]> git.proxmox.com Git - mirror_edk2.git/blame - StandaloneMmPkg/Core/FwVol.c
SourceLevelDebugPkg: Apply uncrustify changes
[mirror_edk2.git] / StandaloneMmPkg / Core / FwVol.c
CommitLineData
b2b02a48
SM
1/** @file\r
2 Firmware volume helper interfaces.\r
6b46d772 3\r
b2b02a48
SM
4 Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>\r
5 Copyright (c) 2016 - 2021, Arm Limited. All rights reserved.<BR>\r
6 SPDX-License-Identifier: BSD-2-Clause-Patent\r
6b46d772
SV
7\r
8**/\r
9\r
10#include "StandaloneMmCore.h"\r
11#include <Library/FvLib.h>\r
d65e0e48 12#include <Library/ExtractGuidedSectionLib.h>\r
6b46d772
SV
13\r
14//\r
15// List of file types supported by dispatcher\r
16//\r
17EFI_FV_FILETYPE mMmFileTypes[] = {\r
18 EFI_FV_FILETYPE_MM,\r
19 0xE, //EFI_FV_FILETYPE_MM_STANDALONE,\r
20 //\r
21 // Note: DXE core will process the FV image file, so skip it in MM core\r
22 // EFI_FV_FILETYPE_FIRMWARE_VOLUME_IMAGE\r
23 //\r
24};\r
25\r
26EFI_STATUS\r
27MmAddToDriverList (\r
7f72ec0b
LE
28 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader,\r
29 IN VOID *Pe32Data,\r
30 IN UINTN Pe32DataSize,\r
31 IN VOID *Depex,\r
32 IN UINTN DepexSize,\r
33 IN EFI_GUID *DriverName\r
6b46d772
SV
34 );\r
35\r
36BOOLEAN\r
37FvHasBeenProcessed (\r
7f72ec0b 38 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader\r
6b46d772
SV
39 );\r
40\r
41VOID\r
81e9eca7 42FvIsBeingProcessed (\r
7f72ec0b 43 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader\r
6b46d772
SV
44 );\r
45\r
92df3ca8 46/**\r
6b46d772 47 Given the pointer to the Firmware Volume Header find the\r
2a0755a9 48 MM driver and return its PE32 image.\r
6b46d772 49\r
92df3ca8 50 @param [in] FwVolHeader Pointer to memory mapped FV\r
6b46d772 51\r
92df3ca8
SM
52 @retval EFI_SUCCESS Success.\r
53 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
54 @retval EFI_NOT_FOUND Could not find section data.\r
55 @retval EFI_OUT_OF_RESOURCES Out of resources.\r
56 @retval EFI_VOLUME_CORRUPTED Firmware volume is corrupted.\r
57 @retval EFI_UNSUPPORTED Operation not supported.\r
6b46d772 58\r
92df3ca8
SM
59**/\r
60EFI_STATUS\r
61MmCoreFfsFindMmDriver (\r
62 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader\r
63 )\r
6b46d772 64{\r
d65e0e48
AB
65 EFI_STATUS Status;\r
66 EFI_STATUS DepexStatus;\r
67 EFI_FFS_FILE_HEADER *FileHeader;\r
68 EFI_FV_FILETYPE FileType;\r
69 VOID *Pe32Data;\r
70 UINTN Pe32DataSize;\r
71 VOID *Depex;\r
72 UINTN DepexSize;\r
73 UINTN Index;\r
74 EFI_COMMON_SECTION_HEADER *Section;\r
75 VOID *SectionData;\r
76 UINTN SectionDataSize;\r
77 UINT32 DstBufferSize;\r
78 VOID *ScratchBuffer;\r
79 UINT32 ScratchBufferSize;\r
80 VOID *DstBuffer;\r
81 UINT16 SectionAttribute;\r
82 UINT32 AuthenticationStatus;\r
83 EFI_FIRMWARE_VOLUME_HEADER *InnerFvHeader;\r
6b46d772
SV
84\r
85 DEBUG ((DEBUG_INFO, "MmCoreFfsFindMmDriver - 0x%x\n", FwVolHeader));\r
86\r
87 if (FvHasBeenProcessed (FwVolHeader)) {\r
88 return EFI_SUCCESS;\r
89 }\r
90\r
81e9eca7 91 FvIsBeingProcessed (FwVolHeader);\r
6b46d772 92\r
d65e0e48
AB
93 //\r
94 // First check for encapsulated compressed firmware volumes\r
95 //\r
96 FileHeader = NULL;\r
97 do {\r
98 Status = FfsFindNextFile (EFI_FV_FILETYPE_FIRMWARE_VOLUME_IMAGE,\r
99 FwVolHeader, &FileHeader);\r
100 if (EFI_ERROR (Status)) {\r
101 break;\r
102 }\r
103 Status = FfsFindSectionData (EFI_SECTION_GUID_DEFINED, FileHeader,\r
104 &SectionData, &SectionDataSize);\r
105 if (EFI_ERROR (Status)) {\r
106 break;\r
107 }\r
108 Section = (EFI_COMMON_SECTION_HEADER *)(FileHeader + 1);\r
109 Status = ExtractGuidedSectionGetInfo (Section, &DstBufferSize,\r
110 &ScratchBufferSize, &SectionAttribute);\r
111 if (EFI_ERROR (Status)) {\r
112 break;\r
113 }\r
114\r
115 //\r
116 // Allocate scratch buffer\r
117 //\r
118 ScratchBuffer = (VOID *)(UINTN)AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));\r
119 if (ScratchBuffer == NULL) {\r
120 return EFI_OUT_OF_RESOURCES;\r
121 }\r
122\r
123 //\r
124 // Allocate destination buffer, extra one page for adjustment\r
125 //\r
126 DstBuffer = (VOID *)(UINTN)AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize));\r
127 if (DstBuffer == NULL) {\r
128 return EFI_OUT_OF_RESOURCES;\r
129 }\r
130\r
131 //\r
132 // Call decompress function\r
133 //\r
134 Status = ExtractGuidedSectionDecode (Section, &DstBuffer, ScratchBuffer,\r
135 &AuthenticationStatus);\r
136 FreePages (ScratchBuffer, EFI_SIZE_TO_PAGES (ScratchBufferSize));\r
137 if (EFI_ERROR (Status)) {\r
138 goto FreeDstBuffer;\r
139 }\r
140\r
141 DEBUG ((DEBUG_INFO,\r
142 "Processing compressed firmware volume (AuthenticationStatus == %x)\n",\r
143 AuthenticationStatus));\r
144\r
145 Status = FindFfsSectionInSections (DstBuffer, DstBufferSize,\r
146 EFI_SECTION_FIRMWARE_VOLUME_IMAGE, &Section);\r
147 if (EFI_ERROR (Status)) {\r
148 goto FreeDstBuffer;\r
149 }\r
150\r
151 InnerFvHeader = (VOID *)(Section + 1);\r
152 Status = MmCoreFfsFindMmDriver (InnerFvHeader);\r
153 if (EFI_ERROR (Status)) {\r
154 goto FreeDstBuffer;\r
155 }\r
156 } while (TRUE);\r
157\r
6b46d772
SV
158 for (Index = 0; Index < sizeof (mMmFileTypes) / sizeof (mMmFileTypes[0]); Index++) {\r
159 DEBUG ((DEBUG_INFO, "Check MmFileTypes - 0x%x\n", mMmFileTypes[Index]));\r
160 FileType = mMmFileTypes[Index];\r
161 FileHeader = NULL;\r
162 do {\r
163 Status = FfsFindNextFile (FileType, FwVolHeader, &FileHeader);\r
164 if (!EFI_ERROR (Status)) {\r
165 Status = FfsFindSectionData (EFI_SECTION_PE32, FileHeader, &Pe32Data, &Pe32DataSize);\r
166 DEBUG ((DEBUG_INFO, "Find PE data - 0x%x\n", Pe32Data));\r
167 DepexStatus = FfsFindSectionData (EFI_SECTION_MM_DEPEX, FileHeader, &Depex, &DepexSize);\r
168 if (!EFI_ERROR (DepexStatus)) {\r
169 MmAddToDriverList (FwVolHeader, Pe32Data, Pe32DataSize, Depex, DepexSize, &FileHeader->Name);\r
170 }\r
171 }\r
172 } while (!EFI_ERROR (Status));\r
173 }\r
174\r
d65e0e48
AB
175 return EFI_SUCCESS;\r
176\r
177FreeDstBuffer:\r
178 FreePages (DstBuffer, EFI_SIZE_TO_PAGES (DstBufferSize));\r
179\r
6b46d772
SV
180 return Status;\r
181}\r