| /** @file | |
| The implementation of Extended SAL variable services. | |
| Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR> | |
| This program and the accompanying materials | |
| are licensed and made available under the terms and conditions of the BSD License | |
| which accompanies this distribution. The full text of the license may be found at | |
| http://opensource.org/licenses/bsd-license.php | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
| **/ | |
| #include "Variable.h" | |
| #include "AuthService.h" | |
| // | |
| // Don't use module globals after the SetVirtualAddress map is signaled | |
| // | |
| ESAL_VARIABLE_GLOBAL *mVariableModuleGlobal; | |
| CHAR16 *mVariableName[NUM_VAR_NAME] = { | |
| L"PlatformLangCodes", | |
| L"LangCodes", | |
| L"PlatformLang", | |
| L"Lang", | |
| L"HwErrRec", | |
| AUTHVAR_KEYDB_NAME, | |
| EFI_SETUP_MODE_NAME, | |
| EFI_PLATFORM_KEY_NAME, | |
| EFI_KEY_EXCHANGE_KEY_NAME | |
| }; | |
| GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL; | |
| // | |
| // The current Hii implementation accesses this variable a larg # of times on every boot. | |
| // Other common variables are only accessed a single time. This is why this cache algorithm | |
| // only targets a single variable. Probably to get an performance improvement out of | |
| // a Cache you would need a cache that improves the search performance for a variable. | |
| // | |
| VARIABLE_CACHE_ENTRY mVariableCache[] = { | |
| { | |
| &gEfiGlobalVariableGuid, | |
| L"Lang", | |
| 0x00000000, | |
| 0x00, | |
| NULL | |
| }, | |
| { | |
| &gEfiGlobalVariableGuid, | |
| L"PlatformLang", | |
| 0x00000000, | |
| 0x00, | |
| NULL | |
| } | |
| }; | |
| /** | |
| Acquires lock only at boot time. Simply returns at runtime. | |
| This is a temperary function which will be removed when | |
| EfiAcquireLock() in UefiLib can handle the call in UEFI | |
| Runtimer driver in RT phase. | |
| It calls EfiAcquireLock() at boot time, and simply returns | |
| at runtime. | |
| @param[in] Lock A pointer to the lock to acquire. | |
| **/ | |
| VOID | |
| AcquireLockOnlyAtBootTime ( | |
| IN EFI_LOCK *Lock | |
| ) | |
| { | |
| if (!EfiAtRuntime ()) { | |
| EfiAcquireLock (Lock); | |
| } | |
| } | |
| /** | |
| Releases lock only at boot time. Simply returns at runtime. | |
| This is a temperary function which will be removed when | |
| EfiReleaseLock() in UefiLib can handle the call in UEFI | |
| Runtimer driver in RT phase. | |
| It calls EfiReleaseLock() at boot time, and simply returns | |
| at runtime | |
| @param[in] Lock A pointer to the lock to release. | |
| **/ | |
| VOID | |
| ReleaseLockOnlyAtBootTime ( | |
| IN EFI_LOCK *Lock | |
| ) | |
| { | |
| if (!EfiAtRuntime ()) { | |
| EfiReleaseLock (Lock); | |
| } | |
| } | |
| /** | |
| Reads/Writes variable storage, volatile or non-volatile. | |
| This function reads or writes volatile or non-volatile variable stroage. | |
| For volatile storage, it performs memory copy. | |
| For non-volatile storage, it accesses data on firmware storage. Data | |
| area to access can span multiple firmware blocks. | |
| @param[in] Write TRUE - Write variable store. | |
| FALSE - Read variable store. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Instance Instance of FV Block services. | |
| @param[in] StartAddress Start address of data to access. | |
| @param[in] DataSize Size of data to access. | |
| @param[in, out] Buffer For write, pointer to the buffer from which data is written. | |
| For read, pointer to the buffer to hold the data read. | |
| @retval EFI_SUCCESS Variable store successfully accessed. | |
| @retval EFI_INVALID_PARAMETER Data area to access exceeds valid variable storage. | |
| **/ | |
| EFI_STATUS | |
| AccessVariableStore ( | |
| IN BOOLEAN Write, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN BOOLEAN Volatile, | |
| IN UINTN Instance, | |
| IN EFI_PHYSICAL_ADDRESS StartAddress, | |
| IN UINT32 DataSize, | |
| IN OUT VOID *Buffer | |
| ) | |
| { | |
| EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry; | |
| UINTN BlockIndex; | |
| UINTN LinearOffset; | |
| UINTN CurrWriteSize; | |
| UINTN CurrWritePtr; | |
| UINT8 *CurrBuffer; | |
| EFI_LBA LbaNumber; | |
| UINTN Size; | |
| EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader; | |
| VARIABLE_STORE_HEADER *VolatileBase; | |
| EFI_PHYSICAL_ADDRESS FvVolHdr; | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| FvVolHdr = 0; | |
| FwVolHeader = NULL; | |
| if (Volatile) { | |
| // | |
| // If data is volatile, simply calculate the data pointer and copy memory. | |
| // Data pointer should point to the actual address where data is to be | |
| // accessed. | |
| // | |
| VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) Global->VolatileVariableBase); | |
| if ((StartAddress + DataSize) > ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // For volatile variable, a simple memory copy is enough. | |
| // | |
| if (Write) { | |
| CopyMem ((VOID *) StartAddress, Buffer, DataSize); | |
| } else { | |
| CopyMem (Buffer, (VOID *) StartAddress, DataSize); | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| // | |
| // If data is non-volatile, calculate firmware volume header and data pointer. | |
| // | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| GetPhysicalAddressFunctionId, | |
| Instance, | |
| (UINT64) &FvVolHdr, | |
| 0, | |
| 0, | |
| 0, | |
| 0, | |
| 0 | |
| ).Status; | |
| ASSERT_EFI_ERROR (Status); | |
| FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr); | |
| ASSERT (FwVolHeader != NULL); | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *)(FwVolHeader + 1); | |
| if ((StartAddress + DataSize) > ((EFI_PHYSICAL_ADDRESS) (UINTN) ((CHAR8 *)VariableStoreHeader + VariableStoreHeader->Size))) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| LinearOffset = (UINTN) FwVolHeader; | |
| CurrWritePtr = StartAddress; | |
| CurrWriteSize = DataSize; | |
| CurrBuffer = Buffer; | |
| LbaNumber = 0; | |
| if (CurrWritePtr < LinearOffset) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Traverse data blocks of this firmware storage to find the one where CurrWritePtr locates | |
| // | |
| for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) { | |
| for (BlockIndex = 0; BlockIndex < PtrBlockMapEntry->NumBlocks; BlockIndex++) { | |
| if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) { | |
| // | |
| // Check to see if the data area to access spans multiple blocks. | |
| // | |
| if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) { | |
| // | |
| // If data area to access is contained in one block, just access and return. | |
| // | |
| if (Write) { | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| WriteFunctionId, | |
| Instance, | |
| LbaNumber, | |
| (CurrWritePtr - LinearOffset), | |
| (UINT64) &CurrWriteSize, | |
| (UINT64) CurrBuffer, | |
| 0, | |
| 0 | |
| ).Status; | |
| } else { | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| ReadFunctionId, | |
| Instance, | |
| LbaNumber, | |
| (CurrWritePtr - LinearOffset), | |
| (UINT64) &CurrWriteSize, | |
| (UINT64) CurrBuffer, | |
| 0, | |
| 0 | |
| ).Status; | |
| } | |
| return Status; | |
| } else { | |
| // | |
| // If data area to access spans multiple blocks, access this one and adjust for the next one. | |
| // | |
| Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr); | |
| if (Write) { | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| WriteFunctionId, | |
| Instance, | |
| LbaNumber, | |
| (CurrWritePtr - LinearOffset), | |
| (UINT64) &Size, | |
| (UINT64) CurrBuffer, | |
| 0, | |
| 0 | |
| ).Status; | |
| } else { | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| ReadFunctionId, | |
| Instance, | |
| LbaNumber, | |
| (CurrWritePtr - LinearOffset), | |
| (UINT64) &Size, | |
| (UINT64) CurrBuffer, | |
| 0, | |
| 0 | |
| ).Status; | |
| } | |
| if (EFI_ERROR (Status)) { | |
| return Status; | |
| } | |
| // | |
| // Adjust for the remaining data. | |
| // | |
| CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length; | |
| CurrBuffer = CurrBuffer + Size; | |
| CurrWriteSize = CurrWriteSize - Size; | |
| } | |
| } | |
| LinearOffset += PtrBlockMapEntry->Length; | |
| LbaNumber++; | |
| } | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Retrieves header of volatile or non-volatile variable stroage. | |
| @param[in] VarStoreAddress Start address of variable storage. | |
| @param[in] Volatile TRUE - Variable storage is volatile. | |
| FALSE - Variable storage is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @param[out] VarStoreHeader Pointer to VARIABLE_STORE_HEADER for output. | |
| **/ | |
| VOID | |
| GetVarStoreHeader ( | |
| IN EFI_PHYSICAL_ADDRESS VarStoreAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance, | |
| OUT VARIABLE_STORE_HEADER *VarStoreHeader | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| Global, | |
| Volatile, | |
| Instance, | |
| VarStoreAddress, | |
| sizeof (VARIABLE_STORE_HEADER), | |
| VarStoreHeader | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| /** | |
| Checks variable header. | |
| This function checks if variable header is valid or not. | |
| @param[in] VariableAddress Start address of variable header. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @param[out] VariableHeader Pointer to AUTHENTICATED_VARIABLE_HEADER for output. | |
| @retval TRUE Variable header is valid. | |
| @retval FALSE Variable header is not valid. | |
| **/ | |
| BOOLEAN | |
| IsValidVariableHeader ( | |
| IN EFI_PHYSICAL_ADDRESS VariableAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance, | |
| OUT AUTHENTICATED_VARIABLE_HEADER *VariableHeader OPTIONAL | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| AUTHENTICATED_VARIABLE_HEADER LocalVariableHeader; | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| Global, | |
| Volatile, | |
| Instance, | |
| VariableAddress, | |
| sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| &LocalVariableHeader | |
| ); | |
| if (EFI_ERROR (Status) || LocalVariableHeader.StartId != VARIABLE_DATA) { | |
| return FALSE; | |
| } | |
| if (VariableHeader != NULL) { | |
| CopyMem (VariableHeader, &LocalVariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER)); | |
| } | |
| return TRUE; | |
| } | |
| /** | |
| Gets status of variable store. | |
| This function gets the current status of variable store. | |
| @param[in] VarStoreHeader Pointer to header of variable store. | |
| @retval EfiRaw Variable store status is raw. | |
| @retval EfiValid Variable store status is valid. | |
| @retval EfiInvalid Variable store status is invalid. | |
| **/ | |
| VARIABLE_STORE_STATUS | |
| GetVariableStoreStatus ( | |
| IN VARIABLE_STORE_HEADER *VarStoreHeader | |
| ) | |
| { | |
| if (CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) && | |
| VarStoreHeader->Format == VARIABLE_STORE_FORMATTED && | |
| VarStoreHeader->State == VARIABLE_STORE_HEALTHY | |
| ) { | |
| return EfiValid; | |
| } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff && | |
| ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff && | |
| VarStoreHeader->Size == 0xffffffff && | |
| VarStoreHeader->Format == 0xff && | |
| VarStoreHeader->State == 0xff | |
| ) { | |
| return EfiRaw; | |
| } else { | |
| return EfiInvalid; | |
| } | |
| } | |
| /** | |
| Gets the size of variable name. | |
| This function gets the size of variable name. | |
| The variable is specified by its variable header. | |
| If variable header contains raw data, just return 0. | |
| @param[in] Variable Pointer to the variable header. | |
| @return Size of variable name in bytes. | |
| **/ | |
| UINTN | |
| NameSizeOfVariable ( | |
| IN AUTHENTICATED_VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| if (Variable->State == (UINT8) (-1) || | |
| Variable->DataSize == (UINT32) -1 || | |
| Variable->NameSize == (UINT32) -1 || | |
| Variable->Attributes == (UINT32) -1) { | |
| return 0; | |
| } | |
| return (UINTN) Variable->NameSize; | |
| } | |
| /** | |
| Gets the size of variable data area. | |
| This function gets the size of variable data area. | |
| The variable is specified by its variable header. | |
| If variable header contains raw data, just return 0. | |
| @param[in] Variable Pointer to the variable header. | |
| @return Size of variable data area in bytes. | |
| **/ | |
| UINTN | |
| DataSizeOfVariable ( | |
| IN AUTHENTICATED_VARIABLE_HEADER *Variable | |
| ) | |
| { | |
| if (Variable->State == (UINT8) -1 || | |
| Variable->DataSize == (UINT32) -1 || | |
