| /** @file | |
| The common variable operation routines shared by DXE_RUNTIME variable | |
| module and DXE_SMM variable module. | |
| Caution: This module requires additional review when modified. | |
| This driver will have external input - variable data. They may be input in SMM mode. | |
| This external input must be validated carefully to avoid security issue like | |
| buffer overflow, integer overflow. | |
| VariableServiceGetNextVariableName () and VariableServiceQueryVariableInfo() are external API. | |
| They need check input parameter. | |
| VariableServiceGetVariable() and VariableServiceSetVariable() are external API | |
| to receive datasize and data buffer. The size should be checked carefully. | |
| VariableServiceSetVariable() should also check authenticate data to avoid buffer overflow, | |
| integer overflow. It should also check attribute to avoid authentication bypass. | |
| Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR> | |
| (C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR> | |
| This program and the accompanying materials | |
| are licensed and made available under the terms and conditions of the BSD License | |
| which accompanies this distribution. The full text of the license may be found at | |
| http://opensource.org/licenses/bsd-license.php | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
| **/ | |
| #include "Variable.h" | |
| VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal; | |
| /// | |
| /// Define a memory cache that improves the search performance for a variable. | |
| /// | |
| VARIABLE_STORE_HEADER *mNvVariableCache = NULL; | |
| /// | |
| /// Memory cache of Fv Header. | |
| /// | |
| EFI_FIRMWARE_VOLUME_HEADER *mNvFvHeaderCache = NULL; | |
| /// | |
| /// The memory entry used for variable statistics data. | |
| /// | |
| VARIABLE_INFO_ENTRY *gVariableInfo = NULL; | |
| /// | |
| /// The flag to indicate whether the platform has left the DXE phase of execution. | |
| /// | |
| BOOLEAN mEndOfDxe = FALSE; | |
| /// | |
| /// It indicates the var check request source. | |
| /// In the implementation, DXE is regarded as untrusted, and SMM is trusted. | |
| /// | |
| VAR_CHECK_REQUEST_SOURCE mRequestSource = VarCheckFromUntrusted; | |
| // | |
| // It will record the current boot error flag before EndOfDxe. | |
| // | |
| VAR_ERROR_FLAG mCurrentBootVarErrFlag = VAR_ERROR_FLAG_NO_ERROR; | |
| VARIABLE_ENTRY_PROPERTY mVariableEntryProperty[] = { | |
| { | |
| &gEdkiiVarErrorFlagGuid, | |
| VAR_ERROR_FLAG_NAME, | |
| { | |
| VAR_CHECK_VARIABLE_PROPERTY_REVISION, | |
| VAR_CHECK_VARIABLE_PROPERTY_READ_ONLY, | |
| VARIABLE_ATTRIBUTE_NV_BS_RT, | |
| sizeof (VAR_ERROR_FLAG), | |
| sizeof (VAR_ERROR_FLAG) | |
| } | |
| }, | |
| }; | |
| AUTH_VAR_LIB_CONTEXT_IN mAuthContextIn = { | |
| AUTH_VAR_LIB_CONTEXT_IN_STRUCT_VERSION, | |
| // | |
| // StructSize, TO BE FILLED | |
| // | |
| 0, | |
| // | |
| // MaxAuthVariableSize, TO BE FILLED | |
| // | |
| 0, | |
| VariableExLibFindVariable, | |
| VariableExLibFindNextVariable, | |
| VariableExLibUpdateVariable, | |
| VariableExLibGetScratchBuffer, | |
| VariableExLibCheckRemainingSpaceForConsistency, | |
| VariableExLibAtRuntime, | |
| }; | |
| AUTH_VAR_LIB_CONTEXT_OUT mAuthContextOut; | |
| /** | |
| Routine used to track statistical information about variable usage. | |
| The data is stored in the EFI system table so it can be accessed later. | |
| VariableInfo.efi can dump out the table. Only Boot Services variable | |
| accesses are tracked by this code. The PcdVariableCollectStatistics | |
| build flag controls if this feature is enabled. | |
| A read that hits in the cache will have Read and Cache true for | |
| the transaction. Data is allocated by this routine, but never | |
| freed. | |
| @param[in] VariableName Name of the Variable to track. | |
| @param[in] VendorGuid Guid of the Variable to track. | |
| @param[in] Volatile TRUE if volatile FALSE if non-volatile. | |
| @param[in] Read TRUE if GetVariable() was called. | |
| @param[in] Write TRUE if SetVariable() was called. | |
| @param[in] Delete TRUE if deleted via SetVariable(). | |
| @param[in] Cache TRUE for a cache hit. | |
| **/ | |
| VOID | |
| UpdateVariableInfo ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN BOOLEAN Volatile, | |
| IN BOOLEAN Read, | |
| IN BOOLEAN Write, | |
| IN BOOLEAN Delete, | |
| IN BOOLEAN Cache | |
| ) | |
| { | |
| VARIABLE_INFO_ENTRY *Entry; | |
| if (FeaturePcdGet (PcdVariableCollectStatistics)) { | |
| if (AtRuntime ()) { | |
| // Don't collect statistics at runtime. | |
| return; | |
| } | |
| if (gVariableInfo == NULL) { | |
| // | |
| // On the first call allocate a entry and place a pointer to it in | |
| // the EFI System Table. | |
| // | |
| gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY)); | |
| ASSERT (gVariableInfo != NULL); | |
| CopyGuid (&gVariableInfo->VendorGuid, VendorGuid); | |
| gVariableInfo->Name = AllocateZeroPool (StrSize (VariableName)); | |
| ASSERT (gVariableInfo->Name != NULL); | |
| StrCpyS (gVariableInfo->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName); | |
| gVariableInfo->Volatile = Volatile; | |
| } | |
| for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) { | |
| if (CompareGuid (VendorGuid, &Entry->VendorGuid)) { | |
| if (StrCmp (VariableName, Entry->Name) == 0) { | |
| if (Read) { | |
| Entry->ReadCount++; | |
| } | |
| if (Write) { | |
| Entry->WriteCount++; | |
| } | |
| if (Delete) { | |
| Entry->DeleteCount++; | |
| } | |
| if (Cache) { | |
| Entry->CacheCount++; | |
| } | |
| return; | |
| } | |
| } | |
| if (Entry->Next == NULL) { | |
| // | |
| // If the entry is not in the table add it. | |
| // Next iteration of the loop will fill in the data. | |
| // | |
| Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY)); | |
| ASSERT (Entry->Next != NULL); | |
| CopyGuid (&Entry->Next->VendorGuid, VendorGuid); | |
| Entry->Next->Name = AllocateZeroPool (StrSize (VariableName)); | |
| ASSERT (Entry->Next->Name != NULL); | |
| StrCpyS (Entry->Next->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName); | |
| Entry->Next->Volatile = Volatile; | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| This code checks if variable header is valid or not. | |
| @param Variable Pointer to the Variable Header. | |
| @param VariableStoreEnd Pointer to the Variable Store End. | |
| @retval TRUE Variable header is valid. | |
| @retval FALSE Variable header is not valid. | |
| **/ | |
| BOOLEAN | |
| IsValidVariableHeader ( | |
| IN VARIABLE_HEADER *Variable, | |
| IN VARIABLE_HEADER *VariableStoreEnd | |
| ) | |
| { | |
| if ((Variable == NULL) || (Variable >= VariableStoreEnd) || (Variable->StartId != VARIABLE_DATA)) { | |
| // | |
| // Variable is NULL or has reached the end of variable store, | |
| // or the StartId is not correct. | |
| // | |
| return FALSE; | |
| } | |
| return TRUE; | |
| } | |
| /** | |
| This function writes data to the FWH at the correct LBA even if the LBAs | |
| are fragmented. | |
| @param Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param Volatile Point out the Variable is Volatile or Non-Volatile. | |
| @param SetByIndex TRUE if target pointer is given as index. | |
| FALSE if target pointer is absolute. | |
| @param Fvb Pointer to the writable FVB protocol. | |
| @param DataPtrIndex Pointer to the Data from the end of VARIABLE_STORE_HEADER | |
| structure. | |
| @param DataSize Size of data to be written. | |
| @param Buffer Pointer to the buffer from which data is written. | |
| @retval EFI_INVALID_PARAMETER Parameters not valid. | |
| @retval EFI_SUCCESS Variable store successfully updated. | |
| **/ | |
| EFI_STATUS | |
| UpdateVariableStore ( | |
| IN VARIABLE_GLOBAL *Global, | |
| IN BOOLEAN Volatile, | |
| IN BOOLEAN SetByIndex, | |
| IN EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb, | |
| IN UINTN DataPtrIndex, | |
| IN UINT32 DataSize, | |
| IN UINT8 *Buffer | |
| ) | |
| { | |
| EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry; | |
| UINTN BlockIndex2; | |
| UINTN LinearOffset; | |
| UINTN CurrWriteSize; | |
| UINTN CurrWritePtr; | |
| UINT8 *CurrBuffer; | |
| EFI_LBA LbaNumber; | |
| UINTN Size; | |
| EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader; | |
| VARIABLE_STORE_HEADER *VolatileBase; | |
| EFI_PHYSICAL_ADDRESS FvVolHdr; | |
| EFI_PHYSICAL_ADDRESS DataPtr; | |
| EFI_STATUS Status; | |
| FwVolHeader = NULL; | |
| DataPtr = DataPtrIndex; | |
| // | |
| // Check if the Data is Volatile. | |
| // | |
| if (!Volatile) { | |
| if (Fvb == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| Status = Fvb->GetPhysicalAddress(Fvb, &FvVolHdr); | |
| ASSERT_EFI_ERROR (Status); | |
| FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr); | |
| // | |
| // Data Pointer should point to the actual Address where data is to be | |
| // written. | |
| // | |
| if (SetByIndex) { | |
| DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase; | |
| } | |
| if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else { | |
| // | |
| // Data Pointer should point to the actual Address where data is to be | |
| // written. | |
| // | |
| VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase); | |
| if (SetByIndex) { | |
| DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase; | |
| } | |
| if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // If Volatile Variable just do a simple mem copy. | |
| // | |
| CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize); | |
| return EFI_SUCCESS; | |
| } | |
| // | |
| // If we are here we are dealing with Non-Volatile Variables. | |
| // | |
| LinearOffset = (UINTN) FwVolHeader; | |
| CurrWritePtr = (UINTN) DataPtr; | |
| CurrWriteSize = DataSize; | |
| CurrBuffer = Buffer; | |
| LbaNumber = 0; | |
| if (CurrWritePtr < LinearOffset) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| for (PtrBlockMapEntry = mNvFvHeaderCache->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) { | |
| for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) { | |
| // | |
| // Check to see if the Variable Writes are spanning through multiple | |
| // blocks. | |
| // | |
| if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) { | |
| if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) { | |
| Status = Fvb->Write ( | |
| Fvb, | |
| LbaNumber, | |
| (UINTN) (CurrWritePtr - LinearOffset), | |
| &CurrWriteSize, | |
| CurrBuffer | |
| ); | |
| return Status; | |
| } else { | |
| Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr); | |
| Status = Fvb->Write ( | |
| Fvb, | |
| LbaNumber, | |
| (UINTN) (CurrWritePtr - LinearOffset), | |
| &Size, | |
| CurrBuffer | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length; | |
| CurrBuffer = CurrBuffer + Size; | |
| CurrWriteSize = CurrWriteSize - Size; | |
| } | |
| } | |
| LinearOffset += PtrBlockMapEntry->Length; | |
| LbaNumber++; | |
| } | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| This code gets the current status of Variable Store. | |
| @param VarStoreHeader Pointer to the Variable Store Header. | |
| @retval EfiRaw Variable store status is raw. | |
| @retval EfiValid Variable store status is valid. | |
| @retval EfiInvalid Variable store status is invalid. | |
| **/ | |
| VARIABLE_STORE_STATUS | |
| GetVariableStoreStatus ( | |
| IN VARIABLE_STORE_HEADER *VarStoreHeader | |
| ) | |
| { | |
| if ((CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) || | |
| CompareGuid (&VarStoreHeader->Signature, &gEfiVariableGuid)) && | |
| VarStoreHeader->Format == VARIABLE_STORE_FORMATTED && | |
| VarStoreHeader->State == VARIABLE_STORE_HEALTHY | |
| ) { | |
| return EfiValid; | |
| } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff && | |
| VarStoreHeader->Size == 0xffffffff && | |
| VarStoreHeader->Format == 0xff && | |
| VarStoreHeader->State == 0xff | |
| ) { | |
| return EfiRaw; | |
| } else { | |
| return EfiInvalid; | |
| } | |
| } | |
| /** | |
| This code gets the size of variable header. | |
| @return Size of variable header in bytes in type UINTN. | |
| **/ | |
| UINTN | |
| GetVariableHeaderSize ( | |
| VOID | |
| ) | |
| { | |
| UINTN Value; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| Value = sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| } else { | |
| Value = sizeof (VARIABLE_HEADER); | |
| } | |
| return Value; | |
| } | |
| /** | |
| This code gets the size of name of variable. | |
| @param Variable Pointer to the Variable Header. | |
| @return UINTN Size of variable in bytes. | |
| **/ | |
| UINTN | |
| NameSizeOfVariable ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| if (AuthVariable->State == (UINT8) (-1) || | |
| AuthVariable->DataSize == (UINT32) (-1) || | |
| AuthVariable->NameSize == (UINT32) (-1) || | |
| AuthVariable->Attributes == (UINT32) (-1)) { | |
| return 0; | |
| } | |
| return (UINTN) AuthVariable->NameSize; | |
| } else { | |
| if (Variable->State == (UINT8) (-1) || | |
| Variable->DataSize == (UINT32) (-1) || | |
| Variable->NameSize == (UINT32) (-1) || | |
| Variable->Attributes == (UINT32) (-1)) { | |
| return 0; | |
| } | |
| return (UINTN) Variable->NameSize; | |
| } | |
| } | |
| /** | |
| This code sets the size of name of variable. | |
| @param[in] Variable Pointer to the Variable Header. | |
| @param[in] NameSize Name size to set. | |
| **/ | |
| VOID | |
| SetNameSizeOfVariable ( | |
| IN VARIABLE_HEADER *Variable, | |
| IN UINTN NameSize | |
| ) | |
| { | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| AuthVariable->NameSize = (UINT32) NameSize; | |
| } else { | |
| Variable->NameSize = (UINT32) NameSize; | |
| } | |
| } | |
| /** | |
| This code gets the size of variable data. | |
| @param Variable Pointer to the Variable Header. | |
| @return Size of variable in bytes. | |
| **/ | |
| UINTN | |
| DataSizeOfVariable ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| if (AuthVariable->State == (UINT8) (-1) || | |
| AuthVariable->DataSize == (UINT32) (-1) || | |
| AuthVariable->NameSize == (UINT32) (-1) || | |
| AuthVariable->Attributes == (UINT32) (-1)) { | |
| return 0; | |
| } | |
| return (UINTN) AuthVariable->DataSize; | |
| } else { | |
| if (Variable->State == (UINT8) (-1) || | |
| Variable->DataSize == (UINT32) (-1) || | |
| Variable->NameSize == (UINT32) (-1) || | |
| Variable->Attributes == (UINT32) (-1)) { | |
| return 0; | |
| } | |
| return (UINTN) Variable->DataSize; | |
| } | |
| } | |
| /** | |
| This code sets the size of variable data. | |
| @param[in] Variable Pointer to the Variable Header. | |
| @param[in] DataSize Data size to set. | |
| **/ | |
| VOID | |
| SetDataSizeOfVariable ( | |
| IN VARIABLE_HEADER *Variable, | |
| IN UINTN DataSize | |
| ) | |
| { | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| AuthVariable->DataSize = (UINT32) DataSize; | |
| } else { | |
| Variable->DataSize = (UINT32) DataSize; | |
| } | |
| } | |
| /** | |
| This code gets the pointer to the variable name. | |
| @param Variable Pointer to the Variable Header. | |
| @return Pointer to Variable Name which is Unicode encoding. | |
| **/ | |
| CHAR16 * | |
| GetVariableNamePtr ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| return (CHAR16 *) ((UINTN) Variable + GetVariableHeaderSize ()); | |
| } | |
| /** | |
| This code gets the pointer to the variable guid. | |
| @param Variable Pointer to the Variable Header. | |
| @return A EFI_GUID* pointer to Vendor Guid. | |
| **/ | |
| EFI_GUID * | |
| GetVendorGuidPtr ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| return &AuthVariable->VendorGuid; | |
| } else { | |
| return &Variable->VendorGuid; | |
| } | |
| } | |
| /** | |
| This code gets the pointer to the variable data. | |
| @param Variable Pointer to the Variable Header. | |
| @return Pointer to Variable Data. | |
| **/ | |
| UINT8 * | |
| GetVariableDataPtr ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| UINTN Value; | |
| // | |
| // Be careful about pad size for alignment. | |
| // | |
| Value = (UINTN) GetVariableNamePtr (Variable); | |
| Value += NameSizeOfVariable (Variable); | |
| Value += GET_PAD_SIZE (NameSizeOfVariable (Variable)); | |
| return (UINT8 *) Value; | |
| } | |
| /** | |
| This code gets the variable data offset related to variable header. | |
| @param Variable Pointer to the Variable Header. | |
| @return Variable Data offset. | |
| **/ | |
| UINTN | |
| GetVariableDataOffset ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| UINTN Value; | |
| // | |
| // Be careful about pad size for alignment | |
| // | |
| Value = GetVariableHeaderSize (); | |
| Value += NameSizeOfVariable (Variable); | |
| Value += GET_PAD_SIZE (NameSizeOfVariable (Variable)); | |
| return Value; | |
| } | |
| /** | |
| This code gets the pointer to the next variable header. | |
| @param Variable Pointer to the Variable Header. | |
| @return Pointer to next variable header. | |
| **/ | |
| VARIABLE_HEADER * | |
| GetNextVariablePtr ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| UINTN Value; | |
| Value = (UINTN) GetVariableDataPtr (Variable); | |
| Value += DataSizeOfVariable (Variable); | |
| Value += GET_PAD_SIZE (DataSizeOfVariable (Variable)); | |
| // | |
| // Be careful about pad size for alignment. | |
| // | |
| return (VARIABLE_HEADER *) HEADER_ALIGN (Value); | |
| } | |
| /** | |
