From nobody Sun May 5 10:26:22 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+82393+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=pass(p=none dis=none) header.from=groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1634674267874195.76587974528252; Tue, 19 Oct 2021 13:11:07 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id Fvu7YY1788612xk7Qix5sAaf; Tue, 19 Oct 2021 13:11:07 -0700 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com [40.107.237.45]) by mx.groups.io with SMTP id smtpd.web09.15570.1634674266480705153 for ; Tue, 19 Oct 2021 13:11:07 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JQ0R5atiXXrfSyDivtP3s4UVrvY4hUeKzGB0ukFjrJ41E1iRmCeI5Pi0tqdvJh9Tw5PzvdiROQHCfiFdy4EdZN2+G5tOD9tYV2e7Z7NhGvUcPVrg0YMOTIJKJXEvTAOrXAV1QS3Qqv8nDpCJm7nyEDeOV86wSeIuWuFTVxGSl5ArJ4b+1UvJ+z2phZyfkBAAGTHpXl45ceCRqqdH+vxspyEsKWCCHNLw/BH0sKAGV1MylhaHpIW1NaqZtpM5ADt3EJCLbS31S+eRW0K5ZxqD2RLZOenb/zaAHCp+2tSTUNbs619c+y64CIW7XH0PRnyMj8Uz0wjyBZtiCfzG/p3J7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9ZwTwnqiB15Yo+MxDXl5Ulo5qmUeRB049eonlaGj/ZU=; b=EF6+ae55G4TGaf/OFWwtD6YtK+2nin3I2R//lv22bKOoABomIjDp7qa3lDRN3OrFkpfadyzsvMY97/c2ELlVips72jqhxHvwbRXs2QZeFkYXbBIvG2zDbGnrk2NHyW6Yp0C5JusSS+jcdQrag+PK+whdrGgapu1nfyg1vslOdrNcZBpvRFCeAgRg0wI6iRvAkGB3vc6B20GZD0r7vVtN3gtSXP5x9lFa0lvgJTJCFMxLwxPs5QiVkduCxhLGU2Qw/JSMpLNumMbHKjIYniOy2Ifd/NlG+a3c2JQU/mAKOZnpYDiBG2PnvK6dmXVDShOFgchCvR5GDg/+b5SSn0JGMg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.112.35) smtp.rcpttodomain=byosoft.com.cn smtp.mailfrom=nvidia.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none X-Received: from DM3PR03CA0012.namprd03.prod.outlook.com (2603:10b6:0:50::22) by CY4PR1201MB0053.namprd12.prod.outlook.com (2603:10b6:910:23::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.17; Tue, 19 Oct 2021 20:11:04 +0000 X-Received: from DM6NAM11FT040.eop-nam11.prod.protection.outlook.com (2603:10b6:0:50:cafe::ce) by DM3PR03CA0012.outlook.office365.com (2603:10b6:0:50::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.15 via Frontend Transport; Tue, 19 Oct 2021 20:11:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.112.35) smtp.mailfrom=nvidia.com; byosoft.com.cn; dkim=none (message not signed) header.d=none;byosoft.com.cn; dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+82393+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.112.35 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.112.35; helo=mail.nvidia.com; X-Received: from mail.nvidia.com (216.228.112.35) by DM6NAM11FT040.mail.protection.outlook.com (10.13.173.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.4608.15 via Frontend Transport; Tue, 19 Oct 2021 20:11:03 +0000 X-Received: from HQMAIL101.nvidia.com (172.20.187.10) by HQMAIL111.nvidia.com (172.20.187.18) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Tue, 19 Oct 2021 20:11:02 +0000 X-Received: from localhost.localdomain (172.20.187.5) by mail.nvidia.com (172.20.187.10) with Microsoft SMTP Server id 15.0.1497.18 via Frontend Transport; Tue, 19 Oct 2021 20:11:02 +0000 From: "Bob Morgan via groups.io" To: CC: Bob Morgan , Jian J Wang , "Liming Gao" , Guomin Jiang Subject: [edk2-devel] [PATCH] MdeModulePkg/DxeCapsuleLibFmp: Add runtime SetImage support Date: Tue, 19 Oct 2021 14:10:55 -0600 Message-ID: X-NVConfidentiality: public MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 83581fc3-5a35-4b13-70a1-08d9933c9398 X-MS-TrafficTypeDiagnostic: CY4PR1201MB0053: X-Microsoft-Antispam-PRVS: X-MS-Exchange-Transport-Forked: True X-MS-Oob-TLC-OOBClassifiers: OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Oct 2021 20:11:03.2128 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 83581fc3-5a35-4b13-70a1-08d9933c9398 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.112.35];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT040.