| Variable->NameSize == (UINT32) -1 || | |
| Variable->Attributes == (UINT32) -1) { | |
| return 0; | |
| } | |
| return (UINTN) Variable->DataSize; | |
| } | |
| /** | |
| Gets the pointer to variable name. | |
| This function gets the pointer to variable name. | |
| The variable is specified by its variable header. | |
| @param[in] VariableAddress Start address of variable header. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @param[out] VariableName Buffer to hold variable name for output. | |
| **/ | |
| VOID | |
| GetVariableNamePtr ( | |
| IN EFI_PHYSICAL_ADDRESS VariableAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance, | |
| OUT CHAR16 *VariableName | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_PHYSICAL_ADDRESS Address; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| BOOLEAN IsValid; | |
| IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader); | |
| ASSERT (IsValid); | |
| // | |
| // Name area follows variable header. | |
| // | |
| Address = VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| Global, | |
| Volatile, | |
| Instance, | |
| Address, | |
| VariableHeader.NameSize, | |
| VariableName | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| /** | |
| Gets the pointer to variable data area. | |
| This function gets the pointer to variable data area. | |
| The variable is specified by its variable header. | |
| @param[in] VariableAddress Start address of variable header. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @param[out] VariableData Buffer to hold variable data for output. | |
| **/ | |
| VOID | |
| GetVariableDataPtr ( | |
| IN EFI_PHYSICAL_ADDRESS VariableAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance, | |
| OUT CHAR16 *VariableData | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_PHYSICAL_ADDRESS Address; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| BOOLEAN IsValid; | |
| IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader); | |
| ASSERT (IsValid); | |
| // | |
| // Data area follows variable name. | |
| // Be careful about pad size for alignment | |
| // | |
| Address = VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| Address += NameSizeOfVariable (&VariableHeader); | |
| Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader)); | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| Global, | |
| Volatile, | |
| Instance, | |
| Address, | |
| VariableHeader.DataSize, | |
| VariableData | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| /** | |
| Gets the pointer to the next variable header. | |
| This function gets the pointer to the next variable header. | |
| The variable is specified by its variable header. | |
| @param[in] VariableAddress Start address of variable header. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @return Pointer to the next variable header. | |
| NULL if variable header is invalid. | |
| **/ | |
| EFI_PHYSICAL_ADDRESS | |
| GetNextVariablePtr ( | |
| IN EFI_PHYSICAL_ADDRESS VariableAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance | |
| ) | |
| { | |
| EFI_PHYSICAL_ADDRESS Address; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| if (!IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader)) { | |
| return 0x0; | |
| } | |
| // | |
| // Header of next variable follows data area of this variable | |
| // | |
| Address = VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| Address += NameSizeOfVariable (&VariableHeader); | |
| Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader)); | |
| Address += DataSizeOfVariable (&VariableHeader); | |
| Address += GET_PAD_SIZE (DataSizeOfVariable (&VariableHeader)); | |
| // | |
| // Be careful about pad size for alignment | |
| // | |
| return HEADER_ALIGN (Address); | |
| } | |
| /** | |
| Gets the pointer to the first variable header in given variable store area. | |
| This function gets the pointer to the first variable header in given variable | |
| store area. The variable store area is given by its start address. | |
| @param[in] VarStoreHeaderAddress Pointer to the header of variable store area. | |
| @return Pointer to the first variable header. | |
| **/ | |
| EFI_PHYSICAL_ADDRESS | |
| GetStartPointer ( | |
| IN EFI_PHYSICAL_ADDRESS VarStoreHeaderAddress | |
| ) | |
| { | |
| return HEADER_ALIGN (VarStoreHeaderAddress + sizeof (VARIABLE_STORE_HEADER)); | |
| } | |
| /** | |
| Gets the pointer to the end of given variable store area. | |
| This function gets the pointer to the end of given variable store area. | |
| The variable store area is given by its start address. | |
| @param[in] VarStoreHeaderAddress Pointer to the header of variable store area. | |
| @param[in] Volatile TRUE - Variable is volatile. | |
| FALSE - Variable is non-volatile. | |
| @param[in] Global Pointer to VARAIBLE_GLOBAL structure. | |
| @param[in] Instance Instance of FV Block services. | |
| @return Pointer to the end of given variable store area. | |
| **/ | |
| EFI_PHYSICAL_ADDRESS | |
| GetEndPointer ( | |
| IN EFI_PHYSICAL_ADDRESS VarStoreHeaderAddress, | |
| IN BOOLEAN Volatile, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VARIABLE_STORE_HEADER VariableStoreHeader; | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| Global, | |
| Volatile, | |
| Instance, | |
| VarStoreHeaderAddress, | |
| sizeof (VARIABLE_STORE_HEADER), | |
| &VariableStoreHeader | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| return HEADER_ALIGN (VarStoreHeaderAddress + VariableStoreHeader.Size); | |
| } | |
| /** | |
| Updates variable info entry in EFI system table for statistical information. | |
| Routine used to track statistical information about variable usage. | |
| The data is stored in the EFI system table so it can be accessed later. | |
| VariableInfo.efi can dump out the table. Only Boot Services variable | |
| accesses are tracked by this code. The PcdVariableCollectStatistics | |
| build flag controls if this feature is enabled. | |
| A read that hits in the cache will have Read and Cache true for | |
| the transaction. Data is allocated by this routine, but never | |
| freed. | |
| @param[in] VariableName Name of the Variable to track. | |
| @param[in] VendorGuid Guid of the Variable to track. | |
| @param[in] Volatile TRUE if volatile FALSE if non-volatile. | |
| @param[in] Read TRUE if GetVariable() was called. | |
| @param[in] Write TRUE if SetVariable() was called. | |
| @param[in] Delete TRUE if deleted via SetVariable(). | |
| @param[in] Cache TRUE for a cache hit. | |
| **/ | |
| VOID | |
| UpdateVariableInfo ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN BOOLEAN Volatile, | |
| IN BOOLEAN Read, | |
| IN BOOLEAN Write, | |
| IN BOOLEAN Delete, | |
| IN BOOLEAN Cache | |
| ) | |
| { | |
| VARIABLE_INFO_ENTRY *Entry; | |
| if (FeaturePcdGet (PcdVariableCollectStatistics)) { | |
| if (EfiAtRuntime ()) { | |
| // | |
| // Don't collect statistics at runtime | |
| // | |
| return; | |
| } | |
| if (gVariableInfo == NULL) { | |
| // | |
| // on the first call allocate a entry and place a pointer to it in | |
| // the EFI System Table | |
| // | |
| gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY)); | |
| ASSERT (gVariableInfo != NULL); | |
| CopyGuid (&gVariableInfo->VendorGuid, VendorGuid); | |
| gVariableInfo->Name = AllocatePool (StrSize (VariableName)); | |
| ASSERT (gVariableInfo->Name != NULL); | |
| StrCpyS (gVariableInfo->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName); | |
| gVariableInfo->Volatile = Volatile; | |
| gBS->InstallConfigurationTable (&gEfiAuthenticatedVariableGuid, gVariableInfo); | |
| } | |
| for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) { | |
| if (CompareGuid (VendorGuid, &Entry->VendorGuid)) { | |
| if (StrCmp (VariableName, Entry->Name) == 0) { | |
| // | |
| // Find the entry matching both variable name and vender GUID, | |
| // and update counters for all types. | |
| // | |
| if (Read) { | |
| Entry->ReadCount++; | |
| } | |
| if (Write) { | |
| Entry->WriteCount++; | |
| } | |
| if (Delete) { | |
| Entry->DeleteCount++; | |
| } | |
| if (Cache) { | |
| Entry->CacheCount++; | |
| } | |
| return; | |
| } | |
| } | |
| if (Entry->Next == NULL) { | |
| // | |
| // If the entry is not in the table add it. | |
| // Next iteration of the loop will fill in the data | |
| // | |
| Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY)); | |
| ASSERT (Entry->Next != NULL); | |
| CopyGuid (&Entry->Next->VendorGuid, VendorGuid); | |
| Entry->Next->Name = AllocatePool (StrSize (VariableName)); | |
| ASSERT (Entry->Next->Name != NULL); | |
| StrCpyS (Entry->Next->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName); | |
| Entry->Next->Volatile = Volatile; | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| Updates variable in cache. | |
| This function searches the variable cache. If the variable to set exists in the cache, | |
| it updates the variable in cache. It has the same parameters with UEFI SetVariable() | |
| service. | |
| @param[in] VariableName A Null-terminated Unicode string that is the name of the vendor's | |
| variable. Each VariableName is unique for each VendorGuid. | |
| @param[in] VendorGuid A unique identifier for the vendor. | |
| @param[in] Attributes Attributes bitmask to set for the variable. | |
| @param[in] DataSize The size in bytes of the Data buffer. A size of zero causes the | |
| variable to be deleted. | |
| @param[in] Data The contents for the variable. | |
| **/ | |
| VOID | |
| UpdateVariableCache ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN UINT32 Attributes, | |
| IN UINTN DataSize, | |
| IN VOID *Data | |
| ) | |
| { | |
| VARIABLE_CACHE_ENTRY *Entry; | |
| UINTN Index; | |
| if (EfiAtRuntime ()) { | |
| // | |
| // Don't use the cache at runtime | |
| // | |
| return; | |
| } | |
| // | |
| // Searches cache for the variable to update. If it exists, update it. | |
| // | |
| for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) { | |
| if (CompareGuid (VendorGuid, Entry->Guid)) { | |
| if (StrCmp (VariableName, Entry->Name) == 0) { | |
| Entry->Attributes = Attributes; | |
| if (DataSize == 0) { | |
| // | |
| // If DataSize is 0, delete the variable. | |
| // | |
| if (Entry->DataSize != 0) { | |
| FreePool (Entry->Data); | |
| } | |
| Entry->DataSize = DataSize; | |
| } else if (DataSize == Entry->DataSize) { | |
| // | |
| // If size of data does not change, simply copy data | |
| // | |
| CopyMem (Entry->Data, Data, DataSize); | |
| } else { | |
| // | |
| // If size of data changes, allocate pool and copy data. | |
| // | |
| Entry->Data = AllocatePool (DataSize); | |
| ASSERT (Entry->Data != NULL); | |
| Entry->DataSize = DataSize; | |
| CopyMem (Entry->Data, Data, DataSize); | |
| } | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| Search the cache to check if the variable is in it. | |
| This function searches the variable cache. If the variable to find exists, return its data | |
| and attributes. | |
| @param[in] VariableName A Null-terminated Unicode string that is the name of the vendor's | |
| variable. Each VariableName is unique for each VendorGuid. | |
| @param[in] VendorGuid A unique identifier for the vendor | |
| @param[out] Attributes Pointer to the attributes bitmask of the variable for output. | |
| @param[in, out] DataSize On input, size of the buffer of Data. | |
| On output, size of the variable's data. | |
| @param[out] Data Pointer to the data buffer for output. | |
| @retval EFI_SUCCESS VariableGuid & VariableName data was returned. | |
| @retval EFI_NOT_FOUND No matching variable found in cache. | |
| @retval EFI_BUFFER_TOO_SMALL *DataSize is smaller than size of the variable's data to return. | |
| **/ | |
| EFI_STATUS | |
| FindVariableInCache ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT UINT32 *Attributes OPTIONAL, | |
| IN OUT UINTN *DataSize, | |
| OUT VOID *Data | |
| ) | |
| { | |
| VARIABLE_CACHE_ENTRY *Entry; | |
| UINTN Index; | |
| if (EfiAtRuntime ()) { | |
| // | |
| // Don't use the cache at runtime | |
| // | |
| return EFI_NOT_FOUND; | |
| } | |
| // | |
| // Searches cache for the variable | |
| // | |
| for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) { | |
| if (CompareGuid (VendorGuid, Entry->Guid)) { | |
| if (StrCmp (VariableName, Entry->Name) == 0) { | |
| if (Entry->DataSize == 0) { | |
| // | |
| // Variable has been deleted so return EFI_NOT_FOUND | |
| // | |
| return EFI_NOT_FOUND; | |
| } else if (Entry->DataSize > *DataSize) { | |
