]> git.proxmox.com Git - mirror_edk2.git/blob - StandaloneMmPkg/Core/Dispatcher.c
4b2f38f700a086c2dfb31401fc57a33509b9e1ba
[mirror_edk2.git] / StandaloneMmPkg / Core / Dispatcher.c
1 /** @file
2 MM Driver Dispatcher.
3
4 Step #1 - When a FV protocol is added to the system every driver in the FV
5 is added to the mDiscoveredList. The Before, and After Depex are
6 pre-processed as drivers are added to the mDiscoveredList. If an Apriori
7 file exists in the FV those drivers are addeded to the
8 mScheduledQueue. The mFvHandleList is used to make sure a
9 FV is only processed once.
10
11 Step #2 - Dispatch. Remove driver from the mScheduledQueue and load and
12 start it. After mScheduledQueue is drained check the
13 mDiscoveredList to see if any item has a Depex that is ready to
14 be placed on the mScheduledQueue.
15
16 Step #3 - Adding to the mScheduledQueue requires that you process Before
17 and After dependencies. This is done recursively as the call to add
18 to the mScheduledQueue checks for Before and recursively adds
19 all Befores. It then addes the item that was passed in and then
20 processess the After dependecies by recursively calling the routine.
21
22 Dispatcher Rules:
23 The rules for the dispatcher are similar to the DXE dispatcher.
24
25 The rules for DXE dispatcher are in chapter 10 of the DXE CIS. Figure 10-3
26 is the state diagram for the DXE dispatcher
27
28 Depex - Dependency Expresion.
29
30 Copyright (c) 2014, Hewlett-Packard Development Company, L.P.
31 Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.<BR>
32 Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.<BR>
33
34 This program and the accompanying materials are licensed and made available
35 under the terms and conditions of the BSD License which accompanies this
36 distribution. The full text of the license may be found at
37 http://opensource.org/licenses/bsd-license.php
38
39 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
40 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
41
42 **/
43
44 #include "StandaloneMmCore.h"
45
46 //
47 // MM Dispatcher Data structures
48 //
49 #define KNOWN_HANDLE_SIGNATURE SIGNATURE_32('k','n','o','w')
50
51 typedef struct {
52 UINTN Signature;
53 LIST_ENTRY Link; // mFvHandleList
54 EFI_HANDLE Handle;
55 } KNOWN_HANDLE;
56
57 //
58 // Function Prototypes
59 //
60
61 EFI_STATUS
62 MmCoreFfsFindMmDriver (
63 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader
64 );
65
66 /**
67 Insert InsertedDriverEntry onto the mScheduledQueue. To do this you
68 must add any driver with a before dependency on InsertedDriverEntry first.
69 You do this by recursively calling this routine. After all the Befores are
70 processed you can add InsertedDriverEntry to the mScheduledQueue.
71 Then you can add any driver with an After dependency on InsertedDriverEntry
72 by recursively calling this routine.
73
74 @param InsertedDriverEntry The driver to insert on the ScheduledLink Queue
75
76 **/
77 VOID
78 MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (
79 IN EFI_MM_DRIVER_ENTRY *InsertedDriverEntry
80 );
81
82 //
83 // The Driver List contains one copy of every driver that has been discovered.
84 // Items are never removed from the driver list. List of EFI_MM_DRIVER_ENTRY
85 //
86 LIST_ENTRY mDiscoveredList = INITIALIZE_LIST_HEAD_VARIABLE (mDiscoveredList);
87
88 //
89 // Queue of drivers that are ready to dispatch. This queue is a subset of the
90 // mDiscoveredList.list of EFI_MM_DRIVER_ENTRY.
91 //
92 LIST_ENTRY mScheduledQueue = INITIALIZE_LIST_HEAD_VARIABLE (mScheduledQueue);
93
94 //
95 // List of handles who's Fv's have been parsed and added to the mFwDriverList.
96 //
97 LIST_ENTRY mFvHandleList = INITIALIZE_LIST_HEAD_VARIABLE (mFvHandleList);
98
99 //
100 // Flag for the MM Dispacher. TRUE if dispatcher is execuing.
101 //
102 BOOLEAN gDispatcherRunning = FALSE;
103
104 //
105 // Flag for the MM Dispacher. TRUE if there is one or more MM drivers ready to be dispatched
106 //
107 BOOLEAN gRequestDispatch = FALSE;
108
109 //
110 // The global variable is defined for Loading modules at fixed address feature to track the MM code
111 // memory range usage. It is a bit mapped array in which every bit indicates the correspoding
112 // memory page available or not.