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1201MB0053 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,bobm@nvidia.com X-Gm-Message-State: nbFgQWmgus4HAD7NIvg8yQ8Dx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1634674267; bh=r+lQB9npTVyziPe2gLEDJyeNc8Jue2b0PMUmNoZZo08=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=lVbJjChZBlVGL+sk+97yFzbX65hbCTdkaFslMpRLy0CNybcAMQ1xf3MUN7cj2ha9cP5 9pbdvgevaxvZQkt05qlCGqmsRO56WgE0MpOeYXy8ivoIHkRB44xM/wyJnE1ANNvCk9lCf mmNhe2t4E+8vA1R188iEn4nrPZBba3NzxAY= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1634674268898100002 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Adds optional support for processing FMP capusle images after ExitBootServices() if the ImageTypeIdGuid is mentioned in the new PcdRuntimeFmpCapsuleImageTypeIdGuid list. Cc: Jian J Wang Cc: Liming Gao Cc: Guomin Jiang Signed-off-by: Bob Morgan --- .../Library/DxeCapsuleLibFmp/DxeCapsuleLib.c | 81 +++++++++--- .../DxeCapsuleLibFmp/DxeCapsuleRuntime.c | 119 ++++++++++++++++++ .../DxeCapsuleLibFmp/DxeRuntimeCapsuleLib.inf | 4 + MdeModulePkg/MdeModulePkg.dec | 7 +- 4 files changed, 192 insertions(+), 19 deletions(-) diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.c b/MdeMod= ulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.c index 90942135d7..0000f91c6a 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.c +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.c @@ -10,6 +10,7 @@ ValidateFmpCapsule(), and DisplayCapsuleImage() receives untrusted input= and performs basic validation. =20 + Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -41,6 +42,11 @@ #include #include =20 +BOOLEAN (EFIAPI *mLibAtRuntimeFunction) (VOID) =3D NULL; +EFI_FIRMWARE_MANAGEMENT_PROTOCOL *mRuntimeFmp =3D NULL; +VOID **mRuntimeFmpProtocolArray =3D NULL; +EFI_GUID *mRuntimeFmpGuidArray =3D NULL; + EFI_SYSTEM_RESOURCE_TABLE *mEsrtTable =3D NULL; BOOLEAN mIsVirtualAddrConverted =3D FALSE; =20 @@ -551,6 +557,11 @@ DumpAllFmpInfo ( UINT32 PackageVersion; CHAR16 *PackageVersionName; =20 + // Dump not supported at runtime. + if ((mLibAtRuntimeFunction !=3D NULL) && mLibAtRuntimeFunction ()) { + return; + } + Status =3D gBS->LocateHandleBuffer ( ByProtocol, &gEfiFirmwareManagementProtocolGuid, @@ -906,25 +917,35 @@ SetFmpImageData ( CHAR16 *AbortReason; EFI_FIRMWARE_MANAGEMENT_UPDATE_IMAGE_PROGRESS ProgressCallback; =20 - Status =3D gBS->HandleProtocol( - Handle, - &gEfiFirmwareManagementProtocolGuid, - (VOID **)&Fmp - ); - if (EFI_ERROR(Status)) { - return Status; - } + // If not using optional runtime support, get FMP protocol for given Han= dle. + // Otherwise, use the one saved by ProcessFmpCapsuleImage(). + if ((mLibAtRuntimeFunction =3D=3D NULL) || !mLibAtRuntimeFunction ()) { + Status =3D gBS->HandleProtocol( + Handle, + &gEfiFirmwareManagementProtocolGuid, + (VOID **)&Fmp + ); + if (EFI_ERROR(Status)) { + return Status; + } =20 - // - // Lookup Firmware Management Progress Protocol before SetImage() is cal= led - // This is an optional protocol that may not be present on Handle. - // - Status =3D gBS->HandleProtocol ( - Handle, - &gEdkiiFirmwareManagementProgressProtocolGuid, - (VOID **)&mFmpProgress - ); - if (EFI_ERROR (Status)) { + // + // Lookup Firmware Management Progress Protocol before SetImage() is c= alled + // This is an optional protocol that may not be present on Handle. + // + Status =3D gBS->HandleProtocol ( + Handle, + &gEdkiiFirmwareManagementProgressProtocolGuid, + (VOID **)&mFmpProgress + ); + if (EFI_ERROR (Status)) { + mFmpProgress =3D NULL; + } + } else { + if (mRuntimeFmp =3D=3D NULL) { + return EFI_UNSUPPORTED; + } + Fmp =3D mRuntimeFmp; mFmpProgress =3D NULL; } =20 @@ -1259,6 +1280,30 @@ ProcessFmpCapsuleImage ( UpdateHardwareInstance =3D ImageHeader->UpdateHardwareInstance; } =20 + // Optional runtime FMP SetImage processing sequence + if ((mLibAtRuntimeFunction !