| Gets the pointer to the first variable header in given variable store area. | |
| @param VarStoreHeader Pointer to the Variable Store Header. | |
| @return Pointer to the first variable header. | |
| **/ | |
| VARIABLE_HEADER * | |
| GetStartPointer ( | |
| IN VARIABLE_STORE_HEADER *VarStoreHeader | |
| ) | |
| { | |
| // | |
| // The end of variable store. | |
| // | |
| return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1); | |
| } | |
| /** | |
| Gets the pointer to the end of the variable storage area. | |
| This function gets pointer to the end of the variable storage | |
| area, according to the input variable store header. | |
| @param VarStoreHeader Pointer to the Variable Store Header. | |
| @return Pointer to the end of the variable storage area. | |
| **/ | |
| VARIABLE_HEADER * | |
| GetEndPointer ( | |
| IN VARIABLE_STORE_HEADER *VarStoreHeader | |
| ) | |
| { | |
| // | |
| // The end of variable store | |
| // | |
| return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size); | |
| } | |
| /** | |
| Record variable error flag. | |
| @param[in] Flag Variable error flag to record. | |
| @param[in] VariableName Name of variable. | |
| @param[in] VendorGuid Guid of variable. | |
| @param[in] Attributes Attributes of the variable. | |
| @param[in] VariableSize Size of the variable. | |
| **/ | |
| VOID | |
| RecordVarErrorFlag ( | |
| IN VAR_ERROR_FLAG Flag, | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN UINT32 Attributes, | |
| IN UINTN VariableSize | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_POINTER_TRACK Variable; | |
| VAR_ERROR_FLAG *VarErrFlag; | |
| VAR_ERROR_FLAG TempFlag; | |
| DEBUG_CODE ( | |
| DEBUG ((EFI_D_ERROR, "RecordVarErrorFlag (0x%02x) %s:%g - 0x%08x - 0x%x\n", Flag, VariableName, VendorGuid, Attributes, VariableSize)); | |
| if (Flag == VAR_ERROR_FLAG_SYSTEM_ERROR) { | |
| if (AtRuntime ()) { | |
| DEBUG ((EFI_D_ERROR, "CommonRuntimeVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonRuntimeVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize)); | |
| } else { | |
| DEBUG ((EFI_D_ERROR, "CommonVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize)); | |
| } | |
| } else { | |
| DEBUG ((EFI_D_ERROR, "CommonMaxUserVariableSpace = 0x%x - CommonUserVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonUserVariableTotalSize)); | |
| } | |
| ); | |
| if (!mEndOfDxe) { | |
| // | |
| // Before EndOfDxe, just record the current boot variable error flag to local variable, | |
| // and leave the variable error flag in NV flash as the last boot variable error flag. | |
| // After EndOfDxe in InitializeVarErrorFlag (), the variable error flag in NV flash | |
| // will be initialized to this local current boot variable error flag. | |
| // | |
| mCurrentBootVarErrFlag &= Flag; | |
| return; | |
| } | |
| // | |
| // Record error flag (it should have be initialized). | |
| // | |
| Status = FindVariable ( | |
| VAR_ERROR_FLAG_NAME, | |
| &gEdkiiVarErrorFlagGuid, | |
| &Variable, | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| VarErrFlag = (VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr); | |
| TempFlag = *VarErrFlag; | |
| TempFlag &= Flag; | |
| if (TempFlag == *VarErrFlag) { | |
| return; | |
| } | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE, | |
| FALSE, | |
| mVariableModuleGlobal->FvbInstance, | |
| (UINTN) VarErrFlag - (UINTN) mNvVariableCache + (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, | |
| sizeof (TempFlag), | |
| &TempFlag | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Update the data in NV cache. | |
| // | |
| *VarErrFlag = TempFlag; | |
| } | |
| } | |
| } | |
| /** | |
| Initialize variable error flag. | |
| Before EndOfDxe, the variable indicates the last boot variable error flag, | |
| then it means the last boot variable error flag must be got before EndOfDxe. | |
| After EndOfDxe, the variable indicates the current boot variable error flag, | |
| then it means the current boot variable error flag must be got after EndOfDxe. | |
| **/ | |
| VOID | |
| InitializeVarErrorFlag ( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_POINTER_TRACK Variable; | |
| VAR_ERROR_FLAG Flag; | |
| VAR_ERROR_FLAG VarErrFlag; | |
| if (!mEndOfDxe) { | |
| return; | |
| } | |
| Flag = mCurrentBootVarErrFlag; | |
| DEBUG ((EFI_D_INFO, "Initialize variable error flag (%02x)\n", Flag)); | |
| Status = FindVariable ( | |
| VAR_ERROR_FLAG_NAME, | |
| &gEdkiiVarErrorFlagGuid, | |
| &Variable, | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| VarErrFlag = *((VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr)); | |
| if (VarErrFlag == Flag) { | |
| return; | |
| } | |
| } | |
| UpdateVariable ( | |
| VAR_ERROR_FLAG_NAME, | |
| &gEdkiiVarErrorFlagGuid, | |
| &Flag, | |
| sizeof (Flag), | |
| VARIABLE_ATTRIBUTE_NV_BS_RT, | |
| 0, | |
| 0, | |
| &Variable, | |
| NULL | |
| ); | |
| } | |
| /** | |
| Is user variable? | |
| @param[in] Variable Pointer to variable header. | |
| @retval TRUE User variable. | |
| @retval FALSE System variable. | |
| **/ | |
| BOOLEAN | |
| IsUserVariable ( | |
| IN VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| VAR_CHECK_VARIABLE_PROPERTY Property; | |
| // | |
| // Only after End Of Dxe, the variables belong to system variable are fixed. | |
| // If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable, | |
| // then no need to check if the variable is user variable or not specially. | |
| // | |
| if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) { | |
| if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) { | |
| return TRUE; | |
| } | |
| } | |
| return FALSE; | |
| } | |
| /** | |
| Calculate common user variable total size. | |
| **/ | |
| VOID | |
| CalculateCommonUserVariableTotalSize ( | |
| VOID | |
| ) | |
| { | |
| VARIABLE_HEADER *Variable; | |
| VARIABLE_HEADER *NextVariable; | |
| UINTN VariableSize; | |
| VAR_CHECK_VARIABLE_PROPERTY Property; | |
| // | |
| // Only after End Of Dxe, the variables belong to system variable are fixed. | |
| // If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable, | |
| // then no need to calculate the common user variable total size specially. | |
| // | |
| if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) { | |
| Variable = GetStartPointer (mNvVariableCache); | |
| while (IsValidVariableHeader (Variable, GetEndPointer (mNvVariableCache))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) { | |
| // | |
| // No property, it is user variable. | |
| // | |
| mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize; | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| } | |
| } | |
| /** | |
| Initialize variable quota. | |
| **/ | |
| VOID | |
| InitializeVariableQuota ( | |
| VOID | |
| ) | |
| { | |
| if (!mEndOfDxe) { | |
| return; | |
| } | |
| InitializeVarErrorFlag (); | |
| CalculateCommonUserVariableTotalSize (); | |
| } | |
| /** | |
| Variable store garbage collection and reclaim operation. | |
| @param[in] VariableBase Base address of variable store. | |
| @param[out] LastVariableOffset Offset of last variable. | |
| @param[in] IsVolatile The variable store is volatile or not; | |
| if it is non-volatile, need FTW. | |
| @param[in, out] UpdatingPtrTrack Pointer to updating variable pointer track structure. | |
| @param[in] NewVariable Pointer to new variable. | |
| @param[in] NewVariableSize New variable size. | |
| @return EFI_SUCCESS Reclaim operation has finished successfully. | |
| @return EFI_OUT_OF_RESOURCES No enough memory resources or variable space. | |
| @return Others Unexpect error happened during reclaim operation. | |
| **/ | |
| EFI_STATUS | |
| Reclaim ( | |
| IN EFI_PHYSICAL_ADDRESS VariableBase, | |
| OUT UINTN *LastVariableOffset, | |
| IN BOOLEAN IsVolatile, | |
| IN OUT VARIABLE_POINTER_TRACK *UpdatingPtrTrack, | |
| IN VARIABLE_HEADER *NewVariable, | |
| IN UINTN NewVariableSize | |
| ) | |
| { | |
| VARIABLE_HEADER *Variable; | |
| VARIABLE_HEADER *AddedVariable; | |
| VARIABLE_HEADER *NextVariable; | |
| VARIABLE_HEADER *NextAddedVariable; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| UINT8 *ValidBuffer; | |
| UINTN MaximumBufferSize; | |
| UINTN VariableSize; | |
| UINTN NameSize; | |
| UINT8 *CurrPtr; | |
| VOID *Point0; | |
| VOID *Point1; | |
| BOOLEAN FoundAdded; | |
| EFI_STATUS Status; | |
| UINTN CommonVariableTotalSize; | |
| UINTN CommonUserVariableTotalSize; | |
| UINTN HwErrVariableTotalSize; | |
| VARIABLE_HEADER *UpdatingVariable; | |
| VARIABLE_HEADER *UpdatingInDeletedTransition; | |
| UpdatingVariable = NULL; | |
| UpdatingInDeletedTransition = NULL; | |
| if (UpdatingPtrTrack != NULL) { | |
| UpdatingVariable = UpdatingPtrTrack->CurrPtr; | |
| UpdatingInDeletedTransition = UpdatingPtrTrack->InDeletedTransitionPtr; | |
| } | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase); | |
| CommonVariableTotalSize = 0; | |
| CommonUserVariableTotalSize = 0; | |
| HwErrVariableTotalSize = 0; | |
| if (IsVolatile) { | |
| // | |
| // Start Pointers for the variable. | |
| // | |
| Variable = GetStartPointer (VariableStoreHeader); | |
| MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER); | |
| while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| if ((Variable->State == VAR_ADDED || Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) && | |
| Variable != UpdatingVariable && | |
| Variable != UpdatingInDeletedTransition | |
| ) { | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| MaximumBufferSize += VariableSize; | |
| } | |
| Variable = NextVariable; | |
| } | |
| if (NewVariable != NULL) { | |
| // | |
| // Add the new variable size. | |
| // | |
| MaximumBufferSize += NewVariableSize; | |
| } | |
| // | |
| // Reserve the 1 Bytes with Oxff to identify the | |
| // end of the variable buffer. | |
| // | |
| MaximumBufferSize += 1; | |
| ValidBuffer = AllocatePool (MaximumBufferSize); | |
| if (ValidBuffer == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| } else { | |
| // | |
| // For NV variable reclaim, don't allocate pool here and just use mNvVariableCache | |
| // as the buffer to reduce SMRAM consumption for SMM variable driver. | |
| // | |
| MaximumBufferSize = mNvVariableCache->Size; | |
| ValidBuffer = (UINT8 *) mNvVariableCache; | |
| } | |
| SetMem (ValidBuffer, MaximumBufferSize, 0xff); | |
| // | |
| // Copy variable store header. | |
| // | |
| CopyMem (ValidBuffer, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER)); | |
| CurrPtr = (UINT8 *) GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer); | |
| // | |
| // Reinstall all ADDED variables as long as they are not identical to Updating Variable. | |
| // | |
| Variable = GetStartPointer (VariableStoreHeader); | |
| while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| if (Variable != UpdatingVariable && Variable->State == VAR_ADDED) { | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize); | |
| CurrPtr += VariableSize; | |
| if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| CommonVariableTotalSize += VariableSize; | |
| if (IsUserVariable (Variable)) { | |
| CommonUserVariableTotalSize += VariableSize; | |
| } | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| // | |
| // Reinstall all in delete transition variables. | |
| // | |
| Variable = GetStartPointer (VariableStoreHeader); | |
| while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| if (Variable != UpdatingVariable && Variable != UpdatingInDeletedTransition && Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // Buffer has cached all ADDED variable. | |
| // Per IN_DELETED variable, we have to guarantee that | |
| // no ADDED one in previous buffer. | |
| // | |
| FoundAdded = FALSE; | |
| AddedVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer); | |
| while (IsValidVariableHeader (AddedVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) ValidBuffer))) { | |
| NextAddedVariable = GetNextVariablePtr (AddedVariable); | |
| NameSize = NameSizeOfVariable (AddedVariable); | |
| if (CompareGuid (GetVendorGuidPtr (AddedVariable), GetVendorGuidPtr (Variable)) && | |
| NameSize == NameSizeOfVariable (Variable) | |
| ) { | |
| Point0 = (VOID *) GetVariableNamePtr (AddedVariable); | |
| Point1 = (VOID *) GetVariableNamePtr (Variable); | |
| if (CompareMem (Point0, Point1, NameSize) == 0) { | |
| FoundAdded = TRUE; | |
| break; | |
| } | |
| } | |
| AddedVariable = NextAddedVariable; | |
| } | |
| if (!FoundAdded) { | |
| // | |
| // Promote VAR_IN_DELETED_TRANSITION to VAR_ADDED. | |
| // | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize); | |
| ((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED; | |
| CurrPtr += VariableSize; | |
| if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| CommonVariableTotalSize += VariableSize; | |
| if (IsUserVariable (Variable)) { | |
| CommonUserVariableTotalSize += VariableSize; | |
| } | |
| } | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| // | |
| // Install the new variable if it is not NULL. | |
| // | |
| if (NewVariable != NULL) { | |
| if (((UINTN) CurrPtr - (UINTN) ValidBuffer) + NewVariableSize > VariableStoreHeader->Size) { | |
| // | |
| // No enough space to store the new variable. | |
| // | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| if (!IsVolatile) { | |
| if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += NewVariableSize; | |
| } else if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| CommonVariableTotalSize += NewVariableSize; | |
| if (IsUserVariable (NewVariable)) { | |
| CommonUserVariableTotalSize += NewVariableSize; | |
| } | |
| } | |
| if ((HwErrVariableTotalSize > PcdGet32 (PcdHwErrStorageSize)) || | |
| (CommonVariableTotalSize > mVariableModuleGlobal->CommonVariableSpace) || | |
| (CommonUserVariableTotalSize > mVariableModuleGlobal->CommonMaxUserVariableSpace)) { | |
| // | |
| // No enough space to store the new variable by NV or NV+HR attribute. | |
| // | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| } | |
| CopyMem (CurrPtr, (UINT8 *) NewVariable, NewVariableSize); | |
| ((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED; | |
| if (UpdatingVariable != NULL) { | |
| UpdatingPtrTrack->CurrPtr = (VARIABLE_HEADER *)((UINTN)UpdatingPtrTrack->StartPtr + ((UINTN)CurrPtr - (UINTN)GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer))); | |
| UpdatingPtrTrack->InDeletedTransitionPtr = NULL; | |
| } | |
| CurrPtr += NewVariableSize; | |
| } | |
| if (IsVolatile) { | |
| // | |
| // If volatile variable store, just copy valid buffer. | |
| // | |
| SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff); | |
| CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) CurrPtr - (UINTN) ValidBuffer); | |
| *LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer; | |
| Status = EFI_SUCCESS; | |
| } else { | |
| // | |
| // If non-volatile variable store, perform FTW here. | |
| // | |
| Status = FtwVariableSpace ( | |
| VariableBase, | |
| (VARIABLE_STORE_HEADER *) ValidBuffer | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| *LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer; | |
| mVariableModuleGlobal->HwErrVariableTotalSize = HwErrVariableTotalSize; | |
| mVariableModuleGlobal->CommonVariableTotalSize = CommonVariableTotalSize; | |
| mVariableModuleGlobal->CommonUserVariableTotalSize = CommonUserVariableTotalSize; | |
| } else { | |
| mVariableModuleGlobal->HwErrVariableTotalSize = 0; | |
| mVariableModuleGlobal->CommonVariableTotalSize = 0; | |
| mVariableModuleGlobal->CommonUserVariableTotalSize = 0; | |
| Variable = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase); | |
| while (IsValidVariableHeader (Variable, GetEndPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize; | |
| } else if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| mVariableModuleGlobal->CommonVariableTotalSize += VariableSize; | |
| if (IsUserVariable (Variable)) { | |
| mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize; | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| *LastVariableOffset = (UINTN) Variable - (UINTN) VariableBase; | |
| } | |
| } | |
| Done: | |
| if (IsVolatile) { | |
| FreePool (ValidBuffer); | |
| } else { | |
| // | |
| // For NV variable reclaim, we use mNvVariableCache as the buffer, so copy the data back. | |
| // | |
| CopyMem (mNvVariableCache, (UINT8 *)(UINTN)VariableBase, VariableStoreHeader->Size); | |
| } | |
| return Status; | |
| } | |
| /** | |
| Find the variable in the specified variable store. | |
| @param[in] VariableName Name of the variable to be found | |
| @param[in] VendorGuid Vendor GUID to be found. | |
| @param[in] IgnoreRtCheck Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute | |
| check at runtime when searching variable. | |
| @param[in, out] PtrTrack Variable Track Pointer structure that contains Variable Information. | |
| @retval EFI_SUCCESS Variable found successfully | |
| @retval EFI_NOT_FOUND Variable not found | |
| **/ | |
| EFI_STATUS | |
| FindVariableEx ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN BOOLEAN IgnoreRtCheck, | |
| IN OUT VARIABLE_POINTER_TRACK *PtrTrack | |
| ) | |
| { | |
| VARIABLE_HEADER *InDeletedVariable; | |
| VOID *Point; | |
| PtrTrack->InDeletedTransitionPtr = NULL; | |
| // | |
| // Find the variable by walk through HOB, volatile and non-volatile variable store. | |