113 //
114 GLOBAL_REMOVE_IF_UNREFERENCED UINT64 *mMmCodeMemoryRangeUsageBitMap=NULL;
115
116 /**
117 To check memory usage bit map array to figure out if the memory range in which the image will be loaded
118 is available or not. If memory range is avaliable, the function will mark the correponding bits to 1
119 which indicates the memory range is used. The function is only invoked when load modules at fixed address
120 feature is enabled.
121
122 @param ImageBase The base addres the image will be loaded at.
123 @param ImageSize The size of the image
124
125 @retval EFI_SUCCESS The memory range the image will be loaded in is available
126 @retval EFI_NOT_FOUND The memory range the image will be loaded in is not available
127 **/
128 EFI_STATUS
129 CheckAndMarkFixLoadingMemoryUsageBitMap (
130 IN EFI_PHYSICAL_ADDRESS ImageBase,
131 IN UINTN ImageSize
132 )
133 {
134 UINT32 MmCodePageNumber;
135 UINT64 MmCodeSize;
136 EFI_PHYSICAL_ADDRESS MmCodeBase;
137 UINTN BaseOffsetPageNumber;
138 UINTN TopOffsetPageNumber;
139 UINTN Index;
140
141 //
142 // Build tool will calculate the smm code size and then patch the PcdLoadFixAddressMmCodePageNumber
143 //
144 MmCodePageNumber = 0;
145 MmCodeSize = EFI_PAGES_TO_SIZE (MmCodePageNumber);
146 MmCodeBase = gLoadModuleAtFixAddressMmramBase;
147
148 //
149 // If the memory usage bit map is not initialized, do it. Every bit in the array
150 // indicate the status of the corresponding memory page, available or not
151 //
152 if (mMmCodeMemoryRangeUsageBitMap == NULL) {
153 mMmCodeMemoryRangeUsageBitMap = AllocateZeroPool (((MmCodePageNumber / 64) + 1) * sizeof (UINT64));
154 }
155
156 //
157 // If the Dxe code memory range is not allocated or the bit map array allocation failed, return EFI_NOT_FOUND
158 //
159 if (mMmCodeMemoryRangeUsageBitMap == NULL) {
160 return EFI_NOT_FOUND;
161 }
162
163 //
164 // see if the memory range for loading the image is in the MM code range.
165 //
166 if (MmCodeBase + MmCodeSize < ImageBase + ImageSize || MmCodeBase > ImageBase) {
167 return EFI_NOT_FOUND;
168 }
169
170 //
171 // Test if the memory is avalaible or not.
172 //
173 BaseOffsetPageNumber = (UINTN)EFI_SIZE_TO_PAGES ((UINT32)(ImageBase - MmCodeBase));
174 TopOffsetPageNumber = (UINTN)EFI_SIZE_TO_PAGES ((UINT32)(ImageBase + ImageSize - MmCodeBase));
175 for (Index = BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index ++) {
176 if ((mMmCodeMemoryRangeUsageBitMap[Index / 64] & LShiftU64 (1, (Index % 64))) != 0) {
177 //
178 // This page is already used.
179 //
180 return EFI_NOT_FOUND;
181 }
182 }
183
184 //
185 // Being here means the memory range is available. So mark the bits for the memory range
186 //
187 for (Index = BaseOffsetPageNumber; Index < TopOffsetPageNumber; Index ++) {
188 mMmCodeMemoryRangeUsageBitMap[Index / 64] |= LShiftU64 (1, (Index % 64));
189 }
190 return EFI_SUCCESS;
191 }
192
193 /**
194 Get the fixed loading address from image header assigned by build tool. This function only be called
195 when Loading module at Fixed address feature enabled.
196
197 @param ImageContext Pointer to the image context structure that describes the PE/COFF
198 image that needs to be examined by this function.
199 @retval EFI_SUCCESS An fixed loading address is assigned to this image by build tools .
200 @retval EFI_NOT_FOUND The image has no assigned fixed loadding address.
201
202 **/
203 EFI_STATUS
204 GetPeCoffImageFixLoadingAssignedAddress(
205 IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext
206 )
207 {
208 UINTN SectionHeaderOffset;
209 EFI_STATUS Status;
210 EFI_IMAGE_SECTION_HEADER SectionHeader;
211 EFI_IMAGE_OPTIONAL_HEADER_UNION *ImgHdr;
212 EFI_PHYSICAL_ADDRESS FixLoadingAddress;
213 UINT16 Index;
214 UINTN Size;
215 UINT16 NumberOfSections;
216 UINT64 ValueInSectionHeader;
217
218 FixLoadingAddress = 0;
219 Status = EFI_NOT_FOUND;
220
221 //
222 // Get PeHeader pointer
223 //
224 ImgHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)((CHAR8* )ImageContext->Handle + ImageContext->PeCoffHeaderOffset);
225 SectionHeaderOffset = ImageContext->PeCoffHeaderOffset + sizeof (UINT32) + sizeof (EFI_IMAGE_FILE_HEADER) +
226 ImgHdr->Pe32.FileHeader.SizeOfOptionalHeader;
227 NumberOfSections = ImgHdr->Pe32.FileHeader.NumberOfSections;
228
229 //
230 // Get base address from the first section header that doesn't point to code section.
