From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web10.10459.1683701396713520792 for ; Tue, 09 May 2023 23:49:57 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=EGfb4j+R; spf=pass (domain: intel.com, ip: 134.134.136.31, mailfrom: james.lu@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683701396; x=1715237396; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=cbc2Hh44Dhjt8q+kUdaxbXLbs1IhZ1WbzvDWKEIF7hA=; b=EGfb4j+R8+EnSIKa4rjKSPonU0VMTeZ3YvYYyHF1D8AJIgQMpxHi2d56 KORbY1yJGrPuvBenfGsoCD62g+Zsgo+2RRt6o3L0BKYPg9f5pLiwjbStM EqIwmHRmn9XiCogLtQNUxWOsFj5WoqTOlyoe5DVclv19XRelRCd2frPlp dtyI4YK/Ji5H5xwtmX8iP0vyYJIYIoFLAnZ8R4ySx84xtPEEdt5QFwTCT EAFZhCkIw617OIrKpXiZzMrOaDqTkJer/O1XdiFgMePmblqnWnDFboB1F +1oz+Rg6QEXuRN9d/ndykZex9Ufl1nn0sjoJY0YFu1ZxP4mH3c2k7nmB2 A==; X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="413433892" X-IronPort-AV: E=Sophos;i="5.99,263,1677571200"; d="scan'208";a="413433892" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2023 23:49:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="843400384" X-IronPort-AV: E=Sophos;i="5.99,263,1677571200"; d="scan'208";a="843400384" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmsmga001.fm.intel.com with ESMTP; 09 May 2023 23:49:56 -0700 Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 9 May 2023 23:49:55 -0700 Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 9 May 2023 23:49:55 -0700 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Tue, 9 May 2023 23:49:55 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.172) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Tue, 9 May 2023 23:49:55 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h4uKCiVmqqZt7+WIaGkglq04jNtLm5KdYwS/RZcU2tT5pu/VsuTwiLoCDsXNOKFwy7bq5Ddevp6t7Y+l04PnFmzvjY2utnkaggFMUtVL21BUODnbYgx2c30aG1A3B6jnpzlEReBudbb2ntd1/wtMHFA+e54w1Qh1NdNnNVpFF0XufDQqyQSis+8B3UHYjkrXoXUNtWXE7nxgoHBt/mwIo+HD/TOn4Tp1nucY2A6m+YGfixIuS9ZGwNbBIvTaHmQhlVLwc0xoWO7ahD2mliqeiFWhN3L98C61S+yxCAFjWVh5hKPvYsWNHIZDSvBJqh4WKOE0AiIhqHG56q7B3cBvaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ylQy817walw/RCdpiWxvumEwPoTgnE+zEZQyHi/DTZ0=; b=FMh2mZJGk+HhHsylLLnTYAmGnrpj4Jv/olUSJn6YxC0TwCM8Sw+BcUGEOzMHF4+D4LEuCvsOIav1duBUGDcJObmh1dlij4dW7HPaJBuq2PBtCnO1sECL0wo1/iBTiE8INVxTci/kW7RDTYQHQOtS4fduiPn5FCe7h985n5ktn49uiUw/nUiRB/PFSYj4kx/TJbjVh/PsXXvwmN0qs25qjYVICQ9AeZ+7ggMQcnWHH4VLnuprLY69I4PIG68HE5owNEhnqjJIYpvgLOy5QdlElOcNEyQ5YkSG/AboN8LHRtNT66MvfQAAQfkMZVLjdVbUPc1jiM5g0/KNxZ3zLdV0oQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from CH3PR11MB7819.namprd11.prod.outlook.com (2603:10b6:610:125::20) by CH3PR11MB7795.namprd11.prod.outlook.com (2603:10b6:610:120::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6363.33; Wed, 10 May 2023 06:49:53 +0000 Received: from CH3PR11MB7819.namprd11.prod.outlook.com ([fe80::6cff:33a5:d30b:9ddb]) by CH3PR11MB7819.namprd11.prod.outlook.com ([fe80::6cff:33a5:d30b:9ddb%3]) with mapi id 15.20.6363.033; Wed, 10 May 2023 06:49:53 +0000 From: "Lu, James" To: "Dong, Guo" , "devel@edk2.groups.io" CC: "Ni, Ray" , "Rhodes, Sean" , "Guo, Gua" Subject: Re: [edk2-devel][PATCH] UefiPayloadPkg: Fix boot shell issue for universal UEFI payload Thread-Topic: [edk2-devel][PATCH] UefiPayloadPkg: Fix boot shell issue for universal UEFI payload Thread-Index: AQHZgvOyQtwsLghRGkiHFmtYreuYE69TETaw Date: Wed, 10 May 2023 06:49:52 +0000 Message-ID: References: <20230510035817.1023-1-guo.dong@intel.com> In-Reply-To: <20230510035817.1023-1-guo.dong@intel.com> Accept-Language: en-001, en-US, zh-TW X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CH3PR11MB7819:EE_|CH3PR11MB7795:EE_ x-ms-office365-filtering-correlation-id: 4b78b0b6-6b63-4446-7d47-08db5122c1f7 x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH3PR11MB7819.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(376002)(366004)(136003)(396003)(346002)(39860400002)(451199021)(5660300002)(52536014)(8676002)(8936002)(2906002)(83380400001)(186003)(33656002)(38100700002)(82960400001)(122000001)(38070700005)(86362001)(53546011)(55016003)(6506007)(107886003)(66476007)(66946007)(316002)(66446008)(66556008)(64756008)(76116006)(4326008)(71200400001)(26005)(478600001)(54906003)(110136005)(9686003)(7696005)(41300700001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Ld4g63qCEFi2MrMJW2i/p4baZOqGzm8RQqC6od5+rnfxpnEyvy9RbFcn6/cA?= =?us-ascii?Q?t8SAXRTbcL1//xC8Pn83PzH3fh6gWY37udX1wjrhrVI8mnsg2Dg9lCVqOnOw?= =?us-ascii?Q?VJHxP/vvZuZ5jRD6Cdrm35cQZf1hvcQTNVNKmK/Hkk2G3vrUTxQ07Psf5leS?= =?us-ascii?Q?CMehs/m1Nt/vHt8RWTGttyqgwvLr/Pb4R5V/ljqvPexLQxFG0MKy8vZjSzC2?= =?us-ascii?Q?I52ExWnU6vc1RHDXN5WL1sEtQr6dlCKdGLCX0BXohnS0QUu+S94xZmp828rq?= =?us-ascii?Q?IdybstFgRPG4DbTUhNY4ec7XN0fBEytPboVNXtzg3aynTm7xrtfSVtDDApQc?= =?us-ascii?Q?4JZZbJcBsTxihvE8ri3XVNyHI1t/4H0qiBRoZrsAt0HIwn7ReKUKyPV9ZjRm?= =?us-ascii?Q?Fw78PPYkmBFlGuiGr247CDUkBZB/dge0bI+OV42qCod9jmTft2XZvITysymN?= =?us-ascii?Q?IF3Oq6HhrnZOT77usTH5F8BBQWPLPtxx45ny91NaL8SyoS5GiFb1BQX8QRRs?= =?us-ascii?Q?6wQ1YkSG+sVTSF0Xo+tAcw7YowYOlRJKMBPWOm9pVF+wvV2uiJwkSRFvkAuN?= =?us-ascii?Q?ioDI6LguDSiCjZZbW8Kdx01jPfdElf5p+CCU5VVor/yqxr1wJCB9RTSHvdm1?= =?us-ascii?Q?uaK0JtlSkX7jRJsWNqSVJudQKtiOfFi7PGlp6dzkKa5yLCMQGY27KbY+v3+T?= =?us-ascii?Q?VEtFKZxY5+bb61r7Y8IeLp83RhwQWRiHRQy3uV73frWvbJ4pHldCF8n0C1+r?= =?us-ascii?Q?gX4aSEU1Xw6kiSBVAP5hXKbLErYuovQw6apARQU4Mj2J5JCja0DcXeFA3zQs?= =?us-ascii?Q?VtCDGawL/RKW1Eitqfbrmrr20cZ7QuzukHWksI6VIJcBHJS4hR+M0hHLBaI6?= =?us-ascii?Q?6aUa5v4lWKiMW/IKL8WBzGsYBX92IiMVTrHgRT/9zLs2635NWNfZ7Bda2ZQT?= =?us-ascii?Q?ddyp9Nj5UIhvaiGlMlD0kPIaZ6ZDlUbUkhDJv1fSN/0p7YbBQBq/BJSjCxiM?= =?us-ascii?Q?jRYSXx82OjsLTS9j9fKbI4B9sJ4rnaoOWI8t9W4jFVhS5JtGU2iODqDwzlCE?= =?us-ascii?Q?2Rkh58SIBgFT5ldbDUQ901d4zqGv4tVXdetvqF9Xr9fTN8RKMSOEkbqLKwRW?= =?us-ascii?Q?RtKA5dd3BD4cO5eOPL01Bi3CkhWgH0SSSYgIFh9DBS2wFjeHhEd/W5ed5dLy?= =?us-ascii?Q?yOKfgYI+32DNumkU0qOm5lGesj6C7CHWlhka5QncoKw/eHRFQnUKcvzkpqwK?= =?us-ascii?Q?cW1DSJdtSGw+4HMeF0BMklx/ZlnJQthpvPCJO5gHoLRcc91TfeD0xdEiEetp?= =?us-ascii?Q?azDvuD7ogEG7mq6x3jmYl8xnW2nAdCr/Mh5nU0fN5+Q1URUWmNiqcrnRQzmU?= =?us-ascii?Q?HoQ2RUbS3avhzIlYJE1552ixX0Gtt0cPkZd5Os+oRyFfMAegSZgnL3SNRUUn?= =?us-ascii?Q?ZBG3Qa4pnCjLyG+jst5kGr+X9s+w3ibKjhVq6WOjS4RfFhoORaZPRdZ/8KqO?= =?us-ascii?Q?ayuLNNhI6jUHqvifWgJHlOCi1j2NBLZmY5A9h7Q/Dax1Xva8jLP51cp0eUum?= =?us-ascii?Q?ZVEa16/t/ac/H+Bg18k=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH3PR11MB7819.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4b78b0b6-6b63-4446-7d47-08db5122c1f7 X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2023 06:49:52.7754 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Or4NG/UiNcedK48fMUOpVKdHBHjw3i6nnatbCyQ65pBPUTC4n5g4jh1b7F+8lxygCwbcaaL2h6/O9mHFTzfpFw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR11MB7795 Return-Path: james.lu@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: James Lu Thanks, James -----Original Message----- From: Dong, Guo =20 Sent: Wednesday, May 10, 2023 11:58 AM To: devel@edk2.groups.io Cc: Dong, Guo ; Ni, Ray ; Rhodes, Sea= n ; Lu, James ; Guo, Gua Subject: [edk2-devel][PATCH] UefiPayloadPkg: Fix boot shell issue for unive= rsal UEFI payload From: Guo Dong After moving BDS driver to a new FV for universal UEFI payload, the shell b= oot option path is not correct since it used the BDS FV instead of DXE FV i= n its device path. This patch would find the correct FV by reading shell file. It also removed PcdShellFile by using gUefiShellFileGuid. Signed-off-by: Guo Dong Cc: Ray Ni Cc: Sean Rhodes Cc: James Lu Cc: Gua Guo --- UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c |= 76 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-= ----- UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf |= 5 +++-- UefiPayloadPkg/UefiPayloadPkg.dec |= 3 --- 3 files changed, 73 insertions(+), 11 deletions(-) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index 62637ae6aa..cf72783af1 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -2,7 +2,7 @@ This file include all platform action which can be customized by IBV/O= EM. -Copyright (c) 2015 - 2021, Intel Corporation. All rights reserved.
= +Copyright (c) 2015 - 2023, Intel Corporation. All rights reserved.
SPD= X-License-Identifier: BSD-2-Clause-Patent **/@@ -11,6 +11,7 @@ SPDX-Licens= e-Identifier: BSD-2-Clause-Patent #include "PlatformConsole.h" #include #include +#include /** Signal EndOfD= xe event and install SMM Ready to lock protocol.@@ -89,6 +90,72 @@ Platform= FindLoadOption ( return -1; } ++EFI_DEVICE_PATH_PROTOCOL *+BdsGetShellFvDevicePath (+ VO= ID+ )+{+ UINTN FvHandleCount;+ EFI_HANDLE = *FvHandleBuffer;+ UINTN I= ndex;+ EFI_STATUS Status;+ EFI_FIRMWARE_VOLUME2_PR= OTOCOL *Fv;+ UINTN Size;+ UINT32 = AuthenticationStatus;+ EFI_DEVICE_PATH_PROTOCOL = *DevicePath;+ VOID *Buffer;++ Status =3D E= FI_SUCCESS;+ gBS->LocateHandleBuffer (+ ByProtocol,+ &gEfi= FirmwareVolume2ProtocolGuid,+ NULL,+ &FvHandleCount,+ = &FvHandleBuffer+ );++ for (Index =3D 0; Index < FvHandleCount; = Index++) {+ Buffer =3D NULL;+ Size =3D 0;+ gBS->HandleProtocol (= + FvHandleBuffer[Index],+ &gEfiFirmwareVolume2ProtocolG= uid,+ (VOID **) &Fv+ );+ Status =3D Fv->ReadSection = (+ Fv,+ &gUefiShellFileGuid,+ = EFI_SECTION_PE32,+ 0,+ &Buffer= ,+ &Size,+ &AuthenticationStatus+ = );+ if (!EFI_ERROR (Status)) {+ //+ // Found the = shell file+ //+ break;+ }+ }++ if (EFI_ERROR (Status)) {+ = if (FvHandleCount) {+ FreePool (FvHandleBuffer);+ }+ return NUL= L;+ }++ DevicePath =3D DevicePathFromHandle (FvHandleBuffer[Index]);++ i= f (FvHandleCount) {+ FreePool (FvHandleBuffer);+ }++ return DevicePath= ;+}+ /** Register a boot option using a file GUID in the FV. @@ -109,15 += 176,12 @@ PlatformRegisterFvBootOption ( EFI_BOOT_MANAGER_LOAD_OPTION *BootOptions; UINTN = BootOptionCount; MEDIA_FW_VOL_FILEPATH_DEVICE_PATH FileNod= e;- EFI_LOADED_IMAGE_PROTOCOL *LoadedImage; EFI_DEVICE_PATH_PRO= TOCOL *DevicePath; - Status =3D gBS->HandleProtocol (gImageHandl= e, &gEfiLoadedImageProtocolGuid, (VOID **)&LoadedImage);- ASSERT_EFI_ERROR= (Status); EfiInitializeFwVolDevicepathNode (&FileNode, FileGuid); Dev= icePath =3D AppendDevicePathNode (- DevicePathFromHandle (L= oadedImage->DeviceHandle),+ BdsGetShellFvDevicePath(), = (EFI_DEVICE_PATH_PROTOCOL *)&FileNode ); @@ -= 248,7 +312,7 @@ PlatformBootManagerAfterConsole ( // // Register UEFI Shell //- PlatformRegisterFvBootOption (PcdGetP= tr (PcdShellFile), L"UEFI Shell", LOAD_OPTION_ACTIVE);+ PlatformRegisterFv= BootOption (&gUefiShellFileGuid, L"UEFI Shell", LOAD_OPTION_ACTIVE); if = (FixedPcdGetBool (PcdBootManagerEscape)) { Print (diff --git a/UefiPayl= oadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf b/UefiPayl= oadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf index f9626175e2..a3951b7a7e 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -1,7 +1,7 @@ ## @file # Include all platform action which can be customized by IBV/OEM= . #-# Copyright (c) 2012 - 2021, Intel Corporation. All rights reserved.+# Copyright (c) 2012 - 2023, Intel Corporation. All rights reserved. # SPDX-License-Identifier: BSD-2-Clause-Patent # ##@@ -32,6 +32,7 @@ MdePkg/MdePkg.dec MdeModulePkg/MdeModulePkg.dec UefiPayloadPkg/UefiP= ayloadPkg.dec+ ShellPkg/ShellPkg.dec [LibraryClasses] BaseLib@@ -52,6 += 53,7 @@ [Guids] gEfiEndOfDxeEventGroupGuid gEdkiiBootManagerMenuFileGuid+ gUe= fiShellFileGuid [Protocols] gEfiGenericMemTestProtocolGuid ## CONSUMES@= @ -69,7 +71,6 @@ gEfiMdeModulePkgTokenSpaceGuid.PcdConOutRow gEfiMdeModulePkgTokenSpace= Guid.PcdConOutColumn gEfiMdeModulePkgTokenSpaceGuid.PcdConInConnectOnDema= nd- gUefiPayloadPkgTokenSpaceGuid.PcdShellFile gEfiMdePkgTokenSpaceGuid.= PcdUartDefaultBaudRate gEfiMdePkgTokenSpaceGuid.PcdUartDefaultDataBits = gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParitydiff --git a/UefiPayloadPkg/Ue= fiPayloadPkg.dec b/UefiPayloadPkg/UefiPayloadPkg.dec index a23a7b5a78..8d111f3a90 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -67,9 +67,6 @@ gUefiPayloadPkgTokenSpaceGuid.PcdPayloadFdMemSize|0|UINT3= 2|0x10000002 ## Save bootloader parameter gUefiPayloadPkgTokenSpaceGuid.PcdBootloaderPa= rameter|0|UINT64|0x10000004 -## FFS filename to find the shell application.= -gUefiPayloadPkgTokenSpaceGuid.PcdShellFile|{ 0x83, 0xA5, 0x04, 0x7C, 0x3E,= 0x9E, 0x1c, 0x4f, 0xAD, 0x65, 0xE0, 0x52, 0x68, 0xD0, 0xB4, 0xD1 }|VOID*|0= x10000005- ## Used to help reduce fragmentation in the EFI memory map gUefi= PayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiACPIReclaimMemory|0x19|UINT32|0x10= 000012 gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiACPIMemoryNVS|0x04|UIN= T32|0x10000013-- 2.39.1.windows.1