| // | |
| // If buffer is too small, return the size needed and EFI_BUFFER_TOO_SMALL | |
| // | |
| *DataSize = Entry->DataSize; | |
| return EFI_BUFFER_TOO_SMALL; | |
| } else { | |
| // | |
| // If buffer is large enough, return the data | |
| // | |
| *DataSize = Entry->DataSize; | |
| CopyMem (Data, Entry->Data, Entry->DataSize); | |
| // | |
| // If Attributes is not NULL, return the variable's attribute. | |
| // | |
| if (Attributes != NULL) { | |
| *Attributes = Entry->Attributes; | |
| } | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| } | |
| } | |
| return EFI_NOT_FOUND; | |
| } | |
| /** | |
| Finds variable in volatile and non-volatile storage areas. | |
| This code finds variable in volatile and non-volatile storage areas. | |
| If VariableName is an empty string, then we just return the first | |
| qualified variable without comparing VariableName and VendorGuid. | |
| Otherwise, VariableName and VendorGuid are compared. | |
| @param[in] VariableName Name of the variable to be found. | |
| @param[in] VendorGuid Vendor GUID to be found. | |
| @param[out] PtrTrack VARIABLE_POINTER_TRACK structure for output, | |
| including the range searched and the target position. | |
| @param[in] Global Pointer to VARIABLE_GLOBAL structure, including | |
| base of volatile variable storage area, base of | |
| NV variable storage area, and a lock. | |
| @param[in] Instance Instance of FV Block services. | |
| @retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while | |
| VendorGuid is NULL. | |
| @retval EFI_SUCCESS Variable successfully found. | |
| @retval EFI_INVALID_PARAMETER Variable not found. | |
| **/ | |
| EFI_STATUS | |
| FindVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT VARIABLE_POINTER_TRACK *PtrTrack, | |
| IN VARIABLE_GLOBAL *Global, | |
| IN UINTN Instance | |
| ) | |
| { | |
| EFI_PHYSICAL_ADDRESS Variable[2]; | |
| EFI_PHYSICAL_ADDRESS InDeletedVariable; | |
| EFI_PHYSICAL_ADDRESS VariableStoreHeader[2]; | |
| UINTN InDeletedStorageIndex; | |
| UINTN Index; | |
| CHAR16 LocalVariableName[MAX_NAME_SIZE]; | |
| BOOLEAN Volatile; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| // | |
| // 0: Volatile, 1: Non-Volatile | |
| // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName | |
| // make use of this mapping to implement search algorithme. | |
| // | |
| VariableStoreHeader[0] = Global->VolatileVariableBase; | |
| VariableStoreHeader[1] = Global->NonVolatileVariableBase; | |
| // | |
| // Start Pointers for the variable. | |
| // Actual Data Pointer where data can be written. | |
| // | |
| Variable[0] = GetStartPointer (VariableStoreHeader[0]); | |
| Variable[1] = GetStartPointer (VariableStoreHeader[1]); | |
| if (VariableName[0] != 0 && VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // Find the variable by walk through volatile and then non-volatile variable store | |
| // | |
| InDeletedVariable = 0x0; | |
| InDeletedStorageIndex = 0; | |
| Volatile = TRUE; | |
| for (Index = 0; Index < 2; Index++) { | |
| if (Index == 1) { | |
| Volatile = FALSE; | |
| } | |
| while (IsValidVariableHeader (Variable[Index], Volatile, Global, Instance, &VariableHeader)) { | |
| if (VariableHeader.State == VAR_ADDED || | |
| VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED) | |
| ) { | |
| if (!EfiAtRuntime () || ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) { | |
| if (VariableName[0] == 0) { | |
| // | |
| // If VariableName is an empty string, then we just find the first qualified variable | |
| // without comparing VariableName and VendorGuid | |
| // | |
| if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // If variable is in delete transition, record it. | |
| // | |
| InDeletedVariable = Variable[Index]; | |
| InDeletedStorageIndex = Index; | |
| } else { | |
| // | |
| // If variable is not in delete transition, return it. | |
| // | |
| PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]); | |
| PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance); | |
| PtrTrack->CurrPtr = Variable[Index]; | |
| PtrTrack->Volatile = Volatile; | |
| return EFI_SUCCESS; | |
| } | |
| } else { | |
| // | |
| // If VariableName is not an empty string, then VariableName and VendorGuid are compared. | |
| // | |
| if (CompareGuid (VendorGuid, &VariableHeader.VendorGuid)) { | |
| GetVariableNamePtr ( | |
| Variable[Index], | |
| Volatile, | |
| Global, | |
| Instance, | |
| LocalVariableName | |
| ); | |
| ASSERT (NameSizeOfVariable (&VariableHeader) != 0); | |
| if (CompareMem (VariableName, LocalVariableName, NameSizeOfVariable (&VariableHeader)) == 0) { | |
| if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // If variable is in delete transition, record it. | |
| // We will use if only no VAR_ADDED variable is found. | |
| // | |
| InDeletedVariable = Variable[Index]; | |
| InDeletedStorageIndex = Index; | |
| } else { | |
| // | |
| // If variable is not in delete transition, return it. | |
| // | |
| PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]); | |
| PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance); | |
| PtrTrack->CurrPtr = Variable[Index]; | |
| PtrTrack->Volatile = Volatile; | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| } | |
| } | |
| } | |
| } | |
| Variable[Index] = GetNextVariablePtr ( | |
| Variable[Index], | |
| Volatile, | |
| Global, | |
| Instance | |
| ); | |
| } | |
| if (InDeletedVariable != 0x0) { | |
| // | |
| // If no VAR_ADDED variable is found, and only variable in delete transition, then use this one. | |
| // | |
| PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[InDeletedStorageIndex]); | |
| PtrTrack->EndPtr = GetEndPointer ( | |
| VariableStoreHeader[InDeletedStorageIndex], | |
| (BOOLEAN)(InDeletedStorageIndex == 0), | |
| Global, | |
| Instance | |
| ); | |
| PtrTrack->CurrPtr = InDeletedVariable; | |
| PtrTrack->Volatile = (BOOLEAN)(InDeletedStorageIndex == 0); | |
| return EFI_SUCCESS; | |
| } | |
| } | |
| PtrTrack->CurrPtr = 0x0; | |
| return EFI_NOT_FOUND; | |
| } | |
| /** | |
| Variable store garbage collection and reclaim operation. | |
| @param[in] VariableBase Base address of variable store area. | |
| @param[out] LastVariableOffset Offset of last variable. | |
| @param[in] IsVolatile The variable store is volatile or not, | |
| if it is non-volatile, need FTW. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @param[in] UpdatingVariable Pointer to header of the variable that is being updated. | |
| @retval EFI_SUCCESS Variable store successfully reclaimed. | |
| @retval EFI_OUT_OF_RESOURCES Fail to allocate memory buffer to hold all valid variables. | |
| **/ | |
| EFI_STATUS | |
| Reclaim ( | |
| IN EFI_PHYSICAL_ADDRESS VariableBase, | |
| OUT UINTN *LastVariableOffset, | |
| IN BOOLEAN IsVolatile, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global, | |
| IN EFI_PHYSICAL_ADDRESS UpdatingVariable | |
| ) | |
| { | |
| EFI_PHYSICAL_ADDRESS Variable; | |
| EFI_PHYSICAL_ADDRESS AddedVariable; | |
| EFI_PHYSICAL_ADDRESS NextVariable; | |
| EFI_PHYSICAL_ADDRESS NextAddedVariable; | |
| VARIABLE_STORE_HEADER VariableStoreHeader; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| AUTHENTICATED_VARIABLE_HEADER AddedVariableHeader; | |
| CHAR16 VariableName[MAX_NAME_SIZE]; | |
| CHAR16 AddedVariableName[MAX_NAME_SIZE]; | |
| UINT8 *ValidBuffer; | |
| UINTN MaximumBufferSize; | |
| UINTN VariableSize; | |
| UINTN NameSize; | |
| UINT8 *CurrPtr; | |
| BOOLEAN FoundAdded; | |
| EFI_STATUS Status; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| GetVarStoreHeader (VariableBase, IsVolatile, VariableGlobal, Instance, &VariableStoreHeader); | |
| // | |
| // recaluate the total size of Common/HwErr type variables in non-volatile area. | |
| // | |
| if (!IsVolatile) { | |
| Global->CommonVariableTotalSize = 0; | |
| Global->HwErrVariableTotalSize = 0; | |
| } | |
| // | |
| // Calculate the size of buffer needed to gather all valid variables | |
| // | |
| Variable = GetStartPointer (VariableBase); | |
| MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER); | |
| while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) { | |
| NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance); | |
| // | |
| // Collect VAR_ADDED variables, and variables in delete transition status. | |
| // | |
| if (VariableHeader.State == VAR_ADDED || | |
| VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED) | |
| ) { | |
| VariableSize = NextVariable - Variable; | |
| MaximumBufferSize += VariableSize; | |
| } | |
| Variable = NextVariable; | |
| } | |
| // | |
| // Reserve the 1 Bytes with Oxff to identify the | |
| // end of the variable buffer. | |
| // | |
| MaximumBufferSize += 1; | |
| ValidBuffer = AllocatePool (MaximumBufferSize); | |
| if (ValidBuffer == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| SetMem (ValidBuffer, MaximumBufferSize, 0xff); | |
| // | |
| // Copy variable store header | |
| // | |
| CopyMem (ValidBuffer, &VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER)); | |
| CurrPtr = (UINT8 *) GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer); | |
| // | |
| // Reinstall all ADDED variables | |
| // | |
| Variable = GetStartPointer (VariableBase); | |
| while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) { | |
| NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance); | |
| if (VariableHeader.State == VAR_ADDED) { | |
| VariableSize = NextVariable - Variable; | |
| CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize); | |
| CurrPtr += VariableSize; | |
| if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| Global->HwErrVariableTotalSize += VariableSize; | |
| } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| Global->CommonVariableTotalSize += VariableSize; | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| // | |
| // Reinstall in delete transition variables | |
| // | |
| Variable = GetStartPointer (VariableBase); | |
| while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) { | |
| NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance); | |
| if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) { | |
| // | |
| // Buffer has cached all ADDED variable. | |
| // Per IN_DELETED variable, we have to guarantee that | |
| // no ADDED one in previous buffer. | |
| // | |
| FoundAdded = FALSE; | |
| AddedVariable = GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer); | |
| while (IsValidVariableHeader (AddedVariable, IsVolatile, VariableGlobal, Instance, &AddedVariableHeader)) { | |
| NextAddedVariable = GetNextVariablePtr (AddedVariable, IsVolatile, VariableGlobal, Instance); | |
| NameSize = NameSizeOfVariable (&AddedVariableHeader); | |
| if (CompareGuid (&AddedVariableHeader.VendorGuid, &VariableHeader.VendorGuid) && | |
| NameSize == NameSizeOfVariable (&VariableHeader) | |
| ) { | |
| GetVariableNamePtr (Variable, IsVolatile, VariableGlobal, Instance, VariableName); | |
| GetVariableNamePtr (AddedVariable, IsVolatile, VariableGlobal, Instance, AddedVariableName); | |
| if (CompareMem (VariableName, AddedVariableName, NameSize) == 0) { | |
| // | |
| // If ADDED variable with the same name and vender GUID has been reinstalled, | |
| // then discard this IN_DELETED copy. | |
| // | |
| FoundAdded = TRUE; | |
| break; | |
| } | |
| } | |
| AddedVariable = NextAddedVariable; | |
| } | |
| // | |
| // Add IN_DELETE variables that have not been added to buffer | |
| // | |
| if (!FoundAdded) { | |
| VariableSize = NextVariable - Variable; | |
| CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize); | |
| if (Variable != UpdatingVariable) { | |
| // | |
| // Make this IN_DELETE instance valid if: | |
| // 1. No valid instance of this variable exists. | |
| // 2. It is not the variable that is going to be updated. | |
| // | |
| ((AUTHENTICATED_VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED; | |
| } | |
| CurrPtr += VariableSize; | |
| if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| Global->HwErrVariableTotalSize += VariableSize; | |
| } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| Global->CommonVariableTotalSize += VariableSize; | |
| } | |
| } | |
| } | |
| Variable = NextVariable; | |
| } | |
| if (IsVolatile) { | |
| // | |
| // If volatile variable store, just copy valid buffer | |
| // | |
| SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader.Size, 0xff); | |
| CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) (CurrPtr - (UINT8 *) ValidBuffer)); | |
