mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-11-28 12:25:19 +01:00
7c0aa811ec
Signed-off-by: Sergey Isakov <isakov-sl@bk.ru>
4629 lines
166 KiB
C
4629 lines
166 KiB
C
/** @file
|
|
The common variable operation routines shared by DXE_RUNTIME variable
|
|
module and DXE_SMM variable module.
|
|
|
|
Caution: This module requires additional review when modified.
|
|
This driver will have external input - variable data. They may be input in SMM mode.
|
|
This external input must be validated carefully to avoid security issue like
|
|
buffer overflow, integer overflow.
|
|
|
|
VariableServiceGetNextVariableName () and VariableServiceQueryVariableInfo() are external API.
|
|
They need check input parameter.
|
|
|
|
VariableServiceGetVariable() and VariableServiceSetVariable() are external API
|
|
to receive datasize and data buffer. The size should be checked carefully.
|
|
|
|
VariableServiceSetVariable() should also check authenticate data to avoid buffer overflow,
|
|
integer overflow. It should also check attribute to avoid authentication bypass.
|
|
|
|
Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
|
(C) Copyright 2015-2018 Hewlett Packard Enterprise Development LP<BR>
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include "Variable.h"
|
|
|
|
VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal;
|
|
|
|
///
|
|
/// Define a memory cache that improves the search performance for a variable.
|
|
/// For EmuNvMode == TRUE, it will be equal to NonVolatileVariableBase.
|
|
///
|
|
VARIABLE_STORE_HEADER *mNvVariableCache = NULL;
|
|
|
|
///
|
|
/// Memory cache of Fv Header.
|
|
///
|
|
EFI_FIRMWARE_VOLUME_HEADER *mNvFvHeaderCache = NULL;
|
|
|
|
///
|
|
/// The memory entry used for variable statistics data.
|
|
///
|
|
VARIABLE_INFO_ENTRY *gVariableInfo = NULL;
|
|
|
|
///
|
|
/// The flag to indicate whether the platform has left the DXE phase of execution.
|
|
///
|
|
BOOLEAN mEndOfDxe = FALSE;
|
|
|
|
///
|
|
/// It indicates the var check request source.
|
|
/// In the implementation, DXE is regarded as untrusted, and SMM is trusted.
|
|
///
|
|
VAR_CHECK_REQUEST_SOURCE mRequestSource = VarCheckFromUntrusted;
|
|
|
|
//
|
|
// It will record the current boot error flag before EndOfDxe.
|
|
//
|
|
VAR_ERROR_FLAG mCurrentBootVarErrFlag = VAR_ERROR_FLAG_NO_ERROR;
|
|
|
|
VARIABLE_ENTRY_PROPERTY mVariableEntryProperty[] = {
|
|
{
|
|
&gEdkiiVarErrorFlagGuid,
|
|
VAR_ERROR_FLAG_NAME,
|
|
{
|
|
VAR_CHECK_VARIABLE_PROPERTY_REVISION,
|
|
VAR_CHECK_VARIABLE_PROPERTY_READ_ONLY,
|
|
VARIABLE_ATTRIBUTE_NV_BS_RT,
|
|
sizeof (VAR_ERROR_FLAG),
|
|
sizeof (VAR_ERROR_FLAG)
|
|
}
|
|
},
|
|
};
|
|
|
|
AUTH_VAR_LIB_CONTEXT_IN mAuthContextIn = {
|
|
AUTH_VAR_LIB_CONTEXT_IN_STRUCT_VERSION,
|
|
//
|
|
// StructSize, TO BE FILLED
|
|
//
|
|
0,
|
|
//
|
|
// MaxAuthVariableSize, TO BE FILLED
|
|
//
|
|
0,
|
|
VariableExLibFindVariable,
|
|
VariableExLibFindNextVariable,
|
|
VariableExLibUpdateVariable,
|
|
VariableExLibGetScratchBuffer,
|
|
VariableExLibCheckRemainingSpaceForConsistency,
|
|
VariableExLibAtRuntime,
|
|
};
|
|
|
|
AUTH_VAR_LIB_CONTEXT_OUT mAuthContextOut;
|
|
|
|
/**
|
|
Routine used to track statistical information about variable usage.
|
|
The data is stored in the EFI system table so it can be accessed later.
|
|
VariableInfo.efi can dump out the table. Only Boot Services variable
|
|
accesses are tracked by this code. The PcdVariableCollectStatistics
|
|
build flag controls if this feature is enabled.
|
|
|
|
A read that hits in the cache will have Read and Cache true for
|
|
the transaction. Data is allocated by this routine, but never
|
|
freed.
|
|
|
|
@param[in] VariableName Name of the Variable to track.
|
|
@param[in] VendorGuid Guid of the Variable to track.
|
|
@param[in] Volatile TRUE if volatile FALSE if non-volatile.
|
|
@param[in] Read TRUE if GetVariable() was called.
|
|
@param[in] Write TRUE if SetVariable() was called.
|
|
@param[in] Delete TRUE if deleted via SetVariable().
|
|
@param[in] Cache TRUE for a cache hit.
|
|
|
|
**/
|
|
VOID
|
|
UpdateVariableInfo (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
IN BOOLEAN Volatile,
|
|
IN BOOLEAN Read,
|
|
IN BOOLEAN Write,
|
|
IN BOOLEAN Delete,
|
|
IN BOOLEAN Cache
|
|
)
|
|
{
|
|
VARIABLE_INFO_ENTRY *Entry;
|
|
|
|
if (FeaturePcdGet (PcdVariableCollectStatistics)) {
|
|
|
|
if (AtRuntime ()) {
|
|
// Don't collect statistics at runtime.
|
|
return;
|
|
}
|
|
|
|
if (gVariableInfo == NULL) {
|
|
//
|
|
// On the first call allocate a entry and place a pointer to it in
|
|
// the EFI System Table.
|
|
//
|
|
gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
|
|
ASSERT (gVariableInfo != NULL);
|
|
|
|
CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);
|
|
gVariableInfo->Name = AllocateZeroPool (StrSize (VariableName));
|
|
ASSERT (gVariableInfo->Name != NULL);
|
|
StrCpyS (gVariableInfo->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName);
|
|
gVariableInfo->Volatile = Volatile;
|
|
}
|
|
|
|
|
|
for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {
|
|
if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {
|
|
if (StrCmp (VariableName, Entry->Name) == 0) {
|
|
if (Read) {
|
|
Entry->ReadCount++;
|
|
}
|
|
if (Write) {
|
|
Entry->WriteCount++;
|
|
}
|
|
if (Delete) {
|
|
Entry->DeleteCount++;
|
|
}
|
|
if (Cache) {
|
|
Entry->CacheCount++;
|
|
}
|
|
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (Entry->Next == NULL) {
|
|
//
|
|
// If the entry is not in the table add it.
|
|
// Next iteration of the loop will fill in the data.
|
|
//
|
|
Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
|
|
ASSERT (Entry->Next != NULL);
|
|
|
|
CopyGuid (&Entry->Next->VendorGuid, VendorGuid);
|
|
Entry->Next->Name = AllocateZeroPool (StrSize (VariableName));
|
|
ASSERT (Entry->Next->Name != NULL);
|
|
StrCpyS (Entry->Next->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName);
|
|
Entry->Next->Volatile = Volatile;
|
|
}
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
|
|
This code checks if variable header is valid or not.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
@param VariableStoreEnd Pointer to the Variable Store End.
|
|
|
|
@retval TRUE Variable header is valid.
|
|
@retval FALSE Variable header is not valid.
|
|
|
|
**/
|
|
BOOLEAN
|
|
IsValidVariableHeader (
|
|
IN VARIABLE_HEADER *Variable,
|
|
IN VARIABLE_HEADER *VariableStoreEnd
|
|
)
|
|
{
|
|
if ((Variable == NULL) || (Variable >= VariableStoreEnd) || (Variable->StartId != VARIABLE_DATA)) {
|
|
//
|
|
// Variable is NULL or has reached the end of variable store,
|
|
// or the StartId is not correct.
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/**
|
|
|
|
This function writes data to the FWH at the correct LBA even if the LBAs
|
|
are fragmented.
|
|
|
|
@param Global Pointer to VARAIBLE_GLOBAL structure.
|
|
@param Volatile Point out the Variable is Volatile or Non-Volatile.
|
|
@param SetByIndex TRUE if target pointer is given as index.
|
|
FALSE if target pointer is absolute.
|
|
@param Fvb Pointer to the writable FVB protocol.
|
|
@param DataPtrIndex Pointer to the Data from the end of VARIABLE_STORE_HEADER
|
|
structure.
|
|
@param DataSize Size of data to be written.
|
|
@param Buffer Pointer to the buffer from which data is written.
|
|
|
|
@retval EFI_INVALID_PARAMETER Parameters not valid.
|
|
@retval EFI_UNSUPPORTED Fvb is a NULL for Non-Volatile variable update.
|
|
@retval EFI_OUT_OF_RESOURCES The remaining size is not enough.
|
|
@retval EFI_SUCCESS Variable store successfully updated.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
UpdateVariableStore (
|
|
IN VARIABLE_GLOBAL *Global,
|
|
IN BOOLEAN Volatile,
|
|
IN BOOLEAN SetByIndex,
|
|
IN EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb,
|
|
IN UINTN DataPtrIndex,
|
|
IN UINT32 DataSize,
|
|
IN UINT8 *Buffer
|
|
)
|
|
{
|
|
EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;
|
|
UINTN BlockIndex2;
|
|
UINTN LinearOffset;
|
|
UINTN CurrWriteSize;
|
|
UINTN CurrWritePtr;
|
|
UINT8 *CurrBuffer;
|
|
EFI_LBA LbaNumber;
|
|
UINTN Size;
|
|
VARIABLE_STORE_HEADER *VolatileBase;
|
|
EFI_PHYSICAL_ADDRESS FvVolHdr;
|
|
EFI_PHYSICAL_ADDRESS DataPtr;
|
|
EFI_STATUS Status;
|
|
|
|
FvVolHdr = 0;
|
|
DataPtr = DataPtrIndex;
|
|
|
|
//
|
|
// Check if the Data is Volatile.
|
|
//
|
|
if (!Volatile && !mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
if (Fvb == NULL) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
Status = Fvb->GetPhysicalAddress(Fvb, &FvVolHdr);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Data Pointer should point to the actual Address where data is to be
|
|
// written.
