From patchwork Thu May 22 01:17:46 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Ying-Chun Liu \(PaulLiu\)" X-Patchwork-Id: 891699 Delivered-To: patch@linaro.org Received: by 2002:adf:e88a:0:b0:3a3:61c9:c5d4 with SMTP id d10csp2404452wrm; Wed, 21 May 2025 18:18:23 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCXPgBeDLPARarTehSc4VkbO/OAK1vFSHFEjzJ9puh7HL7gS6iiPPoqmkDZ53XdHqX4rHqJVLw==@linaro.org X-Google-Smtp-Source: AGHT+IHEdI5c+ERhI/VPj6AKUhVUQxAUbCCHuw7q7byYPhg11bA8SYN/lfXjkBj72HNNmlY1m0ta X-Received: by 2002:a05:6000:3104:b0:3a3:7351:6f2c with SMTP id ffacd0b85a97d-3a373517138mr11111164f8f.49.1747876703095; Wed, 21 May 2025 18:18:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1747876703; cv=none; d=google.com; s=arc-20240605; b=F5D3dIQUyzQYBY9J3+Cc+HHFX/vJ5QtwUUB5t6w52LYeZGT1RPktQ4dt/F6Gdr8ts6 fvuOC1lmpYaBoaYqv3NZNYg962h4xDrQxRHeas8bcoPSEjAB+6hHaruTQuAUNRBZ2zsk 98LUz9NyebSOv8wWD+qRjICO1j3OzuKsoo8Y4NWRORkKwIjj/oWmAUQK6XHI1Li3j3n+ a6lNNYrzK0ywYCcgNcWDC4Xhugg+lCkYAcYkKCpbT/rDFP/zanU3PNWZh3yPQHyjMCzv BrHnbcNP4T3Tos8E6G72VsaW4/jvaqto1qu1TLypdLhAaCWecY5ZDe97OWYKGWBA6Oi3 fqAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ieF40tIbs22ObwJys8yA/rI/S452SE7+TAVp1vEihuo=; fh=qX5ZZPHEMXWmb4A5/dTtVKkSjWWl13aZe4Ej/wmUqYQ=; b=OeEFgSQlVgbvrAVpAOohyDmeDvkjSReE8GNeCAPo8yZEV3YZIUNTJQ2zcrrTf+Xpxz DkM/Ybqo10eAwlYNZllu7J9cwL+E9tEb8JxXsrYq3dudQGGj+UGTzUrRXlR7meUsFnHS 2+seqNJ0aececcG2JLy+UJOTU8op4l5V5099wYPDAJsTtLKLMUVX/464bWcCpoFPA4Cq 9BgEcvDSSl9y5z4C7PM/dzNNtb3vhY8Tkv04Cq3wcwP5mMxBOoX+UU67bBSRENT8bLIq kxJcUFQKdIBHhg4H+3N/6wJ0XuiBfLVeldWLxYKqjNmQ5ZSPlX1NDWalVt8pJhwdby5R 3bfg==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b=e8Z1VZbr; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dara=fail header.i=@linaro.org Return-Path: Received: from phobos.denx.de (phobos.denx.de. [2a01:238:438b:c500:173d:9f52:ddab:ee01]) by mx.google.com with ESMTPS id ffacd0b85a97d-3a35ca4bf35si10537088f8f.52.2025.05.21.18.18.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 May 2025 18:18:23 -0700 (PDT) Received-SPF: pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b=e8Z1VZbr; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dara=fail header.i=@linaro.org Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id D5BB382F7D; Thu, 22 May 2025 03:18:08 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=debian.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="e8Z1VZbr"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2DDDC8006D; Thu, 22 May 2025 03:18:07 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id C65C282F7D for ; Thu, 22 May 2025 03:18:04 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=debian.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=grandpaul@gmail.com Received: by mail-pg1-x52d.google.com with SMTP id 41be03b00d2f7-879d2e419b9so6350397a12.2 for ; Wed, 21 May 2025 18:18:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1747876683; x=1748481483; darn=lists.denx.de; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:sender:from:to:cc:subject:date :message-id:reply-to; bh=ieF40tIbs22ObwJys8yA/rI/S452SE7+TAVp1vEihuo=; b=e8Z1VZbro/Ny7VhcEFUM+ISQ8IkyAwIiq57RYxh/sDmqy6kNA0OZANpjTZFakOKOPN 33Mfw63r+NnkwzVT7wsbOlO202+Ksibxutd1gJY/ak2tmT3tQ3EL7c9ozlJ1jLOffWXW yLKbHLpHzRwg16rJJ7mKQEJVyCoa+Dbg1PsssRRp7EUkvEOjXq9TDf8RxpnEIL0MAdQr JxDtaC6pqjMpC6W4dyhTfDV3qCoUnIUvjonIOYwIA0x6nKUzNA0KzudF7sVnrbSArqg6 ELkdvvJ0QQCCZsEDbcmoxzEMb4teWo/02Df2k9Tg6eVOhOeTQXIWF0qeBsQw05nYXuk5 LQ1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747876683; x=1748481483; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:sender:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=ieF40tIbs22ObwJys8yA/rI/S452SE7+TAVp1vEihuo=; b=wdSlZCV6Mh8FWT1AVlMnUpuaTQ66xkkVjonSz/DjTEvYpWg3aOReA11bDP0z1wHvuG EM2FDH8vayZvYJ1GdYJwp/Yg7BU4xNJpk9nGB+3RwABcRtLhB1mverag0DOWkWI+nY0e tnrjO0mJEqG9d7s59zcg7yai5UaYCtiA+GK/iLvW6zfkUw1niq870XBHuljcnyXr338x y3dZeH9kt2uJhGpi6vBj8m3yk+5vgwLzwkebZgrCQiC0jqfFuzir391wXsxXKtd/6cnt nfgBw+z+lIrOcroMxUIqiKD5lShUeLIC3svemFD0Zl62AYjb/ZxyFwV6xbOeQAMbFjuW 3CrA== X-Gm-Message-State: AOJu0YxL3vsSwMwh/AjWX79oS52LYf/qjmMo7xQb3Fub9gAZnzde9Fel xUebe+g4v0NnnDpzQIFaF6CuZ2eFUBzVfAyQqa0HtVhELOKbA+fEG1GJKTUZNQ== X-Gm-Gg: ASbGncumXB8rpYJbbzVfrpeOzqSf50yk/+H7w3ga5jj/Tm5r6zWZWeb2gTzJe8qSv1R +mP48O/Jne1uSL/dV9DKiqpFiAM3ectmncemORzZTutppTk/+ihO6RsBOOXYd/k4sm0ZKnli0kk zHpkg7PnsGucSuWhU46CdLb8YsE4+c+l78ARcLyiKEbDgMzz0xkCHlLOPOqDqs8XcO7KQ5h4f9v BLaykechYajEl5HItWm+IY/MDijrx6zN29+dEYIV0SxmaEMMrLNegz4C4M1tZZP3Fb3dMtFDWiy +B2uvDdVbBTlzDg23sMOkj1vq5Xm+bmkApV1ICvzvqQOi+g= X-Received: by 2002:a17:903:f8c:b0:223:50f0:b97 with SMTP id d9443c01a7336-231d45d67f2mr293244735ad.52.1747876682744; Wed, 21 May 2025 18:18:02 -0700 (PDT) Received: from localhost ([61.71.79.124]) by smtp.gmail.com with UTF8SMTPSA id d9443c01a7336-231d4e97798sm98796785ad.147.2025.05.21.18.18.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 May 2025 18:18:02 -0700 (PDT) From: "Ying-Chun Liu (PaulLiu)" To: u-boot@lists.denx.de Cc: "Ying-Chun Liu (PaulLiu)" , Heinrich Schuchardt , Ilias Apalodimas , Peter Robinson Subject: [PATCH v3 2/4] efi: add EFI_DEBUG_IMAGE_INFO_TABLE for debug Date: Thu, 22 May 2025 09:17:46 +0800 Message-ID: <20250522011749.3498970-3-paulliu@debian.org> X-Mailer: git-send-email 2.47.2 In-Reply-To: <20250522011749.3498970-1-paulliu@debian.org> References: <20250522011749.3498970-1-paulliu@debian.org> MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean From: "Ying-Chun Liu (PaulLiu)" EFI_DEBUG_IMAGE_INFO_TABLE is used to store EFI_LOADED_IMAGE for debug purpose. This commit adds the table to the EFI_CONFIGURATION_TABLE. This feature is described in UEFI Spec version 2.10. Section 18.4. The implementation ensures support for hardware-assisted debugging and provides a standardized mechanism for debuggers to discover and interact with system-level debug resources. Signed-off-by: Ying-Chun Liu (PaulLiu) Cc: Heinrich Schuchardt Cc: Ilias Apalodimas Cc: Peter Robinson --- V3: Fix the way of installation of configuration table. --- include/efi_api.h | 53 ++++++++++++++++++++++++++++++++++++++ include/efi_loader.h | 2 ++ lib/efi_loader/efi_setup.c | 17 ++++++++++++ 3 files changed, 72 insertions(+) diff --git a/include/efi_api.h b/include/efi_api.h index 6c4c1a0cc7b..8da0a350ce3 100644 --- a/include/efi_api.h +++ b/include/efi_api.h @@ -238,6 +238,10 @@ enum efi_reset_type { EFI_GUID(0xcce33c35, 0x74ac, 0x4087, 0xbc, 0xe7, \ 0x8b, 0x29, 0xb0, 0x2e, 0xeb, 0x27) +#define EFI_DEBUG_IMAGE_INFO_TABLE_GUID \ + EFI_GUID(0x49152e77, 0x1ada, 0x4764, 0xb7, 0xa2, \ + 0x7a, 0xfe, 0xfe, 0xd9, 0x5e, 0x8b) + struct efi_conformance_profiles_table { u16 version; u16 number_of_profiles; @@ -574,6 +578,55 @@ struct efi_loaded_image { efi_status_t (EFIAPI *unload)(efi_handle_t image_handle); }; +#define EFI_DEBUG_IMAGE_INFO_UPDATE_IN_PROGRESS 0x01 +#define EFI_DEBUG_IMAGE_INFO_TABLE_MODIFIED 0x02 + +/** + * struct efi_debug_image_info_normal - Store Debug Information for normal + * image. + * @image_info_type: the type of image info. + * @loaded_image_protocol_instance: the pointer to struct efi_loaded_image. + * @image_handle: the EFI handle of the image. + * + * This struct is created by efi_load_image() and store the information + * for debugging an normal image. + */ +struct efi_debug_image_info_normal { + u32 image_info_type; + struct efi_loaded_image *loaded_image_protocol_instance; + efi_handle_t image_handle; +}; + +/** + * union efi_debug_image_info - The union to store a pointer for EFI + * DEBUG IMAGE INFO. + * @image_info_type: the type of the image_info if it is not a normal image. + * @normal_image: The pointer to a normal image. + * + * This union is for a pointer that can point to the struct of normal_image. + * Or it points to an image_info_type. + */ +union efi_debug_image_info { + u32 *image_info_type; + struct efi_debug_image_info_normal *normal_image; +}; + +/** + * struct efi_debug_image_info_table_header - store the array of + * struct efi_debug_image_info. + * @update_status: Status to notify this struct is ready to use or not. + * @table_size: The number of elements of efi_debug_image_info_table. + * @efi_debug_image_info_table: The array of efi_debug_image_info. + * + * This struct stores the array of efi_debug_image_info. The + * number of elements is table_size. + */ +struct efi_debug_image_info_table_header { + volatile u32 update_status; + u32 table_size; + union efi_debug_image_info *efi_debug_image_info_table; +}; + #define EFI_DEVICE_PATH_PROTOCOL_GUID \ EFI_GUID(0x09576e91, 0x6d3f, 0x11d2, \ 0x8e, 0x39, 0x00, 0xa0, 0xc9, 0x69, 0x72, 0x3b) diff --git a/include/efi_loader.h b/include/efi_loader.h index 8f065244d8e..d0c72d0bc58 100644 --- a/include/efi_loader.h +++ b/include/efi_loader.h @@ -315,6 +315,8 @@ extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; extern const struct efi_hii_config_access_protocol efi_hii_config_access; extern const struct efi_hii_database_protocol efi_hii_database; extern const struct efi_hii_string_protocol efi_hii_string; +/* structure for EFI_DEBUG_SUPPORT_PROTOCOL */ +extern struct efi_debug_image_info_table_header efi_m_debug_info_table_header; uint16_t *efi_dp_str(struct efi_device_path *dp); diff --git a/lib/efi_loader/efi_setup.c b/lib/efi_loader/efi_setup.c index a6b37d994f6..e949100593f 100644 --- a/lib/efi_loader/efi_setup.c +++ b/lib/efi_loader/efi_setup.c @@ -18,6 +18,15 @@ efi_status_t efi_obj_list_initialized = OBJ_LIST_NOT_INITIALIZED; +struct efi_debug_image_info_table_header efi_m_debug_info_table_header = { + 0, + 0, + NULL +}; + +const efi_guid_t efi_debug_image_info_table_guid = + EFI_DEBUG_IMAGE_INFO_TABLE_GUID; + /* * Allow unaligned memory access. * @@ -280,10 +289,18 @@ efi_status_t efi_init_obj_list(void) /* Initialize system table pointer */ if (IS_ENABLED(CONFIG_EFI_DEBUG_SUPPORT_TABLE)) { + efi_guid_t debug_image_info_table_guid = + efi_debug_image_info_table_guid; ret = efi_initialize_system_table_pointer(); if (ret != EFI_SUCCESS) { goto out; } + + ret = efi_install_configuration_table(&debug_image_info_table_guid, + &efi_m_debug_info_table_header); + if (ret != EFI_SUCCESS) { + goto out; + } } if (IS_ENABLED(CONFIG_EFI_ECPT)) {