| Status = EFI_SUCCESS; | |
| } else { | |
| // | |
| // If non-volatile variable store, perform FTW here. | |
| // Write ValidBuffer to destination specified by VariableBase. | |
| // | |
| Status = FtwVariableSpace ( | |
| VariableBase, | |
| ValidBuffer, | |
| (UINTN) (CurrPtr - (UINT8 *) ValidBuffer) | |
| ); | |
| } | |
| if (!EFI_ERROR (Status)) { | |
| *LastVariableOffset = (UINTN) (CurrPtr - (UINT8 *) ValidBuffer); | |
| } else { | |
| *LastVariableOffset = 0; | |
| } | |
| FreePool (ValidBuffer); | |
| return Status; | |
| } | |
| /** | |
| Get index from supported language codes according to language string. | |
| This code is used to get corresponding index in supported language codes. It can handle | |
| RFC4646 and ISO639 language tags. | |
| In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index. | |
| In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index. | |
| For example: | |
| SupportedLang = "engfraengfra" | |
| Lang = "eng" | |
| Iso639Language = TRUE | |
| The return value is "0". | |
| Another example: | |
| SupportedLang = "en;fr;en-US;fr-FR" | |
| Lang = "fr-FR" | |
| Iso639Language = FALSE | |
| The return value is "3". | |
| @param[in] SupportedLang Platform supported language codes. | |
| @param[in] Lang Configured language. | |
| @param[in] Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646. | |
| @return The index of language in the language codes. | |
| **/ | |
| UINTN | |
| GetIndexFromSupportedLangCodes( | |
| IN CHAR8 *SupportedLang, | |
| IN CHAR8 *Lang, | |
| IN BOOLEAN Iso639Language | |
| ) | |
| { | |
| UINTN Index; | |
| UINTN CompareLength; | |
| UINTN LanguageLength; | |
| if (Iso639Language) { | |
| CompareLength = ISO_639_2_ENTRY_SIZE; | |
| for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) { | |
| if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) { | |
| // | |
| // Successfully find the index of Lang string in SupportedLang string. | |
| // | |
| Index = Index / CompareLength; | |
| return Index; | |
| } | |
| } | |
| ASSERT (FALSE); | |
| return 0; | |
| } else { | |
| // | |
| // Compare RFC4646 language code | |
| // | |
| Index = 0; | |
| for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++); | |
| for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) { | |
| // | |
| // Skip ';' characters in SupportedLang | |
| // | |
| for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++); | |
| // | |
| // Determine the length of the next language code in SupportedLang | |
| // | |
| for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++); | |
| if ((CompareLength == LanguageLength) && | |
| (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) { | |
| // | |
| // Successfully find the index of Lang string in SupportedLang string. | |
| // | |
| return Index; | |
| } | |
| } | |
| ASSERT (FALSE); | |
| return 0; | |
| } | |
| } | |
| /** | |
| Get language string from supported language codes according to index. | |
| This code is used to get corresponding language string in supported language codes. It can handle | |
| RFC4646 and ISO639 language tags. | |
| In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index. | |
| In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index. | |
| For example: | |
| SupportedLang = "engfraengfra" | |
| Index = "1" | |
| Iso639Language = TRUE | |
| The return value is "fra". | |
| Another example: | |
| SupportedLang = "en;fr;en-US;fr-FR" | |
| Index = "1" | |
| Iso639Language = FALSE | |
| The return value is "fr". | |
| @param[in] SupportedLang Platform supported language codes. | |
| @param[in] Index the index in supported language codes. | |
| @param[in] Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @return The language string in the language codes. | |
| **/ | |
| CHAR8 * | |
| GetLangFromSupportedLangCodes ( | |
| IN CHAR8 *SupportedLang, | |
| IN UINTN Index, | |
| IN BOOLEAN Iso639Language, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| UINTN SubIndex; | |
| UINTN CompareLength; | |
| CHAR8 *Supported; | |
| SubIndex = 0; | |
| Supported = SupportedLang; | |
| if (Iso639Language) { | |
| // | |
| // according to the index of Lang string in SupportedLang string to get the language. | |
| // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation. | |
| // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string. | |
| // | |
| CompareLength = ISO_639_2_ENTRY_SIZE; | |
| Global->Lang[CompareLength] = '\0'; | |
| return CopyMem (Global->Lang, SupportedLang + Index * CompareLength, CompareLength); | |
| } else { | |
| while (TRUE) { | |
| // | |
| // take semicolon as delimitation, sequentially traverse supported language codes. | |
| // | |
| for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) { | |
| Supported++; | |
| } | |
| if ((*Supported == '\0') && (SubIndex != Index)) { | |
| // | |
| // Have completed the traverse, but not find corrsponding string. | |
| // This case is not allowed to happen. | |
| // | |
| ASSERT(FALSE); | |
| return NULL; | |
| } | |
| if (SubIndex == Index) { | |
| // | |
| // according to the index of Lang string in SupportedLang string to get the language. | |
| // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation. | |
| // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string. | |
| // | |
| Global->PlatformLang[VirtualMode][CompareLength] = '\0'; | |
| return CopyMem (Global->PlatformLang[VirtualMode], Supported - CompareLength, CompareLength); | |
| } | |
| SubIndex++; | |
| // | |
| // Skip ';' characters in Supported | |
| // | |
| for (; *Supported != '\0' && *Supported == ';'; Supported++); | |
| } | |
| } | |
| } | |
| /** | |
| Returns a pointer to an allocated buffer that contains the best matching language | |
| from a set of supported languages. | |
| This function supports both ISO 639-2 and RFC 4646 language codes, but language | |
| code types may not be mixed in a single call to this function. This function | |
| supports a variable argument list that allows the caller to pass in a prioritized | |
| list of language codes to test against all the language codes in SupportedLanguages. | |
| If SupportedLanguages is NULL, then ASSERT(). | |
| @param[in] SupportedLanguages A pointer to a Null-terminated ASCII string that | |
| contains a set of language codes in the format | |
| specified by Iso639Language. | |
| @param[in] Iso639Language If TRUE, then all language codes are assumed to be | |
| in ISO 639-2 format. If FALSE, then all language | |
| codes are assumed to be in RFC 4646 language format. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] ... A variable argument list that contains pointers to | |
| Null-terminated ASCII strings that contain one or more | |
| language codes in the format specified by Iso639Language. | |
| The first language code from each of these language | |
| code lists is used to determine if it is an exact or | |
| close match to any of the language codes in | |
| SupportedLanguages. Close matches only apply to RFC 4646 | |
| language codes, and the matching algorithm from RFC 4647 | |
| is used to determine if a close match is present. If | |
| an exact or close match is found, then the matching | |
| language code from SupportedLanguages is returned. If | |
| no matches are found, then the next variable argument | |
| parameter is evaluated. The variable argument list | |
| is terminated by a NULL. | |
| @retval NULL The best matching language could not be found in SupportedLanguages. | |
| @retval NULL There are not enough resources available to return the best matching | |
| language. | |
| @retval Other A pointer to a Null-terminated ASCII string that is the best matching | |
| language in SupportedLanguages. | |
| **/ | |
| CHAR8 * | |
| VariableGetBestLanguage ( | |
| IN CONST CHAR8 *SupportedLanguages, | |
| IN BOOLEAN Iso639Language, | |
| IN BOOLEAN VirtualMode, | |
| ... | |
| ) | |
| { | |
| VA_LIST Args; | |
| CHAR8 *Language; | |
| UINTN CompareLength; | |
| UINTN LanguageLength; | |
| CONST CHAR8 *Supported; | |
| CHAR8 *Buffer; | |
| ASSERT (SupportedLanguages != NULL); | |
| VA_START (Args, VirtualMode); | |
| while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) { | |
| // | |
| // Default to ISO 639-2 mode | |
| // | |
| CompareLength = 3; | |
| LanguageLength = MIN (3, AsciiStrLen (Language)); | |
| // | |
| // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language | |
| // | |
| if (!Iso639Language) { | |
| for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++); | |
| } | |
| // | |
| // Trim back the length of Language used until it is empty | |
| // | |
| while (LanguageLength > 0) { | |
| // | |
| // Loop through all language codes in SupportedLanguages | |
| // | |
| for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) { | |
| // | |
| // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages | |
| // | |
| if (!Iso639Language) { | |
| // | |
| // Skip ';' characters in Supported | |
| // | |
| for (; *Supported != '\0' && *Supported == ';'; Supported++); | |
| // | |
| // Determine the length of the next language code in Supported | |
| // | |
| for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++); | |
| // | |
| // If Language is longer than the Supported, then skip to the next language | |
| // | |
| if (LanguageLength > CompareLength) { | |
| continue; | |
| } | |
| } | |
| // | |
| // See if the first LanguageLength characters in Supported match Language | |
| // | |
| if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) { | |
| VA_END (Args); | |
| Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang[VirtualMode]; | |
| Buffer[CompareLength] = '\0'; | |
| return CopyMem (Buffer, Supported, CompareLength); | |
| } | |
| } | |
| if (Iso639Language) { | |
| // | |
| // If ISO 639 mode, then each language can only be tested once | |
| // | |
| LanguageLength = 0; | |
| } else { | |
| // | |
| // If RFC 4646 mode, then trim Language from the right to the next '-' character | |
| // | |
| for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--); | |
| } | |
| } | |
| } | |
| VA_END (Args); | |
| // | |
| // No matches were found | |
| // | |
| return NULL; | |
| } | |
| /** | |
| Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang. | |
| When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes. | |
| According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization, | |
| and are read-only. Therefore, in variable driver, only store the original value for other use. | |
| @param[in] VariableName Name of variable. | |
| @param[in] Data Variable data. | |
| @param[in] DataSize Size of data. 0 means delete. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| **/ | |
| VOID | |
| AutoUpdateLangVariable( | |
| IN CHAR16 *VariableName, | |
| IN VOID *Data, | |
| IN UINTN DataSize, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| CHAR8 *BestPlatformLang; | |
| CHAR8 *BestLang; | |
| UINTN Index; | |
| UINT32 Attributes; | |
| VARIABLE_POINTER_TRACK Variable; | |
| BOOLEAN SetLanguageCodes; | |
| CHAR16 **PredefinedVariableName; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| // | |
| // Don't do updates for delete operation | |
| // | |
| if (DataSize == 0) { | |
| return; | |
| } | |
| SetLanguageCodes = FALSE; | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| PredefinedVariableName = &Global->VariableName[VirtualMode][0]; | |
| if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG_CODES]) == 0) { | |
| // | |
| // PlatformLangCodes is a volatile variable, so it can not be updated at runtime. | |
| // | |
| if (EfiAtRuntime ()) { | |
| return; | |
| } | |
| SetLanguageCodes = TRUE; | |
| // | |
| // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only | |
| // Therefore, in variable driver, only store the original value for other use. | |
| // | |
| if (Global->PlatformLangCodes[VirtualMode] != NULL) { | |
| FreePool (Global->PlatformLangCodes[VirtualMode]); | |
| } | |
| Global->PlatformLangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data); | |
| ASSERT (Global->PlatformLangCodes[VirtualMode] != NULL); | |
| // | |
| // PlatformLang holds a single language from PlatformLangCodes, | |
| // so the size of PlatformLangCodes is enough for the PlatformLang. | |
| // | |
| if (Global->PlatformLang[VirtualMode] != NULL) { | |
| FreePool (Global->PlatformLang[VirtualMode]); | |
| } | |
| Global->PlatformLang[VirtualMode] = AllocateRuntimePool (DataSize); | |