| // | |
| InDeletedVariable = NULL; | |
| for ( PtrTrack->CurrPtr = PtrTrack->StartPtr | |
| ; IsValidVariableHeader (PtrTrack->CurrPtr, PtrTrack->EndPtr) | |
| ; PtrTrack->CurrPtr = GetNextVariablePtr (PtrTrack->CurrPtr) | |
| ) { | |
| if (PtrTrack->CurrPtr->State == VAR_ADDED || | |
| PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED) | |
| ) { | |
| if (IgnoreRtCheck || !AtRuntime () || ((PtrTrack->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) { | |
| if (VariableName[0] == 0) { | |
| if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| InDeletedVariable = PtrTrack->CurrPtr; | |
| } else { | |
| PtrTrack->InDeletedTransitionPtr = InDeletedVariable; | |
| return EFI_SUCCESS; | |
| } | |
| } else { | |
| if (CompareGuid (VendorGuid, GetVendorGuidPtr (PtrTrack->CurrPtr))) { | |
| Point = (VOID *) GetVariableNamePtr (PtrTrack->CurrPtr); | |
| ASSERT (NameSizeOfVariable (PtrTrack->CurrPtr) != 0); | |
| if (CompareMem (VariableName, Point, NameSizeOfVariable (PtrTrack->CurrPtr)) == 0) { | |
| if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| InDeletedVariable = PtrTrack->CurrPtr; | |
| } else { | |
| PtrTrack->InDeletedTransitionPtr = InDeletedVariable; | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| } | |
| } | |
| } | |
| } | |
| } | |
| PtrTrack->CurrPtr = InDeletedVariable; | |
| return (PtrTrack->CurrPtr == NULL) ? EFI_NOT_FOUND : EFI_SUCCESS; | |
| } | |
| /** | |
| Finds variable in storage blocks of volatile and non-volatile storage areas. | |
| This code finds variable in storage blocks of volatile and non-volatile storage areas. | |
| If VariableName is an empty string, then we just return the first | |
| qualified variable without comparing VariableName and VendorGuid. | |
| If IgnoreRtCheck is TRUE, then we ignore the EFI_VARIABLE_RUNTIME_ACCESS attribute check | |
| at runtime when searching existing variable, only VariableName and VendorGuid are compared. | |
| Otherwise, variables without EFI_VARIABLE_RUNTIME_ACCESS are not visible at runtime. | |
| @param[in] VariableName Name of the variable to be found. | |
| @param[in] VendorGuid Vendor GUID to be found. | |
| @param[out] PtrTrack VARIABLE_POINTER_TRACK structure for output, | |
| including the range searched and the target position. | |
| @param[in] Global Pointer to VARIABLE_GLOBAL structure, including | |
| base of volatile variable storage area, base of | |
| NV variable storage area, and a lock. | |
| @param[in] IgnoreRtCheck Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute | |
| check at runtime when searching variable. | |
| @retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while | |
| VendorGuid is NULL. | |
| @retval EFI_SUCCESS Variable successfully found. | |
| @retval EFI_NOT_FOUND Variable not found | |
| **/ | |
| EFI_STATUS | |
| FindVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT VARIABLE_POINTER_TRACK *PtrTrack, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN BOOLEAN IgnoreRtCheck | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader[VariableStoreTypeMax]; | |
| VARIABLE_STORE_TYPE Type; | |
| if (VariableName[0] != 0 && VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // 0: Volatile, 1: HOB, 2: Non-Volatile. | |
| // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName | |
| // make use of this mapping to implement search algorithm. | |
| // | |
| VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) Global->VolatileVariableBase; | |
| VariableStoreHeader[VariableStoreTypeHob] = (VARIABLE_STORE_HEADER *) (UINTN) Global->HobVariableBase; | |
| VariableStoreHeader[VariableStoreTypeNv] = mNvVariableCache; | |
| // | |
| // Find the variable by walk through HOB, volatile and non-volatile variable store. | |
| // | |
| for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) { | |
| if (VariableStoreHeader[Type] == NULL) { | |
| continue; | |
| } | |
| PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Type]); | |
| PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Type]); | |
| PtrTrack->Volatile = (BOOLEAN) (Type == VariableStoreTypeVolatile); | |
| Status = FindVariableEx (VariableName, VendorGuid, IgnoreRtCheck, PtrTrack); | |
| if (!EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| } | |
| return EFI_NOT_FOUND; | |
| } | |
| /** | |
| Get index from supported language codes according to language string. | |
| This code is used to get corresponding index in supported language codes. It can handle | |
| RFC4646 and ISO639 language tags. | |
| In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index. | |
| In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index. | |
| For example: | |
| SupportedLang = "engfraengfra" | |
| Lang = "eng" | |
| Iso639Language = TRUE | |
| The return value is "0". | |
| Another example: | |
| SupportedLang = "en;fr;en-US;fr-FR" | |
| Lang = "fr-FR" | |
| Iso639Language = FALSE | |
| The return value is "3". | |
| @param SupportedLang Platform supported language codes. | |
| @param Lang Configured language. | |
| @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646. | |
| @retval The index of language in the language codes. | |
| **/ | |
| UINTN | |
| GetIndexFromSupportedLangCodes( | |
| IN CHAR8 *SupportedLang, | |
| IN CHAR8 *Lang, | |
| IN BOOLEAN Iso639Language | |
| ) | |
| { | |
| UINTN Index; | |
| UINTN CompareLength; | |
| UINTN LanguageLength; | |
| if (Iso639Language) { | |
| CompareLength = ISO_639_2_ENTRY_SIZE; | |
| for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) { | |
| if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) { | |
| // | |
| // Successfully find the index of Lang string in SupportedLang string. | |
| // | |
| Index = Index / CompareLength; | |
| return Index; | |
| } | |
| } | |
| ASSERT (FALSE); | |
| return 0; | |
| } else { | |
| // | |
| // Compare RFC4646 language code | |
| // | |
| Index = 0; | |
| for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++); | |
| for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) { | |
| // | |
| // Skip ';' characters in SupportedLang | |
| // | |
| for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++); | |
| // | |
| // Determine the length of the next language code in SupportedLang | |
| // | |
| for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++); | |
| if ((CompareLength == LanguageLength) && | |
| (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) { | |
| // | |
| // Successfully find the index of Lang string in SupportedLang string. | |
| // | |
| return Index; | |
| } | |
| } | |
| ASSERT (FALSE); | |
| return 0; | |
| } | |
| } | |
| /** | |
| Get language string from supported language codes according to index. | |
| This code is used to get corresponding language strings in supported language codes. It can handle | |
| RFC4646 and ISO639 language tags. | |
| In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index. | |
| In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index. | |
| For example: | |
| SupportedLang = "engfraengfra" | |
| Index = "1" | |
| Iso639Language = TRUE | |
| The return value is "fra". | |
| Another example: | |
| SupportedLang = "en;fr;en-US;fr-FR" | |
| Index = "1" | |
| Iso639Language = FALSE | |
| The return value is "fr". | |
| @param SupportedLang Platform supported language codes. | |
| @param Index The index in supported language codes. | |
| @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646. | |
| @retval The language string in the language codes. | |
| **/ | |
| CHAR8 * | |
| GetLangFromSupportedLangCodes ( | |
| IN CHAR8 *SupportedLang, | |
| IN UINTN Index, | |
| IN BOOLEAN Iso639Language | |
| ) | |
| { | |
| UINTN SubIndex; | |
| UINTN CompareLength; | |
| CHAR8 *Supported; | |
| SubIndex = 0; | |
| Supported = SupportedLang; | |
| if (Iso639Language) { | |
| // | |
| // According to the index of Lang string in SupportedLang string to get the language. | |
| // This code will be invoked in RUNTIME, therefore there is not a memory allocate/free operation. | |
| // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string. | |
| // | |
| CompareLength = ISO_639_2_ENTRY_SIZE; | |
| mVariableModuleGlobal->Lang[CompareLength] = '\0'; | |
| return CopyMem (mVariableModuleGlobal->Lang, SupportedLang + Index * CompareLength, CompareLength); | |
| } else { | |
| while (TRUE) { | |
| // | |
| // Take semicolon as delimitation, sequentially traverse supported language codes. | |
| // | |
| for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) { | |
| Supported++; | |
| } | |
| if ((*Supported == '\0') && (SubIndex != Index)) { | |
| // | |
| // Have completed the traverse, but not find corrsponding string. | |
| // This case is not allowed to happen. | |
| // | |
| ASSERT(FALSE); | |
| return NULL; | |
| } | |
| if (SubIndex == Index) { | |
| // | |
| // According to the index of Lang string in SupportedLang string to get the language. | |
| // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation. | |
| // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string. | |
| // | |
| mVariableModuleGlobal->PlatformLang[CompareLength] = '\0'; | |
| return CopyMem (mVariableModuleGlobal->PlatformLang, Supported - CompareLength, CompareLength); | |
| } | |
| SubIndex++; | |
| // | |
| // Skip ';' characters in Supported | |
| // | |
| for (; *Supported != '\0' && *Supported == ';'; Supported++); | |
| } | |
| } | |
| } | |
| /** | |
| Returns a pointer to an allocated buffer that contains the best matching language | |
| from a set of supported languages. | |
| This function supports both ISO 639-2 and RFC 4646 language codes, but language | |
| code types may not be mixed in a single call to this function. This function | |
| supports a variable argument list that allows the caller to pass in a prioritized | |
| list of language codes to test against all the language codes in SupportedLanguages. | |
| If SupportedLanguages is NULL, then ASSERT(). | |
| @param[in] SupportedLanguages A pointer to a Null-terminated ASCII string that | |
| contains a set of language codes in the format | |
| specified by Iso639Language. | |
| @param[in] Iso639Language If TRUE, then all language codes are assumed to be | |
| in ISO 639-2 format. If FALSE, then all language | |
| codes are assumed to be in RFC 4646 language format | |
| @param[in] ... A variable argument list that contains pointers to | |
| Null-terminated ASCII strings that contain one or more | |
| language codes in the format specified by Iso639Language. | |
| The first language code from each of these language | |
| code lists is used to determine if it is an exact or | |
| close match to any of the language codes in | |
| SupportedLanguages. Close matches only apply to RFC 4646 | |
| language codes, and the matching algorithm from RFC 4647 | |
| is used to determine if a close match is present. If | |
| an exact or close match is found, then the matching | |
| language code from SupportedLanguages is returned. If | |
| no matches are found, then the next variable argument | |
| parameter is evaluated. The variable argument list | |
| is terminated by a NULL. | |
| @retval NULL The best matching language could not be found in SupportedLanguages. | |
| @retval NULL There are not enough resources available to return the best matching | |
| language. | |
| @retval Other A pointer to a Null-terminated ASCII string that is the best matching | |
| language in SupportedLanguages. | |
| **/ | |
| CHAR8 * | |
| EFIAPI | |
| VariableGetBestLanguage ( | |
| IN CONST CHAR8 *SupportedLanguages, | |
| IN BOOLEAN Iso639Language, | |
| ... | |
| ) | |
| { | |
| VA_LIST Args; | |
| CHAR8 *Language; | |
| UINTN CompareLength; | |
| UINTN LanguageLength; | |
| CONST CHAR8 *Supported; | |
| CHAR8 *Buffer; | |
| if (SupportedLanguages == NULL) { | |
| return NULL; | |
| } | |
| VA_START (Args, Iso639Language); | |
| while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) { | |
| // | |
| // Default to ISO 639-2 mode | |
| // | |
| CompareLength = 3; | |
| LanguageLength = MIN (3, AsciiStrLen (Language)); | |
| // | |
| // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language | |
| // | |
| if (!Iso639Language) { | |
| for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++); | |
| } | |
| // | |
| // Trim back the length of Language used until it is empty | |
| // | |
| while (LanguageLength > 0) { | |
| // | |
| // Loop through all language codes in SupportedLanguages | |
| // | |
| for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) { | |
| // | |
| // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages | |
| // | |
| if (!Iso639Language) { | |
| // | |
| // Skip ';' characters in Supported | |
| // | |
| for (; *Supported != '\0' && *Supported == ';'; Supported++); | |
| // | |
| // Determine the length of the next language code in Supported | |
| // | |
| for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++); | |
| // | |
| // If Language is longer than the Supported, then skip to the next language | |
| // | |
| if (LanguageLength > CompareLength) { | |
| continue; | |
| } | |
| } | |
| // | |
| // See if the first LanguageLength characters in Supported match Language | |
| // | |
| if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) { | |
| VA_END (Args); | |
| Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang; | |
| Buffer[CompareLength] = '\0'; | |
| return CopyMem (Buffer, Supported, CompareLength); | |
| } | |
| } | |
| if (Iso639Language) { | |
| // | |
| // If ISO 639 mode, then each language can only be tested once | |
| // | |
| LanguageLength = 0; | |
| } else { | |
| // | |
| // If RFC 4646 mode, then trim Language from the right to the next '-' character | |
| // | |
| for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--); | |
| } | |
| } | |
| } | |
| VA_END (Args); | |
| // | |
| // No matches were found | |
| // | |
| return NULL; | |
| } | |
| /** | |
| This function is to check if the remaining variable space is enough to set | |
| all Variables from argument list successfully. The purpose of the check | |
| is to keep the consistency of the Variables to be in variable storage. | |
| Note: Variables are assumed to be in same storage. | |
| The set sequence of Variables will be same with the sequence of VariableEntry from argument list, | |
| so follow the argument sequence to check the Variables. | |
| @param[in] Attributes Variable attributes for Variable entries. | |
| @param[in] Marker VA_LIST style variable argument list. | |
| The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *. | |
| A NULL terminates the list. The VariableSize of | |
| VARIABLE_ENTRY_CONSISTENCY is the variable data size as input. | |
| It will be changed to variable total size as output. | |
| @retval TRUE Have enough variable space to set the Variables successfully. | |
| @retval FALSE No enough variable space to set the Variables successfully. | |
| **/ | |
| BOOLEAN | |
| EFIAPI | |
| CheckRemainingSpaceForConsistencyInternal ( | |
| IN UINT32 Attributes, | |
| IN VA_LIST Marker | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VA_LIST Args; | |
| VARIABLE_ENTRY_CONSISTENCY *VariableEntry; | |
| UINT64 MaximumVariableStorageSize; | |
| UINT64 RemainingVariableStorageSize; | |
| UINT64 MaximumVariableSize; | |
| UINTN TotalNeededSize; | |
| UINTN OriginalVarSize; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| VARIABLE_POINTER_TRACK VariablePtrTrack; | |
| VARIABLE_HEADER *NextVariable; | |
| UINTN VarNameSize; | |
| UINTN VarDataSize; | |
| // | |
| // Non-Volatile related. | |
| // | |
| VariableStoreHeader = mNvVariableCache; | |
| Status = VariableServiceQueryVariableInfoInternal ( | |
| Attributes, | |
| &MaximumVariableStorageSize, | |
| &RemainingVariableStorageSize, | |
| &MaximumVariableSize | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| TotalNeededSize = 0; | |
| VA_COPY (Args, Marker); | |
| VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *); | |
| while (VariableEntry != NULL) { | |
| // | |
| // Calculate variable total size. | |
| // | |
| VarNameSize = StrSize (VariableEntry->Name); | |
| VarNameSize += GET_PAD_SIZE (VarNameSize); | |
| VarDataSize = VariableEntry->VariableSize; | |
| VarDataSize += GET_PAD_SIZE (VarDataSize); | |
| VariableEntry->VariableSize = HEADER_ALIGN (GetVariableHeaderSize () + VarNameSize + VarDataSize); | |
| TotalNeededSize += VariableEntry->VariableSize; | |
| VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *); | |
| } | |
| VA_END (Args); | |
| if (RemainingVariableStorageSize >= TotalNeededSize) { | |
| // | |
| // Already have enough space. | |
| // | |
| return TRUE; | |
| } else if (AtRuntime ()) { | |
| // | |
| // At runtime, no reclaim. | |
| // The original variable space of Variables can't be reused. | |
| // | |
| return FALSE; | |
| } | |
| VA_COPY (Args, Marker); | |
| VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *); | |
| while (VariableEntry != NULL) { | |
| // | |
| // Check if Variable[Index] has been present and get its size. | |
| // | |
| OriginalVarSize = 0; | |
| VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader); | |
| VariablePtrTrack.EndPtr = GetEndPointer (VariableStoreHeader); | |
| Status = FindVariableEx ( | |
| VariableEntry->Name, | |
