entry po= int. + +**/ +EFI_STATUS +EFIAPI +MmCommTestEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + + Status =3D gBS->LocateProtocol (&gEfiMmCommunicationProtocolGuid, NULL, = (VOID **) &mMmCommunication); + if (EFI_ERROR (Status)) { + return Status; + } + + return MmIplNotifyCommTest (); +} diff --git a/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.h b/Stand= aloneMmPkg/Application/MmCommTestApp/MmCommTest.h new file mode 100644 index 0000000000..8e8305a060 --- /dev/null +++ b/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.h @@ -0,0 +1,37 @@ +/** @file + GUIDs for MM Event. + +Copyright (c) 2015, Intel Corporation. All rights reserved.
+Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ +This program and the accompanying materials are licensed and made availabl= e under +the terms and conditions of the BSD License that accompanies this distribu= tion. +The full text of the license may be found at +http://opensource.org/licenses/bsd-license.php. + +THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLI= ED. + +**/ + +#ifndef __MM_COMM_TEST_H__ +#define __MM_COMM_TEST_H__ + +#define MM_COMM_TEST_GUID \ + { 0xa37721e4, 0x8c0b, 0x4bca, { 0xb5, 0xe8, 0xe9, 0x2, 0xa0, 0x25, 0x51,= 0x4e }} + +extern EFI_GUID gMmCommTestGuid; + +#pragma pack(1) +typedef struct { + EFI_SYSTEM_TABLE EfiSystemTable; +} EFI_MM_COMMUNICATE_TEST_DATA; + +typedef struct { + EFI_GUID HeaderGuid; + UINTN MessageLength; + EFI_MM_COMMUNICATE_TEST_DATA Data; +} EFI_MM_COMMUNICATE_TEST; +#pragma pack() + +#endif diff --git a/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.inf b/Sta= ndaloneMmPkg/Application/MmCommTestApp/MmCommTest.inf new file mode 100644 index 0000000000..1828cd7e13 --- /dev/null +++ b/StandaloneMmPkg/Application/MmCommTestApp/MmCommTest.inf @@ -0,0 +1,57 @@ +## @file +# Sample UEFI Application Reference EDKII Module. +# +# This is a sample shell application that will print "UEFI firmware versi= on Info!" to the +# UEFI Console. +# +# It demos how to communicate with secure partition using MM +# communication protocol. +# +# Copyright (c) 2008 - 2014, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2018, ARM Limited. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may b= e found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D MmCommTest + FILE_GUID =3D 6987936E-ED34-44db-AE97-1FA5E4ED2116 + MODULE_TYPE =3D UEFI_APPLICATION + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D MmCommTestEntryPoint + +[Sources] + MmCommTest.c + +[Packages] + ArmPkg/ArmPkg.dec + ArmPlatformPkg/ArmPlatformPkg.dec + MdePkg/MdePkg.dec + StandaloneMmPkg/StandaloneMmPkg.dec + +[LibraryClasses] + ArmSmcLib + BaseMemoryLib + DebugLib + PrintLib + UefiApplicationEntryPoint + UefiBootServicesTableLib + UefiLib + +[FeaturePcd] + +[Pcd] + +[Guids] + gMmCommTestGuid + +[Protocols] + gEfiMmCommunicationProtocolGuid --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Mon May 6 19:29:52 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 152302584312384.77920286521612; Fri, 6 Apr 2018 07:44:03 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 1AD8022620E85; Fri, 6 Apr 2018 07:44:02 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by ml01.01.org (Postfix) with ESMTP id B36A722620E7D for ; Fri, 6 Apr 2018 07:44:00 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 94E241529; Fri, 6 Apr 2018 07:44:00 -0700 (PDT) Received: from u201365.usa.Arm.com (bc-c3-3-14.eu.iaas.arm.com [10.6.43.238]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1E03C3F587; Fri, 6 Apr 2018 07:43:58 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=217.140.101.70; helo=foss.arm.com; envelope-from=supreeth.venkatesh@arm.com; receiver=edk2-devel@lists.01.org From: Supreeth Venkatesh To: edk2-devel@lists.01.org Date: Fri, 6 Apr 2018 15:42:23 +0100 Message-Id: <20180406144223.10931-19-supreeth.venkatesh@arm.