| ASSERT (Global->PlatformLang[VirtualMode] != NULL); | |
| } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG_CODES]) == 0) { | |
| // | |
| // LangCodes is a volatile variable, so it can not be updated at runtime. | |
| // | |
| if (EfiAtRuntime ()) { | |
| return; | |
| } | |
| SetLanguageCodes = TRUE; | |
| // | |
| // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only | |
| // Therefore, in variable driver, only store the original value for other use. | |
| // | |
| if (Global->LangCodes[VirtualMode] != NULL) { | |
| FreePool (Global->LangCodes[VirtualMode]); | |
| } | |
| Global->LangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data); | |
| ASSERT (Global->LangCodes[VirtualMode] != NULL); | |
| } | |
| if (SetLanguageCodes | |
| && (Global->PlatformLangCodes[VirtualMode] != NULL) | |
| && (Global->LangCodes[VirtualMode] != NULL)) { | |
| // | |
| // Update Lang if PlatformLang is already set | |
| // Update PlatformLang if Lang is already set | |
| // | |
| Status = FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Update Lang | |
| // | |
| VariableName = PredefinedVariableName[VAR_PLATFORM_LANG]; | |
| } else { | |
| Status = FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance); | |
| if (!EFI_ERROR (Status)) { | |
| // | |
| // Update PlatformLang | |
| // | |
| VariableName = PredefinedVariableName[VAR_LANG]; | |
| } else { | |
| // | |
| // Neither PlatformLang nor Lang is set, directly return | |
| // | |
| return; | |
| } | |
| } | |
| Data = (VOID *) GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance); | |
| GetVariableDataPtr ((EFI_PHYSICAL_ADDRESS) Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, (CHAR16 *) Data); | |
| Status = AccessVariableStore ( | |
| FALSE, | |
| VariableGlobal, | |
| Variable.Volatile, | |
| Instance, | |
| (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable.CurrPtr)->DataSize), | |
| sizeof (DataSize), | |
| &DataSize | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| // | |
| // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions. | |
| // | |
| Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS; | |
| if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG]) == 0) { | |
| // | |
| // Update Lang when PlatformLangCodes/LangCodes were set. | |
| // | |
| if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) { | |
| // | |
| // When setting PlatformLang, firstly get most matched language string from supported language codes. | |
| // | |
| BestPlatformLang = VariableGetBestLanguage (Global->PlatformLangCodes[VirtualMode], FALSE, VirtualMode, Data, NULL); | |
| if (BestPlatformLang != NULL) { | |
| // | |
| // Get the corresponding index in language codes. | |
| // | |
| Index = GetIndexFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], BestPlatformLang, FALSE); | |
| // | |
| // Get the corresponding ISO639 language tag according to RFC4646 language tag. | |
| // | |
| BestLang = GetLangFromSupportedLangCodes (Global->LangCodes[VirtualMode], Index, TRUE, VirtualMode, Global); | |
| // | |
| // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously. | |
| // | |
| FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance); | |
| Status = UpdateVariable ( | |
| PredefinedVariableName[VAR_LANG], | |
| Global->GlobalVariableGuid[VirtualMode], | |
| BestLang, | |
| ISO_639_2_ENTRY_SIZE + 1, | |
| Attributes, | |
| 0, | |
| 0, | |
| VirtualMode, | |
| Global, | |
| &Variable | |
| ); | |
| DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a\n", BestPlatformLang, BestLang)); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG]) == 0) { | |
| // | |
| // Update PlatformLang when PlatformLangCodes/LangCodes were set. | |
| // | |
| if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) { | |
| // | |
| // When setting Lang, firstly get most matched language string from supported language codes. | |
| // | |
| BestLang = VariableGetBestLanguage (Global->LangCodes[VirtualMode], TRUE, VirtualMode, Data, NULL); | |
| if (BestLang != NULL) { | |
| // | |
| // Get the corresponding index in language codes. | |
| // | |
| Index = GetIndexFromSupportedLangCodes (Global->LangCodes[VirtualMode], BestLang, TRUE); | |
| // | |
| // Get the corresponding RFC4646 language tag according to ISO639 language tag. | |
| // | |
| BestPlatformLang = GetLangFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], Index, FALSE, VirtualMode, Global); | |
| // | |
| // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously. | |
| // | |
| FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance); | |
| Status = UpdateVariable ( | |
| PredefinedVariableName[VAR_PLATFORM_LANG], | |
| Global->GlobalVariableGuid[VirtualMode], | |
| BestPlatformLang, | |
| AsciiStrSize (BestPlatformLang), | |
| Attributes, | |
| 0, | |
| 0, | |
| VirtualMode, | |
| Global, | |
| &Variable | |
| ); | |
| DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a\n", BestLang, BestPlatformLang)); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| Update the variable region with Variable information. These are the same | |
| arguments as the EFI Variable services. | |
| @param[in] VariableName Name of variable. | |
| @param[in] VendorGuid Guid of variable. | |
| @param[in] Data Variable data. | |
| @param[in] DataSize Size of data. 0 means delete. | |
| @param[in] Attributes Attributes of the variable. | |
| @param[in] KeyIndex Index of associated public key. | |
| @param[in] MonotonicCount Value of associated monotonic count. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @param[in] Variable The variable information which is used to keep track of variable usage. | |
| @retval EFI_SUCCESS The update operation is success. | |
| @retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| UpdateVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN VOID *Data, | |
| IN UINTN DataSize, | |
| IN UINT32 Attributes OPTIONAL, | |
| IN UINT32 KeyIndex OPTIONAL, | |
| IN UINT64 MonotonicCount OPTIONAL, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global, | |
| IN VARIABLE_POINTER_TRACK *Variable | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| AUTHENTICATED_VARIABLE_HEADER *NextVariable; | |
| UINTN VarNameOffset; | |
| UINTN VarDataOffset; | |
| UINTN VarNameSize; | |
| UINTN VarSize; | |
| BOOLEAN Volatile; | |
| UINT8 State; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| AUTHENTICATED_VARIABLE_HEADER *NextVariableHeader; | |
| BOOLEAN Valid; | |
| BOOLEAN Reclaimed; | |
| VARIABLE_STORE_HEADER VariableStoreHeader; | |
| UINTN ScratchSize; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| Reclaimed = FALSE; | |
| if (Variable->CurrPtr != 0) { | |
| Valid = IsValidVariableHeader (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, &VariableHeader); | |
| if (!Valid) { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| // | |
| // Update/Delete existing variable | |
| // | |
| Volatile = Variable->Volatile; | |
| if (EfiAtRuntime ()) { | |
| // | |
| // If EfiAtRuntime and the variable is Volatile and Runtime Access, | |
| // the volatile is ReadOnly, and SetVariable should be aborted and | |
| // return EFI_WRITE_PROTECTED. | |
| // | |
| if (Variable->Volatile) { | |
| Status = EFI_WRITE_PROTECTED; | |
| goto Done; | |
| } | |
| // | |
| // Only variable have NV attribute can be updated/deleted in Runtime | |
| // | |
| if ((VariableHeader.Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| } | |
| // | |
| // Setting a data variable with no access, or zero DataSize attributes | |
| // specified causes it to be deleted. | |
| // | |
| if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { | |
| State = VariableHeader.State; | |
| State &= VAR_DELETED; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| Variable->Volatile, | |
| Instance, | |
| (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State), | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE); | |
| UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data); | |
| } | |
| goto Done; | |
| } | |
| // | |
| // Logic comes here to update variable. | |
| // If the variable is marked valid and the same data has been passed in | |
| // then return to the caller immediately. | |
| // | |
| if (DataSizeOfVariable (&VariableHeader) == DataSize) { | |
| NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance); | |
| GetVariableDataPtr (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, (CHAR16 *) NextVariable); | |
| if (CompareMem (Data, (VOID *) NextVariable, DataSize) == 0) { | |
| UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE); | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } | |
| } | |
| if ((VariableHeader.State == VAR_ADDED) || | |
| (VariableHeader.State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) { | |
| // | |
| // If new data is different from the old one, mark the old one as VAR_IN_DELETED_TRANSITION. | |
| // It will be deleted if new variable is successfully written. | |
| // | |
| State = VariableHeader.State; | |
| State &= VAR_IN_DELETED_TRANSITION; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| Variable->Volatile, | |
| Instance, | |
| (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State), | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| } | |
| } else { | |
| // | |
| // Create a new variable | |
| // | |
| // | |
| // Make sure we are trying to create a new variable. | |
| // Setting a data variable with no access, or zero DataSize attributes means to delete it. | |
| // | |
| if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| // | |
| // Only variable have NV|RT attribute can be created in Runtime | |
| // | |
| if (EfiAtRuntime () && | |
| (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| } | |
| // | |
| // Function part - create a new variable and copy the data. | |
| // Both update a variable and create a variable will come here. | |
| // | |
| // Tricky part: Use scratch data area at the end of volatile variable store | |
| // as a temporary storage. | |
| // | |
| NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance); | |
| ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize)); | |
| NextVariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable; | |
| SetMem (NextVariableHeader, ScratchSize, 0xff); | |
| NextVariableHeader->StartId = VARIABLE_DATA; | |
| NextVariableHeader->Attributes = Attributes; | |
| NextVariableHeader->PubKeyIndex = KeyIndex; | |
| NextVariableHeader->MonotonicCount = MonotonicCount; | |
| NextVariableHeader->Reserved = 0; | |
| VarNameOffset = sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| VarNameSize = StrSize (VariableName); | |
| CopyMem ( | |
| (UINT8 *) ((UINTN)NextVariable + VarNameOffset), | |
| VariableName, | |
| VarNameSize | |
| ); | |
| VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize); | |
| CopyMem ( | |
| (UINT8 *) ((UINTN)NextVariable + VarDataOffset), | |
| Data, | |
| DataSize | |
| ); | |
| CopyMem (&NextVariableHeader->VendorGuid, VendorGuid, sizeof (EFI_GUID)); | |
| // | |
| // There will be pad bytes after Data, the NextVariable->NameSize and | |
| // NextVariable->DataSize should not include pad size so that variable | |
| // service can get actual size in GetVariable. | |
| // | |
| NextVariableHeader->NameSize = (UINT32)VarNameSize; | |
| NextVariableHeader->DataSize = (UINT32)DataSize; | |
| // | |
| // The actual size of the variable that stores in storage should | |
| // include pad size. | |
| // | |
| VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize); | |
| if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) { | |
| // | |
| // Create a nonvolatile variable | |
| // | |
| Volatile = FALSE; | |
| GetVarStoreHeader (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance, &VariableStoreHeader); | |
| if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) | |
| && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize))) | |
| || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) | |
| && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) { | |
| if (EfiAtRuntime ()) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| // | |
| // Perform garbage collection & reclaim operation | |
| // | |
| Status = Reclaim (VariableGlobal->NonVolatileVariableBase, &(Global->NonVolatileLastVariableOffset), FALSE, VirtualMode, Global, Variable->CurrPtr); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| Reclaimed = TRUE; | |
| // | |
| // If still no enough space, return out of resources | |
| // | |