|
|
//
|
|
if (SetByIndex) {
|
|
DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;
|
|
}
|
|
|
|
if ((DataPtr + DataSize) > (FvVolHdr + mNvFvHeaderCache->FvLength)) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
//
|
|
// Data Pointer should point to the actual Address where data is to be
|
|
// written.
|
|
//
|
|
if (Volatile) {
|
|
VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);
|
|
if (SetByIndex) {
|
|
DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;
|
|
}
|
|
|
|
if ((DataPtr + DataSize) > ((UINTN) VolatileBase + VolatileBase->Size)) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
//
|
|
// Emulated non-volatile variable mode.
|
|
//
|
|
if (SetByIndex) {
|
|
DataPtr += (UINTN) mNvVariableCache;
|
|
}
|
|
|
|
if ((DataPtr + DataSize) > ((UINTN) mNvVariableCache + mNvVariableCache->Size)) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
}
|
|
|
|
//
|
|
// If Volatile/Emulated Non-volatile Variable just do a simple mem copy.
|
|
//
|
|
CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// If we are here we are dealing with Non-Volatile Variables.
|
|
//
|
|
LinearOffset = (UINTN) FvVolHdr;
|
|
CurrWritePtr = (UINTN) DataPtr;
|
|
CurrWriteSize = DataSize;
|
|
CurrBuffer = Buffer;
|
|
LbaNumber = 0;
|
|
|
|
if (CurrWritePtr < LinearOffset) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
for (PtrBlockMapEntry = mNvFvHeaderCache->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {
|
|
for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {
|
|
//
|
|
// Check to see if the Variable Writes are spanning through multiple
|
|
// blocks.
|
|
//
|
|
if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {
|
|
if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {
|
|
Status = Fvb->Write (
|
|
Fvb,
|
|
LbaNumber,
|
|
(UINTN) (CurrWritePtr - LinearOffset),
|
|
&CurrWriteSize,
|
|
CurrBuffer
|
|
);
|
|
return Status;
|
|
} else {
|
|
Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);
|
|
Status = Fvb->Write (
|
|
Fvb,
|
|
LbaNumber,
|
|
(UINTN) (CurrWritePtr - LinearOffset),
|
|
&Size,
|
|
CurrBuffer
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;
|
|
CurrBuffer = CurrBuffer + Size;
|
|
CurrWriteSize = CurrWriteSize - Size;
|
|
}
|
|
}
|
|
|
|
LinearOffset += PtrBlockMapEntry->Length;
|
|
LbaNumber++;
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
|
|
This code gets the current status of Variable Store.
|
|
|
|
@param VarStoreHeader Pointer to the Variable Store Header.
|
|
|
|
@retval EfiRaw Variable store status is raw.
|
|
@retval EfiValid Variable store status is valid.
|
|
@retval EfiInvalid Variable store status is invalid.
|
|
|
|
**/
|
|
VARIABLE_STORE_STATUS
|
|
GetVariableStoreStatus (
|
|
IN VARIABLE_STORE_HEADER *VarStoreHeader
|
|
)
|
|
{
|
|
if ((CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) ||
|
|
CompareGuid (&VarStoreHeader->Signature, &gEfiVariableGuid)) &&
|
|
VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&
|
|
VarStoreHeader->State == VARIABLE_STORE_HEALTHY
|
|
) {
|
|
|
|
return EfiValid;
|
|
} else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff &&
|
|
((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff &&
|
|
((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff &&
|
|
((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff &&
|
|
VarStoreHeader->Size == 0xffffffff &&
|
|
VarStoreHeader->Format == 0xff &&
|
|
VarStoreHeader->State == 0xff
|
|
) {
|
|
|
|
return EfiRaw;
|
|
} else {
|
|
return EfiInvalid;
|
|
}
|
|
}
|
|
|
|
/**
|
|
This code gets the size of variable header.
|
|
|
|
@return Size of variable header in bytes in type UINTN.
|
|
|
|
**/
|
|
UINTN
|
|
GetVariableHeaderSize (
|
|
VOID
|
|
)
|
|
{
|
|
UINTN Value;
|
|
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
Value = sizeof (AUTHENTICATED_VARIABLE_HEADER);
|
|
} else {
|
|
Value = sizeof (VARIABLE_HEADER);
|
|
}
|
|
|
|
return Value;
|
|
}
|
|
|
|
/**
|
|
|
|
This code gets the size of name of variable.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return UINTN Size of variable in bytes.
|
|
|
|
**/
|
|
UINTN
|
|
NameSizeOfVariable (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
if (AuthVariable->State == (UINT8) (-1) ||
|
|
AuthVariable->DataSize == (UINT32) (-1) ||
|
|
AuthVariable->NameSize == (UINT32) (-1) ||
|
|
AuthVariable->Attributes == (UINT32) (-1)) {
|
|
return 0;
|
|
}
|
|
return (UINTN) AuthVariable->NameSize;
|
|
} else {
|
|
if (Variable->State == (UINT8) (-1) ||
|
|
Variable->DataSize == (UINT32) (-1) ||
|
|
Variable->NameSize == (UINT32) (-1) ||
|
|
Variable->Attributes == (UINT32) (-1)) {
|
|
return 0;
|
|
}
|
|
return (UINTN) Variable->NameSize;
|
|
}
|
|
}
|
|
|
|
/**
|
|
This code sets the size of name of variable.
|
|
|
|
@param[in] Variable Pointer to the Variable Header.
|
|
@param[in] NameSize Name size to set.
|
|
|
|
**/
|
|
VOID
|
|
SetNameSizeOfVariable (
|
|
IN VARIABLE_HEADER *Variable,
|
|
IN UINTN NameSize
|
|
)
|
|
{
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
AuthVariable->NameSize = (UINT32) NameSize;
|
|
} else {
|
|
Variable->NameSize = (UINT32) NameSize;
|
|
}
|
|
}
|
|
|
|
/**
|
|
|
|
This code gets the size of variable data.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return Size of variable in bytes.
|
|
|
|
**/
|
|
UINTN
|
|
DataSizeOfVariable (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
if (AuthVariable->State == (UINT8) (-1) ||
|
|
AuthVariable->DataSize == (UINT32) (-1) ||
|
|
AuthVariable->NameSize == (UINT32) (-1) ||
|
|
AuthVariable->Attributes == (UINT32) (-1)) {
|
|
return 0;
|
|
}
|
|
return (UINTN) AuthVariable->DataSize;
|
|
} else {
|
|
if (Variable->State == (UINT8) (-1) ||
|
|
Variable->DataSize == (UINT32) (-1) ||
|
|
Variable->NameSize == (UINT32) (-1) ||
|
|
Variable->Attributes == (UINT32) (-1)) {
|
|
return 0;
|
|
}
|
|
return (UINTN) Variable->DataSize;
|
|
}
|
|
}
|
|
|
|
/**
|
|
This code sets the size of variable data.
|
|
|
|
@param[in] Variable Pointer to the Variable Header.
|
|
@param[in] DataSize Data size to set.
|
|
|
|
**/
|
|
VOID
|
|
SetDataSizeOfVariable (
|
|
IN VARIABLE_HEADER *Variable,
|
|
IN UINTN DataSize
|
|
)
|
|
{
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
AuthVariable->DataSize = (UINT32) DataSize;
|
|
} else {
|
|
Variable->DataSize = (UINT32) DataSize;
|
|
}
|
|
}
|
|
|
|
/**
|
|
|
|
This code gets the pointer to the variable name.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return Pointer to Variable Name which is Unicode encoding.
|
|
|
|
**/
|
|
CHAR16 *
|
|
GetVariableNamePtr (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
return (CHAR16 *) ((UINTN) Variable + GetVariableHeaderSize ());
|
|
}
|
|
|
|
/**
|
|
This code gets the pointer to the variable guid.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return A EFI_GUID* pointer to Vendor Guid.
|
|
|
|
**/
|
|
EFI_GUID *
|
|
GetVendorGuidPtr (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
return &AuthVariable->VendorGuid;
|
|
} else {
|
|
return &Variable->VendorGuid;
|
|
}
|
|
}
|
|
|
|
/**
|
|
|
|
This code gets the pointer to the variable data.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return Pointer to Variable Data.
|
|
|
|
**/
|
|
UINT8 *
|
|
GetVariableDataPtr (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
UINTN Value;
|
|
|
|
//
|
|
// Be careful about pad size for alignment.
|
|
//
|
|
Value = (UINTN) GetVariableNamePtr (Variable);
|
|
Value += NameSizeOfVariable (Variable);
|
|
Value += GET_PAD_SIZE (NameSizeOfVariable (Variable));
|
|
|
|
return (UINT8 *) Value;
|
|
}
|
|
|
|
/**
|
|
This code gets the variable data offset related to variable header.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return Variable Data offset.
|
|
|
|
**/
|
|
UINTN
|
|
GetVariableDataOffset (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
UINTN Value;
|
|
|
|
//
|
|
// Be careful about pad size for alignment
|
|
//
|
|
Value = GetVariableHeaderSize ();
|
|
Value += NameSizeOfVariable (Variable);
|
|
Value += GET_PAD_SIZE (NameSizeOfVariable (Variable));
|
|
|
|
return Value;
|
|
}
|
|
|
|
/**
|
|
|
|
This code gets the pointer to the next variable header.
|
|
|
|
@param Variable Pointer to the Variable Header.
|
|
|
|
@return Pointer to next variable header.
|
|
|
|
**/
|
|
VARIABLE_HEADER *
|
|
GetNextVariablePtr (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
UINTN Value;
|
|
|
|
Value = (UINTN) GetVariableDataPtr (Variable);
|
|
Value += DataSizeOfVariable (Variable);
|
|
Value += GET_PAD_SIZE (DataSizeOfVariable (Variable));
|
|
|
|
//
|
|
// Be careful about pad size for alignment.
|
|
//
|
|
return (VARIABLE_HEADER *) HEADER_ALIGN (Value);
|
|
}
|
|
|
|
/**
|
|
|
|
Gets the pointer to the first variable header in given variable store area.
|
|
|
|
@param VarStoreHeader Pointer to the Variable Store Header.
|
|
|
|
@return Pointer to the first variable header.
|
|
|
|
**/
|
|
VARIABLE_HEADER *
|
|
GetStartPointer (
|
|
IN VARIABLE_STORE_HEADER *VarStoreHeader
|
|
)
|
|
{
|
|
//
|
|
// The start of variable store.
|
|
//
|
|
return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);
|
|
}
|
|
|
|
/**
|
|
|
|
Gets the pointer to the end of the variable storage area.