| VariableEntry->Guid, | |
| FALSE, | |
| &VariablePtrTrack | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Get size of Variable[Index]. | |
| // | |
| NextVariable = GetNextVariablePtr (VariablePtrTrack.CurrPtr); | |
| OriginalVarSize = (UINTN) NextVariable - (UINTN) VariablePtrTrack.CurrPtr; | |
| // | |
| // Add the original size of Variable[Index] to remaining variable storage size. | |
| // | |
| RemainingVariableStorageSize += OriginalVarSize; | |
| } | |
| if (VariableEntry->VariableSize > RemainingVariableStorageSize) { | |
| // | |
| // No enough space for Variable[Index]. | |
| // | |
| VA_END (Args); | |
| return FALSE; | |
| } | |
| // | |
| // Sub the (new) size of Variable[Index] from remaining variable storage size. | |
| // | |
| RemainingVariableStorageSize -= VariableEntry->VariableSize; | |
| VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *); | |
| } | |
| VA_END (Args); | |
| return TRUE; | |
| } | |
| /** | |
| This function is to check if the remaining variable space is enough to set | |
| all Variables from argument list successfully. The purpose of the check | |
| is to keep the consistency of the Variables to be in variable storage. | |
| Note: Variables are assumed to be in same storage. | |
| The set sequence of Variables will be same with the sequence of VariableEntry from argument list, | |
| so follow the argument sequence to check the Variables. | |
| @param[in] Attributes Variable attributes for Variable entries. | |
| @param ... The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *. | |
| A NULL terminates the list. The VariableSize of | |
| VARIABLE_ENTRY_CONSISTENCY is the variable data size as input. | |
| It will be changed to variable total size as output. | |
| @retval TRUE Have enough variable space to set the Variables successfully. | |
| @retval FALSE No enough variable space to set the Variables successfully. | |
| **/ | |
| BOOLEAN | |
| EFIAPI | |
| CheckRemainingSpaceForConsistency ( | |
| IN UINT32 Attributes, | |
| ... | |
| ) | |
| { | |
| VA_LIST Marker; | |
| BOOLEAN Return; | |
| VA_START (Marker, Attributes); | |
| Return = CheckRemainingSpaceForConsistencyInternal (Attributes, Marker); | |
| VA_END (Marker); | |
| return Return; | |
| } | |
| /** | |
| Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang. | |
| When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes. | |
| According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization, | |
| and are read-only. Therefore, in variable driver, only store the original value for other use. | |
| @param[in] VariableName Name of variable. | |
| @param[in] Data Variable data. | |
| @param[in] DataSize Size of data. 0 means delete. | |
| @retval EFI_SUCCESS The update operation is successful or ignored. | |
| @retval EFI_WRITE_PROTECTED Update PlatformLangCodes/LangCodes at runtime. | |
| @retval EFI_OUT_OF_RESOURCES No enough variable space to do the update operation. | |
| @retval Others Other errors happened during the update operation. | |
| **/ | |
| EFI_STATUS | |
| AutoUpdateLangVariable ( | |
| IN CHAR16 *VariableName, | |
| IN VOID *Data, | |
| IN UINTN DataSize | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| CHAR8 *BestPlatformLang; | |
| CHAR8 *BestLang; | |
| UINTN Index; | |
| UINT32 Attributes; | |
| VARIABLE_POINTER_TRACK Variable; | |
| BOOLEAN SetLanguageCodes; | |
| VARIABLE_ENTRY_CONSISTENCY VariableEntry[2]; | |
| // | |
| // Don't do updates for delete operation | |
| // | |
| if (DataSize == 0) { | |
| return EFI_SUCCESS; | |
| } | |
| SetLanguageCodes = FALSE; | |
| if (StrCmp (VariableName, EFI_PLATFORM_LANG_CODES_VARIABLE_NAME) == 0) { | |
| // | |
| // PlatformLangCodes is a volatile variable, so it can not be updated at runtime. | |
| // | |
| if (AtRuntime ()) { | |
| return EFI_WRITE_PROTECTED; | |
| } | |
| SetLanguageCodes = TRUE; | |
| // | |
| // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only | |
| // Therefore, in variable driver, only store the original value for other use. | |
| // | |
| if (mVariableModuleGlobal->PlatformLangCodes != NULL) { | |
| FreePool (mVariableModuleGlobal->PlatformLangCodes); | |
| } | |
| mVariableModuleGlobal->PlatformLangCodes = AllocateRuntimeCopyPool (DataSize, Data); | |
| ASSERT (mVariableModuleGlobal->PlatformLangCodes != NULL); | |
| // | |
| // PlatformLang holds a single language from PlatformLangCodes, | |
| // so the size of PlatformLangCodes is enough for the PlatformLang. | |
| // | |
| if (mVariableModuleGlobal->PlatformLang != NULL) { | |
| FreePool (mVariableModuleGlobal->PlatformLang); | |
| } | |
| mVariableModuleGlobal->PlatformLang = AllocateRuntimePool (DataSize); | |
| ASSERT (mVariableModuleGlobal->PlatformLang != NULL); | |
| } else if (StrCmp (VariableName, EFI_LANG_CODES_VARIABLE_NAME) == 0) { | |
| // | |
| // LangCodes is a volatile variable, so it can not be updated at runtime. | |
| // | |
| if (AtRuntime ()) { | |
| return EFI_WRITE_PROTECTED; | |
| } | |
| SetLanguageCodes = TRUE; | |
| // | |
| // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only | |
| // Therefore, in variable driver, only store the original value for other use. | |
| // | |
| if (mVariableModuleGlobal->LangCodes != NULL) { | |
| FreePool (mVariableModuleGlobal->LangCodes); | |
| } | |
| mVariableModuleGlobal->LangCodes = AllocateRuntimeCopyPool (DataSize, Data); | |
| ASSERT (mVariableModuleGlobal->LangCodes != NULL); | |
| } | |
| if (SetLanguageCodes | |
| && (mVariableModuleGlobal->PlatformLangCodes != NULL) | |
| && (mVariableModuleGlobal->LangCodes != NULL)) { | |
| // | |
| // Update Lang if PlatformLang is already set | |
| // Update PlatformLang if Lang is already set | |
| // | |
| Status = FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Update Lang | |
| // | |
| VariableName = EFI_PLATFORM_LANG_VARIABLE_NAME; | |
| Data = GetVariableDataPtr (Variable.CurrPtr); | |
| DataSize = DataSizeOfVariable (Variable.CurrPtr); | |
| } else { | |
| Status = FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Update PlatformLang | |
| // | |
| VariableName = EFI_LANG_VARIABLE_NAME; | |
| Data = GetVariableDataPtr (Variable.CurrPtr); | |
| DataSize = DataSizeOfVariable (Variable.CurrPtr); | |
| } else { | |
| // | |
| // Neither PlatformLang nor Lang is set, directly return | |
| // | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| } | |
| Status = EFI_SUCCESS; | |
| // | |
| // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions. | |
| // | |
| Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS; | |
| if (StrCmp (VariableName, EFI_PLATFORM_LANG_VARIABLE_NAME) == 0) { | |
| // | |
| // Update Lang when PlatformLangCodes/LangCodes were set. | |
| // | |
| if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) { | |
| // | |
| // When setting PlatformLang, firstly get most matched language string from supported language codes. | |
| // | |
| BestPlatformLang = VariableGetBestLanguage (mVariableModuleGlobal->PlatformLangCodes, FALSE, Data, NULL); | |
| if (BestPlatformLang != NULL) { | |
| // | |
| // Get the corresponding index in language codes. | |
| // | |
| Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, BestPlatformLang, FALSE); | |
| // | |
| // Get the corresponding ISO639 language tag according to RFC4646 language tag. | |
| // | |
| BestLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, Index, TRUE); | |
| // | |
| // Check the variable space for both Lang and PlatformLang variable. | |
| // | |
| VariableEntry[0].VariableSize = ISO_639_2_ENTRY_SIZE + 1; | |
| VariableEntry[0].Guid = &gEfiGlobalVariableGuid; | |
| VariableEntry[0].Name = EFI_LANG_VARIABLE_NAME; | |
| VariableEntry[1].VariableSize = AsciiStrSize (BestPlatformLang); | |
| VariableEntry[1].Guid = &gEfiGlobalVariableGuid; | |
| VariableEntry[1].Name = EFI_PLATFORM_LANG_VARIABLE_NAME; | |
| if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) { | |
| // | |
| // No enough variable space to set both Lang and PlatformLang successfully. | |
| // | |
| Status = EFI_OUT_OF_RESOURCES; | |
| } else { | |
| // | |
| // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously. | |
| // | |
| FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| Status = UpdateVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestLang, | |
| ISO_639_2_ENTRY_SIZE + 1, Attributes, 0, 0, &Variable, NULL); | |
| } | |
| DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a Status: %r\n", BestPlatformLang, BestLang, Status)); | |
| } | |
| } | |
| } else if (StrCmp (VariableName, EFI_LANG_VARIABLE_NAME) == 0) { | |
| // | |
| // Update PlatformLang when PlatformLangCodes/LangCodes were set. | |
| // | |
| if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) { | |
| // | |
| // When setting Lang, firstly get most matched language string from supported language codes. | |
| // | |
| BestLang = VariableGetBestLanguage (mVariableModuleGlobal->LangCodes, TRUE, Data, NULL); | |
| if (BestLang != NULL) { | |
| // | |
| // Get the corresponding index in language codes. | |
| // | |
| Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, BestLang, TRUE); | |
| // | |
| // Get the corresponding RFC4646 language tag according to ISO639 language tag. | |
| // | |
| BestPlatformLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, Index, FALSE); | |
| // | |
| // Check the variable space for both PlatformLang and Lang variable. | |
| // | |
| VariableEntry[0].VariableSize = AsciiStrSize (BestPlatformLang); | |
| VariableEntry[0].Guid = &gEfiGlobalVariableGuid; | |
| VariableEntry[0].Name = EFI_PLATFORM_LANG_VARIABLE_NAME; | |
| VariableEntry[1].VariableSize = ISO_639_2_ENTRY_SIZE + 1; | |
| VariableEntry[1].Guid = &gEfiGlobalVariableGuid; | |
| VariableEntry[1].Name = EFI_LANG_VARIABLE_NAME; | |
| if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) { | |
| // | |
| // No enough variable space to set both PlatformLang and Lang successfully. | |
| // | |
| Status = EFI_OUT_OF_RESOURCES; | |
| } else { | |
| // | |
| // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously. | |
| // | |
| FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| Status = UpdateVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestPlatformLang, | |
| AsciiStrSize (BestPlatformLang), Attributes, 0, 0, &Variable, NULL); | |
| } | |
| DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a Status: %r\n", BestLang, BestPlatformLang, Status)); | |
| } | |
| } | |
| } | |
| if (SetLanguageCodes) { | |
| // | |
| // Continue to set PlatformLangCodes or LangCodes. | |
| // | |
| return EFI_SUCCESS; | |
| } else { | |
| return Status; | |
| } | |
| } | |
| /** | |
| Compare two EFI_TIME data. | |
| @param FirstTime A pointer to the first EFI_TIME data. | |
| @param SecondTime A pointer to the second EFI_TIME data. | |
| @retval TRUE The FirstTime is not later than the SecondTime. | |
| @retval FALSE The FirstTime is later than the SecondTime. | |
| **/ | |
| BOOLEAN | |
| VariableCompareTimeStampInternal ( | |
| IN EFI_TIME *FirstTime, | |
| IN EFI_TIME *SecondTime | |
| ) | |
| { | |
| if (FirstTime->Year != SecondTime->Year) { | |
| return (BOOLEAN) (FirstTime->Year < SecondTime->Year); | |
| } else if (FirstTime->Month != SecondTime->Month) { | |
| return (BOOLEAN) (FirstTime->Month < SecondTime->Month); | |
| } else if (FirstTime->Day != SecondTime->Day) { | |
| return (BOOLEAN) (FirstTime->Day < SecondTime->Day); | |
| } else if (FirstTime->Hour != SecondTime->Hour) { | |
| return (BOOLEAN) (FirstTime->Hour < SecondTime->Hour); | |
| } else if (FirstTime->Minute != SecondTime->Minute) { | |
| return (BOOLEAN) (FirstTime->Minute < SecondTime->Minute); | |
| } | |
| return (BOOLEAN) (FirstTime->Second <= SecondTime->Second); | |
| } | |
| /** | |
| Update the variable region with Variable information. If EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS is set, | |
| index of associated public key is needed. | |
| @param[in] VariableName Name of variable. | |
| @param[in] VendorGuid Guid of variable. | |
| @param[in] Data Variable data. | |
| @param[in] DataSize Size of data. 0 means delete. | |
| @param[in] Attributes Attributes of the variable. | |
| @param[in] KeyIndex Index of associated public key. | |
| @param[in] MonotonicCount Value of associated monotonic count. | |
| @param[in, out] CacheVariable The variable information which is used to keep track of variable usage. | |
| @param[in] TimeStamp Value of associated TimeStamp. | |
| @retval EFI_SUCCESS The update operation is success. | |
| @retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region. | |
| **/ | |
| EFI_STATUS | |
| UpdateVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN VOID *Data, | |
| IN UINTN DataSize, | |
| IN UINT32 Attributes OPTIONAL, | |
| IN UINT32 KeyIndex OPTIONAL, | |
| IN UINT64 MonotonicCount OPTIONAL, | |
| IN OUT VARIABLE_POINTER_TRACK *CacheVariable, | |
| IN EFI_TIME *TimeStamp OPTIONAL | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_HEADER *NextVariable; | |
| UINTN ScratchSize; | |
| UINTN MaxDataSize; | |
| UINTN VarNameOffset; | |
| UINTN VarDataOffset; | |
| UINTN VarNameSize; | |
| UINTN VarSize; | |
| BOOLEAN Volatile; | |
| EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb; | |
| UINT8 State; | |
| VARIABLE_POINTER_TRACK *Variable; | |
| VARIABLE_POINTER_TRACK NvVariable; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| UINTN CacheOffset; | |
| UINT8 *BufferForMerge; | |
| UINTN MergedBufSize; | |
| BOOLEAN DataReady; | |
| UINTN DataOffset; | |
| BOOLEAN IsCommonVariable; | |
| BOOLEAN IsCommonUserVariable; | |
| AUTHENTICATED_VARIABLE_HEADER *AuthVariable; | |
| if (mVariableModuleGlobal->FvbInstance == NULL) { | |
| // | |
| // The FVB protocol is not ready, so the EFI_VARIABLE_WRITE_ARCH_PROTOCOL is not installed. | |
| // | |
| if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) { | |
| // | |
| // Trying to update NV variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL | |
| // | |
| DEBUG ((EFI_D_ERROR, "Update NV variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET)); | |
| return EFI_NOT_AVAILABLE_YET; | |
| } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| // | |
| // Trying to update volatile authenticated variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL | |
| // The authenticated variable perhaps is not initialized, just return here. | |
| // | |
| DEBUG ((EFI_D_ERROR, "Update AUTH variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET)); | |
| return EFI_NOT_AVAILABLE_YET; | |
| } | |
| } | |
| // | |
| // Check if CacheVariable points to the variable in variable HOB. | |
| // If yes, let CacheVariable points to the variable in NV variable cache. | |
| // | |
| if ((CacheVariable->CurrPtr != NULL) && | |
| (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) && | |
| (CacheVariable->StartPtr == GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase)) | |
| ) { | |
| CacheVariable->StartPtr = GetStartPointer (mNvVariableCache); | |
| CacheVariable->EndPtr = GetEndPointer (mNvVariableCache); | |
| CacheVariable->Volatile = FALSE; | |
| Status = FindVariableEx (VariableName, VendorGuid, FALSE, CacheVariable); | |
| if (CacheVariable->CurrPtr == NULL || EFI_ERROR (Status)) { | |
| // | |
| // There is no matched variable in NV variable cache. | |
| // | |
| if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0)) || (Attributes == 0)) { | |
| // | |
| // It is to delete variable, | |
| // go to delete this variable in variable HOB and | |
| // try to flush other variables from HOB to flash. | |
| // | |
| UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, FALSE, TRUE, FALSE); | |
| FlushHobVariableToFlash (VariableName, VendorGuid); | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| } | |
| if ((CacheVariable->CurrPtr == NULL) || CacheVariable->Volatile) { | |
| Variable = CacheVariable; | |
| } else { | |
| // | |
| // Update/Delete existing NV variable. | |
| // CacheVariable points to the variable in the memory copy of Flash area | |
| // Now let Variable points to the same variable in Flash area. | |
| // | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase); | |
| Variable = &NvVariable; | |
| Variable->StartPtr = GetStartPointer (VariableStoreHeader); | |
| Variable->EndPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->EndPtr - (UINTN)CacheVariable->StartPtr)); | |
| Variable->CurrPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->CurrPtr - (UINTN)CacheVariable->StartPtr)); | |
| if (CacheVariable->InDeletedTransitionPtr != NULL) { | |
| Variable->InDeletedTransitionPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->InDeletedTransitionPtr - (UINTN)CacheVariable->StartPtr)); | |
| } else { | |
| Variable->InDeletedTransitionPtr = NULL; | |
| } | |
| Variable->Volatile = FALSE; | |
| } | |
| Fvb = mVariableModuleGlobal->FvbInstance; | |
| // | |
| // Tricky part: Use scratch data area at the end of volatile variable store | |
| // as a temporary storage. | |
| // | |
| NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)); | |
| ScratchSize = mVariableModuleGlobal->ScratchBufferSize; | |
| SetMem (NextVariable, ScratchSize, 0xff); | |
| DataReady = FALSE; | |
| if (Variable->CurrPtr != NULL) { | |
| // | |
| // Update/Delete existing variable. | |