| if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) | |
| && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize))) | |
| || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) | |
| && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| } | |
| // | |
| // Four steps | |
| // 1. Write variable header | |
| // 2. Set variable state to header valid | |
| // 3. Write variable data | |
| // 4. Set variable state to valid | |
| // | |
| // | |
| // Step 1: | |
| // | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| FALSE, | |
| Instance, | |
| VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset, | |
| sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 2: | |
| // | |
| NextVariableHeader->State = VAR_HEADER_VALID_ONLY; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| FALSE, | |
| Instance, | |
| VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset, | |
| sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 3: | |
| // | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| FALSE, | |
| Instance, | |
| VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset + sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| (UINT32) VarSize - sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| (UINT8 *) NextVariable + sizeof (AUTHENTICATED_VARIABLE_HEADER) | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Step 4: | |
| // | |
| NextVariableHeader->State = VAR_ADDED; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| FALSE, | |
| Instance, | |
| VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset, | |
| sizeof (AUTHENTICATED_VARIABLE_HEADER), | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| Global->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize); | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) { | |
| Global->HwErrVariableTotalSize += HEADER_ALIGN (VarSize); | |
| } else { | |
| Global->CommonVariableTotalSize += HEADER_ALIGN (VarSize); | |
| } | |
| } else { | |
| // | |
| // Create a volatile variable | |
| // | |
| Volatile = TRUE; | |
| if ((UINT32) (HEADER_ALIGN(VarSize) + Global->VolatileLastVariableOffset) > | |
| ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size) { | |
| // | |
| // Perform garbage collection & reclaim operation | |
| // | |
| Status = Reclaim (VariableGlobal->VolatileVariableBase, &Global->VolatileLastVariableOffset, TRUE, VirtualMode, Global, Variable->CurrPtr); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // If still no enough space, return out of resources | |
| // | |
| if ((UINT32) (HEADER_ALIGN (VarSize) + Global->VolatileLastVariableOffset) > | |
| ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size | |
| ) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto Done; | |
| } | |
| Reclaimed = TRUE; | |
| } | |
| NextVariableHeader->State = VAR_ADDED; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| TRUE, | |
| Instance, | |
| VariableGlobal->VolatileVariableBase + Global->VolatileLastVariableOffset, | |
| (UINT32) VarSize, | |
| (UINT8 *) NextVariable | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| Global->VolatileLastVariableOffset += HEADER_ALIGN (VarSize); | |
| } | |
| // | |
| // Mark the old variable as deleted | |
| // If storage has just been reclaimed, the old variable marked as VAR_IN_DELETED_TRANSITION | |
| // has already been eliminated, so no need to delete it. | |
| // | |
| if (!Reclaimed && !EFI_ERROR (Status) && Variable->CurrPtr != 0) { | |
| State = ((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State; | |
| State &= VAR_DELETED; | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| VariableGlobal, | |
| Variable->Volatile, | |
| Instance, | |
| (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State), | |
| sizeof (UINT8), | |
| &State | |
| ); | |
| } | |
| if (!EFI_ERROR (Status)) { | |
| UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE); | |
| UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data); | |
| } | |
| Done: | |
| return Status; | |
| } | |
| /** | |
| Implements EsalGetVariable function of Extended SAL Variable Services Class. | |
| This function implements EsalGetVariable function of Extended SAL Variable Services Class. | |
| It is equivalent in functionality to the EFI Runtime Service GetVariable(). | |
| @param[in] VariableName A Null-terminated Unicode string that is the name of | |
| the vendor's variable. | |
| @param[in] VendorGuid A unique identifier for the vendor. | |
| @param[out] Attributes If not NULL, a pointer to the memory location to return the | |
| attributes bitmask for the variable. | |
| @param[in, out] DataSize Size of Data found. If size is less than the | |
| data, this value contains the required size. | |
| @param[out] Data On input, the size in bytes of the return Data buffer. | |
| On output, the size of data returned in Data. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @retval EFI_SUCCESS The function completed successfully. | |
| @retval EFI_NOT_FOUND The variable was not found. | |
| @retval EFI_BUFFER_TOO_SMALL DataSize is too small for the result. DataSize has | |
| been updated with the size needed to complete the request. | |
| @retval EFI_INVALID_PARAMETER VariableName is NULL. | |
| @retval EFI_INVALID_PARAMETER VendorGuid is NULL. | |
| @retval EFI_INVALID_PARAMETER DataSize is NULL. | |
| @retval EFI_INVALID_PARAMETER DataSize is not too small and Data is NULL. | |
| @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error. | |
| @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EsalGetVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| OUT UINT32 *Attributes OPTIONAL, | |
| IN OUT UINTN *DataSize, | |
| OUT VOID *Data, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| VARIABLE_POINTER_TRACK Variable; | |
| UINTN VarDataSize; | |
| EFI_STATUS Status; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| BOOLEAN Valid; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock); | |
| // | |
| // Check if this variable exists in cache. | |
| // | |
| Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data); | |
| if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){ | |
| // | |
| // If variable exists in cache, just update statistical information for it and finish. | |
| // Here UpdateVariableInfo() has already retrieved data & attributes for output. | |
| // | |
| UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE); | |
| goto Done; | |
| } | |
| // | |
| // If variable does not exist in cache, search for it in variable storage area. | |
| // | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance); | |
| if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) { | |
| // | |
| // If it cannot be found in variable storage area, goto Done. | |
| // | |
| goto Done; | |
| } | |
| Valid = IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader); | |
| if (!Valid) { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| // | |
| // If variable exists, but not in cache, get its data and attributes, update | |
| // statistical information, and update cache. | |
| // | |
| VarDataSize = DataSizeOfVariable (&VariableHeader); | |
| ASSERT (VarDataSize != 0); | |
| if (*DataSize >= VarDataSize) { | |
| if (Data == NULL) { | |
| Status = EFI_INVALID_PARAMETER; | |
| goto Done; | |
| } | |
| GetVariableDataPtr ( | |
| Variable.CurrPtr, | |
| Variable.Volatile, | |
| VariableGlobal, | |
| Instance, | |
| Data | |
| ); | |
| if (Attributes != NULL) { | |
| *Attributes = VariableHeader.Attributes; | |
| } | |
| *DataSize = VarDataSize; | |
| UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE); | |
| UpdateVariableCache (VariableName, VendorGuid, VariableHeader.Attributes, VarDataSize, Data); | |
| Status = EFI_SUCCESS; | |
| goto Done; | |
| } else { | |
| // | |
| // If DataSize is too small for the result, return EFI_BUFFER_TOO_SMALL. | |
| // | |
| *DataSize = VarDataSize; | |
| Status = EFI_BUFFER_TOO_SMALL; | |
| goto Done; | |
| } | |
| Done: | |
| ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| Implements EsalGetNextVariableName function of Extended SAL Variable Services Class. | |
| This function implements EsalGetNextVariableName function of Extended SAL Variable Services Class. | |
| It is equivalent in functionality to the EFI Runtime Service GetNextVariableName(). | |
| @param[in, out] VariableNameSize Size of the variable | |
| @param[in, out] VariableName On input, supplies the last VariableName that was returned by GetNextVariableName(). | |
| On output, returns the Null-terminated Unicode string of the current variable. | |
| @param[in, out] VendorGuid On input, supplies the last VendorGuid that was returned by GetNextVariableName(). | |
| On output, returns the VendorGuid of the current variable. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @retval EFI_SUCCESS The function completed successfully. | |
| @retval EFI_NOT_FOUND The next variable was not found. | |
| @retval EFI_BUFFER_TOO_SMALL VariableNameSize is too small for the result. | |
| VariableNameSize has been updated with the size needed to complete the request. | |
| @retval EFI_INVALID_PARAMETER VariableNameSize is NULL. | |
| @retval EFI_INVALID_PARAMETER VariableName is NULL. | |
| @retval EFI_INVALID_PARAMETER VendorGuid is NULL. | |
| @retval EFI_DEVICE_ERROR The variable name could not be retrieved due to a hardware error. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EsalGetNextVariableName ( | |
| IN OUT UINTN *VariableNameSize, | |
| IN OUT CHAR16 *VariableName, | |
| IN OUT EFI_GUID *VendorGuid, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| VARIABLE_POINTER_TRACK Variable; | |
| UINTN VarNameSize; | |
| EFI_STATUS Status; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock); | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance); | |
| // | |
| // If the variable does not exist, goto Done and return. | |
| // | |
| if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| if (VariableName[0] != 0) { | |
| // | |
| // If variable name is not NULL, get next variable | |
| // | |
| Variable.CurrPtr = GetNextVariablePtr ( | |
| Variable.CurrPtr, | |
| Variable.Volatile, | |
| VariableGlobal, | |
| Instance | |
| ); | |
| } | |
| while (TRUE) { | |
| if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == 0x0) { | |
| // | |
| // If fail to find a variable in current area, reverse the volatile attribute of area to search. | |
| // | |
| Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1)); | |
| // | |
| // Here we depend on the searching sequence of FindVariable(). | |
| // It first searches volatile area, then NV area. | |
| // So if the volatile attribute after switching is non-volatile, it means that we have finished searching volatile area, | |
| // and EFI_NOT_FOUND is returnd. | |
| // Otherwise, it means that we have finished searchig non-volatile area, and we will continue to search volatile area. | |
| // | |
| if (!Variable.Volatile) { | |
| Variable.StartPtr = GetStartPointer (VariableGlobal->NonVolatileVariableBase); | |
| Variable.EndPtr = GetEndPointer (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance); | |
| } else { | |
| Status = EFI_NOT_FOUND; | |
| goto Done; | |
| } | |
| Variable.CurrPtr = Variable.StartPtr; | |
| if (!IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, NULL)) { | |
| continue; | |
| } | |
| } | |
| // | |
| // Variable is found | |
| // | |
| if (IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader)) { | |
| if ((VariableHeader.State == VAR_ADDED) && | |
| (!(EfiAtRuntime () && ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)))) { | |
| VarNameSize = NameSizeOfVariable (&VariableHeader); | |
| ASSERT (VarNameSize != 0); | |
| if (VarNameSize <= *VariableNameSize) { | |
| GetVariableNamePtr ( | |
| Variable.CurrPtr, | |
| Variable.Volatile, | |
| VariableGlobal, | |
| Instance, | |
| VariableName | |
| ); | |
| CopyMem ( | |
| VendorGuid, | |
| &VariableHeader.VendorGuid, | |
| sizeof (EFI_GUID) | |
| ); | |
| Status = EFI_SUCCESS; | |
| } else { | |
| Status = EFI_BUFFER_TOO_SMALL; | |
| } | |
| *VariableNameSize = VarNameSize; | |
| goto Done; | |
| } | |
| } | |
| Variable.CurrPtr = GetNextVariablePtr ( | |
| Variable.CurrPtr, | |
| Variable.Volatile, | |
| VariableGlobal, | |
| Instance | |
| ); | |
| } | |
| Done: | |
| ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| Implements EsalSetVariable function of Extended SAL Variable Services Class. | |
| This function implements EsalSetVariable function of Extended SAL Variable Services Class. | |