|
|
|
|
This function gets pointer to the end of the variable storage
|
|
area, according to the input variable store header.
|
|
|
|
@param VarStoreHeader Pointer to the Variable Store Header.
|
|
|
|
@return Pointer to the end of the variable storage area.
|
|
|
|
**/
|
|
VARIABLE_HEADER *
|
|
GetEndPointer (
|
|
IN VARIABLE_STORE_HEADER *VarStoreHeader
|
|
)
|
|
{
|
|
//
|
|
// The end of variable store
|
|
//
|
|
return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);
|
|
}
|
|
|
|
/**
|
|
Record variable error flag.
|
|
|
|
@param[in] Flag Variable error flag to record.
|
|
@param[in] VariableName Name of variable.
|
|
@param[in] VendorGuid Guid of variable.
|
|
@param[in] Attributes Attributes of the variable.
|
|
@param[in] VariableSize Size of the variable.
|
|
|
|
**/
|
|
VOID
|
|
RecordVarErrorFlag (
|
|
IN VAR_ERROR_FLAG Flag,
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
IN UINT32 Attributes,
|
|
IN UINTN VariableSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
VAR_ERROR_FLAG *VarErrFlag;
|
|
VAR_ERROR_FLAG TempFlag;
|
|
|
|
DEBUG_CODE (
|
|
DEBUG ((EFI_D_ERROR, "RecordVarErrorFlag (0x%02x) %s:%g - 0x%08x - 0x%x\n", Flag, VariableName, VendorGuid, Attributes, VariableSize));
|
|
if (Flag == VAR_ERROR_FLAG_SYSTEM_ERROR) {
|
|
if (AtRuntime ()) {
|
|
DEBUG ((EFI_D_ERROR, "CommonRuntimeVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonRuntimeVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize));
|
|
} else {
|
|
DEBUG ((EFI_D_ERROR, "CommonVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize));
|
|
}
|
|
} else {
|
|
DEBUG ((EFI_D_ERROR, "CommonMaxUserVariableSpace = 0x%x - CommonUserVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonUserVariableTotalSize));
|
|
}
|
|
);
|
|
|
|
if (!mEndOfDxe) {
|
|
//
|
|
// Before EndOfDxe, just record the current boot variable error flag to local variable,
|
|
// and leave the variable error flag in NV flash as the last boot variable error flag.
|
|
// After EndOfDxe in InitializeVarErrorFlag (), the variable error flag in NV flash
|
|
// will be initialized to this local current boot variable error flag.
|
|
//
|
|
mCurrentBootVarErrFlag &= Flag;
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Record error flag (it should have be initialized).
|
|
//
|
|
Status = FindVariable (
|
|
VAR_ERROR_FLAG_NAME,
|
|
&gEdkiiVarErrorFlagGuid,
|
|
&Variable,
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
VarErrFlag = (VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr);
|
|
TempFlag = *VarErrFlag;
|
|
TempFlag &= Flag;
|
|
if (TempFlag == *VarErrFlag) {
|
|
return;
|
|
}
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
FALSE,
|
|
mVariableModuleGlobal->FvbInstance,
|
|
(UINTN) VarErrFlag - (UINTN) mNvVariableCache + (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
|
|
sizeof (TempFlag),
|
|
&TempFlag
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Update the data in NV cache.
|
|
//
|
|
*VarErrFlag = TempFlag;
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
Initialize variable error flag.
|
|
|
|
Before EndOfDxe, the variable indicates the last boot variable error flag,
|
|
then it means the last boot variable error flag must be got before EndOfDxe.
|
|
After EndOfDxe, the variable indicates the current boot variable error flag,
|
|
then it means the current boot variable error flag must be got after EndOfDxe.
|
|
|
|
**/
|
|
VOID
|
|
InitializeVarErrorFlag (
|
|
VOID
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
VAR_ERROR_FLAG Flag;
|
|
VAR_ERROR_FLAG VarErrFlag;
|
|
|
|
if (!mEndOfDxe) {
|
|
return;
|
|
}
|
|
|
|
Flag = mCurrentBootVarErrFlag;
|
|
DEBUG ((EFI_D_INFO, "Initialize variable error flag (%02x)\n", Flag));
|
|
|
|
Status = FindVariable (
|
|
VAR_ERROR_FLAG_NAME,
|
|
&gEdkiiVarErrorFlagGuid,
|
|
&Variable,
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
VarErrFlag = *((VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr));
|
|
if (VarErrFlag == Flag) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
UpdateVariable (
|
|
VAR_ERROR_FLAG_NAME,
|
|
&gEdkiiVarErrorFlagGuid,
|
|
&Flag,
|
|
sizeof (Flag),
|
|
VARIABLE_ATTRIBUTE_NV_BS_RT,
|
|
0,
|
|
0,
|
|
&Variable,
|
|
NULL
|
|
);
|
|
}
|
|
|
|
/**
|
|
Is user variable?
|
|
|
|
@param[in] Variable Pointer to variable header.
|
|
|
|
@retval TRUE User variable.
|
|
@retval FALSE System variable.
|
|
|
|
**/
|
|
BOOLEAN
|
|
IsUserVariable (
|
|
IN VARIABLE_HEADER *Variable
|
|
)
|
|
{
|
|
VAR_CHECK_VARIABLE_PROPERTY Property;
|
|
|
|
//
|
|
// Only after End Of Dxe, the variables belong to system variable are fixed.
|
|
// If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable,
|
|
// then no need to check if the variable is user variable or not specially.
|
|
//
|
|
if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) {
|
|
if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) {
|
|
return TRUE;
|
|
}
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
Calculate common user variable total size.
|
|
|
|
**/
|
|
VOID
|
|
CalculateCommonUserVariableTotalSize (
|
|
VOID
|
|
)
|
|
{
|
|
VARIABLE_HEADER *Variable;
|
|
VARIABLE_HEADER *NextVariable;
|
|
UINTN VariableSize;
|
|
VAR_CHECK_VARIABLE_PROPERTY Property;
|
|
|
|
//
|
|
// Only after End Of Dxe, the variables belong to system variable are fixed.
|
|
// If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable,
|
|
// then no need to calculate the common user variable total size specially.
|
|
//
|
|
if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) {
|
|
Variable = GetStartPointer (mNvVariableCache);
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (mNvVariableCache))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) {
|
|
//
|
|
// No property, it is user variable.
|
|
//
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize;
|
|
}
|
|
}
|
|
|
|
Variable = NextVariable;
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
Initialize variable quota.
|
|
|
|
**/
|
|
VOID
|
|
InitializeVariableQuota (
|
|
VOID
|
|
)
|
|
{
|
|
if (!mEndOfDxe) {
|
|
return;
|
|
}
|
|
|
|
InitializeVarErrorFlag ();
|
|
CalculateCommonUserVariableTotalSize ();
|
|
}
|
|
|
|
/**
|
|
|
|
Variable store garbage collection and reclaim operation.
|
|
|
|
@param[in] VariableBase Base address of variable store.
|
|
@param[out] LastVariableOffset Offset of last variable.
|
|
@param[in] IsVolatile The variable store is volatile or not;
|
|
if it is non-volatile, need FTW.
|
|
@param[in, out] UpdatingPtrTrack Pointer to updating variable pointer track structure.
|
|
@param[in] NewVariable Pointer to new variable.
|
|
@param[in] NewVariableSize New variable size.
|
|
|
|
@return EFI_SUCCESS Reclaim operation has finished successfully.
|
|
@return EFI_OUT_OF_RESOURCES No enough memory resources or variable space.
|
|
@return Others Unexpect error happened during reclaim operation.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
Reclaim (
|
|
IN EFI_PHYSICAL_ADDRESS VariableBase,
|
|
OUT UINTN *LastVariableOffset,
|
|
IN BOOLEAN IsVolatile,
|
|
IN OUT VARIABLE_POINTER_TRACK *UpdatingPtrTrack,
|
|
IN VARIABLE_HEADER *NewVariable,
|
|
IN UINTN NewVariableSize
|
|
)
|
|
{
|
|
VARIABLE_HEADER *Variable;
|
|
VARIABLE_HEADER *AddedVariable;
|
|
VARIABLE_HEADER *NextVariable;
|
|
VARIABLE_HEADER *NextAddedVariable;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
UINT8 *ValidBuffer;
|
|
UINTN MaximumBufferSize;
|
|
UINTN VariableSize;
|
|
UINTN NameSize;
|
|
UINT8 *CurrPtr;
|
|
VOID *Point0;
|
|
VOID *Point1;
|
|
BOOLEAN FoundAdded;
|
|
EFI_STATUS Status;
|
|
UINTN CommonVariableTotalSize;
|
|
UINTN CommonUserVariableTotalSize;
|
|
UINTN HwErrVariableTotalSize;
|
|
VARIABLE_HEADER *UpdatingVariable;
|
|
VARIABLE_HEADER *UpdatingInDeletedTransition;
|
|
|
|
UpdatingVariable = NULL;
|
|
UpdatingInDeletedTransition = NULL;
|
|
if (UpdatingPtrTrack != NULL) {
|
|
UpdatingVariable = UpdatingPtrTrack->CurrPtr;
|
|
UpdatingInDeletedTransition = UpdatingPtrTrack->InDeletedTransitionPtr;
|
|
}
|
|
|
|
VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);
|
|
|
|
CommonVariableTotalSize = 0;
|
|
CommonUserVariableTotalSize = 0;
|
|
HwErrVariableTotalSize = 0;
|
|
|
|
if (IsVolatile || mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
//
|
|
// Start Pointers for the variable.
|
|
//
|
|
Variable = GetStartPointer (VariableStoreHeader);
|
|
MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER);
|
|
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
if ((Variable->State == VAR_ADDED || Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) &&
|
|
Variable != UpdatingVariable &&
|
|
Variable != UpdatingInDeletedTransition
|
|
) {
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
MaximumBufferSize += VariableSize;
|
|
}
|
|
|
|
Variable = NextVariable;
|
|
}
|
|
|
|
if (NewVariable != NULL) {
|
|
//
|
|
// Add the new variable size.
|
|
//
|
|
MaximumBufferSize += NewVariableSize;
|
|
}
|
|
|
|
//
|
|
// Reserve the 1 Bytes with Oxff to identify the
|
|
// end of the variable buffer.
|
|
//
|
|
MaximumBufferSize += 1;
|
|
ValidBuffer = AllocatePool (MaximumBufferSize);
|
|
if (ValidBuffer == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
//
|
|
// For NV variable reclaim, don't allocate pool here and just use mNvVariableCache
|
|
// as the buffer to reduce SMRAM consumption for SMM variable driver.