231 //
232 for (Index = 0; Index < NumberOfSections; Index++) {
233 //
234 // Read section header from file
235 //
236 Size = sizeof (EFI_IMAGE_SECTION_HEADER);
237 Status = ImageContext->ImageRead (
238 ImageContext->Handle,
239 SectionHeaderOffset,
240 &Size,
241 &SectionHeader
242 );
243 if (EFI_ERROR (Status)) {
244 return Status;
245 }
246
247 Status = EFI_NOT_FOUND;
248
249 if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_CNT_CODE) == 0) {
250 //
251 // Build tool will save the address in PointerToRelocations & PointerToLineNumbers fields
252 // in the first section header that doesn't point to code section in image header. So there
253 // is an assumption that when the feature is enabled, if a module with a loading address
254 // assigned by tools, the PointerToRelocations & PointerToLineNumbers fields should not be
255 // Zero, or else, these 2 fields should be set to Zero
256 //
257 ValueInSectionHeader = ReadUnaligned64 ((UINT64*)&SectionHeader.PointerToRelocations);
258 if (ValueInSectionHeader != 0) {
259 //
260 // Found first section header that doesn't point to code section in which build tool saves the
261 // offset to SMRAM base as image base in PointerToRelocations & PointerToLineNumbers fields
262 //
263 FixLoadingAddress = (EFI_PHYSICAL_ADDRESS)(gLoadModuleAtFixAddressMmramBase + (INT64)ValueInSectionHeader);
264 //
265 // Check if the memory range is available.
266 //
267 Status = CheckAndMarkFixLoadingMemoryUsageBitMap (FixLoadingAddress, (UINTN)(ImageContext->ImageSize + ImageContext->SectionAlignment));
268 if (!EFI_ERROR(Status)) {
269 //
270 // The assigned address is valid. Return the specified loading address
271 //
272 ImageContext->ImageAddress = FixLoadingAddress;
273 }
274 }
275 break;
276 }
277 SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER);
278 }
279 DEBUG ((DEBUG_INFO|DEBUG_LOAD, "LOADING MODULE FIXED INFO: Loading module at fixed address %x, Status = %r\n",
280 FixLoadingAddress, Status));
281 return Status;
282 }
283 /**
284 Loads an EFI image into SMRAM.
285
286 @param DriverEntry EFI_MM_DRIVER_ENTRY instance
287
288 @return EFI_STATUS
289
290 **/
291 EFI_STATUS
292 EFIAPI
293 MmLoadImage (
294 IN OUT EFI_MM_DRIVER_ENTRY *DriverEntry
295 )
296 {
297 UINTN PageCount;
298 EFI_STATUS Status;
299 EFI_PHYSICAL_ADDRESS DstBuffer;
300 PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;
301
302 DEBUG ((DEBUG_INFO, "MmLoadImage - %g\n", &DriverEntry->FileName));
303
304 Status = EFI_SUCCESS;
305
306 //
307 // Initialize ImageContext
308 //
309 ImageContext.Handle = DriverEntry->Pe32Data;
310 ImageContext.ImageRead = PeCoffLoaderImageReadFromMemory;
311
312 //
313 // Get information about the image being loaded
314 //
315 Status = PeCoffLoaderGetImageInfo (&ImageContext);
316 if (EFI_ERROR (Status)) {
317 return Status;
318 }
319
320 PageCount = (UINTN)EFI_SIZE_TO_PAGES ((UINTN)ImageContext.ImageSize + ImageContext.SectionAlignment);
321 DstBuffer = (UINTN)(-1);
322
323 Status = MmAllocatePages (
324 AllocateMaxAddress,
325 EfiRuntimeServicesCode,
326 PageCount,
327 &DstBuffer
328 );
329 if (EFI_ERROR (Status)) {
330 return Status;
331 }
332
333 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)DstBuffer;
334
335 //
336 // Align buffer on section boundry
337 //
338 ImageContext.ImageAddress += ImageContext.SectionAlignment - 1;
339 ImageContext.ImageAddress &= ~((EFI_PHYSICAL_ADDRESS)(ImageContext.SectionAlignment - 1));
