From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR04-DB3-obe.outbound.protection.outlook.com (EUR04-DB3-obe.outbound.protection.outlook.com [40.107.6.62]) by mx.groups.io with SMTP id smtpd.web12.13529.1609766594354014509 for ; Mon, 04 Jan 2021 05:23:14 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=P0QwzHNd; spf=pass (domain: arm.com, ip: 40.107.6.62, mailfrom: sami.mujawar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2f6DRLylhmZE+dAxSl2IedP98NGPsB39lX23PInhyXQ=; b=P0QwzHNdkmEaDmeetnKnd7tkWxdueQSc/7bT4j+RLOqwCxrFZBUzWxTMihQYz2/1mM2dmbe99Igcm8YADBhk+e7ZWFfPc9nCSxBLYolkvVEW1jnkUpFRO9b4UMmZJOIYSJ67W+gWS4Uk+bbQD0KHHAueydfUMM1iXf+TBDhyBMg= Received: from DB6PR0301CA0062.eurprd03.prod.outlook.com (2603:10a6:4:54::30) by DB6PR0802MB2454.eurprd08.prod.outlook.com (2603:10a6:4:9f::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3721.20; Mon, 4 Jan 2021 13:23:10 +0000 Received: from DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:54:cafe::7f) by DB6PR0301CA0062.outlook.office365.com (2603:10a6:4:54::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3721.20 via Frontend Transport; Mon, 4 Jan 2021 13:23:10 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT031.mail.protection.outlook.com (10.152.20.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3721.21 via Frontend Transport; Mon, 4 Jan 2021 13:23:10 +0000 Received: ("Tessian outbound 76bd5a04122f:v71"); Mon, 04 Jan 2021 13:23:10 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: d4464e4cfd99125a X-CR-MTA-TID: 64aa7808 Received: from 7970b535f8cb.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id CAD3BC89-8A61-4DA3-A0EB-08AF887A1E7A.1; Mon, 04 Jan 2021 13:22:46 +0000 Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 7970b535f8cb.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 04 Jan 2021 13:22:46 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=oUDph8NqhLQNW70EYEAdWCk6xIUt8w5YHi28Y86R1Mnneh7pbh+ibAOd3Eh1d4TUy4RowWr7NQMXxvIH1uNVPziRhgdOx+dFuS64nQPnj+wa9FXqZSpPFqlMGAIauq+OmmzX4IwXX5909TYYPDgcHdEOFArN9n7JrxHiMlHf0+9UY+tdJ78CfwB3tQG/0BVUuPz25PyqvtI625WpOEeDjtR8Gb4elxSP6BFKjU90JeG/fVJsrFgJOkVsIdCduyGramrIWjUBnO4xe0wYqwQKiIA03lhsbo5KP1JLdcAWgiBG40XsnwCeznTlxSEc8Jjg0HqawDWB+NkpMuiJT514Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2f6DRLylhmZE+dAxSl2IedP98NGPsB39lX23PInhyXQ=; b=lFW9Rr/SEP+lvD9pbGJ2X2+L67o6DccqYbaqxNL2HWHsXEmFrFVFduvCnfbIGk3/0qBn8ytroSRziLqhUziWXTwloOycwz0dsx/zP4wQd2fjEFaIeVxTGJffRzhOdxYZQJLUYj1FWIyLrxSW5tlUW8GyFndwge0NcR2zS9lBHq2GYJrG8WJkp+yM5RmNk53KDLS+40qn7Y4Now3PmKkjWkzqccc/9oxzJE8DGjOLk+SOPwd+uWmI7ilwyDPkj5e2ICF/u81G3v1h1CWxBwi2jnKV3xC3dTPdSZQrlnbqWOoUWKj7mf3TruyMTEkZlUUILlajtue48UCPaUcIomEKVg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2f6DRLylhmZE+dAxSl2IedP98NGPsB39lX23PInhyXQ=; b=P0QwzHNdkmEaDmeetnKnd7tkWxdueQSc/7bT4j+RLOqwCxrFZBUzWxTMihQYz2/1mM2dmbe99Igcm8YADBhk+e7ZWFfPc9nCSxBLYolkvVEW1jnkUpFRO9b4UMmZJOIYSJ67W+gWS4Uk+bbQD0KHHAueydfUMM1iXf+TBDhyBMg= Received: from DB7PR05CA0040.eurprd05.prod.outlook.com (2603:10a6:10:2e::17) by AM6PR08MB4294.eurprd08.prod.outlook.com (2603:10a6:20b:bd::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3721.21; Mon, 4 Jan 2021 13:22:43 +0000 Received: from DB5EUR03FT038.