|
|
//
|
|
MaximumBufferSize = mNvVariableCache->Size;
|
|
ValidBuffer = (UINT8 *) mNvVariableCache;
|
|
}
|
|
|
|
SetMem (ValidBuffer, MaximumBufferSize, 0xff);
|
|
|
|
//
|
|
// Copy variable store header.
|
|
//
|
|
CopyMem (ValidBuffer, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));
|
|
CurrPtr = (UINT8 *) GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);
|
|
|
|
//
|
|
// Reinstall all ADDED variables as long as they are not identical to Updating Variable.
|
|
//
|
|
Variable = GetStartPointer (VariableStoreHeader);
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
if (Variable != UpdatingVariable && Variable->State == VAR_ADDED) {
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
|
|
CurrPtr += VariableSize;
|
|
if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
HwErrVariableTotalSize += VariableSize;
|
|
} else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
CommonVariableTotalSize += VariableSize;
|
|
if (IsUserVariable (Variable)) {
|
|
CommonUserVariableTotalSize += VariableSize;
|
|
}
|
|
}
|
|
}
|
|
Variable = NextVariable;
|
|
}
|
|
|
|
//
|
|
// Reinstall all in delete transition variables.
|
|
//
|
|
Variable = GetStartPointer (VariableStoreHeader);
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
if (Variable != UpdatingVariable && Variable != UpdatingInDeletedTransition && Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
|
|
//
|
|
// Buffer has cached all ADDED variable.
|
|
// Per IN_DELETED variable, we have to guarantee that
|
|
// no ADDED one in previous buffer.
|
|
//
|
|
|
|
FoundAdded = FALSE;
|
|
AddedVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);
|
|
while (IsValidVariableHeader (AddedVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) ValidBuffer))) {
|
|
NextAddedVariable = GetNextVariablePtr (AddedVariable);
|
|
NameSize = NameSizeOfVariable (AddedVariable);
|
|
if (CompareGuid (GetVendorGuidPtr (AddedVariable), GetVendorGuidPtr (Variable)) &&
|
|
NameSize == NameSizeOfVariable (Variable)
|
|
) {
|
|
Point0 = (VOID *) GetVariableNamePtr (AddedVariable);
|
|
Point1 = (VOID *) GetVariableNamePtr (Variable);
|
|
if (CompareMem (Point0, Point1, NameSize) == 0) {
|
|
FoundAdded = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
AddedVariable = NextAddedVariable;
|
|
}
|
|
if (!FoundAdded) {
|
|
//
|
|
// Promote VAR_IN_DELETED_TRANSITION to VAR_ADDED.
|
|
//
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
|
|
((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
|
|
CurrPtr += VariableSize;
|
|
if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
HwErrVariableTotalSize += VariableSize;
|
|
} else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
CommonVariableTotalSize += VariableSize;
|
|
if (IsUserVariable (Variable)) {
|
|
CommonUserVariableTotalSize += VariableSize;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
Variable = NextVariable;
|
|
}
|
|
|
|
//
|
|
// Install the new variable if it is not NULL.
|
|
//
|
|
if (NewVariable != NULL) {
|
|
if (((UINTN) CurrPtr - (UINTN) ValidBuffer) + NewVariableSize > VariableStoreHeader->Size) {
|
|
//
|
|
// No enough space to store the new variable.
|
|
//
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
if (!IsVolatile) {
|
|
if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
HwErrVariableTotalSize += NewVariableSize;
|
|
} else if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
CommonVariableTotalSize += NewVariableSize;
|
|
if (IsUserVariable (NewVariable)) {
|
|
CommonUserVariableTotalSize += NewVariableSize;
|
|
}
|
|
}
|
|
if ((HwErrVariableTotalSize > PcdGet32 (PcdHwErrStorageSize)) ||
|
|
(CommonVariableTotalSize > mVariableModuleGlobal->CommonVariableSpace) ||
|
|
(CommonUserVariableTotalSize > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
|
|
//
|
|
// No enough space to store the new variable by NV or NV+HR attribute.
|
|
//
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
CopyMem (CurrPtr, (UINT8 *) NewVariable, NewVariableSize);
|
|
((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
|
|
if (UpdatingVariable != NULL) {
|
|
UpdatingPtrTrack->CurrPtr = (VARIABLE_HEADER *)((UINTN)UpdatingPtrTrack->StartPtr + ((UINTN)CurrPtr - (UINTN)GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer)));
|
|
UpdatingPtrTrack->InDeletedTransitionPtr = NULL;
|
|
}
|
|
CurrPtr += NewVariableSize;
|
|
}
|
|
|
|
if (IsVolatile || mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
//
|
|
// If volatile/emulated non-volatile variable store, just copy valid buffer.
|
|
//
|
|
SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);
|
|
CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) CurrPtr - (UINTN) ValidBuffer);
|
|
*LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer;
|
|
if (!IsVolatile) {
|
|
//
|
|
// Emulated non-volatile variable mode.
|
|
//
|
|
mVariableModuleGlobal->HwErrVariableTotalSize = HwErrVariableTotalSize;
|
|
mVariableModuleGlobal->CommonVariableTotalSize = CommonVariableTotalSize;
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize = CommonUserVariableTotalSize;
|
|
}
|
|
Status = EFI_SUCCESS;
|
|
} else {
|
|
//
|
|
// If non-volatile variable store, perform FTW here.
|
|
//
|
|
Status = FtwVariableSpace (
|
|
VariableBase,
|
|
(VARIABLE_STORE_HEADER *) ValidBuffer
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
*LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer;
|
|
mVariableModuleGlobal->HwErrVariableTotalSize = HwErrVariableTotalSize;
|
|
mVariableModuleGlobal->CommonVariableTotalSize = CommonVariableTotalSize;
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize = CommonUserVariableTotalSize;
|
|
} else {
|
|
mVariableModuleGlobal->HwErrVariableTotalSize = 0;
|
|
mVariableModuleGlobal->CommonVariableTotalSize = 0;
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize = 0;
|
|
Variable = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase);
|
|
while (IsValidVariableHeader (Variable, GetEndPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
|
|
} else if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
|
|
if (IsUserVariable (Variable)) {
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize;
|
|
}
|
|
}
|
|
|
|
Variable = NextVariable;
|
|
}
|
|
*LastVariableOffset = (UINTN) Variable - (UINTN) VariableBase;
|
|
}
|
|
}
|
|
|
|
Done:
|
|
if (IsVolatile || mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
FreePool (ValidBuffer);
|
|
} else {
|
|
//
|
|
// For NV variable reclaim, we use mNvVariableCache as the buffer, so copy the data back.
|
|
//
|
|
CopyMem (mNvVariableCache, (UINT8 *)(UINTN)VariableBase, VariableStoreHeader->Size);
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Find the variable in the specified variable store.
|
|
|
|
@param[in] VariableName Name of the variable to be found
|
|
@param[in] VendorGuid Vendor GUID to be found.
|
|
@param[in] IgnoreRtCheck Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute
|
|
check at runtime when searching variable.
|
|
@param[in, out] PtrTrack Variable Track Pointer structure that contains Variable Information.
|
|
|
|
@retval EFI_SUCCESS Variable found successfully
|
|
@retval EFI_NOT_FOUND Variable not found
|
|
**/
|
|
EFI_STATUS
|
|
FindVariableEx (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
IN BOOLEAN IgnoreRtCheck,
|
|
IN OUT VARIABLE_POINTER_TRACK *PtrTrack
|
|
)
|
|
{
|
|
VARIABLE_HEADER *InDeletedVariable;
|
|
VOID *Point;
|
|
|
|
PtrTrack->InDeletedTransitionPtr = NULL;
|
|
|
|
//
|
|
// Find the variable by walk through HOB, volatile and non-volatile variable store.
|
|
//
|
|
InDeletedVariable = NULL;
|
|
|
|
for ( PtrTrack->CurrPtr = PtrTrack->StartPtr
|
|
; IsValidVariableHeader (PtrTrack->CurrPtr, PtrTrack->EndPtr)
|
|
; PtrTrack->CurrPtr = GetNextVariablePtr (PtrTrack->CurrPtr)
|
|
) {
|
|
if (PtrTrack->CurrPtr->State == VAR_ADDED ||
|
|
PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
|
|
) {
|
|
if (IgnoreRtCheck || !AtRuntime () || ((PtrTrack->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
|
|
if (VariableName[0] == 0) {
|
|
if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
InDeletedVariable = PtrTrack->CurrPtr;
|
|
} else {
|
|
PtrTrack->InDeletedTransitionPtr = InDeletedVariable;
|
|
return EFI_SUCCESS;
|
|
}
|
|
} else {
|
|
if (CompareGuid (VendorGuid, GetVendorGuidPtr (PtrTrack->CurrPtr))) {
|
|
Point = (VOID *) GetVariableNamePtr (PtrTrack->CurrPtr);
|
|
|
|
ASSERT (NameSizeOfVariable (PtrTrack->CurrPtr) != 0);
|
|
if (CompareMem (VariableName, Point, NameSizeOfVariable (PtrTrack->CurrPtr)) == 0) {
|
|
if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
InDeletedVariable = PtrTrack->CurrPtr;
|
|
} else {
|
|
PtrTrack->InDeletedTransitionPtr = InDeletedVariable;
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
PtrTrack->CurrPtr = InDeletedVariable;
|
|
return (PtrTrack->CurrPtr == NULL) ? EFI_NOT_FOUND : EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
Finds variable in storage blocks of volatile and non-volatile storage areas.
|
|
|
|
This code finds variable in storage blocks of volatile and non-volatile storage areas.
|
|
If VariableName is an empty string, then we just return the first
|
|
qualified variable without comparing VariableName and VendorGuid.
|
|
If IgnoreRtCheck is TRUE, then we ignore the EFI_VARIABLE_RUNTIME_ACCESS attribute check
|
|
at runtime when searching existing variable, only VariableName and VendorGuid are compared.
|
|
Otherwise, variables without EFI_VARIABLE_RUNTIME_ACCESS are not visible at runtime.
|
|
|
|
@param[in] VariableName Name of the variable to be found.
|
|
@param[in] VendorGuid Vendor GUID to be found.
|
|
@param[out] PtrTrack VARIABLE_POINTER_TRACK structure for output,
|
|
including the range searched and the target position.
|
|
@param[in] Global Pointer to VARIABLE_GLOBAL structure, including
|
|
base of volatile variable storage area, base of
|
|
NV variable storage area, and a lock.