340
341 //
342 // Load the image to our new buffer
343 //
344 Status = PeCoffLoaderLoadImage (&ImageContext);
345 if (EFI_ERROR (Status)) {
346 MmFreePages (DstBuffer, PageCount);
347 return Status;
348 }
349
350 //
351 // Relocate the image in our new buffer
352 //
353 Status = PeCoffLoaderRelocateImage (&ImageContext);
354 if (EFI_ERROR (Status)) {
355 MmFreePages (DstBuffer, PageCount);
356 return Status;
357 }
358
359 //
360 // Flush the instruction cache so the image data are written before we execute it
361 //
362 InvalidateInstructionCacheRange ((VOID *)(UINTN) ImageContext.ImageAddress, (UINTN) ImageContext.ImageSize);
363
364 //
365 // Save Image EntryPoint in DriverEntry
366 //
367 DriverEntry->ImageEntryPoint = ImageContext.EntryPoint;
368 DriverEntry->ImageBuffer = DstBuffer;
369 DriverEntry->NumberOfPage = PageCount;
370
371 if (mEfiSystemTable != NULL) {
372 Status = mEfiSystemTable->BootServices->AllocatePool (
373 EfiBootServicesData,
374 sizeof (EFI_LOADED_IMAGE_PROTOCOL),
375 (VOID **)&DriverEntry->LoadedImage
376 );
377 if (EFI_ERROR (Status)) {
378 MmFreePages (DstBuffer, PageCount);
379 return Status;
380 }
381
382 ZeroMem (DriverEntry->LoadedImage, sizeof (EFI_LOADED_IMAGE_PROTOCOL));
383 //
384 // Fill in the remaining fields of the Loaded Image Protocol instance.
385 // Note: ImageBase is an SMRAM address that can not be accessed outside of SMRAM if SMRAM window is closed.
386 //
387 DriverEntry->LoadedImage->Revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
388 DriverEntry->LoadedImage->ParentHandle = NULL;
389 DriverEntry->LoadedImage->SystemTable = mEfiSystemTable;
390 DriverEntry->LoadedImage->DeviceHandle = NULL;
391 DriverEntry->LoadedImage->FilePath = NULL;
392
393 DriverEntry->LoadedImage->ImageBase = (VOID *)(UINTN)DriverEntry->ImageBuffer;
394 DriverEntry->LoadedImage->ImageSize = ImageContext.ImageSize;
395 DriverEntry->LoadedImage->ImageCodeType = EfiRuntimeServicesCode;
396 DriverEntry->LoadedImage->ImageDataType = EfiRuntimeServicesData;
397
398 //
399 // Create a new image handle in the UEFI handle database for the MM Driver
400 //
401 DriverEntry->ImageHandle = NULL;
402 Status = mEfiSystemTable->BootServices->InstallMultipleProtocolInterfaces (
403 &DriverEntry->ImageHandle,
404 &gEfiLoadedImageProtocolGuid,
405 DriverEntry->LoadedImage,
406 NULL
407 );
408 }
409
410 //
411 // Print the load address and the PDB file name if it is available
412 //
413 DEBUG_CODE_BEGIN ();
414
415 UINTN Index;
416 UINTN StartIndex;
417 CHAR8 EfiFileName[256];
418
419 DEBUG ((DEBUG_INFO | DEBUG_LOAD,
420 "Loading MM driver at 0x%11p EntryPoint=0x%11p ",
421 (VOID *)(UINTN) ImageContext.ImageAddress,
422 FUNCTION_ENTRY_POINT (ImageContext.EntryPoint)));
423
424 //
425 // Print Module Name by Pdb file path.
426 // Windows and Unix style file path are all trimmed correctly.
427 //
428 if (ImageContext.PdbPointer != NULL) {
429 StartIndex = 0;
430 for (Index = 0; ImageContext.PdbPointer[Index] != 0; Index++) {
431 if ((ImageContext.PdbPointer[Index] == '\\') || (ImageContext.PdbPointer[Index] == '/')) {
432 StartIndex = Index + 1;
433 }
434 }
435
436 //
437 // Copy the PDB file name to our temporary string, and replace .pdb with .efi
438 // The PDB file name is limited in the range of 0~255.
439 // If the length is bigger than 255, trim the redudant characters to avoid overflow in array boundary.
440 //
441 for (Index = 0; Index < sizeof (EfiFileName) - 4; Index++) {
442 EfiFileName[Index] = ImageContext.PdbPointer[Index + StartIndex];
443 if (EfiFileName[Index] == 0) {
444 EfiFileName[Index] = '.';
445 }
446 if (EfiFileName[Index] == '.') {
447 EfiFileName[Index + 1] = 'e';
448 EfiFileName[Index + 2] = 'f';
449 EfiFileName[Index + 3] = 'i';
450 EfiFileName[Index + 4] = 0;
451 break;
452 }
453 }
454
455 if (Index == sizeof (EfiFileName) - 4) {
456 EfiFileName[Index] = 0;
457 }
458 DEBUG ((DEBUG_INFO | DEBUG_LOAD, "%a", EfiFileName));
459 }
460 DEBUG ((DEBUG_INFO | DEBUG_LOAD, "\n"));
461
462 DEBUG_CODE_END ();
463
464 return Status;
465 }
466
467 /**
468 Preprocess dependency expression and update DriverEntry to reflect the
469 state of Before and After dependencies. If DriverEntry->Before
470 or DriverEntry->After is set it will never be cleared.
471
472 @param DriverEntry DriverEntry element to update .
473
474 @retval EFI_SUCCESS It always works.
475
476 **/
477 EFI_STATUS
478 MmPreProcessDepex (
479 IN EFI_MM_DRIVER_ENTRY *DriverEntry
480 )
481 {
482 UINT8 *Iterator;
483
484 Iterator = DriverEntry->Depex;
485 DriverEntry->Dependent = TRUE;
486
487 if (*Iterator == EFI_DEP_BEFORE) {
488 DriverEntry->Before = TRUE;
489 } else if (*Iterator == EFI_DEP_AFTER) {
490 DriverEntry->After = TRUE;
491 }
492
493 if (DriverEntry->Before || DriverEntry->After) {
494 CopyMem (&DriverEntry->BeforeAfterGuid, Iterator + 1, sizeof (EFI_GUID));
495 }
496
497 return EFI_SUCCESS;
498 }
499
500 /**
501 Read Depex and pre-process the Depex for Before and After. If Section Extraction
502 protocol returns an error via ReadSection defer the reading of the Depex.
503
504 @param DriverEntry Driver to work on.
505
506 @retval EFI_SUCCESS Depex read and preprossesed
507 @retval EFI_PROTOCOL_ERROR The section extraction protocol returned an error
508 and Depex reading needs to be retried.
509 @retval Error DEPEX not found.
510
511 **/
512 EFI_STATUS
513 MmGetDepexSectionAndPreProccess (
514 IN EFI_MM_DRIVER_ENTRY *DriverEntry
515 )
516 {
517 EFI_STATUS Status;
518
519 //
520 // Data already read
521 //
522 if (DriverEntry->Depex == NULL) {
523 Status = EFI_NOT_FOUND;
524 } else {
525 Status = EFI_SUCCESS;
526 }
527 if (EFI_ERROR (Status)) {
528 if (Status == EFI_PROTOCOL_ERROR) {
529 //
530 // The section extraction protocol failed so set protocol error flag
531 //
532 DriverEntry->DepexProtocolError = TRUE;
533 } else {
534 //
535 // If no Depex assume depend on all architectural protocols
536 //
537 DriverEntry->Depex = NULL;
538 DriverEntry->Dependent = TRUE;
539 DriverEntry->DepexProtocolError = FALSE;
540 }
541 } else {
542 //
543 // Set Before and After state information based on Depex
544 // Driver will be put in Dependent state
545 //
546 MmPreProcessDepex (DriverEntry);
547 DriverEntry->DepexProtocolError = FALSE;
548 }
549
550 return Status;
551 }
552
553 /**
554 This is the main Dispatcher for MM and it exits when there are no more
555 drivers to run. Drain the mScheduledQueue and load and start a PE
556 image for each driver. Search the mDiscoveredList to see if any driver can
557 be placed on the mScheduledQueue. If no drivers are placed on the
558 mScheduledQueue exit the function.
559
560 @retval EFI_SUCCESS All of the MM Drivers that could be dispatched
561 have been run and the MM Entry Point has been
562 registered.
563 @retval EFI_NOT_READY The MM Driver that registered the MM Entry Point
564 was just dispatched.
565 @retval EFI_NOT_FOUND There are no MM Drivers available to be dispatched.
566 @retval EFI_ALREADY_STARTED The MM Dispatcher is already running
567
568 **/
569 EFI_STATUS
570 MmDispatcher (
571 VOID
572 )
573 {
574 EFI_STATUS Status;
575 LIST_ENTRY *Link;
576 EFI_MM_DRIVER_ENTRY *DriverEntry;
577 BOOLEAN ReadyToRun;
578
579 DEBUG ((DEBUG_INFO, "MmDispatcher\n"));
580
581 if (!gRequestDispatch) {
582 DEBUG ((DEBUG_INFO, " !gRequestDispatch\n"));
583 return EFI_NOT_FOUND;
584 }
585
586 if (gDispatcherRunning) {
587 DEBUG ((DEBUG_INFO, " gDispatcherRunning\n"));
588 //
589 // If the dispatcher is running don't let it be restarted.
590 //
591 return EFI_ALREADY_STARTED;
592 }
593
594 gDispatcherRunning = TRUE;
595
596 do {
597 //
598 // Drain the Scheduled Queue
599 //
600 DEBUG ((DEBUG_INFO, " Drain the Scheduled Queue\n"));
601 while (!IsListEmpty (&mScheduledQueue)) {
602 DriverEntry = CR (
603 mScheduledQueue.ForwardLink,
604 EFI_MM_DRIVER_ENTRY,
605 ScheduledLink,
606 EFI_MM_DRIVER_ENTRY_SIGNATURE
607 );
608 DEBUG ((DEBUG_INFO, " DriverEntry (Scheduled) - %g\n", &DriverEntry->FileName));
609
610 //
611 // Load the MM Driver image into memory. If the Driver was transitioned from
612 // Untrused to Scheduled it would have already been loaded so we may need to
613 // skip the LoadImage
614 //
615 if (DriverEntry->ImageHandle == NULL) {
616 Status = MmLoadImage (DriverEntry);
617
618 //
619 // Update the driver state to reflect that it's been loaded
620 //
621 if (EFI_ERROR (Status)) {
622 //
623 // The MM Driver could not be loaded, and do not attempt to load or start it again.
624 // Take driver from Scheduled to Initialized.
625 //
626 DriverEntry->Initialized = TRUE;
627 DriverEntry->Scheduled = FALSE;
628 RemoveEntryList (&DriverEntry->ScheduledLink);
629
630 //
631 // If it's an error don't try the StartImage
632 //
633 continue;
634 }
635 }
636
637 DriverEntry->Scheduled = FALSE;
638 DriverEntry->Initialized = TRUE;
639 RemoveEntryList (&DriverEntry->ScheduledLink);
640
641 //
642 // For each MM driver, pass NULL as ImageHandle
643 //
644 if (mEfiSystemTable == NULL) {
645 DEBUG ((DEBUG_INFO, "StartImage - 0x%x (Standalone Mode)\n", DriverEntry->ImageEntryPoint));
646 Status = ((MM_IMAGE_ENTRY_POINT)(UINTN)DriverEntry->ImageEntryPoint) (DriverEntry->ImageHandle, &gMmCoreMmst);
647 } else {
648 DEBUG ((DEBUG_INFO, "StartImage - 0x%x (Tradition Mode)\n", DriverEntry->ImageEntryPoint));
649 Status = ((EFI_IMAGE_ENTRY_POINT)(UINTN)DriverEntry->ImageEntryPoint) (
650 DriverEntry->ImageHandle,
651 mEfiSystemTable
652 );
653 }
654 if (EFI_ERROR(Status)) {
655 DEBUG ((DEBUG_INFO, "StartImage Status - %r\n", Status));
656 MmFreePages(DriverEntry->ImageBuffer, DriverEntry->NumberOfPage);
657 }
658 }
659
660 //
661 // Search DriverList for items to place on Scheduled Queue
662 //
663 DEBUG ((DEBUG_INFO, " Search DriverList for items to place on Scheduled Queue\n"));
664 ReadyToRun = FALSE;
665 for (Link = mDiscoveredList.ForwardLink; Link != &mDiscoveredList; Link = Link->ForwardLink) {
666 DriverEntry = CR (Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTRY_SIGNATURE);
667 DEBUG ((DEBUG_INFO, " DriverEntry (Discovered) - %g\n", &DriverEntry->FileName));
668
669 if (DriverEntry->DepexProtocolError) {
670 //
671 // If Section Extraction Protocol did not let the Depex be read before retry the read
672 //
673 Status = MmGetDepexSectionAndPreProccess (DriverEntry);
674 }
675
676 if (DriverEntry->Dependent) {
677 if (MmIsSchedulable (DriverEntry)) {
678 MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEntry);
679 ReadyToRun = TRUE;
680 }
681 }
682 }
683 } while (ReadyToRun);
684
685 //
686 // If there is no more MM driver to dispatch, stop the dispatch request
687 //
688 DEBUG ((DEBUG_INFO, " no more MM driver to dispatch, stop the dispatch request\n"));
689 gRequestDispatch = FALSE;
690 for (Link = mDiscoveredList.ForwardLink; Link != &mDiscoveredList; Link = Link->ForwardLink) {
691 DriverEntry = CR (Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTRY_SIGNATURE);
692 DEBUG ((DEBUG_INFO, " DriverEntry (Discovered) - %g\n", &DriverEntry->FileName));
693
694 if (!DriverEntry->Initialized) {
695 //
696 // We have MM driver pending to dispatch
697 //
698 gRequestDispatch = TRUE;
699 break;
700 }
701 }
702
703 gDispatcherRunning = FALSE;
704
705 return EFI_SUCCESS;
706 }
707
708 /**
709 Insert InsertedDriverEntry onto the mScheduledQueue. To do this you
710 must add any driver with a before dependency on InsertedDriverEntry first.
711 You do this by recursively calling this routine. After all the Befores are
712 processed you can add InsertedDriverEntry to the mScheduledQueue.
713 Then you can add any driver with an After dependency on InsertedDriverEntry
714 by recursively calling this routine.
715
716 @param InsertedDriverEntry The driver to insert on the ScheduledLink Queue
717
718 **/
719 VOID
720 MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (
721 IN EFI_MM_DRIVER_ENTRY *InsertedDriverEntry
722 )
723 {
724 LIST_ENTRY *Link;
725 EFI_MM_DRIVER_ENTRY *DriverEntry;
726
727 //
728 // Process Before Dependency
729 //
730 for (Link = mDiscoveredList.ForwardLink; Link != &mDiscoveredList; Link = Link->ForwardLink) {
731 DriverEntry = CR(Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTRY_SIGNATURE);
732 if (DriverEntry->Before && DriverEntry->Dependent && DriverEntry != InsertedDriverEntry) {
733 DEBUG ((DEBUG_DISPATCH, "Evaluate MM DEPEX for FFS(%g)\n", &DriverEntry->FileName));
734 DEBUG ((DEBUG_DISPATCH, " BEFORE FFS(%g) = ", &DriverEntry->BeforeAfterGuid));
735 if (CompareGuid (&InsertedDriverEntry->FileName, &DriverEntry->BeforeAfterGuid)) {
736 //
737 // Recursively process BEFORE
738 //
739 DEBUG ((DEBUG_DISPATCH, "TRUE\n END\n RESULT = TRUE\n"));
740 MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEntry);
741 } else {
742 DEBUG ((DEBUG_DISPATCH, "FALSE\n END\n RESULT = FALSE\n"));
743 }
744 }
745 }
746
747 //
748 // Convert driver from Dependent to Scheduled state
749 //
750
751 InsertedDriverEntry->Dependent = FALSE;
752 InsertedDriverEntry->Scheduled = TRUE;
753 InsertTailList (&mScheduledQueue, &InsertedDriverEntry->ScheduledLink);
754
755
756 //
757 // Process After Dependency
758 //
759 for (Link = mDiscoveredList.ForwardLink; Link != &mDiscoveredList; Link = Link->ForwardLink) {
760 DriverEntry = CR(Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTRY_SIGNATURE);
761 if (DriverEntry->After && DriverEntry->Dependent && DriverEntry != InsertedDriverEntry) {
762 DEBUG ((DEBUG_DISPATCH, "Evaluate MM DEPEX for FFS(%g)\n", &DriverEntry->FileName));
763 DEBUG ((DEBUG_DISPATCH, " AFTER FFS(%g) = ", &DriverEntry->BeforeAfterGuid));
764 if (CompareGuid (&InsertedDriverEntry->FileName, &DriverEntry->BeforeAfterGuid)) {
765 //
766 // Recursively process AFTER
767 //
768 DEBUG ((DEBUG_DISPATCH, "TRUE\n END\n RESULT = TRUE\n"));
769 MmInsertOnScheduledQueueWhileProcessingBeforeAndAfter (DriverEntry);
770 } else {
771 DEBUG ((DEBUG_DISPATCH, "FALSE\n END\n RESULT = FALSE\n"));
772 }
773 }
774 }
775 }
776
777 /**
778 Return TRUE if the Fv has been processed, FALSE if not.
779
780 @param FvHandle The handle of a FV that's being tested
781
782 @retval TRUE Fv protocol on FvHandle has been processed
783 @retval FALSE Fv protocol on FvHandle has not yet been
784 processed
785
786 **/
787 BOOLEAN
788 FvHasBeenProcessed (
789 IN EFI_HANDLE FvHandle
790 )
791 {
792 LIST_ENTRY *Link;
793 KNOWN_HANDLE *KnownHandle;
794
795 for (Link = mFvHandleList.ForwardLink; Link != &mFvHandleList; Link = Link->ForwardLink) {
796 KnownHandle = CR (Link, KNOWN_HANDLE, Link, KNOWN_HANDLE_SIGNATURE);
797 if (KnownHandle->Handle == FvHandle) {
798 return TRUE;
799 }
800 }
801 return FALSE;
802 }
803
804 /**
805 Remember that Fv protocol on FvHandle has had it's drivers placed on the
806 mDiscoveredList. This fucntion adds entries on the mFvHandleList. Items are
807 never removed/freed from the mFvHandleList.
