From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by mx.groups.io with SMTP id smtpd.web11.12295.1647966034742761770 for ; Tue, 22 Mar 2022 09:20:35 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@linux.microsoft.com header.s=default header.b=VZuJlnTl; spf=pass (domain: linux.microsoft.com, ip: 13.77.154.182, mailfrom: mikuback@linux.microsoft.com) Received: from localhost.localdomain (unknown [47.202.59.224]) by linux.microsoft.com (Postfix) with ESMTPSA id 36C8920B4783; Tue, 22 Mar 2022 09:20:33 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 36C8920B4783 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1647966034; bh=FCRRs24aKsw8PolJrkFz4syVAhQ0OttECqz9QibOFb4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VZuJlnTl0s7IdTBfZHmzJaP4KndUZrIXP6c4qjcPFwpdI4ur2JVS2JNZGWeP0Ul/1 /CpPc3dGijlLzniPWG9V2aToKcuwTQua/OAicHqATRECAmSIhve2qG9Ym2v4Yp0sc5 Hk3TpV8sd7AaMmSBPnx4N/KXP/oMG4rZ8f72BSdg= From: "Michael Kubacki" To: devel@edk2.groups.io Cc: Andrew Fish , Kang Gao , Michael D Kinney , Michael Kubacki , Leif Lindholm , Benjamin You , Liu Yun , Ankit Sinha , Nate DeSimone Subject: [PATCH v1 04/41] PrmPkg/PrmConfigDxe: Add initial driver Date: Tue, 22 Mar 2022 12:19:10 -0400 Message-Id: <20220322161947.9319-5-mikuback@linux.microsoft.com> X-Mailer: git-send-email 2.28.0.windows.1 In-Reply-To: <20220322161947.9319-1-mikuback@linux.microsoft.com> References: <20220322161947.9319-1-mikuback@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Michael Kubacki REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3812 This driver serves as a generic PRM configuration driver. Its primary role is to prepare PRM resources published by PRM module configuration libraries for OS runtime. As such, it locates all PRM Configuration Protocol instances and consumes the information to ready those resources. For example, set runtime memory attributes on MMIO ranges and convert physical addresses to virtual addresses in PRM buffers. Cc: Andrew Fish Cc: Kang Gao Cc: Michael D Kinney Cc: Michael Kubacki Cc: Leif Lindholm Cc: Benjamin You Cc: Liu Yun Cc: Ankit Sinha Cc: Nate DeSimone Signed-off-by: Michael Kubacki --- PrmPkg/PrmConfigDxe/PrmConfigDxe.c | 559 ++++++++++++ PrmPkg/PrmLoaderDxe/PrmLoaderDxe.c | 925 ++++++++++++++++++++ PrmPkg/PrmConfigDxe/PrmConfigDxe.inf | 48 + PrmPkg/PrmLoaderDxe/PrmAcpiTable.h | 97 ++ PrmPkg/PrmLoaderDxe/PrmLoader.h | 51 ++ PrmPkg/PrmLoaderDxe/PrmLoaderDxe.inf | 59 ++ 6 files changed, 1739 insertions(+) diff --git a/PrmPkg/PrmConfigDxe/PrmConfigDxe.c b/PrmPkg/PrmConfigDxe/Prm= ConfigDxe.c new file mode 100644 index 000000000000..cb38146bc9e0 --- /dev/null +++ b/PrmPkg/PrmConfigDxe/PrmConfigDxe.c @@ -0,0 +1,559 @@ +/** @file + + This file contains the implementation for a Platform Runtime Mechanism= (PRM) configuration driver. + + Copyright (c) Microsoft Corporation + Copyright (c) 2020, Intel Corporation. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include + +#define _DBGMSGID_ "[PRMCONFIG]" + +STATIC UINTN mMaxRuntimeMmioRangeCount; +STATIC UINTN mMaxStaticDataBufferCount; + +STATIC PRM_RUNTIME_MMIO_RANGES **mRuntimeMmioRanges; +STATIC PRM_DATA_BUFFER ***mStaticDataBuffers; + +/** + Converts the runtime memory range physical addresses to virtual addres= ses. + + @param[in] RuntimeMmioRanges A pointer to a PRM_RUNTIME_MMIO_RANGES= buffer. + +**/ +VOID +ConvertRuntimeMemoryRangeAddresses ( + IN PRM_RUNTIME_MMIO_RANGES *RuntimeMmioRanges + ) +{ + UINTN Index; + + if (RuntimeMmioRanges =3D=3D NULL || RuntimeMmioRanges->Count =3D=3D 0= ) { + return; + } + + for (Index =3D 0; Index < (UINTN) RuntimeMmioRanges->Count; Index++) { + RuntimeMmioRanges->Range[Index].VirtualBaseAddress =3D RuntimeMmioRa= nges->Range[Index].PhysicalBaseAddress; + gRT->ConvertPointer (0x0, (VOID **) &(RuntimeMmioRanges->Range[Index= ].VirtualBaseAddress)); + } +} + +/** + Sets the runtime memory range attributes. + + The EFI_MEMORY_RUNTIME attribute is set for each PRM_RUNTIME_MMIO_RANG= E present + in the buffer provided. + + @param[in] RuntimeMmioRanges A pointer to a PRM_RUNTIME_MMIO_RANG= ES buffer. + +**/ +VOID +SetRuntimeMemoryRangeAttributes ( + IN PRM_RUNTIME_MMIO_RANGES *RuntimeMmioRanges + ) +{ + EFI_STATUS Status; + EFI_STATUS Status2; + UINTN Index; + EFI_GCD_MEMORY_SPACE_DESCRIPTOR Descriptor; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + if (RuntimeMmioRanges =3D=3D NULL || RuntimeMmioRanges->Count =3D=3D 0= ) { + return; + } + + for (Index =3D 0; Index < (UINTN) RuntimeMmioRanges->Count; Index++) { + DEBUG (( + DEBUG_INFO, " %a %a: Runtime MMIO Range [%d].\n", _DBGMSGID_,= __FUNCTION__, Index)); + DEBUG (( + DEBUG_INFO, + " %a %a: Physical address =3D 0x%016x. Length =3D 0x%x.\n", + _DBGMSGID_, + __FUNCTION__, + RuntimeMmioRanges->Range[Index].PhysicalBaseAddress, + RuntimeMmioRanges->Range[Index].Length + )); + + // Runtime memory ranges should cover ranges on a page boundary + ASSERT ((RuntimeMmioRanges->Range[Index].PhysicalBaseAddress & EFI_P= AGE_MASK) =3D=3D 0); + ASSERT ((RuntimeMmioRanges->Range[Index].Length & EFI_PAGE_MASK) =3D= =3D 0); + + Status2 =3D EFI_NOT_FOUND; + Status =3D gDS->GetMemorySpaceDescriptor (RuntimeMmioRanges->Range[I= ndex].PhysicalBaseAddress, &Descriptor); + if (!EFI_ERROR (Status) && + ( + (Descriptor.GcdMemoryType !=3D EfiGcdMemoryTypeMemoryMappedIo &&= Descriptor.GcdMemoryType !=3D EfiGcdMemoryTypeReserved) || + ((Descriptor.Length & EFI_PAGE_MASK) !=3D 0) + ) + ) { + Status2 =3D gDS->RemoveMemorySpace ( + RuntimeMmioRanges->Range[Index].PhysicalBaseAddr= ess, + Descriptor.Length + ); + } + + if (Status =3D=3D EFI_NOT_FOUND || !EFI_ERROR (Status2)) { + Status =3D gDS->AddMemorySpace ( + EfiGcdMemoryTypeMemoryMappedIo, + RuntimeMmioRanges->Range[Index].PhysicalBaseAddres= s, + (UINT64) RuntimeMmioRanges->Range[Index].Length, + EFI_MEMORY_UC | EFI_MEMORY_RUNTIME + ); + ASSERT_EFI_ERROR (Status); + + Status =3D gDS->AllocateMemorySpace ( + EfiGcdAllocateAddress, + EfiGcdMemoryTypeMemoryMappedIo, + 0, + (UINT64) RuntimeMmioRanges->Range[Index].Length, + &RuntimeMmioRanges->Range[Index].PhysicalBaseAddre= ss, + gImageHandle, + NULL + ); + ASSERT_EFI_ERROR (Status); + } + + Status =3D gDS->GetMemorySpaceDescriptor (RuntimeMmioRanges->Range[I= ndex].PhysicalBaseAddress, &Descriptor); + ASSERT_EFI_ERROR (Status); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Error [%r] finding descriptor for runtime memory r= ange 0x%016x.\n", + _DBGMSGID_, + __FUNCTION__, + Status, + RuntimeMmioRanges->Range[Index].PhysicalBaseAddress + )); + continue; + } + if ((Descriptor.Attributes & EFI_MEMORY_RUNTIME) !=3D 0) { + continue; + } + + Status =3D gDS->SetMemorySpaceAttributes ( + RuntimeMmioRanges->Range[Index].PhysicalBaseAddress, + (UINT64) RuntimeMmioRanges->Range[Index].Length, + Descriptor.Attributes | EFI_MEMORY_RUNTIME + ); + ASSERT_EFI_ERROR (Status); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Error [%r] setting descriptor for runtime memory r= ange 0x%016x.\n", + _DBGMSGID_, + __FUNCTION__, + Status, + RuntimeMmioRanges->Range[Index].PhysicalBaseAddress + )); + } else { + DEBUG ((DEBUG_INFO, " %a %a: Successfully set runtime attribu= te for the MMIO range.\n", _DBGMSGID_, __FUNCTION__)); + } + } +} + +/** + Stores pointers or pointer to resources that should be converted in th= e virtual address change event. + +**/ +VOID +StoreVirtualMemoryAddressChangePointers ( + VOID + ) +{ + EFI_STATUS Status; + UINTN BufferIndex; + UINTN HandleCount; + UINTN HandleIndex; + UINTN RangeIndex; + UINTN StaticDataBufferIndex; + EFI_HANDLE *HandleBuffer; + PRM_CONFIG_PROTOCOL *PrmConfigProtocol; + PRM_CONTEXT_BUFFER *CurrentContextBuffer; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + RangeIndex =3D 0; + StaticDataBufferIndex =3D 0; + + mRuntimeMmioRanges =3D AllocateRuntimeZeroPool (sizeof (*mRuntimeMmioR= anges) * mMaxRuntimeMmioRangeCount); + if (mRuntimeMmioRanges =3D=3D NULL && mMaxRuntimeMmioRangeCount > 0) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Memory allocation for runtime MMIO pointer array failed.= \n", + _DBGMSGID_, + __FUNCTION__ + )); + ASSERT (FALSE); + return; + } + + mStaticDataBuffers =3D AllocateRuntimeZeroPool (sizeof (*mStaticDataBu= ffers) * mMaxStaticDataBufferCount); + if (mStaticDataBuffers =3D=3D NULL && mMaxStaticDataBufferCount > 0) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Memory allocation for PRM static data buffer pointer arr= ay failed.\n", + _DBGMSGID_, + __FUNCTION__ + )); + ASSERT (FALSE); + return; + } + + HandleBuffer =3D NULL; + Status =3D gBS->LocateHandleBuffer ( + ByProtocol, + &gPrmConfigProtocolGuid, + NULL, + &HandleCount, + &HandleBuffer + ); + if (!EFI_ERROR (Status)) { + for (HandleIndex =3D 0; HandleIndex < HandleCount; HandleIndex++) { + Status =3D gBS->HandleProtocol ( + HandleBuffer[HandleIndex], + &gPrmConfigProtocolGuid, + (VOID **) &PrmConfigProtocol + ); + ASSERT_EFI_ERROR (Status); + if (EFI_ERROR (Status) || PrmConfigProtocol =3D=3D NULL) { + continue; + } + + for (BufferIndex =3D 0; BufferIndex < PrmConfigProtocol->ModuleCon= textBuffers.BufferCount; BufferIndex++) { + CurrentContextBuffer =3D &(PrmConfigProtocol->ModuleContextBuffe= rs.Buffer[BufferIndex]); + + if (CurrentContextBuffer->StaticDataBuffer !=3D NULL) { + if (StaticDataBufferIndex >=3D mMaxStaticDataBufferCount) { + Status =3D EFI_BUFFER_TOO_SMALL; + DEBUG (( + DEBUG_ERROR, + " %a %a: Index out of bounds - Actual count (%d) of PRM d= ata buffers exceeds maximum count (%d).\n", + _DBGMSGID_, + __FUNCTION__, + StaticDataBufferIndex + 1, + mMaxStaticDataBufferCount + )); + ASSERT_EFI_ERROR (Status); + return; + } + mStaticDataBuffers[StaticDataBufferIndex++] =3D &CurrentContex= tBuffer->StaticDataBuffer; + } + } + if (PrmConfigProtocol->ModuleContextBuffers.RuntimeMmioRanges !=3D= NULL) { + if (RangeIndex >=3D mMaxRuntimeMmioRangeCount) { + Status =3D EFI_BUFFER_TOO_SMALL; + DEBUG (( + DEBUG_ERROR, + " %a %a: Index out of bounds - Actual count (%d) of runtime= MMIO ranges exceeds maximum count (%d).\n", + _DBGMSGID_, + __FUNCTION__, + RangeIndex + 1, + mMaxRuntimeMmioRangeCount + )); + ASSERT_EFI_ERROR (Status); + return; + } + mRuntimeMmioRanges[RangeIndex++] =3D PrmConfigProtocol->ModuleCo= ntextBuffers.RuntimeMmioRanges; + } + } + DEBUG (( + DEBUG_INFO, + " %a %a: %d MMIO ranges buffers saved for future virtual memory c= onversion.\n", + _DBGMSGID_, + __FUNCTION__, + RangeIndex + )); + DEBUG (( + DEBUG_INFO, + " %a %a: %d static buffers saved for future virtual memory conver= sion.\n", + _DBGMSGID_, + __FUNCTION__, + StaticDataBufferIndex + )); + } +} + +/** + Validates a data buffer for a PRM module. + + Verifies the buffer header signature is valid and the length meets the= minimum size. + + @param[in] PrmDataBuffer A pointer to the data buffer for thi= s PRM module. + + @retval EFI_SUCCESS The data buffer was validated succes= sfully. + @retval EFI_INVALID_PARAMETER The pointer given for PrmDataBuffer = is NULL. + @retval EFI_NOT_FOUND The data buffer signature is not val= id. + @retval EFI_BUFFER_TOO_SMALL The buffer size is too small. + +**/ +EFI_STATUS +ValidatePrmDataBuffer ( + IN CONST PRM_DATA_BUFFER *PrmDataBuffer + ) +{ + if (PrmDataBuffer =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (PrmDataBuffer->Header.Signature !=3D PRM_DATA_BUFFER_HEADER_SIGNAT= URE) { + DEBUG ((DEBUG_ERROR, " %a %a: The PRM data buffer signature is inva= lid. PRM module.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_NOT_FOUND; + } + if (PrmDataBuffer->Header.Length < sizeof (PRM_DATA_BUFFER_HEADER)) { + DEBUG ((DEBUG_ERROR, " %a %a: The PRM data buffer length is invalid= .\n", _DBGMSGID_, __FUNCTION__)); + return EFI_BUFFER_TOO_SMALL; + } + + return EFI_SUCCESS; +} + +/** + Validates a PRM context buffer. + + Verifies the buffer header signature is valid and the GUID is set to a= non-zero value. + + @param[in] PrmContextBuffer A pointer to the context buffer for = this PRM handler. + + @retval EFI_SUCCESS The context buffer was validated suc= cessfully. + @retval EFI_INVALID_PARAMETER The pointer given for ContextBuffer = is NULL. + @retval EFI_NOT_FOUND The proper value for a field was not= found. + +**/ +EFI_STATUS +ValidatePrmContextBuffer ( + IN CONST PRM_CONTEXT_BUFFER *PrmContextBuffer + ) +{ + if (PrmContextBuffer =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + if (PrmContextBuffer->Signature !=3D PRM_CONTEXT_BUFFER_SIGNATURE) { + DEBUG ((DEBUG_ERROR, " %a %a: The PRM context buffer signature is i= nvalid.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_NOT_FOUND; + } + + if (IsZeroGuid (&PrmContextBuffer->HandlerGuid)) { + DEBUG ((DEBUG_ERROR, " %a %a: The PRM context buffer GUID is zero.\= n", _DBGMSGID_, __FUNCTION__)); + return EFI_NOT_FOUND; + } + + if (PrmContextBuffer->StaticDataBuffer !=3D NULL && EFI_ERROR (Validat= ePrmDataBuffer (PrmContextBuffer->StaticDataBuffer))) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Error in static buffer for PRM handler %g.\n", + _DBGMSGID_, + __FUNCTION__, + &PrmContextBuffer->HandlerGuid + )); + return EFI_NOT_FOUND; + } + + return EFI_SUCCESS; +} + +/** + Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE. + + This is notification function converts any registered PRM_RUNTIME_MMIO= _RANGE + addresses to a virtual address. + + @param[in] Event Event whose notification function is being in= voked. + @param[in] Context Pointer to the notification function's contex= t. + +**/ +VOID +EFIAPI +PrmConfigVirtualAddressChangeEvent ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + UINTN Index; + + // + // Convert static data buffer pointers + // + for (Index =3D 0; Index < mMaxStaticDataBufferCount; Index++) { + gRT->ConvertPointer (0x0, (VOID **) mStaticDataBuffers[Index]); + } + + // + // Convert runtime MMIO ranges + // + for (Index =3D 0; Index < mMaxRuntimeMmioRangeCount; Index++) { + ConvertRuntimeMemoryRangeAddresses (mRuntimeMmioRanges[Index]); + } +} + +/** + The PRM Config END_OF_DXE protocol notification event handler. + + Finds all of the PRM_CONFIG_PROTOCOL instances installed at end of DXE= and + marks all PRM_RUNTIME_MMIO_RANGE entries as EFI_MEMORY_RUNTIME. + + @param[in] Event Event whose notification function is being= invoked. + @param[in] Context The pointer to the notification function's= context, + which is implementation-dependent. + + @retval EFI_SUCCESS The function executed successfully + +**/ +EFI_STATUS +EFIAPI +PrmConfigEndOfDxeNotification ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + EFI_STATUS Status; + UINTN HandleCount; + UINTN BufferIndex; + UINTN HandleIndex; + EFI_HANDLE *HandleBuffer; + PRM_CONTEXT_BUFFER *CurrentContextBuffer; + PRM_CONFIG_PROTOCOL *PrmConfigProtocol; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + HandleBuffer =3D NULL; + Status =3D gBS->LocateHandleBuffer ( + ByProtocol, + &gPrmConfigProtocolGuid, + NULL, + &HandleCount, + &HandleBuffer + ); + if (!EFI_ERROR (Status)) { + for (HandleIndex =3D 0; HandleIndex < HandleCount; HandleIndex++) { + Status =3D gBS->HandleProtocol ( + HandleBuffer[HandleIndex], + &gPrmConfigProtocolGuid, + (VOID **) &PrmConfigProtocol + ); + ASSERT_EFI_ERROR (Status); + if (EFI_ERROR (Status) || PrmConfigProtocol =3D=3D NULL) { + continue; + } + + DEBUG (( + DEBUG_INFO, + " %a %a: Found PRM configuration protocol for PRM module %g.\n"= , + _DBGMSGID_, + __FUNCTION__, + &PrmConfigProtocol->ModuleContextBuffers.ModuleGuid + )); + + DEBUG ((DEBUG_INFO, " %a %a: Validating module context buffer= s...\n", _DBGMSGID_, __FUNCTION__)); + for (BufferIndex =3D 0; BufferIndex < PrmConfigProtocol->ModuleCon= textBuffers.BufferCount; BufferIndex++) { + CurrentContextBuffer =3D &(PrmConfigProtocol->ModuleContextBuffe= rs.Buffer[BufferIndex]); + + Status =3D ValidatePrmContextBuffer (CurrentContextBuffer); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + " %a %a: Context buffer validation failed for PRM han= dler %g.\n", + _DBGMSGID_, + __FUNCTION__, + CurrentContextBuffer->HandlerGuid + )); + } + if (CurrentContextBuffer->StaticDataBuffer !=3D NULL) { + mMaxStaticDataBufferCount++; + } + } + DEBUG ((DEBUG_INFO, " %a %a: Module context buffer validation= complete.\n", _DBGMSGID_, __FUNCTION__)); + + if (PrmConfigProtocol->ModuleContextBuffers.RuntimeMmioRanges !=3D= NULL) { + DEBUG (( + DEBUG_INFO, + " %a %a: Found %d PRM runtime MMIO ranges to convert.\n", + _DBGMSGID_, + __FUNCTION__, + PrmConfigProtocol->ModuleContextBuffers.RuntimeMmioRanges->Co= unt + )); + SetRuntimeMemoryRangeAttributes (PrmConfigProtocol->ModuleContex= tBuffers.RuntimeMmioRanges); + mMaxRuntimeMmioRangeCount++; + } + } + + StoreVirtualMemoryAddressChangePointers (); + } + + if (HandleBuffer !=3D NULL) { + gBS->FreePool (HandleBuffer); + } + gBS->CloseEvent(Event); + + return EFI_SUCCESS; +} + +/** + The entry point for this module. + + @param[in] ImageHandle The firmware allocated handle for the EFI = image. + @param[in] SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The entry point is executed successfully. + @retval Others An error occurred when executing this entr= y point. + +**/ +EFI_STATUS +EFIAPI +PrmConfigEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + EFI_EVENT Event; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + // + // Register a notification function to change memory attributes at end= of DXE + // + Event =3D NULL; + Status =3D gBS->CreateEventEx( + EVT_NOTIFY_SIGNAL, + TPL_CALLBACK, + PrmConfigEndOfDxeNotification, + NULL, + &gEfiEndOfDxeEventGroupGuid, + &Event + ); + ASSERT_EFI_ERROR (Status); + + // + // Register a notification function for virtual address change + // + Event =3D NULL; + Status =3D gBS->CreateEventEx ( + EVT_NOTIFY_SIGNAL, + TPL_NOTIFY, + PrmConfigVirtualAddressChangeEvent, + NULL, + &gEfiEventVirtualAddressChangeGuid, + &Event + ); + ASSERT_EFI_ERROR (Status); + + return EFI_SUCCESS; +} diff --git a/PrmPkg/PrmLoaderDxe/PrmLoaderDxe.c b/PrmPkg/PrmLoaderDxe/Prm= LoaderDxe.c new file mode 100644 index 000000000000..b43e6d6bf078 --- /dev/null +++ b/PrmPkg/PrmLoaderDxe/PrmLoaderDxe.c @@ -0,0 +1,925 @@ +/** @file + + This file contains the implementation for a Platform Runtime Mechanism= (PRM) + loader driver. + + Copyright (c) Microsoft Corporation + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include "PrmAcpiTable.h" +#include "PrmLoader.h" + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include + +LIST_ENTRY mPrmModuleList; + +// Todo: Potentially refactor mPrmHandlerCount and mPrmModuleCount into = localized structures +// in the future. +UINT32 mPrmHandlerCount; +UINT32 mPrmModuleCount; + +/** + Gets a pointer to the export directory in a given PE/COFF image. + + @param[in] ImageExportDirectory A pointer to an export directo= ry table in a PE/COFF image. + @param[in] PeCoffLoaderImageContext A pointer to a PE_COFF_LOADER_= IMAGE_CONTEXT structure that contains the + PE/COFF image context for the = Image containing the PRM Module Export + Descriptor table. + @param[out] ExportDescriptor A pointer to a pointer to the = PRM Module Export Descriptor table found + in the ImageExportDirectory gi= ven. + + @retval EFI_SUCCESS The PRM Module Export Descript= or table was found successfully. + @retval EFI_INVALID_PARAMETER A required parameter is NULL. + @retval EFI_NOT_FOUND The PRM Module Export Descript= or table was not found in the given + ImageExportDirectory. + +**/ +EFI_STATUS +GetPrmModuleExportDescriptorTable ( + IN EFI_IMAGE_EXPORT_DIRECTORY *ImageExportDirectory, + IN PE_COFF_LOADER_IMAGE_CONTEXT *PeCoffLoaderImageContext, + OUT PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT **ExportDescriptor + ) +{ + UINTN Index; + EFI_PHYSICAL_ADDRESS CurrentImageAddress; + UINT16 PrmModuleExportDescriptorOrdin= al; + CONST CHAR8 *CurrentExportName; + UINT16 *OrdinalTable; + UINT32 *ExportNamePointerTable; + UINT32 *ExportAddressTable; + PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT *TempExportDescriptor; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + *ExportDescriptor =3D NULL; + + if (ImageExportDirectory =3D=3D NULL || + PeCoffLoaderImageContext =3D=3D NULL || + PeCoffLoaderImageContext->ImageAddress =3D=3D 0 || + ExportDescriptor =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + DEBUG (( + DEBUG_INFO, + " %a %a: %d exported names found in this image.\n", + _DBGMSGID_, + __FUNCTION__, + ImageExportDirectory->NumberOfNames + )); + + // + // The export name pointer table and export ordinal table form two par= allel arrays associated by index. + // + CurrentImageAddress =3D PeCoffLoaderImageContext->ImageAddress; + ExportAddressTable =3D (UINT32 *) ((UINTN) CurrentImageAddress + Image= ExportDirectory->AddressOfFunctions); + ExportNamePointerTable =3D (UINT32 *) ((UINTN) CurrentImageAddress + I= mageExportDirectory->AddressOfNames); + OrdinalTable =3D (UINT16 *) ((UINTN) CurrentImageAddress + ImageExport= Directory->AddressOfNameOrdinals); + + for (Index =3D 0; Index < ImageExportDirectory->NumberOfNames; Index++= ) { + CurrentExportName =3D (CONST CHAR8 *) ((UINTN) CurrentImageAddress += ExportNamePointerTable[Index]); + DEBUG (( + DEBUG_INFO, + " %a %a: Export Name[0x%x] - %a.\n", + _DBGMSGID_, + __FUNCTION__, + Index, + CurrentExportName + )); + if ( + AsciiStrnCmp ( + PRM_STRING(PRM_MODULE_EXPORT_DESCRIPTOR_NAME), + CurrentExportName, + AsciiStrLen (PRM_STRING(PRM_MODULE_EXPORT_DESCRIPTOR_NAME)) + ) =3D=3D 0) { + PrmModuleExportDescriptorOrdinal =3D OrdinalTable[Index]; + DEBUG (( + DEBUG_INFO, + " %a %a: PRM Module Export Descriptor found. Ordinal =3D %d.\n"= , + _DBGMSGID_, + __FUNCTION__, + PrmModuleExportDescriptorOrdinal + )); + if (PrmModuleExportDescriptorOrdinal >=3D ImageExportDirectory->Nu= mberOfFunctions) { + DEBUG ((DEBUG_ERROR, "%a %a: The PRM Module Export Descriptor or= dinal value is invalid.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_NOT_FOUND; + } + TempExportDescriptor =3D (PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT *) (= (UINTN) CurrentImageAddress + ExportAddressTable[PrmModuleExportDescripto= rOrdinal]); + if (TempExportDescriptor->Signature =3D=3D PRM_MODULE_EXPORT_DESCR= IPTOR_SIGNATURE) { + *ExportDescriptor =3D TempExportDescriptor; + DEBUG ((DEBUG_INFO, " %a %a: PRM Module Export Descriptor found= at 0x%x.\n", _DBGMSGID_, __FUNCTION__, (UINTN) ExportDescriptor)); + } else { + DEBUG (( + DEBUG_INFO, + " %a %a: PRM Module Export Descriptor found at 0x%x but signa= ture check failed.\n", + _DBGMSGID_, + __FUNCTION__, + (UINTN) TempExportDescriptor + )); + } + DEBUG ((DEBUG_INFO, " %a %a: Exiting export iteration since expor= t descriptor found.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_SUCCESS; + } + } + + return EFI_NOT_FOUND; +} + +/** + Gets a pointer to the export directory in a given PE/COFF image. + + @param[in] Image A pointer to a PE32/COFF image= base address that is loaded into memory + and already relocated to the m= emory base address. RVAs in the image given + should be valid. + @param[in] PeCoffLoaderImageContext A pointer to a PE_COFF_LOADER_= IMAGE_CONTEXT structure that contains the + PE/COFF image context for the = Image given. + @param[out] ImageExportDirectory A pointer to a pointer to the = export directory found in the Image given. + + @retval EFI_SUCCESS The export directory was found= successfully. + @retval EFI_INVALID_PARAMETER A required parameter is NULL. + @retval EFI_UNSUPPORTED The PE/COFF image given is not= supported as a PRM Module. + @retval EFI_NOT_FOUND The image export directory cou= ld not be found for this image. + +**/ +EFI_STATUS +GetExportDirectoryInPeCoffImage ( + IN VOID *Image, + IN PE_COFF_LOADER_IMAGE_CONTEXT *PeCoffLoaderImageContext, + OUT EFI_IMAGE_EXPORT_DIRECTORY **ImageExportDirectory + ) +{ + UINT16 Magic; + UINT32 NumberOfRvaAndSizes; + EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION OptionalHeaderPtrUnion; + EFI_IMAGE_DATA_DIRECTORY *DirectoryEntry; + EFI_IMAGE_EXPORT_DIRECTORY *ExportDirectory; + EFI_IMAGE_SECTION_HEADER *SectionHeader; + + if (Image =3D=3D NULL || PeCoffLoaderImageContext =3D=3D NULL || Image= ExportDirectory =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + DirectoryEntry =3D NULL; + ExportDirectory =3D NULL; + + // + // NOTE: For backward compatibility, use the Machine field to identify= a PE32/PE32+ + // image instead of using the Magic field. Some systems might ge= nerate a PE32+ + // image with PE32 magic. + // + switch (PeCoffLoaderImageContext->Machine) { + case EFI_IMAGE_MACHINE_IA32: + // Todo: Add EFI_IMAGE_MACHINE_ARMT + // + // Assume PE32 image with IA32 Machine field. + // + Magic =3D EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC; + break; + case EFI_IMAGE_MACHINE_X64: + // + // Assume PE32+ image with X64 Machine field + // + Magic =3D EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC; + break; + default: + // + // For unknown Machine field, use Magic in optional header + // + DEBUG (( + DEBUG_WARN, + "%a %a: The machine type for this image is not valid for a PRM mod= ule.\n", + _DBGMSGID_, + __FUNCTION__ + )); + return EFI_UNSUPPORTED; + } + + OptionalHeaderPtrUnion.Pe32 =3D (EFI_IMAGE_NT_HEADERS32 *) ( + (UINTN) Image + + PeCoffLoaderImageContext->PeCoffHeader= Offset + ); + + // + // Check the PE/COFF Header Signature. Determine if the image is valid= and/or a TE image. + // + if (OptionalHeaderPtrUnion.Pe32->Signature !=3D EFI_IMAGE_NT_SIGNATURE= ) { + DEBUG ((DEBUG_ERROR, "%a %a: The PE signature is not valid for the c= urrent image.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_UNSUPPORTED; + } + + SectionHeader =3D (EFI_IMAGE_SECTION_HEADER *) ( + (UINTN) Image + + PeCoffLoaderImageContext->PeCoffHeaderOffset + + sizeof (UINT32) + + sizeof (EFI_IMAGE_FILE_HEADER) + + PeCoffLoaderImageContext->SizeOfHeaders + ); + if (Magic =3D=3D EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { + // + // Use the PE32 offset to get the Export Directory Entry + // + NumberOfRvaAndSizes =3D OptionalHeaderPtrUnion.Pe32->OptionalHeader.= NumberOfRvaAndSizes; + DirectoryEntry =3D (EFI_IMAGE_DATA_DIRECTORY *) &(OptionalHeaderPtrU= nion.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT]= ); + } else if (OptionalHeaderPtrUnion.Pe32->OptionalHeader.Magic =3D=3D EF= I_IMAGE_NT_OPTIONAL_HDR64_MAGIC) { + // + // Use the PE32+ offset get the Export Directory Entry + // + NumberOfRvaAndSizes =3D OptionalHeaderPtrUnion.Pe32Plus->OptionalHea= der.NumberOfRvaAndSizes; + DirectoryEntry =3D (EFI_IMAGE_DATA_DIRECTORY *) &(OptionalHeaderPtrU= nion.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_EXP= ORT]); + } else { + return EFI_UNSUPPORTED; + } + + if (NumberOfRvaAndSizes <=3D EFI_IMAGE_DIRECTORY_ENTRY_EXPORT || Direc= toryEntry->VirtualAddress =3D=3D 0) { + // + // The export directory is not present + // + return EFI_NOT_FOUND; + } else if (((UINT32) (~0) - DirectoryEntry->VirtualAddress) < Director= yEntry->Size) { + // + // The directory address overflows + // + DEBUG ((DEBUG_ERROR, "%a %a: The export directory entry in this imag= e results in overflow.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_UNSUPPORTED; + } else { + DEBUG ((DEBUG_INFO, "%a %a: Export Directory Entry found in the imag= e at 0x%x.\n", _DBGMSGID_, __FUNCTION__, (UINTN) OptionalHeaderPtrUnion.P= e32)); + DEBUG ((DEBUG_INFO, " %a %a: Directory Entry Virtual Address =3D 0x= %x.\n", _DBGMSGID_, __FUNCTION__, DirectoryEntry->VirtualAddress)); + + ExportDirectory =3D (EFI_IMAGE_EXPORT_DIRECTORY *) ((UINTN) Image + = DirectoryEntry->VirtualAddress); + DEBUG (( + DEBUG_INFO, + " %a %a: Export Directory Table found successfully at 0x%x. Name = address =3D 0x%x. Name =3D %a.\n", + _DBGMSGID_, + __FUNCTION__, + (UINTN) ExportDirectory, + ((UINTN) Image + ExportDirectory->Name), + (CHAR8 *) ((UINTN) Image + ExportDirectory->Name) + )); + } + *ImageExportDirectory =3D ExportDirectory; + + return EFI_SUCCESS; +} + +/** + Returns the image major and image minor version in a given PE/COFF ima= ge. + + @param[in] Image A pointer to a PE32/COFF image= base address that is loaded into memory + and already relocated to the m= emory base address. RVAs in the image given + should be valid. + @param[in] PeCoffLoaderImageContext A pointer to a PE_COFF_LOADER_= IMAGE_CONTEXT structure that contains the + PE/COFF image context for the = Image given. + @param[out] ImageMajorVersion A pointer to a UINT16 buffer t= o hold the image major version. + @param[out] ImageMinorVersion A pointer to a UINT16 buffer t= o hold the image minor version. + + @retval EFI_SUCCESS The image version was read suc= cessfully. + @retval EFI_INVALID_PARAMETER A required parameter is NULL. + @retval EFI_UNSUPPORTED The PE/COFF image given is not= supported. + +**/ +EFI_STATUS +GetImageVersionInPeCoffImage ( + IN VOID *Image, + IN PE_COFF_LOADER_IMAGE_CONTEXT *PeCoffLoaderImageContext, + OUT UINT16 *ImageMajorVersion, + OUT UINT16 *ImageMinorVersion + ) +{ + EFI_IMAGE_OPTIONAL_HEADER_PTR_UNION OptionalHeaderPtrUnion; + UINT16 Magic; + + DEBUG ((DEBUG_INFO, " %a %a - Entry.\n", _DBGMSGID_, __FUNCTION__))= ; + + if (Image =3D=3D NULL || PeCoffLoaderImageContext =3D=3D NULL || Image= MajorVersion =3D=3D NULL || ImageMinorVersion =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // + // NOTE: For backward compatibility, use the Machine field to identify= a PE32/PE32+ + // image instead of using the Magic field. Some systems might ge= nerate a PE32+ + // image with PE32 magic. + // + switch (PeCoffLoaderImageContext->Machine) { + case EFI_IMAGE_MACHINE_IA32: + // Todo: Add EFI_IMAGE_MACHINE_ARMT + // + // Assume PE32 image with IA32 Machine field. + // + Magic =3D EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC; + break; + case EFI_IMAGE_MACHINE_X64: + // + // Assume PE32+ image with X64 Machine field + // + Magic =3D EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC; + break; + default: + // + // For unknown Machine field, use Magic in optional header + // + DEBUG (( + DEBUG_WARN, + "%a %a: The machine type for this image is not valid for a PRM mod= ule.\n", + _DBGMSGID_, + __FUNCTION__ + )); + return EFI_UNSUPPORTED; + } + + OptionalHeaderPtrUnion.Pe32 =3D (EFI_IMAGE_NT_HEADERS32 *) ( + (UINTN) Image + + PeCoffLoaderImageContext->PeCoffHeader= Offset + ); + // + // Check the PE/COFF Header Signature. Determine if the image is valid= and/or a TE image. + // + if (OptionalHeaderPtrUnion.Pe32->Signature !=3D EFI_IMAGE_NT_SIGNATURE= ) { + DEBUG ((DEBUG_ERROR, "%a %a: The PE signature is not valid for the c= urrent image.\n", _DBGMSGID_, __FUNCTION__)); + return EFI_UNSUPPORTED; + } + + if (Magic =3D=3D EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC) { + // + // Use the PE32 offset to get the Export Directory Entry + // + *ImageMajorVersion =3D OptionalHeaderPtrUnion.Pe32->OptionalHeader.M= ajorImageVersion; + *ImageMinorVersion =3D OptionalHeaderPtrUnion.Pe32->OptionalHeader.M= inorImageVersion; + } else { + // + // Use the PE32+ offset to get the Export Directory Entry + // + *ImageMajorVersion =3D OptionalHeaderPtrUnion.Pe32Plus->OptionalHead= er.MajorImageVersion; + *ImageMinorVersion =3D OptionalHeaderPtrUnion.Pe32Plus->OptionalHead= er.MinorImageVersion; + } + + DEBUG ((DEBUG_INFO, " %a %a - Image Major Version: 0x%02x.\n", _D= BGMSGID_, __FUNCTION__, *ImageMajorVersion)); + DEBUG ((DEBUG_INFO, " %a %a - Image Minor Version: 0x%02x.\n", _D= BGMSGID_, __FUNCTION__, *ImageMinorVersion)); + + return EFI_SUCCESS; +} + +/** + Creates a new PRM Module Image Context linked list entry. + + @retval PrmModuleImageContextListEntry If successful, a pointer a PRM= Module Image Context linked list entry + otherwise, NULL is returned. + +**/ +STATIC +PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY * +CreateNewPrmModuleImageContextListEntry ( + VOID + ) +{ + PRM_MODULE_IMAGE_CONTEXT *PrmModuleImageContext; + PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY *PrmModuleImageContextListEntr= y; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + PrmModuleImageContext =3D AllocateZeroPool (sizeof (*PrmModuleImageCon= text)); + if (PrmModuleImageContext =3D=3D NULL) { + return NULL; + } + DEBUG (( + DEBUG_INFO, + " %a %a: Allocated PrmModuleImageContext at 0x%x of size 0x%x bytes= .\n", + _DBGMSGID_, + __FUNCTION__, + (UINTN) PrmModuleImageContext, + sizeof (*PrmModuleImageContext) + )); + + PrmModuleImageContextListEntry =3D AllocateZeroPool (sizeof (*PrmModul= eImageContextListEntry)); + if (PrmModuleImageContextListEntry =3D=3D NULL) { + FreePool (PrmModuleImageContext); + return NULL; + } + DEBUG (( + DEBUG_INFO, + " %a %a: Allocated PrmModuleImageContextListEntry at 0x%x of size 0= x%x bytes.\n", + _DBGMSGID_, + __FUNCTION__, + (UINTN) PrmModuleImageContextListEntry, + sizeof (*PrmModuleImageContextListEntry) + )); + + PrmModuleImageContextListEntry->Signature =3D PRM_MODULE_IMAGE_CONTEXT= _LIST_ENTRY_SIGNATURE; + PrmModuleImageContextListEntry->Context =3D PrmModuleImageContext; + + return PrmModuleImageContextListEntry; +} + +/** + Discovers all PRM Modules loaded during the DXE boot phase. + + Each PRM Module discovered is placed into a linked list so the list ca= n br processsed in the future. + + @retval EFI_SUCCESS All PRM Modules were discovere= d successfully. + @retval EFI_NOT_FOUND The gEfiLoadedImageProtocolGui= d protocol could not be found. + @retval EFI_OUT_OF_RESOURCES Insufficient memory resources = to allocate the new PRM Context + linked list nodes. + +**/ +EFI_STATUS +DiscoverPrmModules ( + VOID + ) +{ + EFI_STATUS Status; + PRM_MODULE_IMAGE_CONTEXT TempPrmModuleImageContext; + PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY *PrmModuleImageContextListEntr= y; + EFI_LOADED_IMAGE_PROTOCOL *LoadedImageProtocol; + EFI_HANDLE *HandleBuffer; + UINTN HandleCount; + UINTN Index; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + Status =3D gBS->LocateHandleBuffer ( + ByProtocol, + &gEfiLoadedImageProtocolGuid, + NULL, + &HandleCount, + &HandleBuffer + ); + if (EFI_ERROR (Status) && (HandleCount =3D=3D 0)) { + DEBUG ((DEBUG_ERROR, "%a %a: No LoadedImageProtocol instances found!= \n", _DBGMSGID_, __FUNCTION__)); + return EFI_NOT_FOUND; + } + + for (Index =3D 0; Index < HandleCount; Index++) { + Status =3D gBS->HandleProtocol ( + HandleBuffer[Index], + &gEfiLoadedImageProtocolGuid, + (VOID **) &LoadedImageProtocol + ); + if (EFI_ERROR (Status)) { + continue; + } + + ZeroMem (&TempPrmModuleImageContext, sizeof (TempPrmModuleImageConte= xt)); + TempPrmModuleImageContext.PeCoffImageContext.Handle =3D LoadedIma= geProtocol->ImageBase; + TempPrmModuleImageContext.PeCoffImageContext.ImageRead =3D PeCoffLoa= derImageReadFromMemory; + + Status =3D PeCoffLoaderGetImageInfo (&TempPrmModuleImageContext.PeCo= ffImageContext); + if (EFI_ERROR (Status) || TempPrmModuleImageContext.PeCoffImageConte= xt.ImageError !=3D IMAGE_ERROR_SUCCESS) { + DEBUG (( + DEBUG_WARN, + "%a %a: ImageHandle 0x%016lx is not a valid PE/COFF image. It ca= nnot be considered a PRM module.\n", + _DBGMSGID_, + __FUNCTION__, + (EFI_PHYSICAL_ADDRESS) (UINTN) LoadedImageProtocol->ImageBase + )); + continue; + } + if (TempPrmModuleImageContext.PeCoffImageContext.IsTeImage) { + // A PRM Module is not allowed to be a TE image + continue; + } + + // Attempt to find an export table in this image + Status =3D GetExportDirectoryInPeCoffImage ( + LoadedImageProtocol->ImageBase, + &TempPrmModuleImageContext.PeCoffImageContext, + &TempPrmModuleImageContext.ExportDirectory + ); + if (EFI_ERROR (Status)) { + continue; + } + + // Attempt to find the PRM Module Export Descriptor in the export ta= ble + Status =3D GetPrmModuleExportDescriptorTable ( + TempPrmModuleImageContext.ExportDirectory, + &TempPrmModuleImageContext.PeCoffImageContext, + &TempPrmModuleImageContext.ExportDescriptor + ); + if (EFI_ERROR (Status)) { + continue; + } + // A PRM Module Export Descriptor was successfully found, this is co= nsidered a PRM Module. + + // + // Create a new PRM Module image context node + // + PrmModuleImageContextListEntry =3D CreateNewPrmModuleImageContextLis= tEntry (); + if (PrmModuleImageContextListEntry =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + CopyMem ( + PrmModuleImageContextListEntry->Context, + &TempPrmModuleImageContext, + sizeof (*(PrmModuleImageContextListEntry->Context)) + ); + InsertTailList (&mPrmModuleList, &PrmModuleImageContextListEntry->Li= nk); + mPrmHandlerCount +=3D TempPrmModuleImageContext.ExportDescriptor->Nu= mberPrmHandlers; + mPrmModuleCount++; // Todo: Match with global variable refactor chan= ge in the future + DEBUG ((DEBUG_INFO, "%a %a: New PRM Module inserted into list to be = processed.\n", _DBGMSGID_, __FUNCTION__)); + } + + return EFI_SUCCESS; +} + +/** + Gets the address of an entry in an image export table by ASCII name. + + @param[in] ExportName A pointer to an ASCII name str= ing of the entry name. + @param[in] ImageBaseAddress The base address of the PE/COF= F image. + @param[in] ImageExportDirectory A pointer to the export direct= ory in the image. + @param[out] ExportPhysicalAddress A pointer that will be updated= with the address of the address of the + export entry if found. + + @retval EFI_SUCCESS The export entry was found suc= cessfully. + @retval EFI_INVALID_PARAMETER A required pointer argument is= NULL. + @retval EFI_NOT_FOUND An entry with the given Export= Name was not found. + +**/ +EFI_STATUS +GetExportEntryAddress ( + IN CONST CHAR8 *ExportName, + IN EFI_PHYSICAL_ADDRESS ImageBaseAddress, + IN EFI_IMAGE_EXPORT_DIRECTORY *ImageExportDirectory, + OUT EFI_PHYSICAL_ADDRESS *ExportPhysicalAddress + ) +{ + UINTN ExportNameIndex; + UINT16 CurrentExportOrdinal; + UINT32 *ExportAddressTable; + UINT32 *ExportNamePointerTable; + UINT16 *OrdinalTable; + CONST CHAR8 *ExportNameTablePointerName; + + if (ExportName =3D=3D NULL || ImageBaseAddress =3D=3D 0 || ImageExport= Directory =3D=3D NULL || ExportPhysicalAddress =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + *ExportPhysicalAddress =3D 0; + + ExportAddressTable =3D (UINT32 *) ((UINTN) ImageBaseAddress + ImageExp= ortDirectory->AddressOfFunctions); + ExportNamePointerTable =3D (UINT32 *) ((UINTN) ImageBaseAddress + Imag= eExportDirectory->AddressOfNames); + OrdinalTable =3D (UINT16 *) ((UINTN) ImageBaseAddress + ImageExportDir= ectory->AddressOfNameOrdinals); + + for (ExportNameIndex =3D 0; ExportNameIndex < ImageExportDirectory->Nu= mberOfNames; ExportNameIndex++) { + ExportNameTablePointerName =3D (CONST CHAR8 *) ((UINTN) ImageBaseAdd= ress + ExportNamePointerTable[ExportNameIndex]); + + if (AsciiStrnCmp (ExportName, ExportNameTablePointerName, PRM_HANDLE= R_NAME_MAXIMUM_LENGTH) =3D=3D 0) { + CurrentExportOrdinal =3D OrdinalTable[ExportNameIndex]; + + ASSERT (CurrentExportOrdinal < ImageExportDirectory->NumberOfFunct= ions); + if (CurrentExportOrdinal >=3D ImageExportDirectory->NumberOfFuncti= ons) { + DEBUG ((DEBUG_ERROR, " %a %a: The export ordinal value is inval= id.\n", _DBGMSGID_, __FUNCTION__)); + break; + } + + *ExportPhysicalAddress =3D (EFI_PHYSICAL_ADDRESS) ((UINTN) ImageBa= seAddress + ExportAddressTable[CurrentExportOrdinal]); + return EFI_SUCCESS; + } + } + + return EFI_NOT_FOUND; +} + +/** + Processes a list of PRM context entries to build a PRM ACPI table. + + The ACPI table buffer is allocated and the table structure is built in= side this function. + + @param[out] PrmAcpiDescriptionTable A pointer to a pointer to a bu= ffer that is allocated within this function + and will contain the PRM ACPI = table. In case of an error in this function, + *PrmAcpiDescriptorTable will b= e NULL. + + @retval EFI_SUCCESS All PRM Modules were processed= to construct the PRM ACPI table successfully. + @retval EFI_INVALID_PARAMETER THe parameter PrmAcpiDescripti= onTable is NULL. + @retval EFI_OUT_OF_RESOURCES Insufficient memory resources = to allocate the PRM ACPI table boot services + memory data buffer. + +**/ +EFI_STATUS +ProcessPrmModules ( + OUT PRM_ACPI_DESCRIPTION_TABLE **PrmAcpiDescriptionTable + ) +{ + EFI_IMAGE_EXPORT_DIRECTORY *CurrentImageExportDirectory; + PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT *CurrentExportDescriptorStruct= ; + LIST_ENTRY *Link; + PRM_ACPI_DESCRIPTION_TABLE *PrmAcpiTable; + PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY *TempListEntry; + CONST CHAR8 *CurrentExportDescriptorHandle= rName; + + PRM_CONTEXT_BUFFER *CurrentContextBuffer; + PRM_MODULE_CONTEXT_BUFFERS *CurrentModuleContextBuffers; + PRM_MODULE_INFORMATION_STRUCT *CurrentModuleInfoStruct; + PRM_HANDLER_INFORMATION_STRUCT *CurrentHandlerInfoStruct; + + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS CurrentImageAddress; + UINTN HandlerIndex; + UINT32 PrmAcpiDescriptionTableBufferS= ize; + + UINT64 HandlerPhysicalAddress; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + if (PrmAcpiDescriptionTable =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + Link =3D NULL; + *PrmAcpiDescriptionTable =3D NULL; + + DEBUG ((DEBUG_INFO, " %a %a: %d total PRM modules to process.\n", _DB= GMSGID_, __FUNCTION__, mPrmModuleCount)); + DEBUG ((DEBUG_INFO, " %a %a: %d total PRM handlers to process.\n", _D= BGMSGID_, __FUNCTION__, mPrmHandlerCount)); + + PrmAcpiDescriptionTableBufferSize =3D (OFFSET_OF (PRM_ACPI_DESCRIPTION= _TABLE, PrmModuleInfoStructure) + + (OFFSET_OF (PRM_MODULE_INFORMATI= ON_STRUCT, HandlerInfoStructure) * mPrmModuleCount) + + (sizeof (PRM_HANDLER_INFORMATION= _STRUCT) * mPrmHandlerCount) + ); + DEBUG ((DEBUG_INFO, " %a %a: Total PRM ACPI table size: 0x%x.\n", _DB= GMSGID_, __FUNCTION__, PrmAcpiDescriptionTableBufferSize)); + + PrmAcpiTable =3D AllocateZeroPool ((UINTN) PrmAcpiDescriptionTableBuff= erSize); + if (PrmAcpiTable =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + PrmAcpiTable->Header.Signature =3D PRM_TABLE_SIGNATURE; + PrmAcpiTable->Header.Length =3D PrmAcpiDescriptionTableBuffe= rSize; + PrmAcpiTable->Header.Revision =3D PRM_TABLE_REVISION; + PrmAcpiTable->Header.Checksum =3D 0x0; + CopyMem (&PrmAcpiTable->Header.OemId, PcdGetPtr (PcdAcpiDefaultOemId),= sizeof (PrmAcpiTable->Header.OemId)); + PrmAcpiTable->Header.OemTableId =3D PcdGet64 (PcdAcpiDefaultOemT= ableId); + PrmAcpiTable->Header.OemRevision =3D PcdGet32 (PcdAcpiDefaultOemR= evision); + PrmAcpiTable->Header.CreatorId =3D PcdGet32 (PcdAcpiDefaultCrea= torId); + PrmAcpiTable->Header.CreatorRevision =3D PcdGet32 (PcdAcpiDefaultCrea= torRevision); + PrmAcpiTable->PrmModuleInfoOffset =3D OFFSET_OF (PRM_ACPI_DESCRIPT= ION_TABLE, PrmModuleInfoStructure); + PrmAcpiTable->PrmModuleInfoCount =3D mPrmModuleCount; + + // + // Iterate across all PRM Modules on the list + // + CurrentModuleInfoStruct =3D &PrmAcpiTable->PrmModuleInfoStructure[0]; + EFI_LIST_FOR_EACH(Link, &mPrmModuleList) + { + TempListEntry =3D CR(Link, PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY, Link= , PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY_SIGNATURE); + CurrentImageAddress =3D TempListEntry->Context->PeCoffImageContext.I= mageAddress; + CurrentImageExportDirectory =3D TempListEntry->Context->ExportDirect= ory; + CurrentExportDescriptorStruct =3D TempListEntry->Context->ExportDesc= riptor; + + DEBUG (( + DEBUG_INFO, + " %a %a: PRM Module - %a with %d handlers.\n", + _DBGMSGID_, + __FUNCTION__, + (CHAR8 *) ((UINTN) CurrentImageAddress + CurrentImageExportDirecto= ry->Name), + CurrentExportDescriptorStruct->NumberPrmHandlers + )); + + CurrentModuleInfoStruct->StructureRevision =3D PRM_MODULE_INFORMATIO= N_STRUCT_REVISION; + CurrentModuleInfoStruct->StructureLength =3D ( + OFFSET_OF (PRM_MODULE_INFOR= MATION_STRUCT, HandlerInfoStructure) + + (CurrentExportDescriptorStr= uct->NumberPrmHandlers * sizeof (PRM_HANDLER_INFORMATION_STRUCT)) + ); + CopyGuid (&CurrentModuleInfoStruct->Identifier, &CurrentExportDescri= ptorStruct->ModuleGuid); + CurrentModuleInfoStruct->HandlerCount =3D (UINT32) CurrentExpo= rtDescriptorStruct->NumberPrmHandlers; + CurrentModuleInfoStruct->HandlerInfoOffset =3D OFFSET_OF (PRM_MODUL= E_INFORMATION_STRUCT, HandlerInfoStructure); + + CurrentModuleInfoStruct->MajorRevision =3D 0; + CurrentModuleInfoStruct->MinorRevision =3D 0; + Status =3D GetImageVersionInPeCoffImage ( + (VOID *) (UINTN) CurrentImageAddress, + &TempListEntry->Context->PeCoffImageContext, + &CurrentModuleInfoStruct->MajorRevision, + &CurrentModuleInfoStruct->MinorRevision + ); + ASSERT_EFI_ERROR (Status); + + Status =3D GetExportEntryAddress ( + PRM_STRING (PRM_MODULE_UPDATE_LOCK_DESCRIPTOR_NAME), + CurrentImageAddress, + CurrentImageExportDirectory, + (EFI_PHYSICAL_ADDRESS *) &(CurrentModuleInfoStruct->Modu= leUpdateLock) + ); + ASSERT_EFI_ERROR (Status); + if (!EFI_ERROR (Status)) { + DEBUG (( + DEBUG_INFO, + " %a %a: Found PRM module update lock physical address at 0x%= 016x.\n", + _DBGMSGID_, + __FUNCTION__, + CurrentModuleInfoStruct->ModuleUpdateLock + )); + } + + // It is currently valid for a PRM module not to use a context buffe= r + Status =3D GetModuleContextBuffers ( + ByModuleGuid, + &CurrentModuleInfoStruct->Identifier, + &CurrentModuleContextBuffers + ); + ASSERT (!EFI_ERROR (Status) || Status =3D=3D EFI_NOT_FOUND); + if (!EFI_ERROR (Status) && CurrentModuleContextBuffers !=3D NULL) { + CurrentModuleInfoStruct->RuntimeMmioRanges =3D (UINT64) (UINTN) Cu= rrentModuleContextBuffers->RuntimeMmioRanges; + } + + // + // Iterate across all PRM handlers in the PRM Module + // + for (HandlerIndex =3D 0; HandlerIndex < CurrentExportDescriptorStruc= t->NumberPrmHandlers; HandlerIndex++) { + CurrentHandlerInfoStruct =3D &(CurrentModuleInfoStruct->HandlerInf= oStructure[HandlerIndex]); + + CurrentHandlerInfoStruct->StructureRevision =3D PRM_HANDLER_INFORM= ATION_STRUCT_REVISION; + CurrentHandlerInfoStruct->StructureLength =3D sizeof (PRM_HANDLER_= INFORMATION_STRUCT); + CopyGuid ( + &CurrentHandlerInfoStruct->Identifier, + &CurrentExportDescriptorStruct->PrmHandlerExportDescriptors[Hand= lerIndex].PrmHandlerGuid + ); + + CurrentExportDescriptorHandlerName =3D (CONST CHAR8 *) CurrentExpo= rtDescriptorStruct->PrmHandlerExportDescriptors[HandlerIndex].PrmHandlerN= ame; + + Status =3D GetContextBuffer ( + &CurrentHandlerInfoStruct->Identifier, + CurrentModuleContextBuffers, + &CurrentContextBuffer + ); + if (!EFI_ERROR (Status)) { + CurrentHandlerInfoStruct->PrmContextBuffer =3D (UINT64) CurrentC= ontextBuffer; + } + + Status =3D GetExportEntryAddress ( + CurrentExportDescriptorHandlerName, + CurrentImageAddress, + CurrentImageExportDirectory, + &HandlerPhysicalAddress + ); + ASSERT_EFI_ERROR (Status); + if (!EFI_ERROR (Status)) { + CurrentHandlerInfoStruct->PhysicalAddress =3D HandlerPhysicalAdd= ress; + DEBUG (( + DEBUG_INFO, + " %a %a: Found %a handler physical address at 0x%016x.\n", + _DBGMSGID_, + __FUNCTION__, + CurrentExportDescriptorHandlerName, + CurrentHandlerInfoStruct->PhysicalAddress + )); + } + } + CurrentModuleInfoStruct =3D (PRM_MODULE_INFORMATION_STRUCT *) ((UINT= N) CurrentModuleInfoStruct + CurrentModuleInfoStruct->StructureLength); + } + *PrmAcpiDescriptionTable =3D PrmAcpiTable; + + return EFI_SUCCESS; +} + +/** + Publishes the PRM ACPI table (PRMT). + + @param[in] PrmAcpiDescriptionTable A pointer to a buffer with a c= ompletely populated and valid PRM + ACPI description table. + + @retval EFI_SUCCESS The PRM ACPI was installed suc= cessfully. + @retval EFI_INVALID_PARAMETER THe parameter PrmAcpiDescripti= onTable is NULL or the table signature + in the table provided is inval= id. + @retval EFI_NOT_FOUND The protocol gEfiAcpiTableProt= ocolGuid could not be found. + @retval EFI_OUT_OF_RESOURCES Insufficient memory resources = to allocate the PRM ACPI table buffer. + +**/ +EFI_STATUS +PublishPrmAcpiTable ( + IN PRM_ACPI_DESCRIPTION_TABLE *PrmAcpiDescriptionTable + ) +{ + EFI_STATUS Status; + EFI_ACPI_TABLE_PROTOCOL *AcpiTableProtocol; + UINTN TableKey; + + if (PrmAcpiDescriptionTable =3D=3D NULL || PrmAcpiDescriptionTable->He= ader.Signature !=3D PRM_TABLE_SIGNATURE) { + return EFI_INVALID_PARAMETER; + } + + Status =3D gBS->LocateProtocol (&gEfiAcpiTableProtocolGuid, NULL, (VOI= D **) &AcpiTableProtocol); + if (!EFI_ERROR (Status)) { + TableKey =3D 0; + // + // Publish the PRM ACPI table. The table checksum will be computed d= uring installation. + // + Status =3D AcpiTableProtocol->InstallAcpiTable ( + AcpiTableProtocol, + PrmAcpiDescriptionTable, + PrmAcpiDescriptionTable->Header.Length= , + &TableKey + ); + if (!EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "%a %a: The PRMT ACPI table was installed succ= essfully.\n", _DBGMSGID_, __FUNCTION__)); + } + } + ASSERT_EFI_ERROR (Status); + + return Status; +} + +/** + The PRM Loader END_OF_DXE protocol notification event handler. + + All PRM Modules that are eligible for dispatch should have been loaded= the DXE Dispatcher at the + time of this function invocation. + + The main responsibilities of the PRM Loader are executed from this fun= ction which include 3 phases: + 1.) Disover PRM Modules - Find all PRM modules loaded during DXE dis= patch and insert a PRM Module + Context entry into a linked list to be handed off to phase 2. + 2.) Process PRM Modules - Build a GUID to PRM handler mapping for ea= ch module that is described in the + PRM ACPI table so the OS can resolve a PRM Handler GUID to the c= orresponding PRM Handler physical address. + 3.) Publish PRM ACPI Table - Publish the PRM ACPI table with the inf= ormation gathered in the phase 2. + + @param[in] Event Event whose notification funct= ion is being invoked. + @param[in] Context The pointer to the notificatio= n function's context, + which is implementation-depend= ent. + + @retval EFI_SUCCESS The function executed successf= ully + +**/ +EFI_STATUS +EFIAPI +PrmLoaderEndOfDxeNotification ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + EFI_STATUS Status; + PRM_ACPI_DESCRIPTION_TABLE *PrmAcpiDescriptionTable; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + InitializeListHead (&mPrmModuleList); + + Status =3D DiscoverPrmModules (); + ASSERT_EFI_ERROR (Status); + + Status =3D ProcessPrmModules (&PrmAcpiDescriptionTable); + ASSERT_EFI_ERROR (Status); + + Status =3D PublishPrmAcpiTable (PrmAcpiDescriptionTable); + ASSERT_EFI_ERROR (Status); + + if (PrmAcpiDescriptionTable !=3D NULL) { + FreePool (PrmAcpiDescriptionTable); + } + gBS->CloseEvent (Event); + + return EFI_SUCCESS; +} + +/** + The entry point for this module. + + @param ImageHandle The firmware allocated handle for the EFI image= . + @param SystemTable A pointer to the EFI System Table. + + @retval EFI_SUCCESS The entry point is executed successfully. + @retval Others An error occurred when executing this entry poi= nt. + +**/ +EFI_STATUS +EFIAPI +PrmLoaderEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + EFI_EVENT EndOfDxeEvent; + + DEBUG ((DEBUG_INFO, "%a %a - Entry.\n", _DBGMSGID_, __FUNCTION__)); + + // + // Discover and process installed PRM modules at the End of DXE + // The PRM ACPI table is published if one or PRM modules are discovere= d + // + Status =3D gBS->CreateEventEx( + EVT_NOTIFY_SIGNAL, + TPL_CALLBACK, + PrmLoaderEndOfDxeNotification, + NULL, + &gEfiEndOfDxeEventGroupGuid, + &EndOfDxeEvent + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a %a: EndOfDxe callback registration failed! = %r.\n", _DBGMSGID_, __FUNCTION__, Status)); + ASSERT_EFI_ERROR (Status); + } + + return EFI_SUCCESS; +} diff --git a/PrmPkg/PrmConfigDxe/PrmConfigDxe.inf b/PrmPkg/PrmConfigDxe/P= rmConfigDxe.inf new file mode 100644 index 000000000000..88613c146a0b --- /dev/null +++ b/PrmPkg/PrmConfigDxe/PrmConfigDxe.inf @@ -0,0 +1,48 @@ +## @file +# PRM Configuration Driver +# +# This driver configures PRM Module settings during the boot services e= nvironment. +# +# Copyright (c) Microsoft Corporation +# Copyright (c) 2020, Intel Corporation. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D PrmConfigDxe + FILE_GUID =3D 18D93D57-0B00-4213-B0A2-A2FF5EC214E4 + MODULE_TYPE =3D DXE_RUNTIME_DRIVER + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D PrmConfigEntryPoint + +[Sources] + PrmConfigDxe.c + +[Packages] + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + PrmPkg/PrmPkg.dec + +[Guids] + gEfiEndOfDxeEventGroupGuid + gEfiEventVirtualAddressChangeGuid + +[LibraryClasses] + BaseLib + BaseMemoryLib + DebugLib + DxeServicesTableLib + MemoryAllocationLib + UefiBootServicesTableLib + UefiDriverEntryPoint + UefiRuntimeServicesTableLib + UefiLib + +[Protocols] + gPrmConfigProtocolGuid + +[Depex] + TRUE diff --git a/PrmPkg/PrmLoaderDxe/PrmAcpiTable.h b/PrmPkg/PrmLoaderDxe/Prm= AcpiTable.h new file mode 100644 index 000000000000..6b9099ca7ba7 --- /dev/null +++ b/PrmPkg/PrmLoaderDxe/PrmAcpiTable.h @@ -0,0 +1,97 @@ +/** @file + + Definition for the Platform Runtime Mechanism (PRM) ACPI table (PRMT). + + Copyright (c) 2020, Intel Corporation. All rights reserved.
+ Copyright (c) Microsoft Corporation + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef PRMT_ACPI_TABLE_H_ +#define PRMT_ACPI_TABLE_H_ + +#include +#include + +#define PRM_TABLE_SIGNATURE SIGNATURE_32 ('P', 'R'= , 'M', 'T') + +#define PRM_TABLE_REVISION 0x0 +#define PRM_MODULE_INFORMATION_STRUCT_REVISION 0x00 +#define PRM_HANDLER_INFORMATION_STRUCT_REVISION 0x00 + +#pragma pack(push, 1) + +// +// Platform Runtime Mechanism (PRM) ACPI Table (PRMT) structures +// +typedef struct { + UINT16 StructureRevision; ///< R= evision of this structure + UINT16 StructureLength; ///< L= ength in bytes of this structure + GUID Identifier; ///< G= UID of the PRM handler for this structure + UINT64 PhysicalAddress; ///< P= hysical address of this PRM handler + UINT64 PrmContextBuffer; ///< P= hysical address of the context buffer for this + ///< P= RM handler (PRM_CONTEXT_BUFFER *) + UINT64 StaticDataBuffer; ///< P= hysical address of the static data buffer for + ///< t= his PRM handler (PRM_DATA_BUFFER *) + UINT64 AcpiParameterBuffer; ///< P= hysical address of the parameter buffer + ///< f= or this PRM handler (PRM_DATA_BUFFER *) + ///< t= hat is only used in the case of _DSM invocation. + ///< I= f _DSM invocation is not used, this value is + ///< i= gnored. +} PRM_HANDLER_INFORMATION_STRUCT; + +typedef struct { + UINT16 StructureRevision; ///< R= evision of this structure + UINT16 StructureLength; ///< L= ength in bytes of this structure including the + ///< v= ariable length PRM Handler Info array + GUID Identifier; ///< G= UID of the PRM module for this structure + UINT16 MajorRevision; ///< P= RM module major revision + UINT16 MinorRevision; ///< P= RM module minor revision + UINT16 HandlerCount; ///< N= umber of entries in the Handler Info array + UINT32 HandlerInfoOffset; ///< O= ffset in bytes from the beginning of this + ///< s= tructure to the Handler Info array + UINT64 ModuleUpdateLock; ///< P= hysical address of the PRM Module Update Lock + ///< d= escriptor (PRM_MODULE_UPDATE_LOCK_DESCRIPTOR *) + UINT64 RuntimeMmioRanges; ///< P= hysical address of the PRM MMIO Ranges + ///< s= tructure (PRM_MODULE_RUNTIME_MMIO_RANGES *) + PRM_HANDLER_INFORMATION_STRUCT HandlerInfoStructure[1]; +} PRM_MODULE_INFORMATION_STRUCT; + +typedef struct { + EFI_ACPI_DESCRIPTION_HEADER Header; ///< S= tandard ACPI description header + UINT32 PrmModuleInfoOffset; ///< O= ffset in bytes from the beginning of this + ///< s= tructure to the PRM Module Info array + UINT32 PrmModuleInfoCount; ///< N= umber of entries in the PRM Module Info array + PRM_MODULE_INFORMATION_STRUCT PrmModuleInfoStructure[1]; +} PRM_ACPI_DESCRIPTION_TABLE; + +#pragma pack(pop) + +// +// Helper macros to build PRM Information structures +// +// Todo: Revisit whether to use; currently both macros are not used +// +#define PRM_MODULE_INFORMATION_STRUCTURE(ModuleGuid, ModuleRevision, Han= dlerCount, PrmHanderInfoStructureArray) { \ + { = \ + PRM_MODULE_INFORMATION_STRUCT_REVISION, = /* UINT16 StructureRevision; */ \ + (OFFSET_OF (PRM_MODULE_INFORMATION_STRUCT, HandlerInfoStructure) += (HandlerCount * sizeof (PRM_HANDLER_INFORMATION_STRUCT))) /* UINT16 = StructureLength; */ \ + ModuleGuid, = /* GUID ModuleGuid; */ \ + ModuleRevision, = /* UINT16 ModuleRevision */ \ + HandlerCount, = /* UINT16 HandlerCount */ \ + OFFSET_OF (PRM_MODULE_INFORMATION_STRUCT, HandlerInfoOffset), = /* UINT32 HandlerInfoOffset */ \ + PrmHanderInfoStructureArray = /* PRM_HANDLER_INFORMATION_STRUCT HandlerInfoStructure */ \ + } \ + } + +#define PRM_HANDLER_INFORMATION_STRUCTURE(HandlerGuid, PhysicalAddress) = { \ + { = \ + PRM_HANDLER_INFORMATION_STRUCT_REVISION, = /* UINT16 StructureRevision; */ \ + sizeof (PRM_HANDLER_INFORMATION_STRUCT), = /* UINT16 StructureLength; */ \ + HandlerGuid, = /* GUID HandlerGuid; */ \ + PhysicalAddress, = /* UINT64 PhysicalAddress */ \ + } \ + } + +#endif // _PRMT_ACPI_TABLE_H_ diff --git a/PrmPkg/PrmLoaderDxe/PrmLoader.h b/PrmPkg/PrmLoaderDxe/PrmLoa= der.h new file mode 100644 index 000000000000..1356c7a0c923 --- /dev/null +++ b/PrmPkg/PrmLoaderDxe/PrmLoader.h @@ -0,0 +1,51 @@ +/** @file + + Definitions specific to the Platform Runtime Mechanism (PRM) loader.x + + Copyright (c) Microsoft Corporation + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef PRM_LOADER_H_ +#define PRM_LOADER_H_ + +#include +#include + +#include + +#define _DBGMSGID_ "[PRMLOADER]" +#define PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY_SIGNATURE SIGNATURE_32('P','= R','M','E') + +#pragma pack(push, 1) + +typedef struct { + PE_COFF_LOADER_IMAGE_CONTEXT PeCoffImageContext; + EFI_IMAGE_EXPORT_DIRECTORY *ExportDirectory; + PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT *ExportDescriptor; +} PRM_MODULE_IMAGE_CONTEXT; + +typedef struct { + UINTN Signature; + LIST_ENTRY Link; + PRM_MODULE_IMAGE_CONTEXT *Context; +} PRM_MODULE_IMAGE_CONTEXT_LIST_ENTRY; + +#pragma pack(pop) + +// +// Iterate through the double linked list. NOT delete safe. +// +#define EFI_LIST_FOR_EACH(Entry, ListHead) \ + for(Entry =3D (ListHead)->ForwardLink; Entry !=3D (ListHead); Entry =3D= Entry->ForwardLink) + +// +// Iterate through the double linked list. This is delete-safe. +// Don't touch NextEntry. +// +#define EFI_LIST_FOR_EACH_SAFE(Entry, NextEntry, ListHead) \ + for(Entry =3D (ListHead)->ForwardLink, NextEntry =3D Entry->ForwardLin= k;\ + Entry !=3D (ListHead); Entry =3D NextEntry, NextEntry =3D Entry->F= orwardLin + +#endif diff --git a/PrmPkg/PrmLoaderDxe/PrmLoaderDxe.inf b/PrmPkg/PrmLoaderDxe/P= rmLoaderDxe.inf new file mode 100644 index 000000000000..643e1a7989f2 --- /dev/null +++ b/PrmPkg/PrmLoaderDxe/PrmLoaderDxe.inf @@ -0,0 +1,59 @@ +## @file +# PRM Loader Driver +# +# This driver discovers PRM Modules loaded in memory and places those m= odules and the +# PRM handlers within those modules into a PRMT ACPI table such that th= e handlers are +# made available for invocation in the OS. +# +# Copyright (c) Microsoft Corporation +# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D PrmLoaderDxe + FILE_GUID =3D 226A500A-E14F-414A-A956-40E5762D3D1= E + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D PrmLoaderEntryPoint + +[Sources] + PrmAcpiTable.h + PrmLoader.h + PrmLoaderDxe.c + +[Packages] + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + PrmPkg/PrmPkg.dec + +[Guids] + gEfiEndOfDxeEventGroupGuid + +[LibraryClasses] + BaseLib + BaseMemoryLib + DebugLib + MemoryAllocationLib + PeCoffLib + PrmContextBufferLib + UefiBootServicesTableLib + UefiDriverEntryPoint + UefiLib + +[Pcd] + gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemId ## CONSU= MES + gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemTableId ## CONSU= MES + gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemRevision ## CONSU= MES + gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultCreatorId ## CONSU= MES + gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultCreatorRevision ## CONSU= MES + +[Protocols] + gEfiAcpiTableProtocolGuid + gEfiLoadedImageProtocolGuid + gPrmConfigProtocolGuid + +[Depex] + TRUE --=20 2.28.0.windows.1