|
|
@param[in] IgnoreRtCheck Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute
|
|
check at runtime when searching variable.
|
|
|
|
@retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while
|
|
VendorGuid is NULL.
|
|
@retval EFI_SUCCESS Variable successfully found.
|
|
@retval EFI_NOT_FOUND Variable not found
|
|
|
|
**/
|
|
EFI_STATUS
|
|
FindVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
OUT VARIABLE_POINTER_TRACK *PtrTrack,
|
|
IN VARIABLE_GLOBAL *Global,
|
|
IN BOOLEAN IgnoreRtCheck
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader[VariableStoreTypeMax];
|
|
VARIABLE_STORE_TYPE Type;
|
|
|
|
if (VariableName[0] != 0 && VendorGuid == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// 0: Volatile, 1: HOB, 2: Non-Volatile.
|
|
// The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName
|
|
// make use of this mapping to implement search algorithm.
|
|
//
|
|
VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) Global->VolatileVariableBase;
|
|
VariableStoreHeader[VariableStoreTypeHob] = (VARIABLE_STORE_HEADER *) (UINTN) Global->HobVariableBase;
|
|
VariableStoreHeader[VariableStoreTypeNv] = mNvVariableCache;
|
|
|
|
//
|
|
// Find the variable by walk through HOB, volatile and non-volatile variable store.
|
|
//
|
|
for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) {
|
|
if (VariableStoreHeader[Type] == NULL) {
|
|
continue;
|
|
}
|
|
|
|
PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Type]);
|
|
PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Type]);
|
|
PtrTrack->Volatile = (BOOLEAN) (Type == VariableStoreTypeVolatile);
|
|
|
|
Status = FindVariableEx (VariableName, VendorGuid, IgnoreRtCheck, PtrTrack);
|
|
if (!EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
/**
|
|
Get index from supported language codes according to language string.
|
|
|
|
This code is used to get corresponding index in supported language codes. It can handle
|
|
RFC4646 and ISO639 language tags.
|
|
In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.
|
|
In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.
|
|
|
|
For example:
|
|
SupportedLang = "engfraengfra"
|
|
Lang = "eng"
|
|
Iso639Language = TRUE
|
|
The return value is "0".
|
|
Another example:
|
|
SupportedLang = "en;fr;en-US;fr-FR"
|
|
Lang = "fr-FR"
|
|
Iso639Language = FALSE
|
|
The return value is "3".
|
|
|
|
@param SupportedLang Platform supported language codes.
|
|
@param Lang Configured language.
|
|
@param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.
|
|
|
|
@retval The index of language in the language codes.
|
|
|
|
**/
|
|
UINTN
|
|
GetIndexFromSupportedLangCodes(
|
|
IN CHAR8 *SupportedLang,
|
|
IN CHAR8 *Lang,
|
|
IN BOOLEAN Iso639Language
|
|
)
|
|
{
|
|
UINTN Index;
|
|
UINTN CompareLength;
|
|
UINTN LanguageLength;
|
|
|
|
if (Iso639Language) {
|
|
CompareLength = ISO_639_2_ENTRY_SIZE;
|
|
for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {
|
|
if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {
|
|
//
|
|
// Successfully find the index of Lang string in SupportedLang string.
|
|
//
|
|
Index = Index / CompareLength;
|
|
return Index;
|
|
}
|
|
}
|
|
ASSERT (FALSE);
|
|
return 0;
|
|
} else {
|
|
//
|
|
// Compare RFC4646 language code
|
|
//
|
|
Index = 0;
|
|
for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++);
|
|
|
|
for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) {
|
|
//
|
|
// Skip ';' characters in SupportedLang
|
|
//
|
|
for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++);
|
|
//
|
|
// Determine the length of the next language code in SupportedLang
|
|
//
|
|
for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);
|
|
|
|
if ((CompareLength == LanguageLength) &&
|
|
(AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {
|
|
//
|
|
// Successfully find the index of Lang string in SupportedLang string.
|
|
//
|
|
return Index;
|
|
}
|
|
}
|
|
ASSERT (FALSE);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Get language string from supported language codes according to index.
|
|
|
|
This code is used to get corresponding language strings in supported language codes. It can handle
|
|
RFC4646 and ISO639 language tags.
|
|
In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.
|
|
In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.
|
|
|
|
For example:
|
|
SupportedLang = "engfraengfra"
|
|
Index = "1"
|
|
Iso639Language = TRUE
|
|
The return value is "fra".
|
|
Another example:
|
|
SupportedLang = "en;fr;en-US;fr-FR"
|
|
Index = "1"
|
|
Iso639Language = FALSE
|
|
The return value is "fr".
|
|
|
|
@param SupportedLang Platform supported language codes.
|
|
@param Index The index in supported language codes.
|
|
@param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.
|
|
|
|
@retval The language string in the language codes.
|
|
|
|
**/
|
|
CHAR8 *
|
|
GetLangFromSupportedLangCodes (
|
|
IN CHAR8 *SupportedLang,
|
|
IN UINTN Index,
|
|
IN BOOLEAN Iso639Language
|
|
)
|
|
{
|
|
UINTN SubIndex;
|
|
UINTN CompareLength;
|
|
CHAR8 *Supported;
|
|
|
|
SubIndex = 0;
|
|
Supported = SupportedLang;
|
|
if (Iso639Language) {
|
|
//
|
|
// According to the index of Lang string in SupportedLang string to get the language.
|
|
// This code will be invoked in RUNTIME, therefore there is not a memory allocate/free operation.
|
|
// In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
|
|
//
|
|
CompareLength = ISO_639_2_ENTRY_SIZE;
|
|
mVariableModuleGlobal->Lang[CompareLength] = '\0';
|
|
return CopyMem (mVariableModuleGlobal->Lang, SupportedLang + Index * CompareLength, CompareLength);
|
|
|
|
} else {
|
|
while (TRUE) {
|
|
//
|
|
// Take semicolon as delimitation, sequentially traverse supported language codes.
|
|
//
|
|
for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {
|
|
Supported++;
|
|
}
|
|
if ((*Supported == '\0') && (SubIndex != Index)) {
|
|
//
|
|
// Have completed the traverse, but not find corrsponding string.
|
|
// This case is not allowed to happen.
|
|
//
|
|
ASSERT(FALSE);
|
|
return NULL;
|
|
}
|
|
if (SubIndex == Index) {
|
|
//
|
|
// According to the index of Lang string in SupportedLang string to get the language.
|
|
// As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
|
|
// In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
|
|
//
|
|
mVariableModuleGlobal->PlatformLang[CompareLength] = '\0';
|
|
return CopyMem (mVariableModuleGlobal->PlatformLang, Supported - CompareLength, CompareLength);
|
|
}
|
|
SubIndex++;
|
|
|
|
//
|
|
// Skip ';' characters in Supported
|
|
//
|
|
for (; *Supported != '\0' && *Supported == ';'; Supported++);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
Returns a pointer to an allocated buffer that contains the best matching language
|
|
from a set of supported languages.
|
|
|
|
This function supports both ISO 639-2 and RFC 4646 language codes, but language
|
|
code types may not be mixed in a single call to this function. This function
|
|
supports a variable argument list that allows the caller to pass in a prioritized
|
|
list of language codes to test against all the language codes in SupportedLanguages.
|
|
|
|
If SupportedLanguages is NULL, then ASSERT().
|
|
|
|
@param[in] SupportedLanguages A pointer to a Null-terminated ASCII string that
|
|
contains a set of language codes in the format
|
|
specified by Iso639Language.
|
|
@param[in] Iso639Language If not zero, then all language codes are assumed to be
|
|
in ISO 639-2 format. If zero, then all language
|
|
codes are assumed to be in RFC 4646 language format
|
|
@param[in] ... A variable argument list that contains pointers to
|
|
Null-terminated ASCII strings that contain one or more
|
|
language codes in the format specified by Iso639Language.
|
|
The first language code from each of these language
|
|
code lists is used to determine if it is an exact or
|
|
close match to any of the language codes in
|
|
SupportedLanguages. Close matches only apply to RFC 4646
|
|
language codes, and the matching algorithm from RFC 4647
|
|
is used to determine if a close match is present. If
|
|
an exact or close match is found, then the matching
|
|
language code from SupportedLanguages is returned. If
|
|
no matches are found, then the next variable argument
|
|
parameter is evaluated. The variable argument list
|
|
is terminated by a NULL.
|
|
|
|
@retval NULL The best matching language could not be found in SupportedLanguages.
|
|
@retval NULL There are not enough resources available to return the best matching
|
|
language.
|
|
@retval Other A pointer to a Null-terminated ASCII string that is the best matching
|
|
language in SupportedLanguages.
|
|
|
|
**/
|
|
CHAR8 *
|
|
EFIAPI
|
|
VariableGetBestLanguage (
|
|
IN CONST CHAR8 *SupportedLanguages,
|
|
IN UINTN Iso639Language,
|
|
...
|
|
)
|
|
{
|
|
VA_LIST Args;
|
|
CHAR8 *Language;
|
|
UINTN CompareLength;
|
|
UINTN LanguageLength;
|
|
CONST CHAR8 *Supported;
|
|
CHAR8 *Buffer;
|
|
|
|
if (SupportedLanguages == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
VA_START (Args, Iso639Language);
|
|
while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) {
|
|
//
|
|
// Default to ISO 639-2 mode
|
|
//
|
|
CompareLength = 3;
|
|
LanguageLength = MIN (3, AsciiStrLen (Language));
|
|
|
|
//
|
|
// If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language
|
|
//
|
|
if (Iso639Language == 0) {
|
|
for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++);
|
|
}
|
|
|
|
//
|
|
// Trim back the length of Language used until it is empty
|
|
//
|
|
while (LanguageLength > 0) {
|
|
//
|
|
// Loop through all language codes in SupportedLanguages
|
|
//
|
|
for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) {
|
|
//
|
|
// In RFC 4646 mode, then Loop through all language codes in SupportedLanguages
|
|
//
|
|
if (Iso639Language == 0) {
|
|
//
|
|
// Skip ';' characters in Supported
|
|
//
|
|
for (; *Supported != '\0' && *Supported == ';'; Supported++);
|
|
//
|
|
// Determine the length of the next language code in Supported
|
|
//
|
|
for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++);
|
|
//
|
|
// If Language is longer than the Supported, then skip to the next language
|
|
//
|
|
if (LanguageLength > CompareLength) {
|
|
continue;
|
|
}
|
|
}
|
|
//
|
|
// See if the first LanguageLength characters in Supported match Language
|
|
//
|
|
if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) {
|
|
VA_END (Args);
|
|
|
|
Buffer = (Iso639Language != 0) ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang;
|
|
Buffer[CompareLength] = '\0';
|
|
return CopyMem (Buffer, Supported, CompareLength);
|
|
}
|
|
}
|
|
|
|
if (Iso639Language != 0) {
|
|
//
|
|
// If ISO 639 mode, then each language can only be tested once
|
|
//
|
|
LanguageLength = 0;
|
|
} else {
|
|
//
|
|
// If RFC 4646 mode, then trim Language from the right to the next '-' character
|
|
//
|
|
for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--);
|
|
}
|
|
}
|
|
}
|
|
VA_END (Args);
|
|
|
|
//
|
|
// No matches were found
|
|
//
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
This function is to check if the remaining variable space is enough to set
|
|
all Variables from argument list successfully. The purpose of the check
|
|
is to keep the consistency of the Variables to be in variable storage.