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:2e:cafe::c0) by DB7PR05CA0040.outlook.office365.com (2603:10a6:10:2e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3721.19 via Frontend Transport; Mon, 4 Jan 2021 13:22:43 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT038.mail.protection.outlook.com (10.152.21.84) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3721.21 via Frontend Transport; Mon, 4 Jan 2021 13:22:43 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Mon, 4 Jan 2021 13:22:25 +0000 Received: from E107187.Arm.com (10.57.38.43) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Mon, 4 Jan 2021 13:22:24 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , Subject: [PATCH v3 13/26] StandaloneMmPkg: Fix ECC error 4002 in StandaloneMmCoreEntryPoint Date: Mon, 4 Jan 2021 13:22:00 +0000 Message-ID: <20210104132213.22376-14-sami.mujawar@arm.com> X-Mailer: git-send-email 2.11.0.windows.3 In-Reply-To: <20210104132213.22376-1-sami.mujawar@arm.com> References: <20210104132213.22376-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 589ab0ee-2e2c-4513-a539-08d8b0b3e1d8 X-MS-TrafficTypeDiagnostic: AM6PR08MB4294:|DB6PR0802MB2454: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:1824;OLM:1824; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(6029001)(4636009)(396003)(376002)(136003)(39860400002)(346002)(46966006)(81166007)(54906003)(356005)(2616005)(426003)(336012)(44832011)(7696005)(26005)(186003)(4326008)(6666004)(1076003)(2906002)(47076005)(8936002)(316002)(70206006)(5660300002)(82740400003)(478600001)(82310400003)(70586007)(36756003)(8676002)(83380400001)(6916009)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4294 Return-Path: Sami.Mujawar@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: e338be99-cd11-4fad-a1e5-08d8b0b3d15c X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: NS2tvqT+zsYDKNbNtYxhNNo2SVc7PlvL5mFqI7xry/zK5H7P1dUS7k43qmOgnPfHVtXjU/kmDe3hmEjrSJt/f9vpKPH35Pf9SQd2dW9IKwdHf1foqUoNNpePg6sYwWoOUm/OfWmbc9d1BrUbYfWS9adrNmYqhp3kCMPGn59ozAAWIW8WSFtBkmzkUIagDYJtSBUZ/6ZnN20cZhs1XbiYExUnrJ7UsFftDhMpQxyzYcS3CkoeQpNLCY/Ek+tmNzCJclzeBzfi27SqyBabaJZglGEXtA2X+UFh9hmEWUiuEZWwltJMp3DVMpcg8tzmN/rA0OiSh11PImAFmf0jR8/ut0rpADCwPG+Euz2ChmlXpk5nNmrqVmUVbmFU6UXy3BtZrvpZWyRufKtMluQVDalm30HP+cKOGwH37Gc5BsozgoNdBZQfh4wvEtaE4FYrhldZYcI9s8aTIWgiVP8acSVoH+4pGtflDWEihmKtHwt73T6HGeZtAMQqFNttMYRcvEu++xjnPubE1rOpdN6PHJMZPfPvLivdXxDc4CYheIlZPNU= X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(6029001)(4636009)(136003)(39860400002)(346002)(376002)(396003)(46966006)(54906003)(70586007)(1076003)(8936002)(5660300002)(47076005)(86362001)(316002)(70206006)(4326008)(36756003)(7696005)(8676002)(6666004)(2616005)(44832011)(26005)(478600001)(81166007)(426003)(336012)(82310400003)(2906002)(6916009)(82740400003)(186003)(83380400001);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jan 2021 13:23:10.7551 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 589ab0ee-2e2c-4513-a539-08d8b0b3e1d8 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2454 Content-Type: text/plain Bugzilla: 3150 (https://bugzilla.tianocore.org/show_bug.cgi?id=3150) Add doxygen style function headers to fix ECC reported errors "[4002] Function header doesn't exist Function". Also update the corresponding declaration to add IN/OUT doxygen style reference tags. Signed-off-by: Sami Mujawar Acked-by: Jiewen Yao --- Notes: v3: - No code change. Added bugzilla ID and resending patch [SAMI] with v3 series. v2: - No code change. Resending patch with v2 series. [SAMI] StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h | 34 +++++++------- StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.c | 48 ++++++++++++++++++++ StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCoreEntryPoint.c | 14 +++++- 3 files changed, 78 insertions(+), 