| It is equivalent in functionality to the EFI Runtime Service SetVariable(). | |
| @param[in] VariableName A Null-terminated Unicode string that is the name of the vendor's | |
| variable. Each VariableName is unique for each | |
| VendorGuid. VariableName must contain 1 or more | |
| Unicode characters. If VariableName is an empty Unicode | |
| string, then EFI_INVALID_PARAMETER is returned. | |
| @param[in] VendorGuid A unique identifier for the vendor. | |
| @param[in] Attributes Attributes bitmask to set for the variable. | |
| @param[in] DataSize The size in bytes of the Data buffer. A size of zero causes the | |
| variable to be deleted. | |
| @param[in] Data The contents for the variable. | |
| @param[in] VirtualMode Current calling mode for this function. | |
| @param[in] Global Context of this Extended SAL Variable Services Class call. | |
| @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as | |
| defined by the Attributes. | |
| @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied, or the | |
| DataSize exceeds the maximum allowed. | |
| @retval EFI_INVALID_PARAMETER VariableName is an empty Unicode string. | |
| @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data. | |
| @retval EFI_DEVICE_ERROR The variable could not be saved due to a hardware failure. | |
| @retval EFI_WRITE_PROTECTED The variable in question is read-only. | |
| @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted. | |
| @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure. | |
| @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EsalSetVariable ( | |
| IN CHAR16 *VariableName, | |
| IN EFI_GUID *VendorGuid, | |
| IN UINT32 Attributes, | |
| IN UINTN DataSize, | |
| IN VOID *Data, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| VARIABLE_POINTER_TRACK Variable; | |
| EFI_STATUS Status; | |
| EFI_PHYSICAL_ADDRESS NextVariable; | |
| EFI_PHYSICAL_ADDRESS Point; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| UINT32 KeyIndex; | |
| UINT64 MonotonicCount; | |
| UINTN PayloadSize; | |
| // | |
| // Check input parameters | |
| // | |
| if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if (DataSize != 0 && Data == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // EFI_VARIABLE_RUNTIME_ACCESS bit cannot be set without EFI_VARIABLE_BOOTSERVICE_ACCESS bit. | |
| // | |
| if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) { | |
| if (DataSize < AUTHINFO_SIZE) { | |
| // | |
| // Try to write Authencated Variable without AuthInfo | |
| // | |
| return EFI_SECURITY_VIOLATION; | |
| } | |
| PayloadSize = DataSize - AUTHINFO_SIZE; | |
| } else { | |
| PayloadSize = DataSize; | |
| } | |
| if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){ | |
| // | |
| // Prevent whole variable size overflow | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| // | |
| // For variable for hardware error record, the size of the VariableName, including the Unicode Null | |
| // in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxHardwareErrorVariableSize) bytes. | |
| // | |
| if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| // | |
| // According to UEFI spec, HARDWARE_ERROR_RECORD variable name convention should be L"HwErrRecXXXX" | |
| // | |
| if (StrnCmp (VariableName, \ | |
| Global->VariableName[VirtualMode][VAR_HW_ERR_REC], \ | |
| StrLen(Global->VariableName[VirtualMode][VAR_HW_ERR_REC])) != 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } else { | |
| // | |
| // For variable not for hardware error record, the size of the VariableName, including the | |
| // Unicode Null in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxVariableSize) bytes. | |
| // | |
| if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| } | |
| AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock); | |
| // | |
| // Consider reentrant in MCA/INIT/NMI. It needs be reupdated; | |
| // | |
| if (InterlockedIncrement (&Global->ReentrantState) > 1) { | |
| Point = VariableGlobal->NonVolatileVariableBase;; | |
| // | |
| // Parse non-volatile variable data and get last variable offset | |
| // | |
| NextVariable = GetStartPointer (Point); | |
| while (IsValidVariableHeader (NextVariable, FALSE, VariableGlobal, Instance, NULL)) { | |
| NextVariable = GetNextVariablePtr (NextVariable, FALSE, VariableGlobal, Instance); | |
| } | |
| Global->NonVolatileLastVariableOffset = NextVariable - Point; | |
| } | |
| // | |
| // Check whether the input variable exists | |
| // | |
| Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance); | |
| // | |
| // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang | |
| // | |
| AutoUpdateLangVariable (VariableName, Data, PayloadSize, VirtualMode, Global); | |
| // | |
| // Process PK, KEK, Sigdb seperately | |
| // | |
| if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_PLATFORM_KEY]) == 0)) { | |
| Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, TRUE); | |
| } else if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_KEY_EXCHANGE_KEY]) == 0)) { | |
| Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, FALSE); | |
| } else if (CompareGuid (VendorGuid, Global->ImageSecurityDatabaseGuid[VirtualMode])) { | |
| Status = ProcessVarWithKek (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes); | |
| } else { | |
| Status = VerifyVariable (Data, DataSize, VirtualMode, Global, &Variable, Attributes, &KeyIndex, &MonotonicCount); | |
| if (!EFI_ERROR(Status)) { | |
| // | |
| // Verification pass | |
| // | |
| if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { | |
| // | |
| // Cut the certificate size before set | |
| // | |
| Status = UpdateVariable ( | |
| VariableName, | |
| VendorGuid, | |
| (UINT8*)Data + AUTHINFO_SIZE, | |
| DataSize - AUTHINFO_SIZE, | |
| Attributes, | |
| KeyIndex, | |
| MonotonicCount, | |
| VirtualMode, | |
| Global, | |
| &Variable | |
| ); | |
| } else { | |
| // | |
| // Update variable as usual | |
| // | |
| Status = UpdateVariable ( | |
| VariableName, | |
| VendorGuid, | |
| Data, | |
| DataSize, | |
| Attributes, | |
| 0, | |
| 0, | |
| VirtualMode, | |
| Global, | |
| &Variable | |
| ); | |
| } | |
| } | |
| } | |
| InterlockedDecrement (&Global->ReentrantState); | |
| ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock); | |
| return Status; | |
| } | |
| /** | |
| Implements EsalQueryVariableInfo function of Extended SAL Variable Services Class. | |
| This function implements EsalQueryVariableInfo function of Extended SAL Variable Services Class. | |
| It is equivalent in functionality to the EFI Runtime Service QueryVariableInfo(). | |
| @param[in] Attributes Attributes bitmask to specify the type of variables | |
| on which to return information. | |
| @param[out] MaximumVariableStorageSize On output the maximum size of the storage space available for | |
| the EFI variables associated with the attributes specified. | |
| @param[out] RemainingVariableStorageSize Returns the remaining size of the storage space available for EFI | |
| variables associated with the attributes specified. | |
| @param[out] MaximumVariableSize Returns the maximum size of an individual EFI variable | |
| associated with the attributes specified. | |
| @param[in] VirtualMode Current calling mode for this function | |
| @param[in] Global Context of this Extended SAL Variable Services Class call | |
| @retval EFI_SUCCESS Valid answer returned. | |
| @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied. | |
| @retval EFI_UNSUPPORTED The attribute is not supported on this platform, and the | |
| MaximumVariableStorageSize, RemainingVariableStorageSize, | |
| MaximumVariableSize are undefined. | |
| **/ | |
| EFI_STATUS | |
| EFIAPI | |
| EsalQueryVariableInfo ( | |
| IN UINT32 Attributes, | |
| OUT UINT64 *MaximumVariableStorageSize, | |
| OUT UINT64 *RemainingVariableStorageSize, | |
| OUT UINT64 *MaximumVariableSize, | |
| IN BOOLEAN VirtualMode, | |
| IN ESAL_VARIABLE_GLOBAL *Global | |
| ) | |
| { | |
| EFI_PHYSICAL_ADDRESS Variable; | |
| EFI_PHYSICAL_ADDRESS NextVariable; | |
| UINT64 VariableSize; | |
| EFI_PHYSICAL_ADDRESS VariableStoreHeaderAddress; | |
| BOOLEAN Volatile; | |
| VARIABLE_STORE_HEADER VarStoreHeader; | |
| AUTHENTICATED_VARIABLE_HEADER VariableHeader; | |
| UINT64 CommonVariableTotalSize; | |
| UINT64 HwErrVariableTotalSize; | |
| VARIABLE_GLOBAL *VariableGlobal; | |
| UINT32 Instance; | |
| CommonVariableTotalSize = 0; | |
| HwErrVariableTotalSize = 0; | |
| if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) { | |
| // | |
| // Make sure the Attributes combination is supported by the platform. | |
| // | |
| return EFI_UNSUPPORTED; | |
| } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { | |
| // | |
| // Make sure if runtime bit is set, boot service bit is set also. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } else if (EfiAtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) { | |
| // | |
| // Make sure RT Attribute is set if we are in Runtime phase. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| // | |
| // Make sure Hw Attribute is set with NV. | |
| // | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| VariableGlobal = &Global->VariableGlobal[VirtualMode]; | |
| Instance = Global->FvbInstance; | |
| AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock); | |
| if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) { | |
| // | |
| // Query is Volatile related. | |
| // | |
| Volatile = TRUE; | |
| VariableStoreHeaderAddress = VariableGlobal->VolatileVariableBase; | |
| } else { | |
| // | |
| // Query is Non-Volatile related. | |
| // | |
| Volatile = FALSE; | |
| VariableStoreHeaderAddress = VariableGlobal->NonVolatileVariableBase; | |
| } | |
| // | |
| // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize | |
| // with the storage size (excluding the storage header size). | |
| // | |
| GetVarStoreHeader (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance, &VarStoreHeader); | |
| *MaximumVariableStorageSize = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER); | |
| // Harware error record variable needs larger size. | |
| // | |
| if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| *MaximumVariableStorageSize = PcdGet32(PcdHwErrStorageSize); | |
| *MaximumVariableSize = PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| } else { | |
| if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) { | |
| ASSERT (PcdGet32(PcdHwErrStorageSize) < VarStoreHeader.Size); | |
| *MaximumVariableStorageSize = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize); | |
| } | |
| // | |
| // Let *MaximumVariableSize be PcdGet32(PcdMaxVariableSize) with the exception of the variable header size. | |
| // | |
| *MaximumVariableSize = PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| } | |
| // | |
| // Point to the starting address of the variables. | |
| // | |
| Variable = GetStartPointer (VariableStoreHeaderAddress); | |
| // | |
| // Now walk through the related variable store. | |
| // | |
| while (IsValidVariableHeader (Variable, Volatile, VariableGlobal, Instance, &VariableHeader) && | |
| (Variable < GetEndPointer (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance))) { | |
| NextVariable = GetNextVariablePtr (Variable, Volatile, VariableGlobal, Instance); | |
| VariableSize = NextVariable - Variable; | |
| if (EfiAtRuntime ()) { | |
| // | |
| // we don't take the state of the variables in mind | |
| // when calculating RemainingVariableStorageSize, | |
| // since the space occupied by variables not marked with | |
| // VAR_ADDED is not allowed to be reclaimed in Runtime. | |
| // | |
| if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| CommonVariableTotalSize += VariableSize; | |
| } | |
| } else { | |
| // | |
| // Only care about Variables with State VAR_ADDED,because | |
| // the space not marked as VAR_ADDED is reclaimable now. | |
| // | |
| if (VariableHeader.State == VAR_ADDED) { | |
| if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) { | |
| HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| CommonVariableTotalSize += VariableSize; | |
| } | |
| } | |
| } | |
| // | |
| // Go to the next one | |
| // | |
| Variable = NextVariable; | |
| } | |
| if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){ | |
| *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize; | |
| }else { | |
| *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize; | |
| } | |