|
|
|
|
Note: Variables are assumed to be in same storage.
|
|
The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
|
|
so follow the argument sequence to check the Variables.
|
|
|
|
@param[in] Attributes Variable attributes for Variable entries.
|
|
@param[in] Marker VA_LIST style variable argument list.
|
|
The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
|
|
A NULL terminates the list. The VariableSize of
|
|
VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
|
|
It will be changed to variable total size as output.
|
|
|
|
@retval TRUE Have enough variable space to set the Variables successfully.
|
|
@retval FALSE No enough variable space to set the Variables successfully.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
CheckRemainingSpaceForConsistencyInternal (
|
|
IN UINT32 Attributes,
|
|
IN VA_LIST Marker
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VA_LIST Args;
|
|
VARIABLE_ENTRY_CONSISTENCY *VariableEntry;
|
|
UINT64 MaximumVariableStorageSize;
|
|
UINT64 RemainingVariableStorageSize;
|
|
UINT64 MaximumVariableSize;
|
|
UINTN TotalNeededSize;
|
|
UINTN OriginalVarSize;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
VARIABLE_POINTER_TRACK VariablePtrTrack;
|
|
VARIABLE_HEADER *NextVariable;
|
|
UINTN VarNameSize;
|
|
UINTN VarDataSize;
|
|
|
|
//
|
|
// Non-Volatile related.
|
|
//
|
|
VariableStoreHeader = mNvVariableCache;
|
|
|
|
Status = VariableServiceQueryVariableInfoInternal (
|
|
Attributes,
|
|
&MaximumVariableStorageSize,
|
|
&RemainingVariableStorageSize,
|
|
&MaximumVariableSize
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
TotalNeededSize = 0;
|
|
VA_COPY (Args, Marker);
|
|
VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
|
|
while (VariableEntry != NULL) {
|
|
//
|
|
// Calculate variable total size.
|
|
//
|
|
VarNameSize = StrSize (VariableEntry->Name);
|
|
VarNameSize += GET_PAD_SIZE (VarNameSize);
|
|
VarDataSize = VariableEntry->VariableSize;
|
|
VarDataSize += GET_PAD_SIZE (VarDataSize);
|
|
VariableEntry->VariableSize = HEADER_ALIGN (GetVariableHeaderSize () + VarNameSize + VarDataSize);
|
|
|
|
TotalNeededSize += VariableEntry->VariableSize;
|
|
VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
|
|
}
|
|
VA_END (Args);
|
|
|
|
if (RemainingVariableStorageSize >= TotalNeededSize) {
|
|
//
|
|
// Already have enough space.
|
|
//
|
|
return TRUE;
|
|
} else if (AtRuntime ()) {
|
|
//
|
|
// At runtime, no reclaim.
|
|
// The original variable space of Variables can't be reused.
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
VA_COPY (Args, Marker);
|
|
VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
|
|
while (VariableEntry != NULL) {
|
|
//
|
|
// Check if Variable[Index] has been present and get its size.
|
|
//
|
|
OriginalVarSize = 0;
|
|
VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader);
|
|
VariablePtrTrack.EndPtr = GetEndPointer (VariableStoreHeader);
|
|
Status = FindVariableEx (
|
|
VariableEntry->Name,
|
|
VariableEntry->Guid,
|
|
FALSE,
|
|
&VariablePtrTrack
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Get size of Variable[Index].
|
|
//
|
|
NextVariable = GetNextVariablePtr (VariablePtrTrack.CurrPtr);
|
|
OriginalVarSize = (UINTN) NextVariable - (UINTN) VariablePtrTrack.CurrPtr;
|
|
//
|
|
// Add the original size of Variable[Index] to remaining variable storage size.
|
|
//
|
|
RemainingVariableStorageSize += OriginalVarSize;
|
|
}
|
|
if (VariableEntry->VariableSize > RemainingVariableStorageSize) {
|
|
//
|
|
// No enough space for Variable[Index].
|
|
//
|
|
VA_END (Args);
|
|
return FALSE;
|
|
}
|
|
//
|
|
// Sub the (new) size of Variable[Index] from remaining variable storage size.
|
|
//
|
|
RemainingVariableStorageSize -= VariableEntry->VariableSize;
|
|
VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
|
|
}
|
|
VA_END (Args);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
This function is to check if the remaining variable space is enough to set
|
|
all Variables from argument list successfully. The purpose of the check
|
|
is to keep the consistency of the Variables to be in variable storage.
|
|
|
|
Note: Variables are assumed to be in same storage.
|
|
The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
|
|
so follow the argument sequence to check the Variables.
|
|
|
|
@param[in] Attributes Variable attributes for Variable entries.
|
|
@param ... The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
|
|
A NULL terminates the list. The VariableSize of
|
|
VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
|
|
It will be changed to variable total size as output.
|
|
|
|
@retval TRUE Have enough variable space to set the Variables successfully.
|
|
@retval FALSE No enough variable space to set the Variables successfully.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
CheckRemainingSpaceForConsistency (
|
|
IN UINT32 Attributes,
|
|
...
|
|
)
|
|
{
|
|
VA_LIST Marker;
|
|
BOOLEAN Return;
|
|
|
|
VA_START (Marker, Attributes);
|
|
|
|
Return = CheckRemainingSpaceForConsistencyInternal (Attributes, Marker);
|
|
|
|
VA_END (Marker);
|
|
|
|
return Return;
|
|
}
|
|
|
|
/**
|
|
Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.
|
|
|
|
When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.
|
|
|
|
According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,
|
|
and are read-only. Therefore, in variable driver, only store the original value for other use.
|
|
|
|
@param[in] VariableName Name of variable.
|
|
|
|
@param[in] Data Variable data.
|
|
|
|
@param[in] DataSize Size of data. 0 means delete.
|
|
|
|
@retval EFI_SUCCESS The update operation is successful or ignored.
|
|
@retval EFI_WRITE_PROTECTED Update PlatformLangCodes/LangCodes at runtime.
|
|
@retval EFI_OUT_OF_RESOURCES No enough variable space to do the update operation.
|
|
@retval Others Other errors happened during the update operation.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
AutoUpdateLangVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN VOID *Data,
|
|
IN UINTN DataSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
CHAR8 *BestPlatformLang;
|
|
CHAR8 *BestLang;
|
|
UINTN Index;
|
|
UINT32 Attributes;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
BOOLEAN SetLanguageCodes;
|
|
VARIABLE_ENTRY_CONSISTENCY VariableEntry[2];
|
|
|
|
//
|
|
// Don't do updates for delete operation
|
|
//
|
|
if (DataSize == 0) {
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
SetLanguageCodes = FALSE;
|
|
|
|
if (StrCmp (VariableName, EFI_PLATFORM_LANG_CODES_VARIABLE_NAME) == 0) {
|
|
//
|
|
// PlatformLangCodes is a volatile variable, so it can not be updated at runtime.
|
|
//
|
|
if (AtRuntime ()) {
|
|
return EFI_WRITE_PROTECTED;
|
|
}
|
|
|
|
SetLanguageCodes = TRUE;
|
|
|
|
//
|
|
// According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only
|
|
// Therefore, in variable driver, only store the original value for other use.
|
|
//
|
|
if (mVariableModuleGlobal->PlatformLangCodes != NULL) {
|
|
FreePool (mVariableModuleGlobal->PlatformLangCodes);
|
|
}
|
|
mVariableModuleGlobal->PlatformLangCodes = AllocateRuntimeCopyPool (DataSize, Data);
|
|
ASSERT (mVariableModuleGlobal->PlatformLangCodes != NULL);
|
|
|
|
//
|
|
// PlatformLang holds a single language from PlatformLangCodes,
|
|
// so the size of PlatformLangCodes is enough for the PlatformLang.
|
|
//
|
|
if (mVariableModuleGlobal->PlatformLang != NULL) {
|
|
FreePool (mVariableModuleGlobal->PlatformLang);
|
|
}
|
|
mVariableModuleGlobal->PlatformLang = AllocateRuntimePool (DataSize);
|
|
ASSERT (mVariableModuleGlobal->PlatformLang != NULL);
|
|
|
|
} else if (StrCmp (VariableName, EFI_LANG_CODES_VARIABLE_NAME) == 0) {
|
|
//
|
|
// LangCodes is a volatile variable, so it can not be updated at runtime.
|
|
//
|
|
if (AtRuntime ()) {
|
|
return EFI_WRITE_PROTECTED;
|
|
}
|
|
|
|
SetLanguageCodes = TRUE;
|
|
|
|
//
|
|
// According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only
|
|
// Therefore, in variable driver, only store the original value for other use.
|
|
//
|
|
if (mVariableModuleGlobal->LangCodes != NULL) {
|
|
FreePool (mVariableModuleGlobal->LangCodes);
|
|
}
|
|
mVariableModuleGlobal->LangCodes = AllocateRuntimeCopyPool (DataSize, Data);
|
|
ASSERT (mVariableModuleGlobal->LangCodes != NULL);
|
|
}
|
|
|
|
if (SetLanguageCodes
|
|
&& (mVariableModuleGlobal->PlatformLangCodes != NULL)
|
|
&& (mVariableModuleGlobal->LangCodes != NULL)) {
|
|
//
|
|
// Update Lang if PlatformLang is already set
|
|
// Update PlatformLang if Lang is already set
|
|
//
|
|
Status = FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Update Lang
|
|
//
|
|
VariableName = EFI_PLATFORM_LANG_VARIABLE_NAME;
|
|
Data = GetVariableDataPtr (Variable.CurrPtr);
|
|
DataSize = DataSizeOfVariable (Variable.CurrPtr);
|
|
} else {
|
|
Status = FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Update PlatformLang
|
|
//
|
|
VariableName = EFI_LANG_VARIABLE_NAME;
|
|
Data = GetVariableDataPtr (Variable.CurrPtr);
|
|
DataSize = DataSizeOfVariable (Variable.CurrPtr);
|
|
} else {
|
|
//
|
|
// Neither PlatformLang nor Lang is set, directly return
|
|
//
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
}
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
//
|
|
// According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.
|
|
//
|
|
Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;
|
|
|
|
if (StrCmp (VariableName, EFI_PLATFORM_LANG_VARIABLE_NAME) == 0) {
|
|
//
|
|
// Update Lang when PlatformLangCodes/LangCodes were set.
|
|
//
|
|
if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {
|
|
//
|
|
// When setting PlatformLang, firstly get most matched language string from supported language codes.
|
|
//
|
|
BestPlatformLang = VariableGetBestLanguage (mVariableModuleGlobal->PlatformLangCodes, FALSE, Data, NULL);
|
|
if (BestPlatformLang != NULL) {
|
|
//
|
|
// Get the corresponding index in language codes.
|
|
//
|
|
Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, BestPlatformLang, FALSE);
|
|
|
|
//
|
|
// Get the corresponding ISO639 language tag according to RFC4646 language tag.
|
|
//
|
|
BestLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, Index, TRUE);
|
|
|
|
//
|
|
// Check the variable space for both Lang and PlatformLang variable.
|
|
//
|
|
VariableEntry[0].VariableSize = ISO_639_2_ENTRY_SIZE + 1;
|
|
VariableEntry[0].Guid = &gEfiGlobalVariableGuid;
|
|
VariableEntry[0].Name = EFI_LANG_VARIABLE_NAME;
|
|
|
|
VariableEntry[1].VariableSize = AsciiStrSize (BestPlatformLang);
|
|
VariableEntry[1].Guid = &gEfiGlobalVariableGuid;
|
|
VariableEntry[1].Name = EFI_PLATFORM_LANG_VARIABLE_NAME;
|
|
if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) {
|
|
//
|
|
// No enough variable space to set both Lang and PlatformLang successfully.
|
|
//
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
} else {
|
|
//
|
|
// Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.
|
|
//
|
|
FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
|
|
Status = UpdateVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestLang,
|
|
ISO_639_2_ENTRY_SIZE + 1, Attributes, 0, 0, &Variable, NULL);
|
|
}
|
|
|
|
DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a Status: %r\n", BestPlatformLang, BestLang, Status));
|
|
}
|
|
}
|
|
|
|
} else if (StrCmp (VariableName, EFI_LANG_VARIABLE_NAME) == 0) {
|
|
//
|
|
// Update PlatformLang when PlatformLangCodes/LangCodes were set.
|
|
//
|
|
if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {
|
|
//
|
|
// When setting Lang, firstly get most matched language string from supported language codes.
|
|
//
|
|
BestLang = VariableGetBestLanguage (mVariableModuleGlobal->LangCodes, TRUE, Data, NULL);
|
|
if (BestLang != NULL) {
|
|
//
|
|
// Get the corresponding index in language codes.
|
|
//
|
|
Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, BestLang, TRUE);
|
|
|
|
//
|
|
// Get the corresponding RFC4646 language tag according to ISO639 language tag.
|
|
//
|
|
BestPlatformLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, Index, FALSE);
|
|
|
|
//
|
|
// Check the variable space for both PlatformLang and Lang variable.
|
|
//
|
|
VariableEntry[0].VariableSize = AsciiStrSize (BestPlatformLang);
|
|
VariableEntry[0].Guid = &gEfiGlobalVariableGuid;
|
|
VariableEntry[0].Name = EFI_PLATFORM_LANG_VARIABLE_NAME;
|
|
|
|
VariableEntry[1].VariableSize = ISO_639_2_ENTRY_SIZE + 1;
|
|
VariableEntry[1].Guid = &gEfiGlobalVariableGuid;
|
|
VariableEntry[1].Name = EFI_LANG_VARIABLE_NAME;
|
|
if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) {
|
|
//
|
|
// No enough variable space to set both PlatformLang and Lang successfully.
|
|
//
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
} else {
|
|
//
|
|
// Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.
|
|
//
|
|
FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
|
|
Status = UpdateVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestPlatformLang,
|
|
AsciiStrSize (BestPlatformLang), Attributes, 0, 0, &Variable, NULL);
|
|
}
|
|
|
|
DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a Status: %r\n", BestLang, BestPlatformLang, Status));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (SetLanguageCodes) {
|
|
//
|
|
// Continue to set PlatformLangCodes or LangCodes.
|
|
//
|
|
return EFI_SUCCESS;
|
|
} else {
|
|
return Status;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Compare two EFI_TIME data.
|
|
|
|
|
|
@param FirstTime A pointer to the first EFI_TIME data.
|
|
@param SecondTime A pointer to the second EFI_TIME data.
|
|
|
|
@retval TRUE The FirstTime is not later than the SecondTime.
|
|
@retval FALSE The FirstTime is later than the SecondTime.
|
|
|
|
**/
|
|
BOOLEAN
|
|
VariableCompareTimeStampInternal (
|
|
IN EFI_TIME *FirstTime,
|
|
IN EFI_TIME *SecondTime
|
|
)
|
|
{
|
|
if (FirstTime->Year != SecondTime->Year) {
|
|
return (BOOLEAN) (FirstTime->Year < SecondTime->Year);
|
|
} else if (FirstTime->Month != SecondTime->Month) {
|
|
return (BOOLEAN) (FirstTime->Month < SecondTime->Month);
|
|
} else if (FirstTime->Day != SecondTime->Day) {
|
|
return (BOOLEAN) (FirstTime->Day < SecondTime->Day);
|
|
} else if (FirstTime->Hour != SecondTime->Hour) {
|
|
return (BOOLEAN) (FirstTime->Hour < SecondTime->Hour);
|
|
} else if (FirstTime->Minute != SecondTime->Minute) {
|
|
return (BOOLEAN) (FirstTime->Minute < SecondTime->Minute);
|
|
}
|
|
|
|
return (BOOLEAN) (FirstTime->Second <= SecondTime->Second);
|
|
}
|
|
|
|
/**
|
|
Update the variable region with Variable information. If EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS is set,
|
|
index of associated public key is needed.
|
|
|
|
@param[in] VariableName Name of variable.
|
|
@param[in] VendorGuid Guid of variable.
|
|
@param[in] Data Variable data.
|
|
@param[in] DataSize Size of data. 0 means delete.
|
|
@param[in] Attributes Attributes of the variable.
|
|
@param[in] KeyIndex Index of associated public key.
|
|
@param[in] MonotonicCount Value of associated monotonic count.
|
|
@param[in, out] CacheVariable The variable information which is used to keep track of variable usage.
|
|
@param[in] TimeStamp Value of associated TimeStamp.
|
|
|
|
@retval EFI_SUCCESS The update operation is success.
|
|
@retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
UpdateVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
IN VOID *Data,
|
|
IN UINTN DataSize,
|
|
IN UINT32 Attributes OPTIONAL,
|
|
IN UINT32 KeyIndex OPTIONAL,
|
|
IN UINT64 MonotonicCount OPTIONAL,
|
|
IN OUT VARIABLE_POINTER_TRACK *CacheVariable,
|
|
IN EFI_TIME *TimeStamp OPTIONAL
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_HEADER *NextVariable;
|
|
UINTN ScratchSize;
|
|
UINTN MaxDataSize;
|
|
UINTN VarNameOffset;
|
|
UINTN VarDataOffset;
|
|
UINTN VarNameSize;
|
|
UINTN VarSize;
|
|
BOOLEAN Volatile;
|
|
EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb;
|
|
UINT8 State;
|
|
VARIABLE_POINTER_TRACK *Variable;
|
|
VARIABLE_POINTER_TRACK NvVariable;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
UINT8 *BufferForMerge;
|
|
UINTN MergedBufSize;
|
|
BOOLEAN DataReady;
|
|
UINTN DataOffset;
|
|
BOOLEAN IsCommonVariable;
|
|
BOOLEAN IsCommonUserVariable;
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
|
|
|
|
if (mVariableModuleGlobal->FvbInstance == NULL && !mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
//
|
|
// The FVB protocol is not ready, so the EFI_VARIABLE_WRITE_ARCH_PROTOCOL is not installed.
|
|
//
|
|
if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
//
|
|
// Trying to update NV variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL
|
|
//
|
|
DEBUG ((EFI_D_ERROR, "Update NV variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET));
|
|
return EFI_NOT_AVAILABLE_YET;
|
|
} else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
//
|
|
// Trying to update volatile authenticated variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL
|
|
// The authenticated variable perhaps is not initialized, just return here.
|
|
//
|
|
DEBUG ((EFI_D_ERROR, "Update AUTH variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET));
|
|
return EFI_NOT_AVAILABLE_YET;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Check if CacheVariable points to the variable in variable HOB.
|
|
// If yes, let CacheVariable points to the variable in NV variable cache.
|
|
//
|
|
if ((CacheVariable->CurrPtr != NULL) &&
|
|
(mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) &&
|
|
(CacheVariable->StartPtr == GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase))
|
|
) {
|
|
CacheVariable->StartPtr = GetStartPointer (mNvVariableCache);
|
|
CacheVariable->EndPtr = GetEndPointer (mNvVariableCache);
|
|
CacheVariable->Volatile = FALSE;
|
|
Status = FindVariableEx (VariableName, VendorGuid, FALSE, CacheVariable);
|
|
if (CacheVariable->CurrPtr == NULL || EFI_ERROR (Status)) {
|
|
//
|
|
// There is no matched variable in NV variable cache.
|
|
//
|
|
if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0)) || (Attributes == 0)) {
|
|
//
|
|
// It is to delete variable,
|
|
// go to delete this variable in variable HOB and
|
|
// try to flush other variables from HOB to flash.
|
|
//
|
|
UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, FALSE, TRUE, FALSE);
|
|
FlushHobVariableToFlash (VariableName, VendorGuid);
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ((CacheVariable->CurrPtr == NULL) || CacheVariable->Volatile) {
|
|
Variable = CacheVariable;
|
|
} else {
|
|
//
|
|
// Update/Delete existing NV variable.