18 deletions(-) diff --git a/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h b/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h index 0f9a032404582fd59e3d4e2bf2884b1077b78d5c..34c43897dded9aebe1470f2dbfe96b93590a9e45 100644 --- a/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h +++ b/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h @@ -2,7 +2,7 @@ Entry point to the Standalone MM Foundation when initialized during the SEC phase on ARM platforms -Copyright (c) 2017 - 2018, ARM Ltd. All rights reserved.
+Copyright (c) 2017 - 2020, Arm Ltd. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent **/ @@ -70,13 +70,13 @@ typedef RETURN_STATUS (*REGION_PERMISSION_UPDATE_FUNC) ( sections in the Standalone MM Core module to be able to access RO and RW data and make further progress in the boot process. - @param ImageContext Pointer to PE/COFF image context - @param ImageBase Base of image in memory - @param SectionHeaderOffset Offset of PE/COFF image section header - @param NumberOfSections Number of Sections - @param TextUpdater Function to change code permissions - @param ReadOnlyUpdater Function to change RO permissions - @param ReadWriteUpdater Function to change RW permissions + @param [in] ImageContext Pointer to PE/COFF image context + @param [in] ImageBase Base of image in memory + @param [in] SectionHeaderOffset Offset of PE/COFF image section header + @param [in] NumberOfSections Number of Sections + @param [in] TextUpdater Function to change code permissions + @param [in] ReadOnlyUpdater Function to change RO permissions + @param [in] ReadWriteUpdater Function to change RW permissions **/ EFI_STATUS @@ -98,11 +98,11 @@ UpdateMmFoundationPeCoffPermissions ( the Standalone MM Core module to be able to change permissions of the individual sections later in the boot process. - @param TeData Pointer to PE/COFF image data - @param ImageContext Pointer to PE/COFF image context - @param ImageBase Pointer to ImageBase variable - @param SectionHeaderOffset Offset of PE/COFF image section header - @param NumberOfSections Number of Sections + @param [in] TeData Pointer to PE/COFF image data + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Pointer to ImageBase variable + @param [in, out] SectionHeaderOffset Offset of PE/COFF image section header + @param [in, out] NumberOfSections Number of Sections **/ EFI_STATUS @@ -121,10 +121,10 @@ GetStandaloneMmCorePeCoffSections ( by the Boot Firmware Volume. This function locates the Standalone MM Core module PE/COFF image in the BFV and returns this information. - @param BfvAddress Base Address of Boot Firmware Volume - @param TeData Pointer to address for allocating memory for - PE/COFF image data - @param TeDataSize Pointer to size of PE/COFF image data + @param [in] BfvAddress Base Address of Boot Firmware Volume + @param [in, out] TeData Pointer to address for allocating memory + for PE/COFF image data + @param [in, out] TeDataSize Pointer to size of PE/COFF image data **/ EFI_STATUS diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.c index 0ab6edaeb7f05bc814281d0e928305804633e970..f2e724cfc38e75d61bae5d8d21d40feda1685144 100644 --- a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.c +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.c @@ -25,6 +25,21 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include +/** + Privileged firmware assigns RO & Executable attributes to all memory occupied + by the Boot Firmware Volume. This function sets the correct permissions