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180406144223.10931-1-supreeth.venkatesh@arm.com> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> Subject: [edk2] [PATCH v1 18/18] StandaloneMmPkg: Add handler to handle event received from Normal World. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ard.biesheuvel@linaro.org, leif.lindholm@linaro.org, jiewen.yao@intel.com, liming.gao@intel.com, michael.d.kinney@intel.com MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" This patch adds a simple handler to handle event received from "mmcommtest" shell application. It prints the version information from the copy of the UEFI system table received from normal world. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Achin Gupta Signed-off-by: Supreeth Venkatesh --- StandaloneMmPkg/Core/StandaloneMmCore.c | 39 +++++++++++++++++++++++++++= ++++ StandaloneMmPkg/Core/StandaloneMmCore.inf | 2 ++ StandaloneMmPkg/StandaloneMmPkg.dec | 2 ++ 3 files changed, 43 insertions(+) diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.c b/StandaloneMmPkg/Core= /StandaloneMmCore.c index 0bb99b9710..4aaecdb2ea 100644 --- a/StandaloneMmPkg/Core/StandaloneMmCore.c +++ b/StandaloneMmPkg/Core/StandaloneMmCore.c @@ -95,6 +95,15 @@ EFI_MM_SYSTEM_TABLE gMmCoreMmst =3D { // BOOLEAN mInLegacyBoot =3D FALSE; =20 +EFI_STATUS +EFIAPI +MmCommTestHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ); + // // Table of MMI Handlers that are registered by the MM Core when it is ini= tialized // @@ -106,6 +115,7 @@ MM_CORE_MMI_HANDLERS mMmCoreMmiHandlers[] =3D { { MmLegacyBootHandler, &gEfiEventLegacyBootGuid, NULL, FAL= SE }, { MmExitBootServiceHandler,&gEfiEventExitBootServicesGuid, NULL, FAL= SE }, { MmReadyToBootHandler, &gEfiEventReadyToBootGuid, NULL, FAL= SE }, + { MmCommTestHandler, &gMmCommTestGuid, NULL, TRU= E }, { NULL, NULL, NULL, FAL= SE }, }; =20 @@ -379,7 +389,36 @@ MmEndOfDxeHandler ( return Status; } =20 +/** + This function is the main entry point for communicate-based callback. + + @param DispatchHandle The unique handle assigned to this handler by Mm= iHandlerRegister(). + @param Context Points to an optional handler context which was = specified when the handler was registered. + @param CommBuffer A pointer to a collection of data in memory that= will + be conveyed from a non-MM environment into an MM= environment. + @param CommBufferSize The size of the CommBuffer. =20 + @return Status Code +**/ +EFI_STATUS +EFIAPI +MmCommTestHandler ( + IN EFI_HANDLE DispatchHandle, + IN CONST VOID *Context, OPTIONAL + IN OUT VOID *CommBuffer, OPTIONAL + IN OUT UINTN *CommBufferSize OPTIONAL + ) +{ + EFI_SYSTEM_TABLE SystemTable; + + DEBUG ((DEBUG_INFO, "MmUefiInfoHandler\n")); + + CopyMem (&SystemTable, CommBuffer, sizeof(EFI_SYSTEM_TABLE)); + + DEBUG ((DEBUG_INFO, " UEFI Firmware Version - 0x%x\n", SystemTable.Firm= wareRevision)); + + return EFI_SUCCESS; +} =20 /** The main entry point to MM Foundation. diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.inf b/StandaloneMmPkg/Co= re/StandaloneMmCore.inf index c5eaa14ba3..b35870732c 100644 --- a/StandaloneMmPkg/Core/StandaloneMmCore.inf +++ b/StandaloneMmPkg/Core/StandaloneMmCore.inf @@ -78,3 +78,5 @@ gEfiEventLegacyBootGuid gEfiEventExitBootServicesGuid gEfiEventReadyToBootGuid + gMmCommTestGuid + diff --git a/StandaloneMmPkg/StandaloneMmPkg.dec b/StandaloneMmPkg/Standalo= neMmPkg.dec index 36521bb039..d88be3ce5e 100644 --- a/StandaloneMmPkg/StandaloneMmPkg.dec +++ b/StandaloneMmPkg/StandaloneMmPkg.dec @@ -39,6 +39,8 @@ gEfiStandaloneMmNonSecureBufferGuid =3D { 0xf00497e3, 0xbfa2, 0x41a= 1, { 0x9d, 0x29, 0x54, 0xc2, 0xe9, 0x37, 0x21, 0xc5 }} gEfiArmTfCpuDriverEpDescriptorGuid =3D { 0x6ecbd5a1, 0xc0f8, 0x470= 2, { 0x83, 0x01, 0x4f, 0xc2, 0xc5, 0x47, 0x0a, 0x51 }} =20 + gMmCommTestGuid =3D { 0xa37721e4, 0x8c0b, 0x4bc= a, { 0xb5, 0xe8, 0xe9, 0x2, 0xa0, 0x25, 0x51, 0x4e }} + [PcdsFeatureFlag] gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable|FALSE|BOOLEAN|0x000= 00001 =20 --=20 2.16.2 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel