From: "Stuart Yoder" <stuart.yoder@arm.com>
To: devel@edk2.groups.io, sam.kaynor@arm.com
Cc: Ray Ni <ray.ni@intel.com>, Zhichao Gao <zhichao.gao@intel.com>
Subject: Re: [edk2-devel] [PATCH v4 2/3] ShellPkg: UefiShellDebug1CommandsLib: Image Execution Table in Dmem.c
Date: Thu, 4 Apr 2024 16:26:51 -0500 [thread overview]
Message-ID: <8c9f415a-1e9b-4661-80d3-6ac468a52f66@arm.com> (raw)
In-Reply-To: <20240403211933.1662236-3-Sam.Kaynor@arm.com>
Reviewed-by: Stuart Yoder <stuart.yoder@arm.com>
On 4/3/24 4:19 PM, Sam Kaynor via groups.io wrote:
> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4352
>
> Implemented dumping of the Image Execution Table using Dmem.c
>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Zhichao Gao <zhichao.gao@intel.com>
> Signed-off-by: Sam Kaynor <Sam.Kaynor@arm.com>
> ---
>
> Notes:
> v4:
> - changed Image Execution output to match spec
> v3:
> - fixed build erros
> - added setwidth formatting to output
> - properly using Address variable
>
> ShellPkg/Library/UefiShellDebug1CommandsLib/Dmem.c | 134 ++++++++++++++++++++
> ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.uni | 3 +
> 2 files changed, 137 insertions(+)
>
> diff --git a/ShellPkg/Library/UefiShellDebug1CommandsLib/Dmem.c b/ShellPkg/Library/UefiShellDebug1CommandsLib/Dmem.c
> index 52a0630f1cdc..813759a9055d 100644
> --- a/ShellPkg/Library/UefiShellDebug1CommandsLib/Dmem.c
> +++ b/ShellPkg/Library/UefiShellDebug1CommandsLib/Dmem.c
> @@ -139,6 +139,137 @@ DisplayRtProperties (
> return (ShellStatus);
> }
>
> +/**
> + Retrieve the ImageExecutionTable Entry ImageName from Device Path
> +
> + @param[in] Address The pointer to the ImageExecutionTable.
> +**/
> +EFI_STATUS
> +GetBaseName (
> + IN CHAR16 *FileName,
> + OUT CHAR16 **BaseName
> + )
> +{
> + UINT32 StrLen;
> + CHAR16 *StrTail;
> +
> + StrLen = StrSize(FileName);
> +
> + for (StrTail = FileName + StrLen - 1; StrTail != FileName && *StrTail != L'\\'; StrTail--) {
> + }
> +
> + if (StrTail == FileName) {
> + return EFI_NOT_FOUND;
> + }
> + *BaseName = StrTail+1;
> +
> + return EFI_SUCCESS;
> +}
> +
> +/**
> + Retrieve the ImageExecutionTable entries
> +
> + @param[in] Address The pointer to the ImageExecutionTable.
> +**/
> +EFI_STATUS
> +GetImageExecutionInfo (
> + IN UINT64 Address
> + )
> +{
> + EFI_STATUS Status;
> + EFI_IMAGE_EXECUTION_INFO_TABLE *ExecInfoTablePtr;
> + EFI_IMAGE_EXECUTION_INFO *InfoPtr;
> + VOID *ptr;
> + CHAR16 *ImagePath;
> + CHAR16 *ImageName;
> + UINTN *NumberOfImages;
> + CHAR16 *ActionType;
> +
> + ExecInfoTablePtr = (EFI_IMAGE_EXECUTION_INFO_TABLE *)Address;
> +
> + NumberOfImages = &ExecInfoTablePtr->NumberOfImages;
> +
> + ptr = (VOID *)(ExecInfoTablePtr + 1);
> +
> + for (int Image = 0; Image < *NumberOfImages; Image++, ptr += InfoPtr->InfoSize) {
> + InfoPtr = ptr;
> + ImagePath = (CHAR16*)(InfoPtr + 1);
> +
> + GetBaseName(ImagePath,&ImageName);
> +
> + switch(InfoPtr->Action) {
> + case EFI_IMAGE_EXECUTION_AUTHENTICATION:
> + ActionType = L"AUTHENTICATION";
> + break;
> + case EFI_IMAGE_EXECUTION_AUTH_UNTESTED:
> + ActionType = L"AUTH_UNTESTED";
> + break;
> + case EFI_IMAGE_EXECUTION_AUTH_SIG_FAILED:
> + ActionType = L"AUTH_SIG_FAILED";
> + break;
> + case EFI_IMAGE_EXECUTION_AUTH_SIG_PASSED:
> + ActionType = L"AUTH_SIG_PASSED";
> + break;
> + case EFI_IMAGE_EXECUTION_AUTH_SIG_NOT_FOUND:
> + ActionType = L"AUTH_SIG_NOT_FOUND";
> + break;
> + case EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND:
> + ActionType = L"AUTH_SIG_FOUND";
> + break;
> + case EFI_IMAGE_EXECUTION_POLICY_FAILED:
> + ActionType = L"POLICY_FAILED";
> + break;
> + case EFI_IMAGE_EXECUTION_INITIALIZED:
> + ActionType = L"INITIALIZED";
> + break;
> + default:
> + ActionType = L"invalid action";
> + }
> +
> + Status = ShellPrintHiiEx(
> + -1,
> + -1,
> + NULL,
> + STRING_TOKEN (STR_DMEM_IMG_EXE_ENTRY),
> + gShellDebug1HiiHandle,
> + ImageName,
> + ActionType
> + );
> + }
> +
> + return Status;
> +}
> +
> +/**
> + Display the ImageExecutionTable entries
> +
> + @param[in] Address The pointer to the ImageExecutionTable.
> +**/
> +SHELL_STATUS
> +DisplayImageExecutionEntries (
> + IN UINT64 Address
> + )
> +{
> + SHELL_STATUS ShellStatus;
> + EFI_STATUS Status;
> +
> + ShellStatus = SHELL_SUCCESS;
> +
> + if (Address != 0) {
> + ShellPrintHiiEx (-1, -1, NULL, STRING_TOKEN (STR_DMEM_IMG_EXE_TABLE), gShellDebug1HiiHandle);
> + Status = GetImageExecutionInfo(Address);
> + if (EFI_ERROR (Status)) {
> + ShellStatus = SHELL_ABORTED;
> + ShellPrintHiiEx (-1, -1, NULL, STRING_TOKEN (STR_DMEM_ERR_GET_FAIL), gShellDebug1HiiHandle, L"ImageExecutionTable");
> + }
> + } else {
> + ShellPrintHiiEx (-1, -1, NULL, STRING_TOKEN (STR_DMEM_ERR_NOT_FOUND), gShellDebug1HiiHandle, L"ImageExecutionTable");
> + }
> + return (ShellStatus);
> +}
> +
> +
> +
> STATIC CONST SHELL_PARAM_ITEM ParamList[] = {
> { L"-mmio", TypeFlag },
> { L"-verbose", TypeFlag },
> @@ -369,6 +500,9 @@ ShellCommandRunDmem (
> if (ShellStatus == SHELL_SUCCESS) {
> ShellStatus = DisplayRtProperties (RtPropertiesTableAddress);
> }
> + if (ShellStatus == SHELL_SUCCESS) {
> + ShellStatus = DisplayImageExecutionEntries (ImageExecutionTableAddress);
> + }
> }
>
> } else {
> diff --git a/ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.uni b/ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.uni
> index a2241614f109..3b730164ddce 100644
> --- a/ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.uni
> +++ b/ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.uni
> @@ -144,6 +144,9 @@
> " UPDATE_CAPSULE %d\r\n"
> " QUERY_CAPSULE_CAPABILITIES %d\r\n"
> " QUERY_VARIABLE_INFO %d\r\n"
> +#string STR_DMEM_IMG_EXE_TABLE #language en-US "\r\nImage Execution Table\r\n"
> + "----------------------------------------\r\n"
> +#string STR_DMEM_IMG_EXE_ENTRY #language en-US "%20s: %s\r\n"
> #string STR_DMEM_ERR_NOT_FOUND #language en-US "\r\n%H%s%N: Table address not found.\r\n"
> #string STR_DMEM_ERR_GET_FAIL #language en-US "\r\n%H%s%N: Unable to get table information.\r\n"
>
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#117445): https://edk2.groups.io/g/devel/message/117445
Mute This Topic: https://groups.io/mt/105318208/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-
next prev parent reply other threads:[~2024-04-04 21:26 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-03 21:19 [edk2-devel] [PATCH v4 0/3] Adding support for verbose UEFI Table dumping to Dmem.c Sam Kaynor
2024-04-03 21:19 ` [edk2-devel] [PATCH v4 1/3] ShellPkg: UefiShellDebug1CommandsLib: Dumping RT Properties in Dmem.c Sam Kaynor
2024-04-04 21:26 ` Stuart Yoder
2024-04-04 21:31 ` Stuart Yoder
2024-04-03 21:19 ` [edk2-devel] [PATCH v4 2/3] ShellPkg: UefiShellDebug1CommandsLib: Image Execution Table " Sam Kaynor
2024-04-04 21:26 ` Stuart Yoder [this message]
2024-04-04 21:32 ` Stuart Yoder
2024-04-03 21:19 ` [edk2-devel] [PATCH v4 3/3] ShellPkg: UefiShellDebug1CommandsLib: Conformance Profiles " Sam Kaynor
2024-04-04 21:27 ` Stuart Yoder
2024-04-04 21:35 ` Stuart Yoder
2024-04-09 8:00 ` [edk2-devel] [PATCH v4 0/3] Adding support for verbose UEFI Table dumping to Dmem.c Gao, Zhichao
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=8c9f415a-1e9b-4661-80d3-6ac468a52f66@arm.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox