-/** @file
- DXE Core Main Entry Point
-
-Copyright (c) 2006 - 2008, Intel Corporation. <BR>
-All rights reserved. This program and the accompanying materials
-are licensed and made available under the terms and conditions of the BSD License
-which accompanies this distribution. The full text of the license may be found at
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#include "DxeMain.h"
-
-//
-// DXE Core Global Variables for Protocols from PEI
-//
-EFI_HANDLE mDecompressHandle = NULL;
-
-//
-// DXE Core globals for Architecture Protocols
-//
-EFI_SECURITY_ARCH_PROTOCOL *gSecurity = NULL;
-EFI_CPU_ARCH_PROTOCOL *gCpu = NULL;
-EFI_METRONOME_ARCH_PROTOCOL *gMetronome = NULL;
-EFI_TIMER_ARCH_PROTOCOL *gTimer = NULL;
-EFI_BDS_ARCH_PROTOCOL *gBds = NULL;
-EFI_WATCHDOG_TIMER_ARCH_PROTOCOL *gWatchdogTimer = NULL;
-
-//
-// DXE Core Global used to update core loaded image protocol handle
-//
-EFI_GUID *gDxeCoreFileName;
-EFI_LOADED_IMAGE_PROTOCOL *gDxeCoreLoadedImage;
-
-//
-// DXE Core Module Variables
-//
-EFI_BOOT_SERVICES mBootServices = {
- {
- EFI_BOOT_SERVICES_SIGNATURE, // Signature
- EFI_BOOT_SERVICES_REVISION, // Revision
- sizeof (EFI_BOOT_SERVICES), // HeaderSize
- 0, // CRC32
- 0 // Reserved
- },
- (EFI_RAISE_TPL) CoreRaiseTpl, // RaiseTPL
- (EFI_RESTORE_TPL) CoreRestoreTpl, // RestoreTPL
- (EFI_ALLOCATE_PAGES) CoreAllocatePages, // AllocatePages
- (EFI_FREE_PAGES) CoreFreePages, // FreePages
- (EFI_GET_MEMORY_MAP) CoreGetMemoryMap, // GetMemoryMap
- (EFI_ALLOCATE_POOL) CoreAllocatePool, // AllocatePool
- (EFI_FREE_POOL) CoreFreePool, // FreePool
- (EFI_CREATE_EVENT) CoreCreateEvent, // CreateEvent
- (EFI_SET_TIMER) CoreSetTimer, // SetTimer
- (EFI_WAIT_FOR_EVENT) CoreWaitForEvent, // WaitForEvent
- (EFI_SIGNAL_EVENT) CoreSignalEvent, // SignalEvent
- (EFI_CLOSE_EVENT) CoreCloseEvent, // CloseEvent
- (EFI_CHECK_EVENT) CoreCheckEvent, // CheckEvent
- (EFI_INSTALL_PROTOCOL_INTERFACE) CoreInstallProtocolInterface, // InstallProtocolInterface
- (EFI_REINSTALL_PROTOCOL_INTERFACE) CoreReinstallProtocolInterface, // ReinstallProtocolInterface
- (EFI_UNINSTALL_PROTOCOL_INTERFACE) CoreUninstallProtocolInterface, // UninstallProtocolInterface
- (EFI_HANDLE_PROTOCOL) CoreHandleProtocol, // HandleProtocol
- (VOID *) NULL, // Reserved
- (EFI_REGISTER_PROTOCOL_NOTIFY) CoreRegisterProtocolNotify, // RegisterProtocolNotify
- (EFI_LOCATE_HANDLE) CoreLocateHandle, // LocateHandle
- (EFI_LOCATE_DEVICE_PATH) CoreLocateDevicePath, // LocateDevicePath
- (EFI_INSTALL_CONFIGURATION_TABLE) CoreInstallConfigurationTable, // InstallConfigurationTable
- (EFI_IMAGE_LOAD) CoreLoadImage, // LoadImage
- (EFI_IMAGE_START) CoreStartImage, // StartImage
- (EFI_EXIT) CoreExit, // Exit
- (EFI_IMAGE_UNLOAD) CoreUnloadImage, // UnloadImage
- (EFI_EXIT_BOOT_SERVICES) CoreExitBootServices, // ExitBootServices
- (EFI_GET_NEXT_MONOTONIC_COUNT) CoreEfiNotAvailableYetArg1, // GetNextMonotonicCount
- (EFI_STALL) CoreStall, // Stall
- (EFI_SET_WATCHDOG_TIMER) CoreSetWatchdogTimer, // SetWatchdogTimer
- (EFI_CONNECT_CONTROLLER) CoreConnectController, // ConnectController
- (EFI_DISCONNECT_CONTROLLER) CoreDisconnectController, // DisconnectController
- (EFI_OPEN_PROTOCOL) CoreOpenProtocol, // OpenProtocol
- (EFI_CLOSE_PROTOCOL) CoreCloseProtocol, // CloseProtocol
- (EFI_OPEN_PROTOCOL_INFORMATION) CoreOpenProtocolInformation, // OpenProtocolInformation
- (EFI_PROTOCOLS_PER_HANDLE) CoreProtocolsPerHandle, // ProtocolsPerHandle
- (EFI_LOCATE_HANDLE_BUFFER) CoreLocateHandleBuffer, // LocateHandleBuffer
- (EFI_LOCATE_PROTOCOL) CoreLocateProtocol, // LocateProtocol
- (EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES) CoreInstallMultipleProtocolInterfaces, // InstallMultipleProtocolInterfaces
- (EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES) CoreUninstallMultipleProtocolInterfaces, // UninstallMultipleProtocolInterfaces
- (EFI_CALCULATE_CRC32) CoreEfiNotAvailableYetArg3, // CalculateCrc32
- (EFI_COPY_MEM) CopyMem, // CopyMem
- (EFI_SET_MEM) SetMem, // SetMem
- (EFI_CREATE_EVENT_EX) CoreCreateEventEx // CreateEventEx
-};
-
-EFI_DXE_SERVICES mDxeServices = {
- {
- DXE_SERVICES_SIGNATURE, // Signature
- DXE_SERVICES_REVISION, // Revision
- sizeof (DXE_SERVICES), // HeaderSize
- 0, // CRC32
- 0 // Reserved
- },
- (EFI_ADD_MEMORY_SPACE) CoreAddMemorySpace, // AddMemorySpace
- (EFI_ALLOCATE_MEMORY_SPACE) CoreAllocateMemorySpace, // AllocateMemorySpace
- (EFI_FREE_MEMORY_SPACE) CoreFreeMemorySpace, // FreeMemorySpace
- (EFI_REMOVE_MEMORY_SPACE) CoreRemoveMemorySpace, // RemoveMemorySpace
- (EFI_GET_MEMORY_SPACE_DESCRIPTOR) CoreGetMemorySpaceDescriptor, // GetMemorySpaceDescriptor
- (EFI_SET_MEMORY_SPACE_ATTRIBUTES) CoreSetMemorySpaceAttributes, // SetMemorySpaceAttributes
- (EFI_GET_MEMORY_SPACE_MAP) CoreGetMemorySpaceMap, // GetMemorySpaceMap
- (EFI_ADD_IO_SPACE) CoreAddIoSpace, // AddIoSpace
- (EFI_ALLOCATE_IO_SPACE) CoreAllocateIoSpace, // AllocateIoSpace
- (EFI_FREE_IO_SPACE) CoreFreeIoSpace, // FreeIoSpace
- (EFI_REMOVE_IO_SPACE) CoreRemoveIoSpace, // RemoveIoSpace
- (EFI_GET_IO_SPACE_DESCRIPTOR) CoreGetIoSpaceDescriptor, // GetIoSpaceDescriptor
- (EFI_GET_IO_SPACE_MAP) CoreGetIoSpaceMap, // GetIoSpaceMap
- (EFI_DISPATCH) CoreDispatcher, // Dispatch
- (EFI_SCHEDULE) CoreSchedule, // Schedule
- (EFI_TRUST) CoreTrust, // Trust
- (EFI_PROCESS_FIRMWARE_VOLUME) CoreProcessFirmwareVolume, // ProcessFirmwareVolume
-};
-
-EFI_SYSTEM_TABLE mEfiSystemTableTemplate = {
- {
- EFI_SYSTEM_TABLE_SIGNATURE, // Signature
- EFI_SYSTEM_TABLE_REVISION, // Revision
- sizeof (EFI_SYSTEM_TABLE), // HeaderSize
- 0, // CRC32
- 0 // Reserved
- },
- NULL, // FirmwareVendor
- 0, // FirmwareRevision
- NULL, // ConsoleInHandle
- NULL, // ConIn
- NULL, // ConsoleOutHandle
- NULL, // ConOut
- NULL, // StandardErrorHandle
- NULL, // StdErr
- NULL, // RuntimeServices
- &mBootServices, // BootServices
- 0, // NumberOfConfigurationTableEntries
- NULL // ConfigurationTable
-};
-
-EFI_RUNTIME_SERVICES mEfiRuntimeServicesTableTemplate = {
- {
- EFI_RUNTIME_SERVICES_SIGNATURE, // Signature
- EFI_RUNTIME_SERVICES_REVISION, // Revision
- sizeof (EFI_RUNTIME_SERVICES), // HeaderSize
- 0, // CRC32
- 0 // Reserved
- },
- (EFI_GET_TIME) CoreEfiNotAvailableYetArg2, // GetTime
- (EFI_SET_TIME) CoreEfiNotAvailableYetArg1, // SetTime
- (EFI_GET_WAKEUP_TIME) CoreEfiNotAvailableYetArg3, // GetWakeupTime
- (EFI_SET_WAKEUP_TIME) CoreEfiNotAvailableYetArg2, // SetWakeupTime
- (EFI_SET_VIRTUAL_ADDRESS_MAP) CoreEfiNotAvailableYetArg4, // SetVirtualAddressMap
- (EFI_CONVERT_POINTER) CoreEfiNotAvailableYetArg2, // ConvertPointer
- (EFI_GET_VARIABLE) CoreEfiNotAvailableYetArg5, // GetVariable
- (EFI_GET_NEXT_VARIABLE_NAME) CoreEfiNotAvailableYetArg3, // GetNextVariableName
- (EFI_SET_VARIABLE) CoreEfiNotAvailableYetArg5, // SetVariable
- (EFI_GET_NEXT_HIGH_MONO_COUNT) CoreEfiNotAvailableYetArg1, // GetNextHighMonotonicCount
- (EFI_RESET_SYSTEM) CoreEfiNotAvailableYetArg4, // ResetSystem
- (EFI_UPDATE_CAPSULE) CoreEfiNotAvailableYetArg3, // UpdateCapsule
- (EFI_QUERY_CAPSULE_CAPABILITIES) CoreEfiNotAvailableYetArg4, // QueryCapsuleCapabilities
- (EFI_QUERY_VARIABLE_INFO) CoreEfiNotAvailableYetArg4 // QueryVariableInfo
-};
-
-EFI_RUNTIME_ARCH_PROTOCOL gRuntimeTemplate = {
- INITIALIZE_LIST_HEAD_VARIABLE (gRuntimeTemplate.ImageHead),
- INITIALIZE_LIST_HEAD_VARIABLE (gRuntimeTemplate.EventHead),
-
- //
- // Make sure Size != sizeof (EFI_MEMORY_DESCRIPTOR). This will
- // prevent people from having pointer math bugs in their code.
- // now you have to use *DescriptorSize to make things work.
- //
- sizeof (EFI_MEMORY_DESCRIPTOR) + sizeof (UINT64) - (sizeof (EFI_MEMORY_DESCRIPTOR) % sizeof (UINT64)),
- EFI_MEMORY_DESCRIPTOR_VERSION,
- 0,
- NULL,
- NULL,
- FALSE,
- FALSE
-};
-
-EFI_RUNTIME_ARCH_PROTOCOL *gRuntime = &gRuntimeTemplate;
-
-//
-// DXE Core Global Variables for the EFI System Table, Boot Services Table,
-// DXE Services Table, and Runtime Services Table
-//
-EFI_DXE_SERVICES *gDxeCoreDS = &mDxeServices;
-EFI_SYSTEM_TABLE *gDxeCoreST = NULL;
-
-//
-// For debug initialize gDxeCoreRT to template. gDxeCoreRT must be allocated from RT memory
-// but gDxeCoreRT is used for ASSERT () and DEBUG () type macros so lets give it
-// a value that will not cause debug infrastructure to crash early on.
-//
-EFI_RUNTIME_SERVICES *gDxeCoreRT = &mEfiRuntimeServicesTableTemplate;
-EFI_HANDLE gDxeCoreImageHandle = NULL;
-
-
-//
-// EFI Decompress Protocol
-//
-EFI_DECOMPRESS_PROTOCOL gEfiDecompress = {
- DxeMainUefiDecompressGetInfo,
- DxeMainUefiDecompress
-};
-
-//
-// Main entry point to the DXE Core
-//
-
-/**
- Main entry point to DXE Core.
-
- @param HobStart Pointer to the beginning of the HOB List from PEI.
-
- @return This function should never return.
-
-**/
-VOID
-EFIAPI
-DxeMain (
- IN VOID *HobStart
- )
-{
- EFI_STATUS Status;
- EFI_PHYSICAL_ADDRESS MemoryBaseAddress;
- UINT64 MemoryLength;
-
- //
- // Initialize Memory Services
- //
- CoreInitializeMemoryServices (&HobStart, &MemoryBaseAddress, &MemoryLength);
-
- //
- // Allocate the EFI System Table and EFI Runtime Service Table from EfiRuntimeServicesData
- // Use the templates to initialize the contents of the EFI System Table and EFI Runtime Services Table
- //
- gDxeCoreST = AllocateRuntimeCopyPool (sizeof (EFI_SYSTEM_TABLE), &mEfiSystemTableTemplate);
- ASSERT (gDxeCoreST != NULL);
-
- gDxeCoreRT = AllocateRuntimeCopyPool (sizeof (EFI_RUNTIME_SERVICES), &mEfiRuntimeServicesTableTemplate);
- ASSERT (gDxeCoreRT != NULL);
-
- gDxeCoreST->RuntimeServices = gDxeCoreRT;
-
- //
- // Start the Image Services.
- //
- Status = CoreInitializeImageServices (HobStart);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Call constructor for all libraries
- //
- ProcessLibraryConstructorList (gDxeCoreImageHandle, gDxeCoreST);
- PERF_END (NULL,"PEI", NULL, 0) ;
- PERF_START (NULL,"DXE", NULL, 0) ;
-
- //
- // Initialize the Global Coherency Domain Services
- //
- Status = CoreInitializeGcdServices (&HobStart, MemoryBaseAddress, MemoryLength);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Install the DXE Services Table into the EFI System Tables's Configuration Table
- //
- Status = CoreInstallConfigurationTable (&gEfiDxeServicesTableGuid, gDxeCoreDS);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Install the HOB List into the EFI System Tables's Configuration Table
- //
- Status = CoreInstallConfigurationTable (&gEfiHobListGuid, HobStart);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Install Memory Type Information Table into the EFI System Tables's Configuration Table
- //
- Status = CoreInstallConfigurationTable (&gEfiMemoryTypeInformationGuid, &gMemoryTypeInformation);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Report Status Code here for DXE_ENTRY_POINT once it is available
- //
- REPORT_STATUS_CODE (
- EFI_PROGRESS_CODE,
- FixedPcdGet32(PcdStatusCodeValueDxeCoreEntry)
- );
-
- //
- // Create the aligned system table pointer structure that is used by external
- // debuggers to locate the system table... Also, install debug image info
- // configuration table.
- //
- CoreInitializeDebugImageInfoTable ();
- CoreNewDebugImageInfoEntry (
- EFI_DEBUG_IMAGE_INFO_TYPE_NORMAL,
- gDxeCoreLoadedImage,
- gDxeCoreImageHandle
- );
-
- DEBUG ((DEBUG_INFO | DEBUG_LOAD, "HOBLIST address in DXE = 0x%p\n", HobStart));
-
- //
- // Initialize the Event Services
- //
- Status = CoreInitializeEventServices ();
- ASSERT_EFI_ERROR (Status);
-
-
- //
- // Get the Protocols that were passed in from PEI to DXE through GUIDed HOBs
- //
- // These Protocols are not architectural. This implementation is sharing code between
- // PEI and DXE in order to save FLASH space. These Protocols could also be implemented
- // as part of the DXE Core. However, that would also require the DXE Core to be ported
- // each time a different CPU is used, a different Decompression algorithm is used, or a
- // different Image type is used. By placing these Protocols in PEI, the DXE Core remains
- // generic, and only PEI and the Arch Protocols need to be ported from Platform to Platform,
- // and from CPU to CPU.
- //
-
- //
- // Publish the EFI, Tiano, and Custom Decompress protocols for use by other DXE components
- //
- Status = CoreInstallMultipleProtocolInterfaces (
- &mDecompressHandle,
- &gEfiDecompressProtocolGuid, &gEfiDecompress,
- NULL
- );
- ASSERT_EFI_ERROR (Status);
-
- //
- // Register for the GUIDs of the Architectural Protocols, so the rest of the
- // EFI Boot Services and EFI Runtime Services tables can be filled in.
- //
- CoreNotifyOnArchProtocolInstallation ();
-
- //
- // Produce Firmware Volume Protocols, one for each FV in the HOB list.
- //
- Status = FwVolBlockDriverInit (gDxeCoreImageHandle, gDxeCoreST);
- ASSERT_EFI_ERROR (Status);
-
- Status = FwVolDriverInit (gDxeCoreImageHandle, gDxeCoreST);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Produce the Section Extraction Protocol
- //
- Status = InitializeSectionExtraction (gDxeCoreImageHandle, gDxeCoreST);
- ASSERT_EFI_ERROR (Status);
-
- //
- // Initialize the DXE Dispatcher
- //
- PERF_START (NULL,"CoreInitializeDispatcher", "DxeMain", 0) ;
- CoreInitializeDispatcher ();
- PERF_END (NULL,"CoreInitializeDispatcher", "DxeMain", 0) ;
-
- //
- // Invoke the DXE Dispatcher
- //
- PERF_START (NULL, "CoreDispatcher", "DxeMain", 0);
- CoreDispatcher ();
- PERF_END (NULL, "CoreDispatcher", "DxeMain", 0);
-
- //
- // Display Architectural protocols that were not loaded if this is DEBUG build
- //
- DEBUG_CODE_BEGIN ();
- CoreDisplayMissingArchProtocols ();
- DEBUG_CODE_END ();
-
- //
- // Display any drivers that were not dispatched because dependency expression
- // evaluated to false if this is a debug build
- //
- DEBUG_CODE_BEGIN ();
- CoreDisplayDiscoveredNotDispatched ();
- DEBUG_CODE_END ();
-
- //
- // Assert if the Architectural Protocols are not present.
- //
- ASSERT_EFI_ERROR (CoreAllEfiServicesAvailable ());
-
- //
- // Report Status code before transfer control to BDS
- //
- REPORT_STATUS_CODE (
- EFI_PROGRESS_CODE,
- FixedPcdGet32 (PcdStatusCodeValueDxeCoreHandoffToBds)
- );
-
- //
- // Transfer control to the BDS Architectural Protocol
- //
- gBds->Entry (gBds);
-
- //
- // BDS should never return
- //
- ASSERT (FALSE);
- CpuDeadLoop ();
-}
-
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are
- available.
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg0 (
- VOID
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are
- available.
-
- @param Arg1 Undefined
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg1 (
- UINTN Arg1
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are available.
-
- @param Arg1 Undefined
- @param Arg2 Undefined
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg2 (
- UINTN Arg1,
- UINTN Arg2
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are available.
-
- @param Arg1 Undefined
- @param Arg2 Undefined
- @param Arg3 Undefined
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg3 (
- UINTN Arg1,
- UINTN Arg2,
- UINTN Arg3
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are available.
-
- @param Arg1 Undefined
- @param Arg2 Undefined
- @param Arg3 Undefined
- @param Arg4 Undefined
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg4 (
- UINTN Arg1,
- UINTN Arg2,
- UINTN Arg3,
- UINTN Arg4
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Place holder function until all the Boot Services and Runtime Services are available.
-
- @param Arg1 Undefined
- @param Arg2 Undefined
- @param Arg3 Undefined
- @param Arg4 Undefined
- @param Arg5 Undefined
-
- @return EFI_NOT_AVAILABLE_YET
-
-**/
-EFI_STATUS
-EFIAPI
-CoreEfiNotAvailableYetArg5 (
- UINTN Arg1,
- UINTN Arg2,
- UINTN Arg3,
- UINTN Arg4,
- UINTN Arg5
- )
-{
- //
- // This function should never be executed. If it does, then the architectural protocols
- // have not been designed correctly. The CpuBreakpoint () is commented out for now until the
- // DXE Core and all the Architectural Protocols are complete.
- //
-
- return EFI_NOT_AVAILABLE_YET;
-}
-
-
-/**
- Calcualte the 32-bit CRC in a EFI table using the service provided by the
- gRuntime service.
-
- @param Hdr Pointer to an EFI standard header
-
-**/
-VOID
-CalculateEfiHdrCrc (
- IN OUT EFI_TABLE_HEADER *Hdr
- )
-{
- UINT32 Crc;
-
- Hdr->CRC32 = 0;
-
- //
- // If gBS->CalculateCrce32 () == CoreEfiNotAvailableYet () then
- // Crc will come back as zero if we set it to zero here
- //
- Crc = 0;
- gBS->CalculateCrc32 ((UINT8 *)Hdr, Hdr->HeaderSize, &Crc);
- Hdr->CRC32 = Crc;
-}
-
-
-/**
- Terminates all boot services.
-
- @param ImageHandle Handle that identifies the exiting image.
- @param MapKey Key to the latest memory map.
-
- @retval EFI_SUCCESS Boot Services terminated
- @retval EFI_INVALID_PARAMETER MapKey is incorrect.
-
-**/
-EFI_STATUS
-EFIAPI
-CoreExitBootServices (
- IN EFI_HANDLE ImageHandle,
- IN UINTN MapKey
- )
-{
- EFI_STATUS Status;
-
- //
- // Terminate memory services if the MapKey matches
- //
- Status = CoreTerminateMemoryMap (MapKey);
- if (EFI_ERROR (Status)) {
- return Status;
- }
-
- //
- // Disable Timer
- //
- gTimer->SetTimerPeriod (gTimer, 0);
-
- //
- // Notify other drivers that we are exiting boot services.
- //
- CoreNotifySignalList (&gEfiEventExitBootServicesGuid);
-
- //
- // Disable CPU Interrupts
- //
- gCpu->DisableInterrupt (gCpu);
-
- //
- // Report that ExitBootServices() has been called
- //
- REPORT_STATUS_CODE (
- EFI_PROGRESS_CODE,
- FixedPcdGet32 (PcdStatusCodeValueBootServiceExit)
- );
-
- //
- // Clear the non-runtime values of the EFI System Table
- //
- gDxeCoreST->BootServices = NULL;
- gDxeCoreST->ConIn = NULL;
- gDxeCoreST->ConsoleInHandle = NULL;
- gDxeCoreST->ConOut = NULL;
- gDxeCoreST->ConsoleOutHandle = NULL;
- gDxeCoreST->StdErr = NULL;
- gDxeCoreST->StandardErrorHandle = NULL;
-
- //
- // Recompute the 32-bit CRC of the EFI System Table
- //
- CalculateEfiHdrCrc (&gDxeCoreST->Hdr);
-
- //
- // Zero out the Boot Service Table
- //
- ZeroMem (gBS, sizeof (EFI_BOOT_SERVICES));
- gBS = NULL;
-
- //
- // Update the AtRuntime field in Runtiem AP.
- //
- gRuntime->AtRuntime = TRUE;
-
- return Status;
-}
-
-
-/**
- Given a compressed source buffer, this function retrieves the size of the
- uncompressed buffer and the size of the scratch buffer required to decompress
- the compressed source buffer.
-
- The GetInfo() function retrieves the size of the uncompressed buffer and the
- temporary scratch buffer required to decompress the buffer specified by Source
- and SourceSize. If the size of the uncompressed buffer or the size of the
- scratch buffer cannot be determined from the compressed data specified by
- Source and SourceData, then EFI_INVALID_PARAMETER is returned. Otherwise, the
- size of the uncompressed buffer is returned in DestinationSize, the size of
- the scratch buffer is returned in ScratchSize, and EFI_SUCCESS is returned.
- The GetInfo() function does not have scratch buffer available to perform a
- thorough checking of the validity of the source data. It just retrieves the
- "Original Size" field from the beginning bytes of the source data and output
- it as DestinationSize. And ScratchSize is specific to the decompression
- implementation.
-
- @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.
- @param Source The source buffer containing the compressed data.
- @param SourceSize The size, in bytes, of the source buffer.
- @param DestinationSize A pointer to the size, in bytes, of the
- uncompressed buffer that will be generated when the
- compressed buffer specified by Source and
- SourceSize is decompressed.
- @param ScratchSize A pointer to the size, in bytes, of the scratch
- buffer that is required to decompress the
- compressed buffer specified by Source and
- SourceSize.
-
- @retval EFI_SUCCESS The size of the uncompressed data was returned in
- DestinationSize and the size of the scratch buffer
- was returned in ScratchSize.
- @retval EFI_INVALID_PARAMETER The size of the uncompressed data or the size of
- the scratch buffer cannot be determined from the
- compressed data specified by Source and
- SourceSize.
-
-**/
-EFI_STATUS
-EFIAPI
-DxeMainUefiDecompressGetInfo (
- IN EFI_DECOMPRESS_PROTOCOL *This,
- IN VOID *Source,
- IN UINT32 SourceSize,
- OUT UINT32 *DestinationSize,
- OUT UINT32 *ScratchSize
- )
-{
- if (Source == NULL || DestinationSize == NULL || ScratchSize == NULL) {
- return EFI_INVALID_PARAMETER;
- }
- return UefiDecompressGetInfo (Source, SourceSize, DestinationSize, ScratchSize);
-}
-
-
-/**
- Decompresses a compressed source buffer.
-
- The Decompress() function extracts decompressed data to its original form.
- This protocol is designed so that the decompression algorithm can be
- implemented without using any memory services. As a result, the Decompress()
- Function is not allowed to call AllocatePool() or AllocatePages() in its
- implementation. It is the caller's responsibility to allocate and free the
- Destination and Scratch buffers.
- If the compressed source data specified by Source and SourceSize is
- sucessfully decompressed into Destination, then EFI_SUCCESS is returned. If
- the compressed source data specified by Source and SourceSize is not in a
- valid compressed data format, then EFI_INVALID_PARAMETER is returned.
-
- @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.
- @param Source The source buffer containing the compressed data.
- @param SourceSize SourceSizeThe size of source data.
- @param Destination On output, the destination buffer that contains
- the uncompressed data.
- @param DestinationSize The size of the destination buffer. The size of
- the destination buffer needed is obtained from
- EFI_DECOMPRESS_PROTOCOL.GetInfo().
- @param Scratch A temporary scratch buffer that is used to perform
- the decompression.
- @param ScratchSize The size of scratch buffer. The size of the
- scratch buffer needed is obtained from GetInfo().
-
- @retval EFI_SUCCESS Decompression completed successfully, and the
- uncompressed buffer is returned in Destination.
- @retval EFI_INVALID_PARAMETER The source buffer specified by Source and
- SourceSize is corrupted (not in a valid
- compressed format).
-
-**/
-EFI_STATUS
-EFIAPI
-DxeMainUefiDecompress (
- IN EFI_DECOMPRESS_PROTOCOL *This,
- IN VOID *Source,
- IN UINT32 SourceSize,
- IN OUT VOID *Destination,
- IN UINT32 DestinationSize,
- IN OUT VOID *Scratch,
- IN UINT32 ScratchSize
- )
-{
- EFI_STATUS Status;
- UINT32 TestDestinationSize;
- UINT32 TestScratchSize;
-
- if (Source == NULL || Destination== NULL || Scratch == NULL) {
- return EFI_INVALID_PARAMETER;
- }
-
- Status = UefiDecompressGetInfo (Source, SourceSize, &TestDestinationSize, &TestScratchSize);
- if (EFI_ERROR (Status)) {
- return Status;
- }
-
- if (ScratchSize < TestScratchSize || DestinationSize < TestDestinationSize) {
- return RETURN_INVALID_PARAMETER;
- }
-
- return UefiDecompress (Source, Destination, Scratch);
-}
+/** @file\r
+ DXE Core Main Entry Point\r
+\r
+Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include "DxeMain.h"\r
+\r
+//\r
+// DXE Core Global Variables for Protocols from PEI\r
+//\r
+EFI_HANDLE mDecompressHandle = NULL;\r
+\r
+//\r
+// DXE Core globals for Architecture Protocols\r
+//\r
+EFI_SECURITY_ARCH_PROTOCOL *gSecurity = NULL;\r
+EFI_SECURITY2_ARCH_PROTOCOL *gSecurity2 = NULL;\r
+EFI_CPU_ARCH_PROTOCOL *gCpu = NULL;\r
+EFI_METRONOME_ARCH_PROTOCOL *gMetronome = NULL;\r
+EFI_TIMER_ARCH_PROTOCOL *gTimer = NULL;\r
+EFI_BDS_ARCH_PROTOCOL *gBds = NULL;\r
+EFI_WATCHDOG_TIMER_ARCH_PROTOCOL *gWatchdogTimer = NULL;\r
+\r
+//\r
+// DXE Core globals for optional protocol dependencies\r
+//\r
+EFI_SMM_BASE2_PROTOCOL *gSmmBase2 = NULL;\r
+\r
+//\r
+// DXE Core Global used to update core loaded image protocol handle\r
+//\r
+EFI_GUID *gDxeCoreFileName;\r
+EFI_LOADED_IMAGE_PROTOCOL *gDxeCoreLoadedImage;\r
+\r
+//\r
+// DXE Core Module Variables\r
+//\r
+EFI_BOOT_SERVICES mBootServices = {\r
+ {\r
+ EFI_BOOT_SERVICES_SIGNATURE, // Signature\r
+ EFI_BOOT_SERVICES_REVISION, // Revision\r
+ sizeof (EFI_BOOT_SERVICES), // HeaderSize\r
+ 0, // CRC32\r
+ 0 // Reserved\r
+ },\r
+ (EFI_RAISE_TPL) CoreRaiseTpl, // RaiseTPL\r
+ (EFI_RESTORE_TPL) CoreRestoreTpl, // RestoreTPL\r
+ (EFI_ALLOCATE_PAGES) CoreAllocatePages, // AllocatePages\r
+ (EFI_FREE_PAGES) CoreFreePages, // FreePages\r
+ (EFI_GET_MEMORY_MAP) CoreGetMemoryMap, // GetMemoryMap\r
+ (EFI_ALLOCATE_POOL) CoreAllocatePool, // AllocatePool\r
+ (EFI_FREE_POOL) CoreFreePool, // FreePool\r
+ (EFI_CREATE_EVENT) CoreCreateEvent, // CreateEvent\r
+ (EFI_SET_TIMER) CoreSetTimer, // SetTimer\r
+ (EFI_WAIT_FOR_EVENT) CoreWaitForEvent, // WaitForEvent\r
+ (EFI_SIGNAL_EVENT) CoreSignalEvent, // SignalEvent\r
+ (EFI_CLOSE_EVENT) CoreCloseEvent, // CloseEvent\r
+ (EFI_CHECK_EVENT) CoreCheckEvent, // CheckEvent\r
+ (EFI_INSTALL_PROTOCOL_INTERFACE) CoreInstallProtocolInterface, // InstallProtocolInterface\r
+ (EFI_REINSTALL_PROTOCOL_INTERFACE) CoreReinstallProtocolInterface, // ReinstallProtocolInterface\r
+ (EFI_UNINSTALL_PROTOCOL_INTERFACE) CoreUninstallProtocolInterface, // UninstallProtocolInterface\r
+ (EFI_HANDLE_PROTOCOL) CoreHandleProtocol, // HandleProtocol\r
+ (VOID *) NULL, // Reserved\r
+ (EFI_REGISTER_PROTOCOL_NOTIFY) CoreRegisterProtocolNotify, // RegisterProtocolNotify\r
+ (EFI_LOCATE_HANDLE) CoreLocateHandle, // LocateHandle\r
+ (EFI_LOCATE_DEVICE_PATH) CoreLocateDevicePath, // LocateDevicePath\r
+ (EFI_INSTALL_CONFIGURATION_TABLE) CoreInstallConfigurationTable, // InstallConfigurationTable\r
+ (EFI_IMAGE_LOAD) CoreLoadImage, // LoadImage\r
+ (EFI_IMAGE_START) CoreStartImage, // StartImage\r
+ (EFI_EXIT) CoreExit, // Exit\r
+ (EFI_IMAGE_UNLOAD) CoreUnloadImage, // UnloadImage\r
+ (EFI_EXIT_BOOT_SERVICES) CoreExitBootServices, // ExitBootServices\r
+ (EFI_GET_NEXT_MONOTONIC_COUNT) CoreEfiNotAvailableYetArg1, // GetNextMonotonicCount\r
+ (EFI_STALL) CoreStall, // Stall\r
+ (EFI_SET_WATCHDOG_TIMER) CoreSetWatchdogTimer, // SetWatchdogTimer\r
+ (EFI_CONNECT_CONTROLLER) CoreConnectController, // ConnectController\r
+ (EFI_DISCONNECT_CONTROLLER) CoreDisconnectController, // DisconnectController\r
+ (EFI_OPEN_PROTOCOL) CoreOpenProtocol, // OpenProtocol\r
+ (EFI_CLOSE_PROTOCOL) CoreCloseProtocol, // CloseProtocol\r
+ (EFI_OPEN_PROTOCOL_INFORMATION) CoreOpenProtocolInformation, // OpenProtocolInformation\r
+ (EFI_PROTOCOLS_PER_HANDLE) CoreProtocolsPerHandle, // ProtocolsPerHandle\r
+ (EFI_LOCATE_HANDLE_BUFFER) CoreLocateHandleBuffer, // LocateHandleBuffer\r
+ (EFI_LOCATE_PROTOCOL) CoreLocateProtocol, // LocateProtocol\r
+ (EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES) CoreInstallMultipleProtocolInterfaces, // InstallMultipleProtocolInterfaces\r
+ (EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES) CoreUninstallMultipleProtocolInterfaces, // UninstallMultipleProtocolInterfaces\r
+ (EFI_CALCULATE_CRC32) CoreEfiNotAvailableYetArg3, // CalculateCrc32\r
+ (EFI_COPY_MEM) CopyMem, // CopyMem\r
+ (EFI_SET_MEM) SetMem, // SetMem\r
+ (EFI_CREATE_EVENT_EX) CoreCreateEventEx // CreateEventEx\r
+};\r
+\r
+EFI_DXE_SERVICES mDxeServices = {\r
+ {\r
+ DXE_SERVICES_SIGNATURE, // Signature\r
+ DXE_SERVICES_REVISION, // Revision\r
+ sizeof (DXE_SERVICES), // HeaderSize\r
+ 0, // CRC32\r
+ 0 // Reserved\r
+ },\r
+ (EFI_ADD_MEMORY_SPACE) CoreAddMemorySpace, // AddMemorySpace\r
+ (EFI_ALLOCATE_MEMORY_SPACE) CoreAllocateMemorySpace, // AllocateMemorySpace\r
+ (EFI_FREE_MEMORY_SPACE) CoreFreeMemorySpace, // FreeMemorySpace\r
+ (EFI_REMOVE_MEMORY_SPACE) CoreRemoveMemorySpace, // RemoveMemorySpace\r
+ (EFI_GET_MEMORY_SPACE_DESCRIPTOR) CoreGetMemorySpaceDescriptor, // GetMemorySpaceDescriptor\r
+ (EFI_SET_MEMORY_SPACE_ATTRIBUTES) CoreSetMemorySpaceAttributes, // SetMemorySpaceAttributes\r
+ (EFI_GET_MEMORY_SPACE_MAP) CoreGetMemorySpaceMap, // GetMemorySpaceMap\r
+ (EFI_ADD_IO_SPACE) CoreAddIoSpace, // AddIoSpace\r
+ (EFI_ALLOCATE_IO_SPACE) CoreAllocateIoSpace, // AllocateIoSpace\r
+ (EFI_FREE_IO_SPACE) CoreFreeIoSpace, // FreeIoSpace\r
+ (EFI_REMOVE_IO_SPACE) CoreRemoveIoSpace, // RemoveIoSpace\r
+ (EFI_GET_IO_SPACE_DESCRIPTOR) CoreGetIoSpaceDescriptor, // GetIoSpaceDescriptor\r
+ (EFI_GET_IO_SPACE_MAP) CoreGetIoSpaceMap, // GetIoSpaceMap\r
+ (EFI_DISPATCH) CoreDispatcher, // Dispatch\r
+ (EFI_SCHEDULE) CoreSchedule, // Schedule\r
+ (EFI_TRUST) CoreTrust, // Trust\r
+ (EFI_PROCESS_FIRMWARE_VOLUME) CoreProcessFirmwareVolume, // ProcessFirmwareVolume\r
+ (EFI_SET_MEMORY_SPACE_CAPABILITIES)CoreSetMemorySpaceCapabilities, // SetMemorySpaceCapabilities\r
+};\r
+\r
+EFI_SYSTEM_TABLE mEfiSystemTableTemplate = {\r
+ {\r
+ EFI_SYSTEM_TABLE_SIGNATURE, // Signature\r
+ EFI_SYSTEM_TABLE_REVISION, // Revision\r
+ sizeof (EFI_SYSTEM_TABLE), // HeaderSize\r
+ 0, // CRC32\r
+ 0 // Reserved\r
+ },\r
+ NULL, // FirmwareVendor\r
+ 0, // FirmwareRevision\r
+ NULL, // ConsoleInHandle\r
+ NULL, // ConIn\r
+ NULL, // ConsoleOutHandle\r
+ NULL, // ConOut\r
+ NULL, // StandardErrorHandle\r
+ NULL, // StdErr\r
+ NULL, // RuntimeServices\r
+ &mBootServices, // BootServices\r
+ 0, // NumberOfConfigurationTableEntries\r
+ NULL // ConfigurationTable\r
+};\r
+\r
+EFI_RUNTIME_SERVICES mEfiRuntimeServicesTableTemplate = {\r
+ {\r
+ EFI_RUNTIME_SERVICES_SIGNATURE, // Signature\r
+ EFI_RUNTIME_SERVICES_REVISION, // Revision\r
+ sizeof (EFI_RUNTIME_SERVICES), // HeaderSize\r
+ 0, // CRC32\r
+ 0 // Reserved\r
+ },\r
+ (EFI_GET_TIME) CoreEfiNotAvailableYetArg2, // GetTime\r
+ (EFI_SET_TIME) CoreEfiNotAvailableYetArg1, // SetTime\r
+ (EFI_GET_WAKEUP_TIME) CoreEfiNotAvailableYetArg3, // GetWakeupTime\r
+ (EFI_SET_WAKEUP_TIME) CoreEfiNotAvailableYetArg2, // SetWakeupTime\r
+ (EFI_SET_VIRTUAL_ADDRESS_MAP) CoreEfiNotAvailableYetArg4, // SetVirtualAddressMap\r
+ (EFI_CONVERT_POINTER) CoreEfiNotAvailableYetArg2, // ConvertPointer\r
+ (EFI_GET_VARIABLE) CoreEfiNotAvailableYetArg5, // GetVariable\r
+ (EFI_GET_NEXT_VARIABLE_NAME) CoreEfiNotAvailableYetArg3, // GetNextVariableName\r
+ (EFI_SET_VARIABLE) CoreEfiNotAvailableYetArg5, // SetVariable\r
+ (EFI_GET_NEXT_HIGH_MONO_COUNT) CoreEfiNotAvailableYetArg1, // GetNextHighMonotonicCount\r
+ (EFI_RESET_SYSTEM) CoreEfiNotAvailableYetArg4, // ResetSystem\r
+ (EFI_UPDATE_CAPSULE) CoreEfiNotAvailableYetArg3, // UpdateCapsule\r
+ (EFI_QUERY_CAPSULE_CAPABILITIES) CoreEfiNotAvailableYetArg4, // QueryCapsuleCapabilities\r
+ (EFI_QUERY_VARIABLE_INFO) CoreEfiNotAvailableYetArg4 // QueryVariableInfo\r
+};\r
+\r
+EFI_RUNTIME_ARCH_PROTOCOL gRuntimeTemplate = {\r
+ INITIALIZE_LIST_HEAD_VARIABLE (gRuntimeTemplate.ImageHead),\r
+ INITIALIZE_LIST_HEAD_VARIABLE (gRuntimeTemplate.EventHead),\r
+\r
+ //\r
+ // Make sure Size != sizeof (EFI_MEMORY_DESCRIPTOR). This will\r
+ // prevent people from having pointer math bugs in their code.\r
+ // now you have to use *DescriptorSize to make things work.\r
+ //\r
+ sizeof (EFI_MEMORY_DESCRIPTOR) + sizeof (UINT64) - (sizeof (EFI_MEMORY_DESCRIPTOR) % sizeof (UINT64)),\r
+ EFI_MEMORY_DESCRIPTOR_VERSION,\r
+ 0,\r
+ NULL,\r
+ NULL,\r
+ FALSE,\r
+ FALSE\r
+};\r
+\r
+EFI_RUNTIME_ARCH_PROTOCOL *gRuntime = &gRuntimeTemplate;\r
+\r
+//\r
+// DXE Core Global Variables for the EFI System Table, Boot Services Table,\r
+// DXE Services Table, and Runtime Services Table\r
+//\r
+EFI_DXE_SERVICES *gDxeCoreDS = &mDxeServices;\r
+EFI_SYSTEM_TABLE *gDxeCoreST = NULL;\r
+\r
+//\r
+// For debug initialize gDxeCoreRT to template. gDxeCoreRT must be allocated from RT memory\r
+// but gDxeCoreRT is used for ASSERT () and DEBUG () type macros so lets give it\r
+// a value that will not cause debug infrastructure to crash early on.\r
+//\r
+EFI_RUNTIME_SERVICES *gDxeCoreRT = &mEfiRuntimeServicesTableTemplate;\r
+EFI_HANDLE gDxeCoreImageHandle = NULL;\r
+\r
+BOOLEAN gMemoryMapTerminated = FALSE;\r
+\r
+//\r
+// EFI Decompress Protocol\r
+//\r
+EFI_DECOMPRESS_PROTOCOL gEfiDecompress = {\r
+ DxeMainUefiDecompressGetInfo,\r
+ DxeMainUefiDecompress\r
+};\r
+\r
+//\r
+// For Loading modules at fixed address feature, the configuration table is to cache the top address below which to load\r
+// Runtime code&boot time code\r
+//\r
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_LOAD_FIXED_ADDRESS_CONFIGURATION_TABLE gLoadModuleAtFixAddressConfigurationTable = {0, 0};\r
+\r
+// Main entry point to the DXE Core\r
+//\r
+\r
+/**\r
+ Main entry point to DXE Core.\r
+\r
+ @param HobStart Pointer to the beginning of the HOB List from PEI.\r
+\r
+ @return This function should never return.\r
+\r
+**/\r
+VOID\r
+EFIAPI\r
+DxeMain (\r
+ IN VOID *HobStart\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ EFI_PHYSICAL_ADDRESS MemoryBaseAddress;\r
+ UINT64 MemoryLength;\r
+ PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;\r
+ UINTN Index;\r
+ EFI_HOB_GUID_TYPE *GuidHob;\r
+ EFI_VECTOR_HANDOFF_INFO *VectorInfoList;\r
+ EFI_VECTOR_HANDOFF_INFO *VectorInfo;\r
+ VOID *EntryPoint;\r
+\r
+ //\r
+ // Setup the default exception handlers\r
+ //\r
+ VectorInfoList = NULL;\r
+ GuidHob = GetNextGuidHob (&gEfiVectorHandoffInfoPpiGuid, HobStart);\r
+ if (GuidHob != NULL) {\r
+ VectorInfoList = (EFI_VECTOR_HANDOFF_INFO *) (GET_GUID_HOB_DATA(GuidHob));\r
+ }\r
+ Status = InitializeCpuExceptionHandlersEx (VectorInfoList, NULL);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Initialize Debug Agent to support source level debug in DXE phase\r
+ //\r
+ InitializeDebugAgent (DEBUG_AGENT_INIT_DXE_CORE, HobStart, NULL);\r
+\r
+ //\r
+ // Initialize Memory Services\r
+ //\r
+ CoreInitializeMemoryServices (&HobStart, &MemoryBaseAddress, &MemoryLength);\r
+\r
+ MemoryProfileInit (HobStart);\r
+\r
+ //\r
+ // Allocate the EFI System Table and EFI Runtime Service Table from EfiRuntimeServicesData\r
+ // Use the templates to initialize the contents of the EFI System Table and EFI Runtime Services Table\r
+ //\r
+ gDxeCoreST = AllocateRuntimeCopyPool (sizeof (EFI_SYSTEM_TABLE), &mEfiSystemTableTemplate);\r
+ ASSERT (gDxeCoreST != NULL);\r
+\r
+ gDxeCoreRT = AllocateRuntimeCopyPool (sizeof (EFI_RUNTIME_SERVICES), &mEfiRuntimeServicesTableTemplate);\r
+ ASSERT (gDxeCoreRT != NULL);\r
+\r
+ gDxeCoreST->RuntimeServices = gDxeCoreRT;\r
+\r
+ //\r
+ // Start the Image Services.\r
+ //\r
+ Status = CoreInitializeImageServices (HobStart);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Initialize the Global Coherency Domain Services\r
+ //\r
+ Status = CoreInitializeGcdServices (&HobStart, MemoryBaseAddress, MemoryLength);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Call constructor for all libraries\r
+ //\r
+ ProcessLibraryConstructorList (gDxeCoreImageHandle, gDxeCoreST);\r
+ PERF_CROSSMODULE_END ("PEI");\r
+ PERF_CROSSMODULE_BEGIN ("DXE");\r
+\r
+ //\r
+ // Report DXE Core image information to the PE/COFF Extra Action Library\r
+ //\r
+ ZeroMem (&ImageContext, sizeof (ImageContext));\r
+ ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN)gDxeCoreLoadedImage->ImageBase;\r
+ ImageContext.PdbPointer = PeCoffLoaderGetPdbPointer ((VOID*)(UINTN)ImageContext.ImageAddress);\r
+ ImageContext.SizeOfHeaders = PeCoffGetSizeOfHeaders ((VOID*)(UINTN)ImageContext.ImageAddress);\r
+ Status = PeCoffLoaderGetEntryPoint ((VOID*)(UINTN)ImageContext.ImageAddress, &EntryPoint);\r
+ if (Status == EFI_SUCCESS) {\r
+ ImageContext.EntryPoint = (EFI_PHYSICAL_ADDRESS)(UINTN)EntryPoint;\r
+ }\r
+ ImageContext.Handle = (VOID *)(UINTN)gDxeCoreLoadedImage->ImageBase;\r
+ ImageContext.ImageRead = PeCoffLoaderImageReadFromMemory;\r
+ PeCoffLoaderRelocateImageExtraAction (&ImageContext);\r
+\r
+ //\r
+ // Install the DXE Services Table into the EFI System Tables's Configuration Table\r
+ //\r
+ Status = CoreInstallConfigurationTable (&gEfiDxeServicesTableGuid, gDxeCoreDS);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Install the HOB List into the EFI System Tables's Configuration Table\r
+ //\r
+ Status = CoreInstallConfigurationTable (&gEfiHobListGuid, HobStart);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Install Memory Type Information Table into the EFI System Tables's Configuration Table\r
+ //\r
+ Status = CoreInstallConfigurationTable (&gEfiMemoryTypeInformationGuid, &gMemoryTypeInformation);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // If Loading modules At fixed address feature is enabled, install Load moduels at fixed address\r
+ // Configuration Table so that user could easily to retrieve the top address to load Dxe and PEI\r
+ // Code and Tseg base to load SMM driver.\r
+ //\r
+ if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0) {\r
+ Status = CoreInstallConfigurationTable (&gLoadFixedAddressConfigurationTableGuid, &gLoadModuleAtFixAddressConfigurationTable);\r
+ ASSERT_EFI_ERROR (Status);\r
+ }\r
+ //\r
+ // Report Status Code here for DXE_ENTRY_POINT once it is available\r
+ //\r
+ REPORT_STATUS_CODE (\r
+ EFI_PROGRESS_CODE,\r
+ (EFI_SOFTWARE_DXE_CORE | EFI_SW_DXE_CORE_PC_ENTRY_POINT)\r
+ );\r
+\r
+ //\r
+ // Create the aligned system table pointer structure that is used by external\r
+ // debuggers to locate the system table... Also, install debug image info\r
+ // configuration table.\r
+ //\r
+ CoreInitializeDebugImageInfoTable ();\r
+ CoreNewDebugImageInfoEntry (\r
+ EFI_DEBUG_IMAGE_INFO_TYPE_NORMAL,\r
+ gDxeCoreLoadedImage,\r
+ gDxeCoreImageHandle\r
+ );\r
+\r
+ DEBUG ((DEBUG_INFO | DEBUG_LOAD, "HOBLIST address in DXE = 0x%p\n", HobStart));\r
+\r
+ DEBUG_CODE_BEGIN ();\r
+ EFI_PEI_HOB_POINTERS Hob;\r
+\r
+ for (Hob.Raw = HobStart; !END_OF_HOB_LIST(Hob); Hob.Raw = GET_NEXT_HOB(Hob)) {\r
+ if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_MEMORY_ALLOCATION) {\r
+ DEBUG ((DEBUG_INFO | DEBUG_LOAD, "Memory Allocation 0x%08x 0x%0lx - 0x%0lx\n", \\r
+ Hob.MemoryAllocation->AllocDescriptor.MemoryType, \\r
+ Hob.MemoryAllocation->AllocDescriptor.MemoryBaseAddress, \\r
+ Hob.MemoryAllocation->AllocDescriptor.MemoryBaseAddress + Hob.MemoryAllocation->AllocDescriptor.MemoryLength - 1));\r
+ }\r
+ }\r
+ for (Hob.Raw = HobStart; !END_OF_HOB_LIST(Hob); Hob.Raw = GET_NEXT_HOB(Hob)) {\r
+ if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_FV) {\r
+ DEBUG ((\r
+ DEBUG_INFO | DEBUG_LOAD,\r
+ "FV Hob 0x%0lx - 0x%0lx\n",\r
+ Hob.FirmwareVolume->BaseAddress,\r
+ Hob.FirmwareVolume->BaseAddress + Hob.FirmwareVolume->Length - 1\r
+ ));\r
+ } else if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_FV2) {\r
+ DEBUG ((\r
+ DEBUG_INFO | DEBUG_LOAD,\r
+ "FV2 Hob 0x%0lx - 0x%0lx\n",\r
+ Hob.FirmwareVolume2->BaseAddress,\r
+ Hob.FirmwareVolume2->BaseAddress + Hob.FirmwareVolume2->Length - 1\r
+ ));\r
+ DEBUG ((\r
+ DEBUG_INFO | DEBUG_LOAD,\r
+ " %g - %g\n",\r
+ &Hob.FirmwareVolume2->FvName,\r
+ &Hob.FirmwareVolume2->FileName\r
+ ));\r
+ } else if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_FV3) {\r
+ DEBUG ((\r
+ DEBUG_INFO | DEBUG_LOAD,\r
+ "FV3 Hob 0x%0lx - 0x%0lx - 0x%x - 0x%x\n",\r
+ Hob.FirmwareVolume3->BaseAddress,\r
+ Hob.FirmwareVolume3->BaseAddress + Hob.FirmwareVolume3->Length - 1,\r
+ Hob.FirmwareVolume3->AuthenticationStatus,\r
+ Hob.FirmwareVolume3->ExtractedFv\r
+ ));\r
+ if (Hob.FirmwareVolume3->ExtractedFv) {\r
+ DEBUG ((\r
+ DEBUG_INFO | DEBUG_LOAD,\r
+ " %g - %g\n",\r
+ &Hob.FirmwareVolume3->FvName,\r
+ &Hob.FirmwareVolume3->FileName\r
+ ));\r
+ }\r
+ }\r
+ }\r
+ DEBUG_CODE_END ();\r
+\r
+ //\r
+ // Initialize the Event Services\r
+ //\r
+ Status = CoreInitializeEventServices ();\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ MemoryProfileInstallProtocol ();\r
+\r
+ CoreInitializePropertiesTable ();\r
+ CoreInitializeMemoryAttributesTable ();\r
+ CoreInitializeMemoryProtection ();\r
+\r
+ //\r
+ // Get persisted vector hand-off info from GUIDeed HOB again due to HobStart may be updated,\r
+ // and install configuration table\r
+ //\r
+ GuidHob = GetNextGuidHob (&gEfiVectorHandoffInfoPpiGuid, HobStart);\r
+ if (GuidHob != NULL) {\r
+ VectorInfoList = (EFI_VECTOR_HANDOFF_INFO *) (GET_GUID_HOB_DATA(GuidHob));\r
+ VectorInfo = VectorInfoList;\r
+ Index = 1;\r
+ while (VectorInfo->Attribute != EFI_VECTOR_HANDOFF_LAST_ENTRY) {\r
+ VectorInfo ++;\r
+ Index ++;\r
+ }\r
+ VectorInfo = AllocateCopyPool (sizeof (EFI_VECTOR_HANDOFF_INFO) * Index, (VOID *) VectorInfoList);\r
+ ASSERT (VectorInfo != NULL);\r
+ Status = CoreInstallConfigurationTable (&gEfiVectorHandoffTableGuid, (VOID *) VectorInfo);\r
+ ASSERT_EFI_ERROR (Status);\r
+ }\r
+\r
+ //\r
+ // Get the Protocols that were passed in from PEI to DXE through GUIDed HOBs\r
+ //\r
+ // These Protocols are not architectural. This implementation is sharing code between\r
+ // PEI and DXE in order to save FLASH space. These Protocols could also be implemented\r
+ // as part of the DXE Core. However, that would also require the DXE Core to be ported\r
+ // each time a different CPU is used, a different Decompression algorithm is used, or a\r
+ // different Image type is used. By placing these Protocols in PEI, the DXE Core remains\r
+ // generic, and only PEI and the Arch Protocols need to be ported from Platform to Platform,\r
+ // and from CPU to CPU.\r
+ //\r
+\r
+ //\r
+ // Publish the EFI, Tiano, and Custom Decompress protocols for use by other DXE components\r
+ //\r
+ Status = CoreInstallMultipleProtocolInterfaces (\r
+ &mDecompressHandle,\r
+ &gEfiDecompressProtocolGuid, &gEfiDecompress,\r
+ NULL\r
+ );\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Register for the GUIDs of the Architectural Protocols, so the rest of the\r
+ // EFI Boot Services and EFI Runtime Services tables can be filled in.\r
+ // Also register for the GUIDs of optional protocols.\r
+ //\r
+ CoreNotifyOnProtocolInstallation ();\r
+\r
+ //\r
+ // Produce Firmware Volume Protocols, one for each FV in the HOB list.\r
+ //\r
+ Status = FwVolBlockDriverInit (gDxeCoreImageHandle, gDxeCoreST);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ Status = FwVolDriverInit (gDxeCoreImageHandle, gDxeCoreST);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Produce the Section Extraction Protocol\r
+ //\r
+ Status = InitializeSectionExtraction (gDxeCoreImageHandle, gDxeCoreST);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Initialize the DXE Dispatcher\r
+ //\r
+ CoreInitializeDispatcher ();\r
+\r
+ //\r
+ // Invoke the DXE Dispatcher\r
+ //\r
+ CoreDispatcher ();\r
+\r
+ //\r
+ // Display Architectural protocols that were not loaded if this is DEBUG build\r
+ //\r
+ DEBUG_CODE_BEGIN ();\r
+ CoreDisplayMissingArchProtocols ();\r
+ DEBUG_CODE_END ();\r
+\r
+ //\r
+ // Display any drivers that were not dispatched because dependency expression\r
+ // evaluated to false if this is a debug build\r
+ //\r
+ DEBUG_CODE_BEGIN ();\r
+ CoreDisplayDiscoveredNotDispatched ();\r
+ DEBUG_CODE_END ();\r
+\r
+ //\r
+ // Assert if the Architectural Protocols are not present.\r
+ //\r
+ Status = CoreAllEfiServicesAvailable ();\r
+ if (EFI_ERROR(Status)) {\r
+ //\r
+ // Report Status code that some Architectural Protocols are not present.\r
+ //\r
+ REPORT_STATUS_CODE (\r
+ EFI_ERROR_CODE | EFI_ERROR_MAJOR,\r
+ (EFI_SOFTWARE_DXE_CORE | EFI_SW_DXE_CORE_EC_NO_ARCH)\r
+ );\r
+ }\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ //\r
+ // Report Status code before transfer control to BDS\r
+ //\r
+ REPORT_STATUS_CODE (\r
+ EFI_PROGRESS_CODE,\r
+ (EFI_SOFTWARE_DXE_CORE | EFI_SW_DXE_CORE_PC_HANDOFF_TO_NEXT)\r
+ );\r
+\r
+ //\r
+ // Transfer control to the BDS Architectural Protocol\r
+ //\r
+ gBds->Entry (gBds);\r
+\r
+ //\r
+ // BDS should never return\r
+ //\r
+ ASSERT (FALSE);\r
+ CpuDeadLoop ();\r
+\r
+ UNREACHABLE ();\r
+}\r
+\r
+\r
+\r
+\r
+/**\r
+ Place holder function until all the Boot Services and Runtime Services are\r
+ available.\r
+\r
+ @param Arg1 Undefined\r
+\r
+ @return EFI_NOT_AVAILABLE_YET\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreEfiNotAvailableYetArg1 (\r
+ UINTN Arg1\r
+ )\r
+{\r
+ //\r
+ // This function should never be executed. If it does, then the architectural protocols\r
+ // have not been designed correctly. The CpuBreakpoint () is commented out for now until the\r
+ // DXE Core and all the Architectural Protocols are complete.\r
+ //\r
+\r
+ return EFI_NOT_AVAILABLE_YET;\r
+}\r
+\r
+\r
+/**\r
+ Place holder function until all the Boot Services and Runtime Services are available.\r
+\r
+ @param Arg1 Undefined\r
+ @param Arg2 Undefined\r
+\r
+ @return EFI_NOT_AVAILABLE_YET\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreEfiNotAvailableYetArg2 (\r
+ UINTN Arg1,\r
+ UINTN Arg2\r
+ )\r
+{\r
+ //\r
+ // This function should never be executed. If it does, then the architectural protocols\r
+ // have not been designed correctly. The CpuBreakpoint () is commented out for now until the\r
+ // DXE Core and all the Architectural Protocols are complete.\r
+ //\r
+\r
+ return EFI_NOT_AVAILABLE_YET;\r
+}\r
+\r
+\r
+/**\r
+ Place holder function until all the Boot Services and Runtime Services are available.\r
+\r
+ @param Arg1 Undefined\r
+ @param Arg2 Undefined\r
+ @param Arg3 Undefined\r
+\r
+ @return EFI_NOT_AVAILABLE_YET\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreEfiNotAvailableYetArg3 (\r
+ UINTN Arg1,\r
+ UINTN Arg2,\r
+ UINTN Arg3\r
+ )\r
+{\r
+ //\r
+ // This function should never be executed. If it does, then the architectural protocols\r
+ // have not been designed correctly. The CpuBreakpoint () is commented out for now until the\r
+ // DXE Core and all the Architectural Protocols are complete.\r
+ //\r
+\r
+ return EFI_NOT_AVAILABLE_YET;\r
+}\r
+\r
+\r
+/**\r
+ Place holder function until all the Boot Services and Runtime Services are available.\r
+\r
+ @param Arg1 Undefined\r
+ @param Arg2 Undefined\r
+ @param Arg3 Undefined\r
+ @param Arg4 Undefined\r
+\r
+ @return EFI_NOT_AVAILABLE_YET\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreEfiNotAvailableYetArg4 (\r
+ UINTN Arg1,\r
+ UINTN Arg2,\r
+ UINTN Arg3,\r
+ UINTN Arg4\r
+ )\r
+{\r
+ //\r
+ // This function should never be executed. If it does, then the architectural protocols\r
+ // have not been designed correctly. The CpuBreakpoint () is commented out for now until the\r
+ // DXE Core and all the Architectural Protocols are complete.\r
+ //\r
+\r
+ return EFI_NOT_AVAILABLE_YET;\r
+}\r
+\r
+\r
+/**\r
+ Place holder function until all the Boot Services and Runtime Services are available.\r
+\r
+ @param Arg1 Undefined\r
+ @param Arg2 Undefined\r
+ @param Arg3 Undefined\r
+ @param Arg4 Undefined\r
+ @param Arg5 Undefined\r
+\r
+ @return EFI_NOT_AVAILABLE_YET\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreEfiNotAvailableYetArg5 (\r
+ UINTN Arg1,\r
+ UINTN Arg2,\r
+ UINTN Arg3,\r
+ UINTN Arg4,\r
+ UINTN Arg5\r
+ )\r
+{\r
+ //\r
+ // This function should never be executed. If it does, then the architectural protocols\r
+ // have not been designed correctly. The CpuBreakpoint () is commented out for now until the\r
+ // DXE Core and all the Architectural Protocols are complete.\r
+ //\r
+\r
+ return EFI_NOT_AVAILABLE_YET;\r
+}\r
+\r
+\r
+/**\r
+ Calcualte the 32-bit CRC in a EFI table using the service provided by the\r
+ gRuntime service.\r
+\r
+ @param Hdr Pointer to an EFI standard header\r
+\r
+**/\r
+VOID\r
+CalculateEfiHdrCrc (\r
+ IN OUT EFI_TABLE_HEADER *Hdr\r
+ )\r
+{\r
+ UINT32 Crc;\r
+\r
+ Hdr->CRC32 = 0;\r
+\r
+ //\r
+ // If gBS->CalculateCrce32 () == CoreEfiNotAvailableYet () then\r
+ // Crc will come back as zero if we set it to zero here\r
+ //\r
+ Crc = 0;\r
+ gBS->CalculateCrc32 ((UINT8 *)Hdr, Hdr->HeaderSize, &Crc);\r
+ Hdr->CRC32 = Crc;\r
+}\r
+\r
+\r
+/**\r
+ Terminates all boot services.\r
+\r
+ @param ImageHandle Handle that identifies the exiting image.\r
+ @param MapKey Key to the latest memory map.\r
+\r
+ @retval EFI_SUCCESS Boot Services terminated\r
+ @retval EFI_INVALID_PARAMETER MapKey is incorrect.\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+CoreExitBootServices (\r
+ IN EFI_HANDLE ImageHandle,\r
+ IN UINTN MapKey\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+\r
+ //\r
+ // Disable Timer\r
+ //\r
+ gTimer->SetTimerPeriod (gTimer, 0);\r
+\r
+ //\r
+ // Terminate memory services if the MapKey matches\r
+ //\r
+ Status = CoreTerminateMemoryMap (MapKey);\r
+ if (EFI_ERROR (Status)) {\r
+ //\r
+ // Notify other drivers that ExitBootServices fail\r
+ //\r
+ CoreNotifySignalList (&gEventExitBootServicesFailedGuid);\r
+ return Status;\r
+ }\r
+\r
+ gMemoryMapTerminated = TRUE;\r
+\r
+ //\r
+ // Notify other drivers that we are exiting boot services.\r
+ //\r
+ CoreNotifySignalList (&gEfiEventExitBootServicesGuid);\r
+\r
+ //\r
+ // Report that ExitBootServices() has been called\r
+ //\r
+ REPORT_STATUS_CODE (\r
+ EFI_PROGRESS_CODE,\r
+ (EFI_SOFTWARE_EFI_BOOT_SERVICE | EFI_SW_BS_PC_EXIT_BOOT_SERVICES)\r
+ );\r
+\r
+ MemoryProtectionExitBootServicesCallback();\r
+\r
+ //\r
+ // Disable interrupt of Debug timer.\r
+ //\r
+ SaveAndSetDebugTimerInterrupt (FALSE);\r
+\r
+ //\r
+ // Disable CPU Interrupts\r
+ //\r
+ gCpu->DisableInterrupt (gCpu);\r
+\r
+ //\r
+ // Clear the non-runtime values of the EFI System Table\r
+ //\r
+ gDxeCoreST->BootServices = NULL;\r
+ gDxeCoreST->ConIn = NULL;\r
+ gDxeCoreST->ConsoleInHandle = NULL;\r
+ gDxeCoreST->ConOut = NULL;\r
+ gDxeCoreST->ConsoleOutHandle = NULL;\r
+ gDxeCoreST->StdErr = NULL;\r
+ gDxeCoreST->StandardErrorHandle = NULL;\r
+\r
+ //\r
+ // Recompute the 32-bit CRC of the EFI System Table\r
+ //\r
+ CalculateEfiHdrCrc (&gDxeCoreST->Hdr);\r
+\r
+ //\r
+ // Zero out the Boot Service Table\r
+ //\r
+ ZeroMem (gBS, sizeof (EFI_BOOT_SERVICES));\r
+ gBS = NULL;\r
+\r
+ //\r
+ // Update the AtRuntime field in Runtiem AP.\r
+ //\r
+ gRuntime->AtRuntime = TRUE;\r
+\r
+ return Status;\r
+}\r
+\r
+\r
+/**\r
+ Given a compressed source buffer, this function retrieves the size of the\r
+ uncompressed buffer and the size of the scratch buffer required to decompress\r
+ the compressed source buffer.\r
+\r
+ The GetInfo() function retrieves the size of the uncompressed buffer and the\r
+ temporary scratch buffer required to decompress the buffer specified by Source\r
+ and SourceSize. If the size of the uncompressed buffer or the size of the\r
+ scratch buffer cannot be determined from the compressed data specified by\r
+ Source and SourceData, then EFI_INVALID_PARAMETER is returned. Otherwise, the\r
+ size of the uncompressed buffer is returned in DestinationSize, the size of\r
+ the scratch buffer is returned in ScratchSize, and EFI_SUCCESS is returned.\r
+ The GetInfo() function does not have scratch buffer available to perform a\r
+ thorough checking of the validity of the source data. It just retrieves the\r
+ "Original Size" field from the beginning bytes of the source data and output\r
+ it as DestinationSize. And ScratchSize is specific to the decompression\r
+ implementation.\r
+\r
+ @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.\r
+ @param Source The source buffer containing the compressed data.\r
+ @param SourceSize The size, in bytes, of the source buffer.\r
+ @param DestinationSize A pointer to the size, in bytes, of the\r
+ uncompressed buffer that will be generated when the\r
+ compressed buffer specified by Source and\r
+ SourceSize is decompressed.\r
+ @param ScratchSize A pointer to the size, in bytes, of the scratch\r
+ buffer that is required to decompress the\r
+ compressed buffer specified by Source and\r
+ SourceSize.\r
+\r
+ @retval EFI_SUCCESS The size of the uncompressed data was returned in\r
+ DestinationSize and the size of the scratch buffer\r
+ was returned in ScratchSize.\r
+ @retval EFI_INVALID_PARAMETER The size of the uncompressed data or the size of\r
+ the scratch buffer cannot be determined from the\r
+ compressed data specified by Source and\r
+ SourceSize.\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+DxeMainUefiDecompressGetInfo (\r
+ IN EFI_DECOMPRESS_PROTOCOL *This,\r
+ IN VOID *Source,\r
+ IN UINT32 SourceSize,\r
+ OUT UINT32 *DestinationSize,\r
+ OUT UINT32 *ScratchSize\r
+ )\r
+{\r
+ if (Source == NULL || DestinationSize == NULL || ScratchSize == NULL) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+ return UefiDecompressGetInfo (Source, SourceSize, DestinationSize, ScratchSize);\r
+}\r
+\r
+\r
+/**\r
+ Decompresses a compressed source buffer.\r
+\r
+ The Decompress() function extracts decompressed data to its original form.\r
+ This protocol is designed so that the decompression algorithm can be\r
+ implemented without using any memory services. As a result, the Decompress()\r
+ Function is not allowed to call AllocatePool() or AllocatePages() in its\r
+ implementation. It is the caller's responsibility to allocate and free the\r
+ Destination and Scratch buffers.\r
+ If the compressed source data specified by Source and SourceSize is\r
+ successfully decompressed into Destination, then EFI_SUCCESS is returned. If\r
+ the compressed source data specified by Source and SourceSize is not in a\r
+ valid compressed data format, then EFI_INVALID_PARAMETER is returned.\r
+\r
+ @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.\r
+ @param Source The source buffer containing the compressed data.\r
+ @param SourceSize SourceSizeThe size of source data.\r
+ @param Destination On output, the destination buffer that contains\r
+ the uncompressed data.\r
+ @param DestinationSize The size of the destination buffer. The size of\r
+ the destination buffer needed is obtained from\r
+ EFI_DECOMPRESS_PROTOCOL.GetInfo().\r
+ @param Scratch A temporary scratch buffer that is used to perform\r
+ the decompression.\r
+ @param ScratchSize The size of scratch buffer. The size of the\r
+ scratch buffer needed is obtained from GetInfo().\r
+\r
+ @retval EFI_SUCCESS Decompression completed successfully, and the\r
+ uncompressed buffer is returned in Destination.\r
+ @retval EFI_INVALID_PARAMETER The source buffer specified by Source and\r
+ SourceSize is corrupted (not in a valid\r
+ compressed format).\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+DxeMainUefiDecompress (\r
+ IN EFI_DECOMPRESS_PROTOCOL *This,\r
+ IN VOID *Source,\r
+ IN UINT32 SourceSize,\r
+ IN OUT VOID *Destination,\r
+ IN UINT32 DestinationSize,\r
+ IN OUT VOID *Scratch,\r
+ IN UINT32 ScratchSize\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ UINT32 TestDestinationSize;\r
+ UINT32 TestScratchSize;\r
+\r
+ if (Source == NULL || Destination== NULL || Scratch == NULL) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ Status = UefiDecompressGetInfo (Source, SourceSize, &TestDestinationSize, &TestScratchSize);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+\r
+ if (ScratchSize < TestScratchSize || DestinationSize < TestDestinationSize) {\r
+ return RETURN_INVALID_PARAMETER;\r
+ }\r
+\r
+ return UefiDecompress (Source, Destination, Scratch);\r
+}\r