| if (*RemainingVariableStorageSize < sizeof (AUTHENTICATED_VARIABLE_HEADER)) { | |
| *MaximumVariableSize = 0; | |
| } else if ((*RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER)) < *MaximumVariableSize) { | |
| *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER); | |
| } | |
| ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock); | |
| return EFI_SUCCESS; | |
| } | |
| /** | |
| Notification function of EVT_GROUP_READY_TO_BOOT event group. | |
| This is a notification function registered on EVT_GROUP_READY_TO_BOOT event group. | |
| When the Boot Manager is about to load and execute a boot option, it reclaims variable | |
| storage if free size is below the threshold. | |
| @param[in] Event Event whose notification function is being invoked. | |
| @param[in] Context Pointer to the notification function's context. | |
| **/ | |
| VOID | |
| EFIAPI | |
| ReclaimForOS( | |
| IN EFI_EVENT Event, | |
| IN VOID *Context | |
| ) | |
| { | |
| UINT32 VarSize; | |
| EFI_STATUS Status; | |
| UINTN CommonVariableSpace; | |
| UINTN RemainingCommonVariableSpace; | |
| UINTN RemainingHwErrVariableSpace; | |
| VarSize = ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase))->Size; | |
| Status = EFI_SUCCESS; | |
| // | |
| //Allowable max size of common variable storage space | |
| // | |
| CommonVariableSpace = VarSize - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize); | |
| RemainingCommonVariableSpace = CommonVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize; | |
| RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize; | |
| // | |
| // If the free area is below a threshold, then performs reclaim operation. | |
| // | |
| if ((RemainingCommonVariableSpace < PcdGet32 (PcdMaxVariableSize)) | |
| || ((PcdGet32 (PcdHwErrStorageSize) != 0) && | |
| (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){ | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase, | |
| &mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| FALSE, | |
| Physical, | |
| mVariableModuleGlobal, | |
| 0x0 | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| /** | |
| Flush the HOB variable to NV variable storage. | |
| **/ | |
| VOID | |
| FlushHob2Nv ( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| VOID *GuidHob; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| AUTHENTICATED_VARIABLE_HEADER *VariableHeader; | |
| // | |
| // Get HOB variable store. | |
| // | |
| GuidHob = GetFirstGuidHob (&gEfiAuthenticatedVariableGuid); | |
| if (GuidHob != NULL) { | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) GET_GUID_HOB_DATA (GuidHob); | |
| if (CompareGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) && | |
| (VariableStoreHeader->Format == VARIABLE_STORE_FORMATTED) && | |
| (VariableStoreHeader->State == VARIABLE_STORE_HEALTHY) | |
| ) { | |
| DEBUG ((EFI_D_INFO, "HOB Variable Store appears to be valid.\n")); | |
| // | |
| // Flush the HOB variable to NV Variable storage. | |
| // | |
| for ( VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN (VariableStoreHeader + 1) | |
| ; (VariableHeader < (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VariableStoreHeader + VariableStoreHeader->Size) | |
| && | |
| (VariableHeader->StartId == VARIABLE_DATA)) | |
| ; VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) (VariableHeader + 1) | |
| + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize) | |
| + VariableHeader->DataSize + GET_PAD_SIZE (VariableHeader->DataSize) | |
| ) | |
| ) { | |
| ASSERT (VariableHeader->State == VAR_ADDED); | |
| ASSERT ((VariableHeader->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0); | |
| Status = EsalSetVariable ( | |
| (CHAR16 *) (VariableHeader + 1), | |
| &VariableHeader->VendorGuid, | |
| VariableHeader->Attributes, | |
| VariableHeader->DataSize, | |
| (UINT8 *) (VariableHeader + 1) + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize), | |
| Physical, | |
| mVariableModuleGlobal | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| } | |
| } | |
| } | |
| } | |
| /** | |
| Initializes variable store area for non-volatile and volatile variable. | |
| This function allocates and initializes memory space for global context of ESAL | |
| variable service and variable store area for non-volatile and volatile variable. | |
| @param[in] ImageHandle The Image handle of this driver. | |
| @param[in] SystemTable The pointer of EFI_SYSTEM_TABLE. | |
| @retval EFI_SUCCESS Function successfully executed. | |
| @retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource. | |
| **/ | |
| EFI_STATUS | |
| VariableCommonInitialize ( | |
| IN EFI_HANDLE ImageHandle, | |
| IN EFI_SYSTEM_TABLE *SystemTable | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader; | |
| EFI_PHYSICAL_ADDRESS CurrPtr; | |
| VARIABLE_STORE_HEADER *VolatileVariableStore; | |
| VARIABLE_STORE_HEADER *VariableStoreHeader; | |
| EFI_PHYSICAL_ADDRESS Variable; | |
| EFI_PHYSICAL_ADDRESS NextVariable; | |
| UINTN VariableSize; | |
| UINT32 Instance; | |
| EFI_PHYSICAL_ADDRESS FvVolHdr; | |
| EFI_PHYSICAL_ADDRESS TempVariableStoreHeader; | |
| EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor; | |
| UINT64 BaseAddress; | |
| UINT64 Length; | |
| UINTN Index; | |
| UINT8 Data; | |
| EFI_PHYSICAL_ADDRESS VariableStoreBase; | |
| UINT64 VariableStoreLength; | |
| EFI_EVENT ReadyToBootEvent; | |
| UINTN ScratchSize; | |
| // | |
| // Allocate memory for mVariableModuleGlobal | |
| // | |
| mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (ESAL_VARIABLE_GLOBAL)); | |
| if (mVariableModuleGlobal == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| mVariableModuleGlobal->GlobalVariableGuid[Physical] = &gEfiGlobalVariableGuid; | |
| CopyMem ( | |
| mVariableModuleGlobal->VariableName[Physical], | |
| mVariableName, | |
| sizeof (mVariableName) | |
| ); | |
| EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal[Physical].VariableServicesLock, TPL_NOTIFY); | |
| // | |
| // Note that in EdkII variable driver implementation, Hardware Error Record type variable | |
| // is stored with common variable in the same NV region. So the platform integrator should | |
| // ensure that the value of PcdHwErrStorageSize is less than or equal to the value of | |
| // PcdFlashNvStorageVariableSize. | |
| // | |
| ASSERT (PcdGet32(PcdHwErrStorageSize) <= PcdGet32 (PcdFlashNvStorageVariableSize)); | |
| // | |
| // Allocate memory for volatile variable store | |
| // | |
| ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize)); | |
| VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize); | |
| if (VolatileVariableStore == NULL) { | |
| FreePool (mVariableModuleGlobal); | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff); | |
| // | |
| // Variable Specific Data | |
| // | |
| mVariableModuleGlobal->VariableGlobal[Physical].VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore; | |
| mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer ((EFI_PHYSICAL_ADDRESS) VolatileVariableStore) - (UINTN) VolatileVariableStore; | |
| CopyGuid (&VolatileVariableStore->Signature, &gEfiAuthenticatedVariableGuid); | |
| VolatileVariableStore->Size = PcdGet32 (PcdVariableStoreSize); | |
| VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED; | |
| VolatileVariableStore->State = VARIABLE_STORE_HEALTHY; | |
| VolatileVariableStore->Reserved = 0; | |
| VolatileVariableStore->Reserved1 = 0; | |
| // | |
| // Get non volatile varaible store | |
| // | |
| TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase); | |
| VariableStoreBase = TempVariableStoreHeader + \ | |
| (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength); | |
| VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \ | |
| (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength); | |
| // | |
| // Mark the variable storage region of the FLASH as RUNTIME | |
| // | |
| BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK); | |
| Length = VariableStoreLength + (VariableStoreBase - BaseAddress); | |
| Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK); | |
| Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| Status = gDS->SetMemorySpaceAttributes ( | |
| BaseAddress, | |
| Length, | |
| GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| // | |
| // Get address of non volatile variable store base. | |
| // | |
| mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = VariableStoreBase; | |
| // | |
| // Check Integrity | |
| // | |
| // | |
| // Find the Correct Instance of the FV Block Service. | |
| // | |
| Instance = 0; | |
| CurrPtr = mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase; | |
| do { | |
| FvVolHdr = 0; | |
| Status = (EFI_STATUS) EsalCall ( | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO, | |
| EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI, | |
| GetPhysicalAddressFunctionId, | |
| Instance, | |
| (UINT64) &FvVolHdr, | |
| 0, | |
| 0, | |
| 0, | |
| 0, | |
| 0 | |
| ).Status; | |
| if (EFI_ERROR (Status)) { | |
| break; | |
| } | |
| FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr); | |
| ASSERT (FwVolHeader != NULL); | |
| if (CurrPtr >= (EFI_PHYSICAL_ADDRESS) FwVolHeader && | |
| CurrPtr < ((EFI_PHYSICAL_ADDRESS) FwVolHeader + FwVolHeader->FvLength)) { | |
| mVariableModuleGlobal->FvbInstance = Instance; | |
| break; | |
| } | |
| Instance++; | |
| } while (Status == EFI_SUCCESS); | |
| VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr; | |
| if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) { | |
| if (~VariableStoreHeader->Size == 0) { | |
| Status = AccessVariableStore ( | |
| TRUE, | |
| &mVariableModuleGlobal->VariableGlobal[Physical], | |
| FALSE, | |
| mVariableModuleGlobal->FvbInstance, | |
| (UINTN) &VariableStoreHeader->Size, | |
| sizeof (UINT32), | |
| (UINT8 *) &VariableStoreLength | |
| ); | |
| // | |
| // As Variables are stored in NV storage, which are slow devices,such as flash. | |
| // Variable operation may skip checking variable program result to improve performance, | |
| // We can assume Variable program is OK through some check point. | |
| // Variable Store Size Setting should be the first Variable write operation, | |
| // We can assume all Read/Write is OK if we can set Variable store size successfully. | |
| // If write fail, we will assert here. | |
| // | |
| ASSERT(VariableStoreHeader->Size == VariableStoreLength); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| } | |
| mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr); | |
| // | |
| // Parse non-volatile variable data and get last variable offset. | |
| // | |
| Variable = GetStartPointer (CurrPtr); | |
| Status = EFI_SUCCESS; | |
| while (IsValidVariableHeader (Variable, FALSE, &(mVariableModuleGlobal->VariableGlobal[Physical]), Instance, NULL)) { | |
| NextVariable = GetNextVariablePtr ( | |
| Variable, | |
| FALSE, | |
| &(mVariableModuleGlobal->VariableGlobal[Physical]), | |
| Instance | |
| ); | |
| VariableSize = NextVariable - Variable; | |
| if ((((AUTHENTICATED_VARIABLE_HEADER *)Variable)->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) { | |
| mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize; | |
| } else { | |
| mVariableModuleGlobal->CommonVariableTotalSize += VariableSize; | |
| } | |
| Variable = NextVariable; | |
| } | |
| mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) CurrPtr; | |
| // | |
| // Check if the free area is really free. | |
| // | |
| for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) { | |
| Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase)[Index]; | |
| if (Data != 0xff) { | |
| // | |
| // There must be something wrong in variable store, do reclaim operation. | |
| // | |
| Status = Reclaim ( | |
| mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase, | |
| &mVariableModuleGlobal->NonVolatileLastVariableOffset, | |
| FALSE, | |
| Physical, | |
| mVariableModuleGlobal, | |
| 0x0 | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| goto Done; | |
| } | |
| break; | |
| } | |
| } | |
| // | |
| // Register the event handling function to reclaim variable for OS usage. | |
| // | |
| Status = EfiCreateEventReadyToBootEx ( | |
| TPL_NOTIFY, | |
| ReclaimForOS, | |
| NULL, | |
| &ReadyToBootEvent | |
| ); | |
| } else { | |
| Status = EFI_VOLUME_CORRUPTED; | |
| DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n")); | |
| } | |
| Done: | |
| if (EFI_ERROR (Status)) { | |
| FreePool (mVariableModuleGlobal); | |
| FreePool (VolatileVariableStore); | |
| } | |
| return Status; | |
| } |