=3D NULL) && mLibAtRuntimeFunction () && + (mRuntimeFmpProtocolArray !=3D NULL)) { + mRuntimeFmp =3D NULL; + Index2 =3D 0; + while (mRuntimeFmpProtocolArray[Index2] !=3D NULL) { + if (CompareGuid (&ImageHeader->UpdateImageTypeId, + &mRuntimeFmpGuidArray[Index2])) { + mRuntimeFmp =3D (EFI_FIRMWARE_MANAGEMENT_PROTOCOL *) + mRuntimeFmpProtocolArray[Index2]; + break; + } + Index2++; + } + + Status =3D SetFmpImageData (NULL, + ImageHeader, + Index - FmpCapsuleHeader->EmbeddedDriverCo= unt); + if (EFI_ERROR (Status)) { + return Status; + } + continue; + } + Status =3D GetFmpHandleBufferByType ( &ImageHeader->UpdateImageTypeId, UpdateHardwareInstance, diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleRuntime.c b/Md= eModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleRuntime.c index f94044a409..6feb6dab79 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleRuntime.c +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleRuntime.c @@ -1,6 +1,7 @@ /** @file Capsule library runtime support. =20 + Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
Copyright (c) 2016 - 2017, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -19,7 +20,11 @@ #include #include #include +#include =20 +extern BOOLEAN (EFIAPI *mLibAtRuntimeFunction) (VOID); +extern VOID **mRuntimeFmpProtocolArray; +extern EFI_GUID *mRuntimeFmpGuidArray; extern EFI_SYSTEM_RESOURCE_TABLE *mEsrtTable; extern BOOLEAN mIsVirtualAddrConverted; EFI_EVENT mDxeRuntimeCapsuleLibVirtualAddressChangeEvent = =3D NULL; @@ -40,9 +45,121 @@ DxeCapsuleLibVirtualAddressChangeEvent ( ) { gRT->ConvertPointer (EFI_OPTIONAL_PTR, (VOID **)&mEsrtTable); + + if (mRuntimeFmpProtocolArray !=3D NULL) { + VOID **FmpArrayEntry; + + FmpArrayEntry =3D mRuntimeFmpProtocolArray; + while (*FmpArrayEntry !=3D NULL) { + EfiConvertPointer (0x0, (VOID **) FmpArrayEntry); + FmpArrayEntry++; + } + EfiConvertPointer (0x0, (VOID **) &mRuntimeFmpProtocolArray); + } + if (mRuntimeFmpGuidArray !=3D NULL) { + EfiConvertPointer (0x0, (VOID **) &mRuntimeFmpGuidArray); + } + if (mLibAtRuntimeFunction !=3D NULL ) { + EfiConvertPointer (0x0, (VOID **) &mLibAtRuntimeFunction); + } + mIsVirtualAddrConverted =3D TRUE; } =20 +/** + Initialize optional runtime FMP arrays to support FMP SetImage processing + after ExitBootServices() is called. + + The ImageTypeIdGuids of runtime-capable FMP protocol drivers are extract= ed + from the PcdRuntimeFmpCapsuleImageTypeIdGuid list and their protocol + structure pointers are saved in the mRuntimeFmpProtocolArray for use dur= ing + UpdateCapsule() processing. UpdateHardwareInstance is not supported. + +**/ +STATIC +VOID +EFIAPI +InitializeRuntimeFmpArrays ( + VOID + ) +{ + EFI_GUID *Guid; + UINTN NumHandles; + EFI_HANDLE *HandleBuffer; + EFI_STATUS Status; + UINTN Count; + UINTN Index; + UINTN FmpArrayIndex; + + EFI_STATUS + GetFmpHandleBufferByType ( + IN EFI_GUID *UpdateImageTypeId, + IN UINT64 UpdateHardwareInstance, + OUT UINTN *NoHandles, OPTIONAL + OUT EFI_HANDLE **HandleBuf, OPTIONAL + OUT BOOLEAN **ResetRequiredBuf OPTIONAL + ); + + Count =3D PcdGetSize (PcdRuntimeFmpCapsuleImageTypeIdGuid) / sizeof (GUI= D); + if (Count =3D=3D 0) { + return; + } + + // mRuntimeFmpProtocolArray is a NULL-terminated list of FMP protocol po= inters + mRuntimeFmpProtocolArray =3D (VOID **) + AllocateRuntimeZeroPool ((Count + 1) * sizeof (VOID *)); + if (mRuntimeFmpProtocolArray =3D=3D NULL) { + DEBUG ((DEBUG_ERROR, "Error allocating