808
809 @param FvHandle The handle of a FV that has been processed
810
811 **/
812 VOID
813 FvIsBeingProcesssed (
814 IN EFI_HANDLE FvHandle
815 )
816 {
817 KNOWN_HANDLE *KnownHandle;
818
819 DEBUG ((DEBUG_INFO, "FvIsBeingProcesssed - 0x%08x\n", FvHandle));
820
821 KnownHandle = AllocatePool (sizeof (KNOWN_HANDLE));
822 ASSERT (KnownHandle != NULL);
823
824 KnownHandle->Signature = KNOWN_HANDLE_SIGNATURE;
825 KnownHandle->Handle = FvHandle;
826 InsertTailList (&mFvHandleList, &KnownHandle->Link);
827 }
828
829 /**
830 Add an entry to the mDiscoveredList. Allocate memory to store the DriverEntry,
831 and initilize any state variables. Read the Depex from the FV and store it
832 in DriverEntry. Pre-process the Depex to set the Before and After state.
833 The Discovered list is never free'ed and contains booleans that represent the
834 other possible MM driver states.
835
836 @param Fv Fv protocol, needed to read Depex info out of
837 FLASH.
838 @param FvHandle Handle for Fv, needed in the
839 EFI_MM_DRIVER_ENTRY so that the PE image can be
840 read out of the FV at a later time.
841 @param DriverName Name of driver to add to mDiscoveredList.
842
843 @retval EFI_SUCCESS If driver was added to the mDiscoveredList.
844 @retval EFI_ALREADY_STARTED The driver has already been started. Only one
845 DriverName may be active in the system at any one
846 time.
847
848 **/
849 EFI_STATUS
850 MmAddToDriverList (
851 IN EFI_HANDLE FvHandle,
852 IN VOID *Pe32Data,
853 IN UINTN Pe32DataSize,
854 IN VOID *Depex,
855 IN UINTN DepexSize,
856 IN EFI_GUID *DriverName
857 )
858 {
859 EFI_MM_DRIVER_ENTRY *DriverEntry;
860
861 DEBUG ((DEBUG_INFO, "MmAddToDriverList - %g (0x%08x)\n", DriverName, Pe32Data));
862
863 //
864 // Create the Driver Entry for the list. ZeroPool initializes lots of variables to
865 // NULL or FALSE.
866 //
867 DriverEntry = AllocateZeroPool (sizeof (EFI_MM_DRIVER_ENTRY));
868 ASSERT (DriverEntry != NULL);
869
870 DriverEntry->Signature = EFI_MM_DRIVER_ENTRY_SIGNATURE;
871 CopyGuid (&DriverEntry->FileName, DriverName);
872 DriverEntry->FvHandle = FvHandle;
873 DriverEntry->Pe32Data = Pe32Data;
874 DriverEntry->Pe32DataSize = Pe32DataSize;
875 DriverEntry->Depex = Depex;
876 DriverEntry->DepexSize = DepexSize;
877
878 MmGetDepexSectionAndPreProccess (DriverEntry);
879
880 InsertTailList (&mDiscoveredList, &DriverEntry->Link);
881 gRequestDispatch = TRUE;
882
883 return EFI_SUCCESS;
884 }
885
886 /**
887 Traverse the discovered list for any drivers that were discovered but not loaded
888 because the dependency experessions evaluated to false.
889
890 **/
891 VOID
892 MmDisplayDiscoveredNotDispatched (
893 VOID
894 )
895 {
896 LIST_ENTRY *Link;
897 EFI_MM_DRIVER_ENTRY *DriverEntry;
898
899 for (Link = mDiscoveredList.ForwardLink;Link !=&mDiscoveredList; Link = Link->ForwardLink) {
900 DriverEntry = CR (Link, EFI_MM_DRIVER_ENTRY, Link, EFI_MM_DRIVER_ENTRY_SIGNATURE);
901 if (DriverEntry->Dependent) {
902 DEBUG ((DEBUG_LOAD, "MM Driver %g was discovered but not loaded!!\n", &DriverEntry->FileName));
903 }
904 }
905 }