| // | |
| if (AtRuntime ()) { | |
| // | |
| // If AtRuntime and the variable is Volatile and Runtime Access, | |
| // the volatile is ReadOnly, and SetVariable should be aborted and | |
| // return EFI_WRITE_PROTECTED. | |
| // | |
| if (Variable->Volatile) { | |
| Status = EFI_WRITE_PROTECTED; | |
| goto Done; | |
| } | |
| // | |
| // Only variable that have NV attributes can be updated/deleted in Runtime. | |
| // | |
| if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| // | |
| // Only variable that have RT attributes can be updated/deleted in Runtime. | |
| // | |
| if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| } | |
| // | |
| // Setting a data variable with no access, or zero DataSize attributes | |
| // causes it to be deleted. | |
| // When the EFI_VARIABLE_APPEND_WRITE attribute is set, DataSize of zero will | |
| // not delete the variable. | |
| // | |
| if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0))|| ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0)) { | |
| if (Variable->InDeletedTransitionPtr != NULL) { | |
| // | |
| // Both ADDED and IN_DELETED_TRANSITION variable are present, | |
| // set IN_DELETED_TRANSITION one to DELETED state first. | |
| // | |
| ASSERT (CacheVariable->InDeletedTransitionPtr != NULL); | |
| State = CacheVariable->InDeletedTransitionPtr->State; | |
| State &= VAR_DELETED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| Variable->Volatile, | |
| FALSE, | |
| Fvb, | |
| (UINTN) &Variable->InDeletedTransitionPtr->State, | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| if (!Variable->Volatile) { | |
| CacheVariable->InDeletedTransitionPtr->State = State; | |
| } | |
| } else { | |
| goto Done; | |
| } | |
| } | |
| State = CacheVariable->CurrPtr->State; | |
| State &= VAR_DELETED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| Variable->Volatile, | |
| FALSE, | |
| Fvb, | |
| (UINTN) &Variable->CurrPtr->State, | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, FALSE, TRUE, FALSE); | |
| if (!Variable->Volatile) { | |
| CacheVariable->CurrPtr->State = State; | |
| FlushHobVariableToFlash (VariableName, VendorGuid); | |
| } | |
| } | |
| goto Done; | |
| } | |
| // | |
| // If the variable is marked valid, and the same data has been passed in, | |
| // then return to the caller immediately. | |
| // | |
| if (DataSizeOfVariable (CacheVariable->CurrPtr) == DataSize && | |
| (CompareMem (Data, GetVariableDataPtr (CacheVariable->CurrPtr), DataSize) == 0) && | |
| ((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && | |
| (TimeStamp == NULL)) { | |
| // | |
| // Variable content unchanged and no need to update timestamp, just return. | |
| // | |
| UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, TRUE, FALSE, FALSE); | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } else if ((CacheVariable->CurrPtr->State == VAR_ADDED) || | |
| (CacheVariable->CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) { | |
| // | |
| // EFI_VARIABLE_APPEND_WRITE attribute only effects for existing variable. | |
| // | |
| if ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0) { | |
| // | |
| // NOTE: From 0 to DataOffset of NextVariable is reserved for Variable Header and Name. | |
| // From DataOffset of NextVariable is to save the existing variable data. | |
| // | |
| DataOffset = GetVariableDataOffset (CacheVariable->CurrPtr); | |
| BufferForMerge = (UINT8 *) ((UINTN) NextVariable + DataOffset); | |
| CopyMem (BufferForMerge, (UINT8 *) ((UINTN) CacheVariable->CurrPtr + DataOffset), DataSizeOfVariable (CacheVariable->CurrPtr)); | |
| // | |
| // Set Max Common/Auth Variable Data Size as default MaxDataSize. | |
| // | |
| if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| MaxDataSize = mVariableModuleGlobal->MaxAuthVariableSize - DataOffset; | |
| } else { | |
| MaxDataSize = mVariableModuleGlobal->MaxVariableSize - DataOffset; | |
| } | |
| // | |
| // Append the new data to the end of existing data. | |
| // Max Harware error record variable data size is different from common/auth variable. | |
| // | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| MaxDataSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - DataOffset; | |
| } | |
| if (DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize > MaxDataSize) { | |
| // | |
| // Existing data size + new data size exceed maximum variable size limitation. | |
| // | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| CopyMem ((UINT8*) ((UINTN) BufferForMerge + DataSizeOfVariable (CacheVariable->CurrPtr)), Data, DataSize); | |
| MergedBufSize = DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize; | |
| // | |
| // BufferForMerge(from DataOffset of NextVariable) has included the merged existing and new data. | |
| // | |
| Data = BufferForMerge; | |
| DataSize = MergedBufSize; | |
| DataReady = TRUE; | |
| } | |
| // | |
| // Mark the old variable as in delete transition. | |
| // | |
| State = CacheVariable->CurrPtr->State; | |
| State &= VAR_IN_DELETED_TRANSITION; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| Variable->Volatile, | |
| FALSE, | |
| Fvb, | |
| (UINTN) &Variable->CurrPtr->State, | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| if (!Variable->Volatile) { | |
| CacheVariable->CurrPtr->State = State; | |
| } | |
| } | |
| } else { | |
| // | |
| // Not found existing variable. Create a new variable. | |
| // | |
| if ((DataSize == 0) && ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0)) { | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } | |
| // | |
| // Make sure we are trying to create a new variable. | |
| // Setting a data variable with zero DataSize or no access attributes means to delete it. | |
| // | |
| if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| // | |
| // Only variable have NV|RT attribute can be created in Runtime. | |
| // | |
| if (AtRuntime () && | |
| (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| } | |
| // | |
| // Function part - create a new variable and copy the data. | |
| // Both update a variable and create a variable will come here. | |
| // | |
| NextVariable->StartId = VARIABLE_DATA; | |
| // | |
| // NextVariable->State = VAR_ADDED; | |
| // | |
| NextVariable->Reserved = 0; | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable; | |
| AuthVariable->PubKeyIndex = KeyIndex; | |
| AuthVariable->MonotonicCount = MonotonicCount; | |
| ZeroMem (&AuthVariable->TimeStamp, sizeof (EFI_TIME)); | |
| if (((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) != 0) && | |
| (TimeStamp != NULL)) { | |
| if ((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) { | |
| CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME)); | |
| } else { | |
| // | |
| // In the case when the EFI_VARIABLE_APPEND_WRITE attribute is set, only | |
| // when the new TimeStamp value is later than the current timestamp associated | |
| // with the variable, we need associate the new timestamp with the updated value. | |
| // | |
| if (Variable->CurrPtr != NULL) { | |
| if (VariableCompareTimeStampInternal (&(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), TimeStamp)) { | |
| CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME)); | |
| } | |
| } | |
| } | |
| } | |
| } | |
| // | |
| // The EFI_VARIABLE_APPEND_WRITE attribute will never be set in the returned | |
| // Attributes bitmask parameter of a GetVariable() call. | |
| // | |
| NextVariable->Attributes = Attributes & (~EFI_VARIABLE_APPEND_WRITE); | |
| VarNameOffset = GetVariableHeaderSize (); | |
| VarNameSize = StrSize (VariableName); | |
| CopyMem ( | |
| (UINT8 *) ((UINTN) NextVariable + VarNameOffset), | |
| VariableName, | |
| VarNameSize | |
| ); | |
| VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize); | |
| // | |
| // If DataReady is TRUE, it means the variable data has been saved into | |
| // NextVariable during EFI_VARIABLE_APPEND_WRITE operation preparation. | |
| // | |
| if (!DataReady) { | |
| CopyMem ( | |
| (UINT8 *) ((UINTN) NextVariable + VarDataOffset), | |
| Data, | |
| DataSize | |
| ); | |
| } | |
| CopyMem (GetVendorGuidPtr (NextVariable), VendorGuid, sizeof (EFI_GUID)); | |
| // | |
| // There will be pad bytes after Data, the NextVariable->NameSize and | |
| // NextVariable->DataSize should not include pad size so that variable | |
| // service can get actual size in GetVariable. | |
| // | |
| SetNameSizeOfVariable (NextVariable, VarNameSize); | |
| SetDataSizeOfVariable (NextVariable, DataSize); | |
| // | |
| // The actual size of the variable that stores in storage should | |
| // include pad size. | |
| // | |
| VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize); | |
| if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) { | |
| // | |
| // Create a nonvolatile variable. | |
| // | |
| Volatile = FALSE; | |
| IsCommonVariable = FALSE; | |
| IsCommonUserVariable = FALSE; | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) { | |
| IsCommonVariable = TRUE; | |
| IsCommonUserVariable = IsUserVariable (NextVariable); | |
| } | |
| if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) | |
| && ((VarSize + mVariableModuleGlobal->HwErrVariableTotalSize) > PcdGet32 (PcdHwErrStorageSize))) | |
| || (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace)) | |
| || (IsCommonVariable && AtRuntime () && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace)) | |
| || (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace))) { | |
| if (AtRuntime ()) { | |
| if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) { | |
| RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize); | |
| } | |
| if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace)) { | |
| RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize); | |
| } | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| // | |
| // Perform garbage collection & reclaim operation, and integrate the new variable at the same time. | |
| // | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, | |
| &mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| FALSE, | |
| Variable, | |
| NextVariable, | |
| HEADER_ALIGN (VarSize) | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // The new variable has been integrated successfully during reclaiming. | |
| // | |
| if (Variable->CurrPtr != NULL) { | |
| CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr)); | |
| CacheVariable->InDeletedTransitionPtr = NULL; | |
| } | |
| UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, TRUE, FALSE, FALSE); | |
| FlushHobVariableToFlash (VariableName, VendorGuid); | |
| } else { | |
| if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) { | |
| RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize); | |
| } | |
| if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace)) { | |
| RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize); | |
| } | |
| } | |
| goto Done; | |
| } | |
| // | |
| // Four steps | |
| // 1. Write variable header | |
| // 2. Set variable state to header valid | |
| // 3. Write variable data | |
| // 4. Set variable state to valid | |
| // | |
| // | |
| // Step 1: | |
| // | |
| CacheOffset = mVariableModuleGlobal->NonVolatileLastVariableOffset; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE, | |
| TRUE, | |
| Fvb, | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| (UINT32) GetVariableHeaderSize (), | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 2: | |
| // | |
| NextVariable->State = VAR_HEADER_VALID_ONLY; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE, | |
| TRUE, | |
| Fvb, | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State), | |
| sizeof (UINT8), | |
| &NextVariable->State | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 3: | |
| // | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE, | |
| TRUE, | |
| Fvb, | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset + GetVariableHeaderSize (), | |
| (UINT32) (VarSize - GetVariableHeaderSize ()), | |
| (UINT8 *) NextVariable + GetVariableHeaderSize () | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 4: | |
| // | |
| NextVariable->State = VAR_ADDED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| FALSE, | |
| TRUE, | |
| Fvb, | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State), | |
| sizeof (UINT8), | |
| &NextVariable->State | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize); | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) { | |
| mVariableModuleGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VarSize); | |
| } else { | |
| mVariableModuleGlobal->CommonVariableTotalSize += HEADER_ALIGN (VarSize); | |
| if (IsCommonUserVariable) { | |
| mVariableModuleGlobal->CommonUserVariableTotalSize += HEADER_ALIGN (VarSize); | |
| } | |
| } | |
| // | |
| // update the memory copy of Flash region. | |
| // | |
| CopyMem ((UINT8 *)mNvVariableCache + CacheOffset, (UINT8 *)NextVariable, VarSize); | |
| } else { | |
| // | |
| // Create a volatile variable. | |
| // | |
| Volatile = TRUE; | |
| if ((UINT32) (VarSize + mVariableModuleGlobal->VolatileLastVariableOffset) > | |
| ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) { | |
| // | |
| // Perform garbage collection & reclaim operation, and integrate the new variable at the same time. | |
| // | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, | |
| &mVariableModuleGlobal->VolatileLastVariableOffset, | |
| TRUE, | |
| Variable, | |
| NextVariable, | |
| HEADER_ALIGN (VarSize) | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // The new variable has been integrated successfully during reclaiming. | |
| // | |
| if (Variable->CurrPtr != NULL) { | |
| CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr)); | |
| CacheVariable->InDeletedTransitionPtr = NULL; | |
| } | |
| UpdateVariableInfo (VariableName, VendorGuid, TRUE, FALSE, TRUE, FALSE, FALSE); | |
| } | |
| goto Done; | |
| } | |
| NextVariable->State = VAR_ADDED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| TRUE, | |
| TRUE, | |
| Fvb, | |
| mVariableModuleGlobal->VolatileLastVariableOffset, | |
| (UINT32) VarSize, | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| mVariableModuleGlobal->VolatileLastVariableOffset += HEADER_ALIGN (VarSize); | |
| } | |
| // | |
| // Mark the old variable as deleted. | |
| // | |
| if (!EFI_ERROR (Status) && Variable->CurrPtr != NULL) { | |
| if (Variable->InDeletedTransitionPtr != NULL) { | |
| // | |
| // Both ADDED and IN_DELETED_TRANSITION old variable are present, | |
| // set IN_DELETED_TRANSITION one to DELETED state first. | |
| // | |
| ASSERT (CacheVariable->InDeletedTransitionPtr != NULL); | |
| State = CacheVariable->InDeletedTransitionPtr->State; | |
| State &= VAR_DELETED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| Variable->Volatile, | |
| FALSE, | |
| Fvb, | |
| (UINTN) &Variable->InDeletedTransitionPtr->State, | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| if (!Variable->Volatile) { | |
| CacheVariable->InDeletedTransitionPtr->State = State; | |
| } | |
| } else { | |
| goto Done; | |
| } | |
| } | |
| State = Variable->CurrPtr->State; | |
| State &= VAR_DELETED; | |
| Status = UpdateVariableStore ( | |
| &mVariableModuleGlobal->VariableGlobal, | |
| Variable->Volatile, | |
| FALSE, | |
| Fvb, | |
| (UINTN) &Variable->CurrPtr->State, | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (!EFI_ERROR (Status) && !Variable->Volatile) { | |
| CacheVariable->CurrPtr->State = State; | |
| } | |
| } | |
| if (!EFI_ERROR (Status)) { | |
| UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE); | |
| if (!Volatile) { | |
| FlushHobVariableToFlash (VariableName, VendorGuid); | |
| } | |
| } | |
| Done: | |
| return Status; | |
| } | |
| /** | |
| This code finds variable in storage blocks (Volatile or Non-Volatile). | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode, and datasize is external input. | |
| This function will do basic validation, before parse the data. | |
| @param VariableName Name of Variable to be found. | |
| @param VendorGuid Variable vendor GUID. | |
| @param Attributes Attribute value of the variable found. | |
| @param DataSize Size of Data found. If size is less than the | |
| data, this value contains the required size. | |
| @param Data The buffer to return the contents of the variable. May be NULL | |
| with a zero DataSize in order to determine the size buffer needed. | |
| @return EFI_INVALID_PARAMETER Invalid parameter. | |
| @return EFI_SUCCESS Find the specified variable. | |
| @return EFI_NOT_FOUND Not found. | |
| @return EFI_BUFFER_TO_SMALL DataSize is too small for the result. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceGetVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT UINT32 *Attributes OPTIONAL, | |
| IN OUT UINTN *DataSize, | |
| OUT VOID *Data OPTIONAL | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_POINTER_TRACK Variable; | |
| UINTN VarDataSize; | |
| if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if (VariableName[0] == 0) { | |
| return EFI_NOT_FOUND; | |
| } | |
| AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Get data size | |
| // | |
| VarDataSize = DataSizeOfVariable (Variable.CurrPtr); | |
| ASSERT (VarDataSize != 0); | |
| if (*DataSize >= VarDataSize) { | |