mRuntimeFmpProtocolArray\n")); + return; + } + mRuntimeFmpGuidArray =3D (EFI_GUID *) + AllocateRuntimeZeroPool (Count * sizeof (EFI_GUID)); + if (mRuntimeFmpGuidArray =3D=3D NULL) { + DEBUG ((DEBUG_ERROR, "Error allocating mRuntimeFmpGuidArray")); + FreePool (mRuntimeFmpProtocolArray); + return; + } + + // For each runtime ImageTypeIdGuid in the PCD, save its GUID and FMP pr= otocol + FmpArrayIndex =3D 0; + Guid =3D PcdGetPtr (PcdRuntimeFmpCapsuleImageTypeIdGuid); + for (Index =3D 0; Index < Count; Index++, Guid++) { + mRuntimeFmpGuidArray[FmpArrayIndex] =3D *Guid; + HandleBuffer =3D NULL; + Status =3D GetFmpHandleBufferByType (Guid, + 0, + &NumHandles, + &HandleBuffer, + NULL); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, + "Error finding FMP handle for runtime ImageTypeIdGuid=3D%g: = %r\n", + Guid, Status)); + continue; + } + + if (NumHandles > 1) { + DEBUG ((DEBUG_ERROR, + "FMP runtime ImageTypeIdGuid=3D%g returned %u handles, only = 1 supported\n", + Guid, NumHandles)); + } + Status =3D gBS->HandleProtocol (HandleBuffer[0], + &gEfiFirmwareManagementProtocolGuid, + &mRuntimeFmpProtocolArray[FmpArrayIndex]= ); + FreePool (HandleBuffer); + if (EFI_ERROR(Status)) { + DEBUG ((DEBUG_ERROR, + "Error getting FMP protocol for runtime ImageTypeIdGuid=3D%g= : %r\n", + Guid, Status)); + continue; + } + + FmpArrayIndex++; + } + + mLibAtRuntimeFunction =3D EfiAtRuntime; +} + /** Notify function for event group EFI_EVENT_GROUP_READY_TO_BOOT. =20 @@ -93,6 +210,8 @@ DxeCapsuleLibReadyToBootEventNotify ( // mEsrtTable->FwResourceCountMax =3D mEsrtTable->FwResourceCount; } + + InitializeRuntimeFmpArrays (); } =20 /** diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeRuntimeCapsuleLib.inf= b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeRuntimeCapsuleLib.inf index bf56f4623f..7b3f5e04f8 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeRuntimeCapsuleLib.inf +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeRuntimeCapsuleLib.inf @@ -49,6 +49,7 @@ PrintLib HobLib BmpSupportLib + PcdLib =20 =20 [Protocols] @@ -70,5 +71,8 @@ gEfiEventVirtualAddressChangeGuid ## CONSUMES ## Event gEdkiiCapsuleOnDiskNameGuid ## SOMETIMES_CONSUMES ## GUID =20 +[Pcd] + gEfiMdeModulePkgTokenSpaceGuid.PcdRuntimeFmpCapsuleImageTypeIdGuid + [Depex] gEfiVariableWriteArchProtocolGuid diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 133e04ee86..869aa892f7 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -3,7 +3,7 @@ # It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and libr= ary classes) # and libraries instances, which are used for those modules. # -# Copyright (c) 2019, NVIDIA CORPORATION. All rights reserved. +# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
# Copyright (c) 2007 - 2021, Intel Corporation. All rights reserved.
# Copyright (c) 2016, Linaro Ltd. All rights reserved.
# (C) Copyright 2016 - 2019 Hewlett Packard Enterprise Development LP
@@ -2020,6 +2020,11 @@ # @Prompt Capsule On Disk Temp Relocation file name in PEI phase gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName|L"Cod.tmp"|VOID*= |0x30001048 =20 + ## This PCD holds a list of GUIDs for the ImageTypeId to indicate the + # FMP is runtime capable. + # @Prompt A list of runtime-capable FMP ImageTypeId GUIDs + gEfiMdeModulePkgTokenSpaceGuid.PcdRuntimeFmpCapsuleImageTypeIdGuid|{0x0}= |VOID*|0x30001049 + ## This PCD hold a list GUIDs for the ImageTypeId to indicate the # FMP capsule is a system FMP. # @Prompt A list of system FMP ImageTypeId GUIDs --=20 2.17.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#82393): https://edk2.groups.io/g/devel/message/82393 Mute This Topic: https://groups.io/mt/86449582/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-