of + sections in the Standalone MM Core module to be able to access RO and RW data + and make further progress in the boot process. + + @param [in] ImageContext Pointer to PE/COFF image context + @param [in] ImageBase Base of image in memory + @param [in] SectionHeaderOffset Offset of PE/COFF image section header + @param [in] NumberOfSections Number of Sections + @param [in] TextUpdater Function to change code permissions + @param [in] ReadOnlyUpdater Function to change RO permissions + @param [in] ReadWriteUpdater Function to change RW permissions + +**/ EFI_STATUS EFIAPI UpdateMmFoundationPeCoffPermissions ( @@ -113,6 +128,17 @@ UpdateMmFoundationPeCoffPermissions ( return RETURN_SUCCESS; } +/** + Privileged firmware assigns RO & Executable attributes to all memory occupied + by the Boot Firmware Volume. This function locates the Standalone MM Core + module PE/COFF image in the BFV and returns this information. + + @param [in] BfvAddress Base Address of Boot Firmware Volume + @param [in, out] TeData Pointer to address for allocating memory + for PE/COFF image data + @param [in, out] TeDataSize Pointer to size of PE/COFF image data + +**/ EFI_STATUS EFIAPI LocateStandaloneMmCorePeCoffData ( @@ -151,6 +177,15 @@ LocateStandaloneMmCorePeCoffData ( return Status; } +/** + Returns the PC COFF section information. + + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Base of image in memory + @param [out] SectionHeaderOffset Offset of PE/COFF image section header + @param [out] NumberOfSections Number of Sections + +**/ STATIC EFI_STATUS GetPeCoffSectionInformation ( @@ -241,6 +276,19 @@ GetPeCoffSectionInformation ( return RETURN_SUCCESS; } +/** + Privileged firmware assigns RO & Executable attributes to all memory occupied + by the Boot Firmware Volume. This function locates the section information of + the Standalone MM Core module to be able to change permissions of the + individual sections later in the boot process. + + @param [in] TeData Pointer to PE/COFF image data + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Pointer to ImageBase variable + @param [in, out] SectionHeaderOffset Offset of PE/COFF image section header + @param [in, out] NumberOfSections Number of Sections + +**/ EFI_STATUS EFIAPI GetStandaloneMmCorePeCoffSections ( diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCoreEntryPoint.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCoreEntryPoint.c index 9cecfa667b905c975ddd348513c51fc8a5955718..3d3c772019df9afe9b8ec77019c776ea7c3b55fb 100644 --- a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCoreEntryPoint.c +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCoreEntryPoint.c @@ -2,7 +2,7 @@ Entry point to the Standalone MM Foundation when initialized during the SEC phase on ARM platforms -Copyright (c) 2017 - 2018, ARM Ltd. All rights reserved.
+Copyright (c) 2017 - 2020, Arm Ltd. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent **/ @@ -101,6 +101,12 @@ GetAndPrintBootinformation ( return PayloadBootInfo; } +/** + A loop to delegated events. + + @param [in] EventCompleteSvcArgs Pointer to the event completion arguments. + +**/ VOID EFIAPI DelegatedEventLoop ( @@ -156,6 +162,12 @@ DelegatedEventLoop ( } } +/** + Query the SPM version, check compatibility and return success if compatible. + + @retval EFI_SUCCESS SPM versions compatible. + @retval EFI_UNSUPPORTED SPM versions not compatible. +**/ STATIC EFI_STATUS GetSpmVersion (VOID) -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)'