| if (Data == NULL) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize); | |
| if (Attributes != NULL) { | |
| *Attributes = Variable.CurrPtr->Attributes; | |
| } | |
| *DataSize = VarDataSize; | |
| UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE); | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } else { | |
| *DataSize = VarDataSize; | |
| Status = EFI_BUFFER_TOO_SMALL; | |
| goto Done; | |
| } | |
| Done: | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| This code Finds the Next available variable. | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode. This function will do basic validation, before parse the data. | |
| @param[in] VariableName Pointer to variable name. | |
| @param[in] VendorGuid Variable Vendor Guid. | |
| @param[out] VariablePtr Pointer to variable header address. | |
| @retval EFI_SUCCESS The function completed successfully. | |
| @retval EFI_NOT_FOUND The next variable was not found. | |
| @retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while VendorGuid is NULL. | |
| @retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and | |
| GUID of an existing variable. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceGetNextVariableInternal ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT VARIABLE_HEADER **VariablePtr | |
| ) | |
| { | |
| VARIABLE_STORE_TYPE Type; | |
| VARIABLE_POINTER_TRACK Variable; | |
| VARIABLE_POINTER_TRACK VariableInHob; | |
| VARIABLE_POINTER_TRACK VariablePtrTrack; | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader[VariableStoreTypeMax]; | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) { | |
| // | |
| // For VariableName is an empty string, FindVariable() will try to find and return | |
| // the first qualified variable, and if FindVariable() returns error (EFI_NOT_FOUND) | |
| // as no any variable is found, still go to return the error (EFI_NOT_FOUND). | |
| // | |
| if (VariableName[0] != 0) { | |
| // | |
| // For VariableName is not an empty string, and FindVariable() returns error as | |
| // VariableName and VendorGuid are not a name and GUID of an existing variable, | |
| // there is no way to get next variable, follow spec to return EFI_INVALID_PARAMETER. | |
| // | |
| Status = EFI_INVALID_PARAMETER; | |
| } | |
| goto Done; | |
| } | |
| if (VariableName[0] != 0) { | |
| // | |
| // If variable name is not NULL, get next variable. | |
| // | |
| Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr); | |
| } | |
| // | |
| // 0: Volatile, 1: HOB, 2: Non-Volatile. | |
| // The index and attributes mapping must be kept in this order as FindVariable | |
| // makes use of this mapping to implement search algorithm. | |
| // | |
| VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase; | |
| VariableStoreHeader[VariableStoreTypeHob] = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase; | |
| VariableStoreHeader[VariableStoreTypeNv] = mNvVariableCache; | |
| while (TRUE) { | |
| // | |
| // Switch from Volatile to HOB, to Non-Volatile. | |
| // | |
| while (!IsValidVariableHeader (Variable.CurrPtr, Variable.EndPtr)) { | |
| // | |
| // Find current storage index | |
| // | |
| for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) { | |
| if ((VariableStoreHeader[Type] != NULL) && (Variable.StartPtr == GetStartPointer (VariableStoreHeader[Type]))) { | |
| break; | |
| } | |
| } | |
| ASSERT (Type < VariableStoreTypeMax); | |
| // | |
| // Switch to next storage | |
| // | |
| for (Type++; Type < VariableStoreTypeMax; Type++) { | |
| if (VariableStoreHeader[Type] != NULL) { | |
| break; | |
| } | |
| } | |
| // | |
| // Capture the case that | |
| // 1. current storage is the last one, or | |
| // 2. no further storage | |
| // | |
| if (Type == VariableStoreTypeMax) { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| Variable.StartPtr = GetStartPointer (VariableStoreHeader[Type]); | |
| Variable.EndPtr = GetEndPointer (VariableStoreHeader[Type]); | |
| Variable.CurrPtr = Variable.StartPtr; | |
| } | |
| // | |
| // Variable is found | |
| // | |
| if (Variable.CurrPtr->State == VAR_ADDED || Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| if (!AtRuntime () || ((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) { | |
| if (Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // If it is a IN_DELETED_TRANSITION variable, | |
| // and there is also a same ADDED one at the same time, | |
| // don't return it. | |
| // | |
| VariablePtrTrack.StartPtr = Variable.StartPtr; | |
| VariablePtrTrack.EndPtr = Variable.EndPtr; | |
| Status = FindVariableEx ( | |
| GetVariableNamePtr (Variable.CurrPtr), | |
| GetVendorGuidPtr (Variable.CurrPtr), | |
| FALSE, | |
| &VariablePtrTrack | |
| ); | |
| if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State == VAR_ADDED) { | |
| Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr); | |
| continue; | |
| } | |
| } | |
| // | |
| // Don't return NV variable when HOB overrides it | |
| // | |
| if ((VariableStoreHeader[VariableStoreTypeHob] != NULL) && (VariableStoreHeader[VariableStoreTypeNv] != NULL) && | |
| (Variable.StartPtr == GetStartPointer (VariableStoreHeader[VariableStoreTypeNv])) | |
| ) { | |
| VariableInHob.StartPtr = GetStartPointer (VariableStoreHeader[VariableStoreTypeHob]); | |
| VariableInHob.EndPtr = GetEndPointer (VariableStoreHeader[VariableStoreTypeHob]); | |
| Status = FindVariableEx ( | |
| GetVariableNamePtr (Variable.CurrPtr), | |
| GetVendorGuidPtr (Variable.CurrPtr), | |
| FALSE, | |
| &VariableInHob | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr); | |
| continue; | |
| } | |
| } | |
| *VariablePtr = Variable.CurrPtr; | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } | |
| } | |
| Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr); | |
| } | |
| Done: | |
| return Status; | |
| } | |
| /** | |
| This code Finds the Next available variable. | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode. This function will do basic validation, before parse the data. | |
| @param VariableNameSize The size of the VariableName buffer. The size must be large | |
| enough to fit input string supplied in VariableName buffer. | |
| @param VariableName Pointer to variable name. | |
| @param VendorGuid Variable Vendor Guid. | |
| @retval EFI_SUCCESS The function completed successfully. | |
| @retval EFI_NOT_FOUND The next variable was not found. | |
| @retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result. | |
| VariableNameSize has been updated with the size needed to complete the request. | |
| @retval EFI_INVALID_PARAMETER VariableNameSize is NULL. | |
| @retval EFI_INVALID_PARAMETER VariableName is NULL. | |
| @retval EFI_INVALID_PARAMETER VendorGuid is NULL. | |
| @retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and | |
| GUID of an existing variable. | |
| @retval EFI_INVALID_PARAMETER Null-terminator is not found in the first VariableNameSize bytes of | |
| the input VariableName buffer. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceGetNextVariableName ( | |
| IN OUT UINTN *VariableNameSize, | |
| IN OUT CHAR16 *VariableName, | |
| IN OUT EFI_GUID *VendorGuid | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINTN MaxLen; | |
| UINTN VarNameSize; | |
| VARIABLE_HEADER *VariablePtr; | |
| if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Calculate the possible maximum length of name string, including the Null terminator. | |
| // | |
| MaxLen = *VariableNameSize / sizeof (CHAR16); | |
| if ((MaxLen == 0) || (StrnLenS (VariableName, MaxLen) == MaxLen)) { | |
| // | |
| // Null-terminator is not found in the first VariableNameSize bytes of the input VariableName buffer, | |
| // follow spec to return EFI_INVALID_PARAMETER. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| Status = VariableServiceGetNextVariableInternal (VariableName, VendorGuid, &VariablePtr); | |
| if (!EFI_ERROR (Status)) { | |
| VarNameSize = NameSizeOfVariable (VariablePtr); | |
| ASSERT (VarNameSize != 0); | |
| if (VarNameSize <= *VariableNameSize) { | |
| CopyMem (VariableName, GetVariableNamePtr (VariablePtr), VarNameSize); | |
| CopyMem (VendorGuid, GetVendorGuidPtr (VariablePtr), sizeof (EFI_GUID)); | |
| Status = EFI_SUCCESS; | |
| } else { | |
| Status = EFI_BUFFER_TOO_SMALL; | |
| } | |
| *VariableNameSize = VarNameSize; | |
| } | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| This code sets variable in storage blocks (Volatile or Non-Volatile). | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode, and datasize and data are external input. | |
| This function will do basic validation, before parse the data. | |
| This function will parse the authentication carefully to avoid security issues, like | |
| buffer overflow, integer overflow. | |
| This function will check attribute carefully to avoid authentication bypass. | |
| @param VariableName Name of Variable to be found. | |
| @param VendorGuid Variable vendor GUID. | |
| @param Attributes Attribute value of the variable found | |
| @param DataSize Size of Data found. If size is less than the | |
| data, this value contains the required size. | |
| @param Data Data pointer. | |
| @return EFI_INVALID_PARAMETER Invalid parameter. | |
| @return EFI_SUCCESS Set successfully. | |
| @return EFI_OUT_OF_RESOURCES Resource not enough to set variable. | |
| @return EFI_NOT_FOUND Not found. | |
| @return EFI_WRITE_PROTECTED Variable is read-only. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceSetVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN UINT32 Attributes, | |
| IN UINTN DataSize, | |
| IN VOID *Data | |
| ) | |
| { | |
| VARIABLE_POINTER_TRACK Variable; | |
| EFI_STATUS Status; | |
| VARIABLE_HEADER *NextVariable; | |
| EFI_PHYSICAL_ADDRESS Point; | |
| UINTN PayloadSize; | |
| // | |
| // Check input parameters. | |
| // | |
| if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if (DataSize != 0 && Data == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Check for reserverd bit in variable attribute. | |
| // EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS is deprecated but we still allow | |
| // the delete operation of common authenticated variable at user physical presence. | |
| // So leave EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS attribute check to AuthVariableLib | |
| // | |
| if ((Attributes & (~(EFI_VARIABLE_ATTRIBUTES_MASK | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS))) != 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Make sure if runtime bit is set, boot service bit is set also. | |
| // | |
| if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { | |
| if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { | |
| return EFI_UNSUPPORTED; | |
| } else { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) { | |
| // | |
| // Not support authenticated variable write. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) { | |
| if (PcdGet32 (PcdHwErrStorageSize) == 0) { | |
| // | |
| // Not support harware error record variable variable. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } | |
| // | |
| // EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS and EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute | |
| // cannot be set both. | |
| // | |
| if (((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) | |
| && ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS)) { | |
| return EFI_UNSUPPORTED; | |
| } | |
| if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) { | |
| // | |
| // If DataSize == AUTHINFO_SIZE and then PayloadSize is 0. | |
| // Maybe it's the delete operation of common authenticated variable at user physical presence. | |
| // | |
| if (DataSize != AUTHINFO_SIZE) { | |
| return EFI_UNSUPPORTED; | |
| } | |
| PayloadSize = DataSize - AUTHINFO_SIZE; | |
| } else if ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) { | |
| // | |
| // Sanity check for EFI_VARIABLE_AUTHENTICATION_2 descriptor. | |
| // | |
| if (DataSize < OFFSET_OF_AUTHINFO2_CERT_DATA || | |
| ((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength > DataSize - (OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) || | |
| ((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength < OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData)) { | |
| return EFI_SECURITY_VIOLATION; | |
| } | |
| PayloadSize = DataSize - AUTHINFO2_SIZE (Data); | |
| } else { | |
| PayloadSize = DataSize; | |
| } | |
| if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){ | |
| // | |
| // Prevent whole variable size overflow | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // The size of the VariableName, including the Unicode Null in bytes plus | |
| // the DataSize is limited to maximum size of PcdGet32 (PcdMaxHardwareErrorVariableSize) | |
| // bytes for HwErrRec#### variable. | |
| // | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| if (StrSize (VariableName) + PayloadSize > PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize ()) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else { | |
| // | |
| // The size of the VariableName, including the Unicode Null in bytes plus | |
| // the DataSize is limited to maximum size of Max(Auth)VariableSize bytes. | |
| // | |
| if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ()) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else { | |
| if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize ()) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } | |
| } | |
| // | |
| // Special Handling for MOR Lock variable. | |
| // | |
| Status = SetVariableCheckHandlerMor (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize)); | |
| if (Status == EFI_ALREADY_STARTED) { | |
| // | |
| // EFI_ALREADY_STARTED means the SetVariable() action is handled inside of SetVariableCheckHandlerMor(). | |
| // Variable driver can just return SUCCESS. | |
| // | |
| return EFI_SUCCESS; | |
| } | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| Status = VarCheckLibSetVariableCheck (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize), mRequestSource); | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| // | |
| // Consider reentrant in MCA/INIT/NMI. It needs be reupdated. | |
| // | |
| if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) { | |
| Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase; | |
| // | |
| // Parse non-volatile variable data and get last variable offset. | |
| // | |
| NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point); | |
| while (IsValidVariableHeader (NextVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point))) { | |
| NextVariable = GetNextVariablePtr (NextVariable); | |
| } | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point; | |
| } | |
| // | |
| // Check whether the input variable is already existed. | |
| // | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, TRUE); | |
| if (!EFI_ERROR (Status)) { | |
| if (((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) && AtRuntime ()) { | |
| Status = EFI_WRITE_PROTECTED; | |
| goto Done; | |
| } | |
| if (Attributes != 0 && (Attributes & (~EFI_VARIABLE_APPEND_WRITE)) != Variable.CurrPtr->Attributes) { | |
| // | |
| // If a preexisting variable is rewritten with different attributes, SetVariable() shall not | |
| // modify the variable and shall return EFI_INVALID_PARAMETER. Two exceptions to this rule: | |
| // 1. No access attributes specified | |
| // 2. The only attribute differing is EFI_VARIABLE_APPEND_WRITE | |
| // | |
| Status = EFI_INVALID_PARAMETER; | |
| DEBUG ((EFI_D_INFO, "[Variable]: Rewritten a preexisting variable(0x%08x) with different attributes(0x%08x) - %g:%s\n", Variable.CurrPtr->Attributes, Attributes, VendorGuid, VariableName)); | |
| goto Done; | |
| } | |
| } | |
| if (!FeaturePcdGet (PcdUefiVariableDefaultLangDeprecate)) { | |
| // | |
| // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang. | |
| // | |
| Status = AutoUpdateLangVariable (VariableName, Data, DataSize); | |
| if (EFI_ERROR (Status)) { | |
| // | |
| // The auto update operation failed, directly return to avoid inconsistency between PlatformLang and Lang. | |
| // | |
| goto Done; | |
| } | |
| } | |
| if (mVariableModuleGlobal->VariableGlobal.AuthSupport) { | |
| Status = AuthVariableLibProcessVariable (VariableName, VendorGuid, Data, DataSize, Attributes); | |
| } else { | |
| Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, 0, 0, &Variable, NULL); | |
| } | |
| Done: | |
| InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState); | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| if (!AtRuntime ()) { | |
| if (!EFI_ERROR (Status)) { | |
| SecureBootHook ( | |
| VariableName, | |
| VendorGuid | |
| ); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| This code returns information about the EFI variables. | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode. This function will do basic validation, before parse the data. | |
| @param Attributes Attributes bitmask to specify the type of variables | |
| on which to return information. | |
| @param MaximumVariableStorageSize Pointer to the maximum size of the storage space available | |
| for the EFI variables associated with the attributes specified. | |
| @param RemainingVariableStorageSize Pointer to the remaining size of the storage space available | |
| for EFI variables associated with the attributes specified. | |
| @param MaximumVariableSize Pointer to the maximum size of an individual EFI variables | |
| associated with the attributes specified. | |
| @return EFI_SUCCESS Query successfully. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceQueryVariableInfoInternal ( | |
| IN UINT32 Attributes, | |
| OUT UINT64 *MaximumVariableStorageSize, | |
| OUT UINT64 *RemainingVariableStorageSize, | |
| OUT UINT64 *MaximumVariableSize | |
| ) | |
| { | |
| VARIABLE_HEADER *Variable; | |
| VARIABLE_HEADER *NextVariable; | |
| UINT64 VariableSize; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| UINT64 CommonVariableTotalSize; | |
| UINT64 HwErrVariableTotalSize; | |
| EFI_STATUS Status; | |
| VARIABLE_POINTER_TRACK VariablePtrTrack; | |
| CommonVariableTotalSize = 0; | |
| HwErrVariableTotalSize = 0; | |
| if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) { | |
| // | |
| // Query is Volatile related. | |
| // | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase); | |
| } else { | |
| // | |
| // Query is Non-Volatile related. | |
| // | |
| VariableStoreHeader = mNvVariableCache; | |
| } | |
| // | |
| // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize | |
| // with the storage size (excluding the storage header size). | |
| // | |
| *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER); | |
| // | |
| // Harware error record variable needs larger size. | |
| // | |
| if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| *MaximumVariableStorageSize = PcdGet32 (PcdHwErrStorageSize); | |
| *MaximumVariableSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize (); | |
| } else { | |
| if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) { | |
| if (AtRuntime ()) { | |
| *MaximumVariableStorageSize = mVariableModuleGlobal->CommonRuntimeVariableSpace; | |
| } else { | |
| *MaximumVariableStorageSize = mVariableModuleGlobal->CommonVariableSpace; | |
| } | |
| } | |
| // | |
| // Let *MaximumVariableSize be Max(Auth)VariableSize with the exception of the variable header size. | |
| // | |
| if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| *MaximumVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize (); | |
| } else { | |
| *MaximumVariableSize = mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize (); | |
| } | |
| } | |
| // | |
| // Point to the starting address of the variables. | |
| // | |
| Variable = GetStartPointer (VariableStoreHeader); | |
| // | |
| // Now walk through the related variable store. | |
| // | |
| while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable; | |
| if (AtRuntime ()) { | |
| // | |
| // We don't take the state of the variables in mind | |
| // when calculating RemainingVariableStorageSize, | |
| // since the space occupied by variables not marked with | |
| // VAR_ADDED is not allowed to be reclaimed in Runtime. | |
| // | |
| if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| CommonVariableTotalSize += VariableSize; | |
| } | |
| } else { | |
| // | |
| // Only care about Variables with State VAR_ADDED, because | |
| // the space not marked as VAR_ADDED is reclaimable now. | |
| // | |
| if (Variable->State == VAR_ADDED) { | |
| if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| CommonVariableTotalSize += VariableSize; | |
| } | |
| } else if (Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // If it is a IN_DELETED_TRANSITION variable, | |
| // and there is not also a same ADDED one at the same time, | |
| // this IN_DELETED_TRANSITION variable is valid. | |
| // | |
| VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader); | |
| VariablePtrTrack.EndPtr = GetEndPointer (VariableStoreHeader); | |
| Status = FindVariableEx ( | |
| GetVariableNamePtr (Variable), | |
| GetVendorGuidPtr (Variable), | |
| FALSE, | |
| &VariablePtrTrack | |
| ); | |
| if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State != VAR_ADDED) { | |
| if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| CommonVariableTotalSize += VariableSize; | |
| } | |
| } | |
| } | |
| } | |
| // | |
| // Go to the next one. | |
| // | |
| Variable = NextVariable; | |
| } | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){ | |
| *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize; | |
| } else { | |
| if (*MaximumVariableStorageSize < CommonVariableTotalSize) { | |
| *RemainingVariableStorageSize = 0; | |
| } else { | |
| *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize; | |
| } | |
| } | |
| if (*RemainingVariableStorageSize < GetVariableHeaderSize ()) { | |
| *MaximumVariableSize = 0; | |
| } else if ((*RemainingVariableStorageSize - GetVariableHeaderSize ()) < *MaximumVariableSize) { | |
| *MaximumVariableSize = *RemainingVariableStorageSize - GetVariableHeaderSize (); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| This code returns information about the EFI variables. | |
| Caution: This function may receive untrusted input. | |
| This function may be invoked in SMM mode. This function will do basic validation, before parse the data. | |
| @param Attributes Attributes bitmask to specify the type of variables | |
| on which to return information. | |
| @param MaximumVariableStorageSize Pointer to the maximum size of the storage space available | |
| for the EFI variables associated with the attributes specified. | |
| @param RemainingVariableStorageSize Pointer to the remaining size of the storage space available | |
| for EFI variables associated with the attributes specified. | |
| @param MaximumVariableSize Pointer to the maximum size of an individual EFI variables | |
| associated with the attributes specified. | |
| @return EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied. | |
| @return EFI_SUCCESS Query successfully. | |
| @return EFI_UNSUPPORTED The attribute is not supported on this platform. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| VariableServiceQueryVariableInfo ( | |
| IN UINT32 Attributes, | |
| OUT UINT64 *MaximumVariableStorageSize, | |
| OUT UINT64 *RemainingVariableStorageSize, | |
| OUT UINT64 *MaximumVariableSize | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { | |
| // | |
| // Deprecated attribute, make this check as highest priority. | |
| // | |
| return EFI_UNSUPPORTED; | |
| } | |
| if ((Attributes & EFI_VARIABLE_ATTRIBUTES_MASK) == 0) { | |
| // | |
| // Make sure the Attributes combination is supported by the platform. | |
| // | |
| return EFI_UNSUPPORTED; | |
| } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { | |
| // | |
| // Make sure if runtime bit is set, boot service bit is set also. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } else if (AtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) { | |
| // | |
| // Make sure RT Attribute is set if we are in Runtime phase. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| // | |
| // Make sure Hw Attribute is set with NV. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) { | |
| if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) { | |
| // | |
| // Not support authenticated variable write. | |
| // | |
| return EFI_UNSUPPORTED; | |
| } | |
| } else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) { | |
| if (PcdGet32 (PcdHwErrStorageSize) == 0) { | |
| // | |
| // Not support harware error record variable variable. | |
| // | |
| return EFI_UNSUPPORTED; | |
| } | |
| } | |
| AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| Status = VariableServiceQueryVariableInfoInternal ( | |
| Attributes, | |
| MaximumVariableStorageSize, | |
| RemainingVariableStorageSize, | |
| MaximumVariableSize | |
| ); | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| This function reclaims variable storage if free size is below the threshold. | |
| Caution: This function may be invoked at SMM mode. | |
| Care must be taken to make sure not security issue. | |
| **/ | |
| VOID | |
| ReclaimForOS( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINTN RemainingCommonRuntimeVariableSpace; | |
| UINTN RemainingHwErrVariableSpace; | |
| STATIC BOOLEAN Reclaimed; | |
| // | |
| // This function will be called only once at EndOfDxe or ReadyToBoot event. | |
| // | |
| if (Reclaimed) { | |
| return; | |
| } | |
| Reclaimed = TRUE; | |
| Status = EFI_SUCCESS; | |
| if (mVariableModuleGlobal->CommonRuntimeVariableSpace < mVariableModuleGlobal->CommonVariableTotalSize) { | |
| RemainingCommonRuntimeVariableSpace = 0; | |
| } else { | |
| RemainingCommonRuntimeVariableSpace = mVariableModuleGlobal->CommonRuntimeVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize; | |
| } | |
| RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize; | |
| // | |
| // Check if the free area is below a threshold. | |
| // | |
| if (((RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxVariableSize) || | |
| (RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxAuthVariableSize)) || | |
| ((PcdGet32 (PcdHwErrStorageSize) != 0) && | |
| (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){ | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, | |
| &mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| FALSE, | |
| NULL, | |
| NULL, | |
| 0 | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| /** | |
| Get non-volatile maximum variable size. | |
| @return Non-volatile maximum variable size. | |
| **/ | |
| UINTN | |
| GetNonVolatileMaxVariableSize ( | |
| VOID | |
| ) | |
| { | |
| if (PcdGet32 (PcdHwErrStorageSize) != 0) { | |
| return MAX (MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize)), | |
| PcdGet32 (PcdMaxHardwareErrorVariableSize)); | |
| } else { | |
| return MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize)); | |
| } | |
| } | |
| /** | |
| Init non-volatile variable store. | |
| @param[out] NvFvHeader Output pointer to non-volatile FV header address. | |
| @retval EFI_SUCCESS Function successfully executed. | |
| @retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource. | |
| @retval EFI_VOLUME_CORRUPTED Variable Store or Firmware Volume for Variable Store is corrupted. | |
| **/ | |
| EFI_STATUS | |
| InitNonVolatileVariableStore ( | |
| OUT EFI_FIRMWARE_VOLUME_HEADER **NvFvHeader | |
| ) | |
| { | |
| EFI_FIRMWARE_VOLUME_HEADER *FvHeader; | |
| VARIABLE_HEADER *Variable; | |
| VARIABLE_HEADER *NextVariable; | |
| EFI_PHYSICAL_ADDRESS VariableStoreBase; | |
| UINT64 VariableStoreLength; | |
| UINTN VariableSize; | |
| EFI_HOB_GUID_TYPE *GuidHob; | |
| EFI_PHYSICAL_ADDRESS NvStorageBase; | |
| UINT8 *NvStorageData; | |
| UINT32 NvStorageSize; | |
| FAULT_TOLERANT_WRITE_LAST_WRITE_DATA *FtwLastWriteData; | |
| UINT32 BackUpOffset; | |
| UINT32 BackUpSize; | |
| UINT32 HwErrStorageSize; | |
| UINT32 MaxUserNvVariableSpaceSize; | |
| UINT32 BoottimeReservedNvVariableSpaceSize; | |
| EFI_STATUS Status; | |
| VOID *FtwProtocol; | |
| mVariableModuleGlobal->FvbInstance = NULL; | |
| // | |
| // Allocate runtime memory used for a memory copy of the FLASH region. | |
| // Keep the memory and the FLASH in sync as updates occur. | |
| // | |
| NvStorageSize = PcdGet32 (PcdFlashNvStorageVariableSize); | |
| NvStorageData = AllocateRuntimeZeroPool (NvStorageSize); | |
| if (NvStorageData == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet64 (PcdFlashNvStorageVariableBase64); | |
| if (NvStorageBase == 0) { | |
| NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet32 (PcdFlashNvStorageVariableBase); | |
| } | |
| // | |
| // Copy NV storage data to the memory buffer. | |
| // | |
| CopyMem (NvStorageData, (UINT8 *) (UINTN) NvStorageBase, NvStorageSize); | |
| Status = GetFtwProtocol ((VOID **)&FtwProtocol); | |
| // | |
| // If FTW protocol has been installed, no need to check FTW last write data hob. | |
| // | |
| if (EFI_ERROR (Status)) { | |
| // | |
| // Check the FTW last write data hob. | |
| // | |
| GuidHob = GetFirstGuidHob (&gEdkiiFaultTolerantWriteGuid); | |
| if (GuidHob != NULL) { | |
| FtwLastWriteData = (FAULT_TOLERANT_WRITE_LAST_WRITE_DATA *) GET_GUID_HOB_DATA (GuidHob); | |
| if (FtwLastWriteData->TargetAddress == NvStorageBase) { | |
| DEBUG ((EFI_D_INFO, "Variable: NV storage is backed up in spare block: 0x%x\n", (UINTN) FtwLastWriteData->SpareAddress)); | |
| // | |
| // Copy the backed up NV storage data to the memory buffer from spare block. | |
| // | |
| CopyMem (NvStorageData, (UINT8 *) (UINTN) (FtwLastWriteData->SpareAddress), NvStorageSize); | |
| } else if ((FtwLastWriteData->TargetAddress > NvStorageBase) && | |
| (FtwLastWriteData->TargetAddress < (NvStorageBase + NvStorageSize))) { | |
| // | |
| // Flash NV storage from the Offset is backed up in spare block. | |
| // | |
| BackUpOffset = (UINT32) (FtwLastWriteData->TargetAddress - NvStorageBase); | |
| BackUpSize = NvStorageSize - BackUpOffset; | |
| DEBUG ((EFI_D_INFO, "Variable: High partial NV storage from offset: %x is backed up in spare block: 0x%x\n", BackUpOffset, (UINTN) FtwLastWriteData->SpareAddress)); | |
| // | |
| // Copy the partial backed up NV storage data to the memory buffer from spare block. | |
| // | |
| CopyMem (NvStorageData + BackUpOffset, (UINT8 *) (UINTN) FtwLastWriteData->SpareAddress, BackUpSize); | |
| } | |
| } | |
| } | |
| FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) NvStorageData; | |
| // | |
| // Check if the Firmware Volume is not corrupted | |
| // | |
| if ((FvHeader->Signature != EFI_FVH_SIGNATURE) || (!CompareGuid (&gEfiSystemNvDataFvGuid, &FvHeader->FileSystemGuid))) { | |
| FreePool (NvStorageData); | |
| DEBUG ((EFI_D_ERROR, "Firmware Volume for Variable Store is corrupted\n")); | |
| return EFI_VOLUME_CORRUPTED; | |
| } | |
| VariableStoreBase = (UINTN) FvHeader + FvHeader->HeaderLength; | |
| VariableStoreLength = NvStorageSize - FvHeader->HeaderLength; | |
| mNvFvHeaderCache = FvHeader; | |
| mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase; | |
| mNvVariableCache = (VARIABLE_STORE_HEADER *) (UINTN) VariableStoreBase; | |
| if (GetVariableStoreStatus (mNvVariableCache) != EfiValid) { | |
| FreePool (NvStorageData); | |
| mNvFvHeaderCache = NULL; | |
| mNvVariableCache = NULL; | |
| DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n")); | |
| return EFI_VOLUME_CORRUPTED; | |
| } | |
| ASSERT(mNvVariableCache->Size == VariableStoreLength); | |
| ASSERT (sizeof (VARIABLE_STORE_HEADER) <= VariableStoreLength); | |
| mVariableModuleGlobal->VariableGlobal.AuthFormat = (BOOLEAN)(CompareGuid (&mNvVariableCache->Signature, &gEfiAuthenticatedVariableGuid)); | |
| HwErrStorageSize = PcdGet32 (PcdHwErrStorageSize); | |
| MaxUserNvVariableSpaceSize = PcdGet32 (PcdMaxUserNvVariableSpaceSize); | |
| BoottimeReservedNvVariableSpaceSize = PcdGet32 (PcdBoottimeReservedNvVariableSpaceSize); | |
| // | |
| // Note that in EdkII variable driver implementation, Hardware Error Record type variable | |
| // is stored with common variable in the same NV region. So the platform integrator should | |
| // ensure that the value of PcdHwErrStorageSize is less than the value of | |
| // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)). | |
| // | |
| ASSERT (HwErrStorageSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER))); | |
| // | |
| // Ensure that the value of PcdMaxUserNvVariableSpaceSize is less than the value of | |
| // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize). | |
| // | |
| ASSERT (MaxUserNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize)); | |
| // | |
| // Ensure that the value of PcdBoottimeReservedNvVariableSpaceSize is less than the value of | |
| // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize). | |
| // | |
| ASSERT (BoottimeReservedNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize)); | |
| mVariableModuleGlobal->CommonVariableSpace = ((UINTN) VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize); | |
| mVariableModuleGlobal->CommonMaxUserVariableSpace = ((MaxUserNvVariableSpaceSize != 0) ? MaxUserNvVariableSpaceSize : mVariableModuleGlobal->CommonVariableSpace); | |
| mVariableModuleGlobal->CommonRuntimeVariableSpace = mVariableModuleGlobal->CommonVariableSpace - BoottimeReservedNvVariableSpaceSize; | |
| DEBUG ((EFI_D_INFO, "Variable driver common space: 0x%x 0x%x 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonRuntimeVariableSpace)); | |
| // | |
| // The max NV variable size should be < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)). | |
| // | |
| ASSERT (GetNonVolatileMaxVariableSize () < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER))); | |
| mVariableModuleGlobal->MaxVariableSize = PcdGet32 (PcdMaxVariableSize); | |
| mVariableModuleGlobal->MaxAuthVariableSize = ((PcdGet32 (PcdMaxAuthVariableSize) != 0) ? PcdGet32 (PcdMaxAuthVariableSize) : mVariableModuleGlobal->MaxVariableSize); | |
| // | |
| // Parse non-volatile variable data and get last variable offset. | |
| // | |
| Variable = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase); | |
| while (IsValidVariableHeader (Variable, GetEndPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase))) { | |
| NextVariable = GetNextVariablePtr (Variable); | |
| VariableSize = (UINTN) NextVariable - (UINTN) Variable; | |
| if ((Variable->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| mVariableModuleGlobal->CommonVariableTotalSize += VariableSize; | |
| } | |
| Variable = NextVariable; | |
| } | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) VariableStoreBase; | |
| *NvFvHeader = FvHeader; | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Flush the HOB variable to flash. | |
| @param[in] VariableName Name of variable has been updated or deleted. | |
| @param[in] VendorGuid Guid of variable has been updated or deleted. | |
| **/ | |
| VOID | |
| FlushHobVariableToFlash ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| VARIABLE_HEADER *Variable; | |
| VOID *VariableData; | |
| VARIABLE_POINTER_TRACK VariablePtrTrack; | |
| BOOLEAN ErrorFlag; | |
| ErrorFlag = FALSE; | |
| // | |
| // Flush the HOB variable to flash. | |
| // | |
| if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) { | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase; | |
| // | |
| // Set HobVariableBase to 0, it can avoid SetVariable to call back. | |
| // | |
| mVariableModuleGlobal->VariableGlobal.HobVariableBase = 0; | |
| for ( Variable = GetStartPointer (VariableStoreHeader) | |
| ; IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader)) | |
| ; Variable = GetNextVariablePtr (Variable) | |
| ) { | |
| if (Variable->State != VAR_ADDED) { | |
| // | |
| // The HOB variable has been set to DELETED state in local. | |
| // | |
| continue; | |
| } | |
| ASSERT ((Variable->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0); | |
| if (VendorGuid == NULL || VariableName == NULL || | |
| !CompareGuid (VendorGuid, GetVendorGuidPtr (Variable)) || | |
| StrCmp (VariableName, GetVariableNamePtr (Variable)) != 0) { | |
| VariableData = GetVariableDataPtr (Variable); | |
| FindVariable (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &VariablePtrTrack, &mVariableModuleGlobal->VariableGlobal, FALSE); | |
| Status = UpdateVariable ( | |
| GetVariableNamePtr (Variable), | |
| GetVendorGuidPtr (Variable), | |
| VariableData, | |
| DataSizeOfVariable (Variable), | |
| Variable->Attributes, | |
| 0, | |
| 0, | |
| &VariablePtrTrack, | |
| NULL | |
| ); | |
| DEBUG ((EFI_D_INFO, "Variable driver flush the HOB variable to flash: %g %s %r\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable), Status)); | |
| } else { | |
| // | |
| // The updated or deleted variable is matched with this HOB variable. | |
| // Don't break here because we will try to set other HOB variables | |
| // since this variable could be set successfully. | |
| // | |
| Status = EFI_SUCCESS; | |
| } | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // If set variable successful, or the updated or deleted variable is matched with the HOB variable, | |
| // set the HOB variable to DELETED state in local. | |
| // | |
| DEBUG ((EFI_D_INFO, "Variable driver set the HOB variable to DELETED state in local: %g %s\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable))); | |
| Variable->State &= VAR_DELETED; | |
| } else { | |
| ErrorFlag = TRUE; | |
| } | |
| } | |
| if (ErrorFlag) { | |
| // | |
| // We still have HOB variable(s) not flushed in flash. | |
| // | |
| mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VariableStoreHeader; | |
| } else { | |
| // | |
| // All HOB variables have been flushed in flash. | |
| // | |
| DEBUG ((EFI_D_INFO, "Variable driver: all HOB variables have been flushed in flash.\n")); | |
| if (!AtRuntime ()) { | |
| FreePool ((VOID *) VariableStoreHeader); | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| Initializes variable write service after FTW was ready. | |
| @retval EFI_SUCCESS Function successfully executed. | |
| @retval Others Fail to initialize the variable service. | |
| **/ | |
| EFI_STATUS | |
| VariableWriteServiceInitialize ( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINTN Index; | |
| UINT8 Data; | |
| EFI_PHYSICAL_ADDRESS VariableStoreBase; | |
| EFI_PHYSICAL_ADDRESS NvStorageBase; | |
| VARIABLE_ENTRY_PROPERTY *VariableEntry; | |
| AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet64 (PcdFlashNvStorageVariableBase64); | |
| if (NvStorageBase == 0) { | |
| NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet32 (PcdFlashNvStorageVariableBase); | |
| } | |
| VariableStoreBase = NvStorageBase + (mNvFvHeaderCache->HeaderLength); | |
| // | |
| // Let NonVolatileVariableBase point to flash variable store base directly after FTW ready. | |
| // | |
| mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase; | |
| // | |
| // Check if the free area is really free. | |
| // | |
| for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < mNvVariableCache->Size; Index++) { | |
| Data = ((UINT8 *) mNvVariableCache)[Index]; | |
| if (Data != 0xff) { | |
| // | |
| // There must be something wrong in variable store, do reclaim operation. | |
| // | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, | |
| &mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| FALSE, | |
| NULL, | |
| NULL, | |
| 0 | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| return Status; | |
| } | |
| break; | |
| } | |
| } | |
| FlushHobVariableToFlash (NULL, NULL); | |
| Status = EFI_SUCCESS; | |
| ZeroMem (&mAuthContextOut, sizeof (mAuthContextOut)); | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| // | |
| // Authenticated variable initialize. | |
| // | |
| mAuthContextIn.StructSize = sizeof (AUTH_VAR_LIB_CONTEXT_IN); | |
| mAuthContextIn.MaxAuthVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize (); | |
| Status = AuthVariableLibInitialize (&mAuthContextIn, &mAuthContextOut); | |
| if (!EFI_ERROR (Status)) { | |
| DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable support!\n")); | |
| mVariableModuleGlobal->VariableGlobal.AuthSupport = TRUE; | |
| if (mAuthContextOut.AuthVarEntry != NULL) { | |
| for (Index = 0; Index < mAuthContextOut.AuthVarEntryCount; Index++) { | |
| VariableEntry = &mAuthContextOut.AuthVarEntry[Index]; | |
| Status = VarCheckLibVariablePropertySet ( | |
| VariableEntry->Name, | |
| VariableEntry->Guid, | |
| &VariableEntry->VariableProperty | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| } else if (Status == EFI_UNSUPPORTED) { | |
| DEBUG ((EFI_D_INFO, "NOTICE - AuthVariableLibInitialize() returns %r!\n", Status)); | |
| DEBUG ((EFI_D_INFO, "Variable driver will continue to work without auth variable support!\n")); | |
| mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE; | |
| Status = EFI_SUCCESS; | |
| } | |
| } | |
| if (!EFI_ERROR (Status)) { | |
| for (Index = 0; Index < ARRAY_SIZE (mVariableEntryProperty); Index++) { | |
| VariableEntry = &mVariableEntryProperty[Index]; | |
| Status = VarCheckLibVariablePropertySet (VariableEntry->Name, VariableEntry->Guid, &VariableEntry->VariableProperty); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock); | |
| // | |
| // Initialize MOR Lock variable. | |
| // | |
| MorLockInit (); | |
| return Status; | |
| } | |
| /** | |
| Convert normal variable storage to the allocated auth variable storage. | |
| @param[in] NormalVarStorage Pointer to the normal variable storage header | |
| @retval the allocated auth variable storage | |
| **/ | |
| VOID * | |
| ConvertNormalVarStorageToAuthVarStorage ( | |
| VARIABLE_STORE_HEADER *NormalVarStorage | |
| ) | |
| { | |
| VARIABLE_HEADER *StartPtr; | |
| UINT8 *NextPtr; | |
| VARIABLE_HEADER *EndPtr; | |
| UINTN AuthVarStroageSize; | |
| AUTHENTICATED_VARIABLE_HEADER *AuthStartPtr; | |
| VARIABLE_STORE_HEADER *AuthVarStorage; | |
| AuthVarStroageSize = sizeof (VARIABLE_STORE_HEADER); | |
| // | |
| // Set AuthFormat as FALSE for normal variable storage | |
| // | |
| mVariableModuleGlobal->VariableGlobal.AuthFormat = FALSE; | |
| // | |
| // Calculate Auth Variable Storage Size | |
| // | |
| StartPtr = GetStartPointer (NormalVarStorage); | |
| EndPtr = GetEndPointer (NormalVarStorage); | |
| while (StartPtr < EndPtr) { | |
| if (StartPtr->State == VAR_ADDED) { | |
| AuthVarStroageSize = HEADER_ALIGN (AuthVarStroageSize); | |
| AuthVarStroageSize += sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| AuthVarStroageSize += StartPtr->NameSize + GET_PAD_SIZE (StartPtr->NameSize); | |
| AuthVarStroageSize += StartPtr->DataSize + GET_PAD_SIZE (StartPtr->DataSize); | |
| } | |
| StartPtr = GetNextVariablePtr (StartPtr); | |
| } | |
| // | |
| // Allocate Runtime memory for Auth Variable Storage | |
| // | |
| AuthVarStorage = AllocateRuntimeZeroPool (AuthVarStroageSize); | |
| ASSERT (AuthVarStorage != NULL); | |
| if (AuthVarStorage == NULL) { | |
| return NULL; | |
| } | |
| // | |
| // Copy Variable from Normal storage to Auth storage | |
| // | |
| StartPtr = GetStartPointer (NormalVarStorage); | |
| EndPtr = GetEndPointer (NormalVarStorage); | |
| AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) GetStartPointer (AuthVarStorage); | |
| while (StartPtr < EndPtr) { | |
| if (StartPtr->State == VAR_ADDED) { | |
| AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN (AuthStartPtr); | |
| // | |
| // Copy Variable Header | |
| // | |
| AuthStartPtr->StartId = StartPtr->StartId; | |
| AuthStartPtr->State = StartPtr->State; | |
| AuthStartPtr->Attributes = StartPtr->Attributes; | |
| AuthStartPtr->NameSize = StartPtr->NameSize; | |
| AuthStartPtr->DataSize = StartPtr->DataSize; | |
| CopyGuid (&AuthStartPtr->VendorGuid, &StartPtr->VendorGuid); | |
| // | |
| // Copy Variable Name | |
| // | |
| NextPtr = (UINT8 *) (AuthStartPtr + 1); | |
| CopyMem (NextPtr, GetVariableNamePtr (StartPtr), AuthStartPtr->NameSize); | |
| // | |
| // Copy Variable Data | |
| // | |
| NextPtr = NextPtr + AuthStartPtr->NameSize + GET_PAD_SIZE (AuthStartPtr->NameSize); | |
| CopyMem (NextPtr, GetVariableDataPtr (StartPtr), AuthStartPtr->DataSize); | |
| // | |
| // Go to next variable | |
| // | |
| AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) (NextPtr + AuthStartPtr->DataSize + GET_PAD_SIZE (AuthStartPtr->DataSize)); | |
| } | |
| StartPtr = GetNextVariablePtr (StartPtr); | |
| } | |
| // | |
| // Update Auth Storage Header | |
| // | |
| AuthVarStorage->Format = NormalVarStorage->Format; | |
| AuthVarStorage->State = NormalVarStorage->State; | |
| AuthVarStorage->Size = (UINT32)((UINTN)AuthStartPtr - (UINTN)AuthVarStorage); | |
| CopyGuid (&AuthVarStorage->Signature, &gEfiAuthenticatedVariableGuid); | |
| ASSERT (AuthVarStorage->Size <= AuthVarStroageSize); | |
| // | |
| // Restore AuthFormat | |
| // | |
| mVariableModuleGlobal->VariableGlobal.AuthFormat = TRUE; | |
| return AuthVarStorage; | |
| } | |
| /** | |
| Initializes variable store area for non-volatile and volatile variable. | |
| @retval EFI_SUCCESS Function successfully executed. | |
| @retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource. | |
| **/ | |
| EFI_STATUS | |
| VariableCommonInitialize ( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER *VolatileVariableStore; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| UINT64 VariableStoreLength; | |
| UINTN ScratchSize; | |
| EFI_HOB_GUID_TYPE *GuidHob; | |
| EFI_GUID *VariableGuid; | |
| EFI_FIRMWARE_VOLUME_HEADER *NvFvHeader; | |
| BOOLEAN IsNormalVariableHob; | |
| // | |
| // Allocate runtime memory for variable driver global structure. | |
| // | |
| mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (VARIABLE_MODULE_GLOBAL)); | |
| if (mVariableModuleGlobal == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| InitializeLock (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY); | |
| // | |
| // Init non-volatile variable store. | |
| // | |
| NvFvHeader = NULL; | |
| Status = InitNonVolatileVariableStore (&NvFvHeader); | |
| if (EFI_ERROR (Status)) { | |
| FreePool (mVariableModuleGlobal); | |
| return Status; | |
| } | |
| // | |
| // mVariableModuleGlobal->VariableGlobal.AuthFormat | |
| // has been initialized in InitNonVolatileVariableStore(). | |
| // | |
| if (mVariableModuleGlobal->VariableGlobal.AuthFormat) { | |
| DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable format!\n")); | |
| // | |
| // Set AuthSupport to FALSE first, VariableWriteServiceInitialize() will initialize it. | |
| // | |
| mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE; | |
| VariableGuid = &gEfiAuthenticatedVariableGuid; | |
| } else { | |
| DEBUG ((EFI_D_INFO, "Variable driver will work without auth variable support!\n")); | |
| mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE; | |
| VariableGuid = &gEfiVariableGuid; | |
| } | |
| // | |
| // Get HOB variable store. | |
| // | |
| IsNormalVariableHob = FALSE; | |
| GuidHob = GetFirstGuidHob (VariableGuid); | |
| if (GuidHob == NULL && VariableGuid == &gEfiAuthenticatedVariableGuid) { | |
| // | |
| // Try getting it from normal variable HOB | |
| // | |
| GuidHob = GetFirstGuidHob (&gEfiVariableGuid); | |
| IsNormalVariableHob = TRUE; | |
| } | |
| if (GuidHob != NULL) { | |
| VariableStoreHeader = GET_GUID_HOB_DATA (GuidHob); | |
| VariableStoreLength = GuidHob->Header.HobLength - sizeof (EFI_HOB_GUID_TYPE); | |
| if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) { | |
| if (!IsNormalVariableHob) { | |
| mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) AllocateRuntimeCopyPool ((UINTN) VariableStoreLength, (VOID *) VariableStoreHeader); | |
| } else { | |
| mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) ConvertNormalVarStorageToAuthVarStorage ((VOID *) VariableStoreHeader); | |
| } | |
| if (mVariableModuleGlobal->VariableGlobal.HobVariableBase == 0) { | |
| FreePool (NvFvHeader); | |
| FreePool (mVariableModuleGlobal); | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| } else { | |
| DEBUG ((EFI_D_ERROR, "HOB Variable Store header is corrupted!\n")); | |
| } | |
| } | |
| // | |
| // Allocate memory for volatile variable store, note that there is a scratch space to store scratch data. | |
| // | |
| ScratchSize = GetNonVolatileMaxVariableSize (); | |
| mVariableModuleGlobal->ScratchBufferSize = ScratchSize; | |
| VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize); | |
| if (VolatileVariableStore == NULL) { | |
| if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) { | |
| FreePool ((VOID *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase); | |
| } | |
| FreePool (NvFvHeader); | |
| FreePool (mVariableModuleGlobal); | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff); | |
| // | |
| // Initialize Variable Specific Data. | |
| // | |
| mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore; | |
| mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore; | |
| CopyGuid (&VolatileVariableStore->Signature, VariableGuid); | |
| VolatileVariableStore->Size = PcdGet32 (PcdVariableStoreSize); | |
| VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED; | |
| VolatileVariableStore->State = VARIABLE_STORE_HEALTHY; | |
| VolatileVariableStore->Reserved = 0; | |
| VolatileVariableStore->Reserved1 = 0; | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Get the proper fvb handle and/or fvb protocol by the given Flash address. | |
| @param[in] Address The Flash address. | |
| @param[out] FvbHandle In output, if it is not NULL, it points to the proper FVB handle. | |
| @param[out] FvbProtocol In output, if it is not NULL, it points to the proper FVB protocol. | |
| **/ | |
| EFI_STATUS | |
| GetFvbInfoByAddress ( | |
| IN EFI_PHYSICAL_ADDRESS Address, | |
| OUT EFI_HANDLE *FvbHandle OPTIONAL, | |
| OUT EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL **FvbProtocol OPTIONAL | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_HANDLE *HandleBuffer; | |
| UINTN HandleCount; | |
| UINTN Index; | |
| EFI_PHYSICAL_ADDRESS FvbBaseAddress; | |
| EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb; | |
| EFI_FVB_ATTRIBUTES_2 Attributes; | |
| UINTN BlockSize; | |
| UINTN NumberOfBlocks; | |
| HandleBuffer = NULL; | |
| // | |
| // Get all FVB handles. | |
| // | |
| Status = GetFvbCountAndBuffer (&HandleCount, &HandleBuffer); | |
| if (EFI_ERROR (Status)) { | |
| return EFI_NOT_FOUND; | |
| } | |
| // | |
| // Get the FVB to access variable store. | |
| // | |
| Fvb = NULL; | |
| for (Index = 0; Index < HandleCount; Index += 1, Status = EFI_NOT_FOUND, Fvb = NULL) { | |
| Status = GetFvbByHandle (HandleBuffer[Index], &Fvb); | |
| if (EFI_ERROR (Status)) { | |
| Status = EFI_NOT_FOUND; | |
| break; | |
| } | |
| // | |
| // Ensure this FVB protocol supported Write operation. | |
| // | |
| Status = Fvb->GetAttributes (Fvb, &Attributes); | |
| if (EFI_ERROR (Status) || ((Attributes & EFI_FVB2_WRITE_STATUS) == 0)) { | |
| continue; | |
| } | |
| // | |
| // Compare the address and select the right one. | |
| // | |
| Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress); | |
| if (EFI_ERROR (Status)) { | |
| continue; | |
| } | |
| // | |
| // Assume one FVB has one type of BlockSize. | |
| // | |
| Status = Fvb->GetBlockSize (Fvb, 0, &BlockSize, &NumberOfBlocks); | |
| if (EFI_ERROR (Status)) { | |
| continue; | |
| } | |
| if ((Address >= FvbBaseAddress) && (Address < (FvbBaseAddress + BlockSize * NumberOfBlocks))) { | |
| if (FvbHandle != NULL) { | |
| *FvbHandle = HandleBuffer[Index]; | |
| } | |
| if (FvbProtocol != NULL) { | |
| *FvbProtocol = Fvb; | |
| } | |
| Status = EFI_SUCCESS; | |
| break; | |
| } | |
| } | |
| FreePool (HandleBuffer); | |
| if (Fvb == NULL) { | |
| Status = EFI_NOT_FOUND; | |
| } | |
| return Status; | |
| } | |