From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c09::242; helo=mail-wm0-x242.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wm0-x242.google.com (mail-wm0-x242.google.com [IPv6:2a00:1450:400c:c09::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id A44612112A2B0 for ; Wed, 12 Sep 2018 06:22:42 -0700 (PDT) Received: by mail-wm0-x242.google.com with SMTP id q8-v6so2409392wmq.4 for ; Wed, 12 Sep 2018 06:22:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=3/BVtfkcORKSeUT5LfxPSJO1t3YRhbeLzxUb+6ZOqtc=; b=LUfwVCEurhUOegZmoQBhjf+WF6F1tOdO1QQ0RIZmk3XL4HjUoybnPI7A2gKwN5IVb+ X6xvn5dTkDZTTrA771wmY7bDeI+ugoWocqm1h9vEAhftghicx/L/I3AIKTURx4xd0JK6 GrItXf5o//QbvcRhepm6A+5dkyromGRyap60o= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=3/BVtfkcORKSeUT5LfxPSJO1t3YRhbeLzxUb+6ZOqtc=; b=iY/vVANEQczkIB+4R9rdmngl5W4Po0Xc8iy5YPMYNpl064WEFn6TK79aR/n1adq7B9 awVQ5pqMfm/shTBAEvh/EowOUmi3+6hGP+mS+RXOtPFlhxbuKLWev2D4UQUZhXO/jl/G wm3xgXZGxK5y4p9BLdGzpgs7Josmi3jmI9PHRimn3olugtdPWwLiL9HD5A+B72Ou7Wiw 8Fatz6+at5kfUu6emyLXMscXbhGnt76s4pEUFxwmsWt1fV4xONjnmu/pjs5H/2Eu8SMw PFhPQ0WO+oftB2WKyk3h9nFnPlqo56ipS+EQr5F5QruWSR5IGwQBV/0R5zFLOcqhyjd0 v+xw== X-Gm-Message-State: APzg51BaKKs2BWcx+iuoWcRcDLBBBRGODL1aY3vsGB5ZksfaO5BhHNAK BB3gbp3hnZG9yuEN13fAYMPewrb3BHrZhQ== X-Google-Smtp-Source: ANB0VdahIgi9NZXn5Wuh8NakMzHERDDhj5dwg5mg9P41e9Wf8qBqr9mbh9971xGYx8Z5ss2mNLHnpA== X-Received: by 2002:a1c:a941:: with SMTP id s62-v6mr1578117wme.76.1536758560737; Wed, 12 Sep 2018 06:22:40 -0700 (PDT) Received: from mba13.kuq.prv ([2001:a62:605:90f4:1f3:d690:1764:36ca]) by smtp.gmail.com with ESMTPSA id e133-v6sm1985129wma.33.2018.09.12.06.22.39 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 12 Sep 2018 06:22:39 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org Cc: agraf@suse.de, Ard Biesheuvel , Zimmer Vincent , Brian Richardson , Michael D Kinney , Andrew Fish , Laszlo Ersek , Leif Lindholm , Star Zeng , Eric Dong , Ruiyu Ni Date: Wed, 12 Sep 2018 15:21:48 +0200 Message-Id: <20180912132151.4258-2-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180912132151.4258-1-ard.biesheuvel@linaro.org> References: <20180912132151.4258-1-ard.biesheuvel@linaro.org> Subject: [PATCH 1/4] MdeModulePkg: introduce PE/COFF image emulator protocol X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Sep 2018 13:22:43 -0000 Introduce a protocol that can be invoked by the image loading services to execute foreign architecture PE/COFF images via an emulator. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Ard Biesheuvel --- MdeModulePkg/Include/Protocol/PeCoffImageEmulator.h | 51 ++++++++++++++++++++ MdeModulePkg/MdeModulePkg.dec | 4 ++ 2 files changed, 55 insertions(+) diff --git a/MdeModulePkg/Include/Protocol/PeCoffImageEmulator.h b/MdeModulePkg/Include/Protocol/PeCoffImageEmulator.h new file mode 100644 index 000000000000..3391e68557b9 --- /dev/null +++ b/MdeModulePkg/Include/Protocol/PeCoffImageEmulator.h @@ -0,0 +1,51 @@ +/** @file + Copyright (c) 2018, Linaro, Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BSD License + which accompanies this distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. + +**/ + +#ifndef __PECOFF_IMAGE_EMULATOR_PROTOCOL_GUID_H__ +#define __PECOFF_IMAGE_EMULATOR_PROTOCOL_GUID_H__ + +#define EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL_GUID \ + { 0x96F46153, 0x97A7, 0x4793, { 0xAC, 0xC1, 0xFA, 0x19, 0xBF, 0x78, 0xEA, 0x97 } } + +typedef struct _EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL; + +typedef +BOOLEAN +(EFIAPI *IS_PECOFF_IMAGE_SUPPORTED) ( + IN EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL *This, + IN UINT16 MachineType, + IN UINT16 ImageType + ); + +typedef +EFI_STATUS +(EFIAPI *REGISTER_PECOFF_IMAGE) ( + IN EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL *This, + IN EFI_PHYSICAL_ADDRESS ImageBase, + IN UINT64 ImageSize + ); + +typedef +EFI_STATUS +(EFIAPI *UNREGISTER_PECOFF_IMAGE) ( + IN EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL *This, + IN EFI_PHYSICAL_ADDRESS ImageBase + ); + +typedef struct _EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL { + IS_PECOFF_IMAGE_SUPPORTED IsImageSupported; + REGISTER_PECOFF_IMAGE RegisterImage; + UNREGISTER_PECOFF_IMAGE UnregisterImage; +} EDKII_PECOFF_IMAGE_EMULATOR_PROTOCOL; + +#endif diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 6a6d9660edc2..be307329f901 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -617,6 +617,10 @@ ## Include/Protocol/AtaAtapiPolicy.h gEdkiiAtaAtapiPolicyProtocolGuid = { 0xe59cd769, 0x5083, 0x4f26,{ 0x90, 0x94, 0x6c, 0x91, 0x9f, 0x91, 0x6c, 0x4e } } + + ## Include/Protocol/PeCoffImageEmulator.h + gEdkiiPeCoffImageEmulatorProtocolGuid = { 0x96f46153, 0x97a7, 0x4793, { 0xac, 0xc1, 0xfa, 0x19, 0xbf, 0x78, 0xea, 0x97 } } + # # [Error.gEfiMdeModulePkgTokenSpaceGuid] # 0x80000001 | Invalid value provided. -- 2.17.1