|
|
// CacheVariable points to the variable in the memory copy of Flash area
|
|
// Now let Variable points to the same variable in Flash area.
|
|
//
|
|
VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);
|
|
Variable = &NvVariable;
|
|
Variable->StartPtr = GetStartPointer (VariableStoreHeader);
|
|
Variable->EndPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->EndPtr - (UINTN)CacheVariable->StartPtr));
|
|
|
|
Variable->CurrPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->CurrPtr - (UINTN)CacheVariable->StartPtr));
|
|
if (CacheVariable->InDeletedTransitionPtr != NULL) {
|
|
Variable->InDeletedTransitionPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->InDeletedTransitionPtr - (UINTN)CacheVariable->StartPtr));
|
|
} else {
|
|
Variable->InDeletedTransitionPtr = NULL;
|
|
}
|
|
Variable->Volatile = FALSE;
|
|
}
|
|
|
|
Fvb = mVariableModuleGlobal->FvbInstance;
|
|
|
|
//
|
|
// Tricky part: Use scratch data area at the end of volatile variable store
|
|
// as a temporary storage.
|
|
//
|
|
NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));
|
|
ScratchSize = mVariableModuleGlobal->ScratchBufferSize;
|
|
SetMem (NextVariable, ScratchSize, 0xff);
|
|
DataReady = FALSE;
|
|
|
|
if (Variable->CurrPtr != NULL) {
|
|
//
|
|
// Update/Delete existing variable.
|
|
//
|
|
if (AtRuntime ()) {
|
|
//
|
|
// If AtRuntime and the variable is Volatile and Runtime Access,
|
|
// the volatile is ReadOnly, and SetVariable should be aborted and
|
|
// return EFI_WRITE_PROTECTED.
|
|
//
|
|
if (Variable->Volatile) {
|
|
Status = EFI_WRITE_PROTECTED;
|
|
goto Done;
|
|
}
|
|
//
|
|
// Only variable that have NV attributes can be updated/deleted in Runtime.
|
|
//
|
|
if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Only variable that have RT attributes can be updated/deleted in Runtime.
|
|
//
|
|
if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Setting a data variable with no access, or zero DataSize attributes
|
|
// causes it to be deleted.
|
|
// When the EFI_VARIABLE_APPEND_WRITE attribute is set, DataSize of zero will
|
|
// not delete the variable.
|
|
//
|
|
if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0))|| ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0)) {
|
|
if (Variable->InDeletedTransitionPtr != NULL) {
|
|
//
|
|
// Both ADDED and IN_DELETED_TRANSITION variable are present,
|
|
// set IN_DELETED_TRANSITION one to DELETED state first.
|
|
//
|
|
ASSERT (CacheVariable->InDeletedTransitionPtr != NULL);
|
|
State = CacheVariable->InDeletedTransitionPtr->State;
|
|
State &= VAR_DELETED;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
Variable->Volatile,
|
|
FALSE,
|
|
Fvb,
|
|
(UINTN) &Variable->InDeletedTransitionPtr->State,
|
|
sizeof (UINT8),
|
|
&State
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
if (!Variable->Volatile) {
|
|
CacheVariable->InDeletedTransitionPtr->State = State;
|
|
}
|
|
} else {
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
State = CacheVariable->CurrPtr->State;
|
|
State &= VAR_DELETED;
|
|
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
Variable->Volatile,
|
|
FALSE,
|
|
Fvb,
|
|
(UINTN) &Variable->CurrPtr->State,
|
|
sizeof (UINT8),
|
|
&State
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, FALSE, TRUE, FALSE);
|
|
if (!Variable->Volatile) {
|
|
CacheVariable->CurrPtr->State = State;
|
|
FlushHobVariableToFlash (VariableName, VendorGuid);
|
|
}
|
|
}
|
|
goto Done;
|
|
}
|
|
//
|
|
// If the variable is marked valid, and the same data has been passed in,
|
|
// then return to the caller immediately.
|
|
//
|
|
if (DataSizeOfVariable (CacheVariable->CurrPtr) == DataSize &&
|
|
(CompareMem (Data, GetVariableDataPtr (CacheVariable->CurrPtr), DataSize) == 0) &&
|
|
((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) &&
|
|
(TimeStamp == NULL)) {
|
|
//
|
|
// Variable content unchanged and no need to update timestamp, just return.
|
|
//
|
|
UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, TRUE, FALSE, FALSE);
|
|
Status = EFI_SUCCESS;
|
|
goto Done;
|
|
} else if ((CacheVariable->CurrPtr->State == VAR_ADDED) ||
|
|
(CacheVariable->CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {
|
|
|
|
//
|
|
// EFI_VARIABLE_APPEND_WRITE attribute only effects for existing variable.
|
|
//
|
|
if ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0) {
|
|
//
|
|
// NOTE: From 0 to DataOffset of NextVariable is reserved for Variable Header and Name.
|
|
// From DataOffset of NextVariable is to save the existing variable data.
|
|
//
|
|
DataOffset = GetVariableDataOffset (CacheVariable->CurrPtr);
|
|
BufferForMerge = (UINT8 *) ((UINTN) NextVariable + DataOffset);
|
|
CopyMem (BufferForMerge, (UINT8 *) ((UINTN) CacheVariable->CurrPtr + DataOffset), DataSizeOfVariable (CacheVariable->CurrPtr));
|
|
|
|
//
|
|
// Set Max Auth/Non-Volatile/Volatile Variable Data Size as default MaxDataSize.
|
|
//
|
|
if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
MaxDataSize = mVariableModuleGlobal->MaxAuthVariableSize - DataOffset;
|
|
} else if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
MaxDataSize = mVariableModuleGlobal->MaxVariableSize - DataOffset;
|
|
} else {
|
|
MaxDataSize = mVariableModuleGlobal->MaxVolatileVariableSize - DataOffset;
|
|
}
|
|
|
|
//
|
|
// Append the new data to the end of existing data.
|
|
// Max Harware error record variable data size is different from common/auth variable.
|
|
//
|
|
if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
MaxDataSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - DataOffset;
|
|
}
|
|
|
|
if (DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize > MaxDataSize) {
|
|
//
|
|
// Existing data size + new data size exceed maximum variable size limitation.
|
|
//
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto Done;
|
|
}
|
|
CopyMem ((UINT8*) ((UINTN) BufferForMerge + DataSizeOfVariable (CacheVariable->CurrPtr)), Data, DataSize);
|
|
MergedBufSize = DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize;
|
|
|
|
//
|
|
// BufferForMerge(from DataOffset of NextVariable) has included the merged existing and new data.
|
|
//
|
|
Data = BufferForMerge;
|
|
DataSize = MergedBufSize;
|
|
DataReady = TRUE;
|
|
}
|
|
|
|
//
|
|
// Mark the old variable as in delete transition.
|
|
//
|
|
State = CacheVariable->CurrPtr->State;
|
|
State &= VAR_IN_DELETED_TRANSITION;
|
|
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
Variable->Volatile,
|
|
FALSE,
|
|
Fvb,
|
|
(UINTN) &Variable->CurrPtr->State,
|
|
sizeof (UINT8),
|
|
&State
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
if (!Variable->Volatile) {
|
|
CacheVariable->CurrPtr->State = State;
|
|
}
|
|
}
|
|
} else {
|
|
//
|
|
// Not found existing variable. Create a new variable.
|
|
//
|
|
|
|
if ((DataSize == 0) && ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0)) {
|
|
Status = EFI_SUCCESS;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Make sure we are trying to create a new variable.
|
|
// Setting a data variable with zero DataSize or no access attributes means to delete it.
|
|
//
|
|
if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {
|
|
Status = EFI_NOT_FOUND;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Only variable have NV|RT attribute can be created in Runtime.
|
|
//
|
|
if (AtRuntime () &&
|
|
(((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Function part - create a new variable and copy the data.
|
|
// Both update a variable and create a variable will come here.
|
|
//
|
|
NextVariable->StartId = VARIABLE_DATA;
|
|
//
|
|
// NextVariable->State = VAR_ADDED;
|
|
//
|
|
NextVariable->Reserved = 0;
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable;
|
|
AuthVariable->PubKeyIndex = KeyIndex;
|
|
AuthVariable->MonotonicCount = MonotonicCount;
|
|
ZeroMem (&AuthVariable->TimeStamp, sizeof (EFI_TIME));
|
|
|
|
if (((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) != 0) &&
|
|
(TimeStamp != NULL)) {
|
|
if ((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) {
|
|
CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
|
|
} else {
|
|
//
|
|
// In the case when the EFI_VARIABLE_APPEND_WRITE attribute is set, only
|
|
// when the new TimeStamp value is later than the current timestamp associated
|
|
// with the variable, we need associate the new timestamp with the updated value.
|
|
//
|
|
if (Variable->CurrPtr != NULL) {
|
|
if (VariableCompareTimeStampInternal (&(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), TimeStamp)) {
|
|
CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
|
|
} else {
|
|
CopyMem (&AuthVariable->TimeStamp, &(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), sizeof (EFI_TIME));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// The EFI_VARIABLE_APPEND_WRITE attribute will never be set in the returned
|
|
// Attributes bitmask parameter of a GetVariable() call.
|
|
//
|
|
NextVariable->Attributes = Attributes & (~EFI_VARIABLE_APPEND_WRITE);
|
|
|
|
VarNameOffset = GetVariableHeaderSize ();
|
|
VarNameSize = StrSize (VariableName);
|
|
CopyMem (
|
|
(UINT8 *) ((UINTN) NextVariable + VarNameOffset),
|
|
VariableName,
|
|
VarNameSize
|
|
);
|
|
VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);
|
|
|
|
//
|
|
// If DataReady is TRUE, it means the variable data has been saved into
|
|
// NextVariable during EFI_VARIABLE_APPEND_WRITE operation preparation.
|
|
//
|
|
if (!DataReady) {
|
|
CopyMem (
|
|
(UINT8 *) ((UINTN) NextVariable + VarDataOffset),
|
|
Data,
|
|
DataSize
|
|
);
|
|
}
|
|
|
|
CopyMem (GetVendorGuidPtr (NextVariable), VendorGuid, sizeof (EFI_GUID));
|
|
//
|
|
// There will be pad bytes after Data, the NextVariable->NameSize and
|
|
// NextVariable->DataSize should not include pad size so that variable
|
|
// service can get actual size in GetVariable.
|
|
//
|
|
SetNameSizeOfVariable (NextVariable, VarNameSize);
|
|
SetDataSizeOfVariable (NextVariable, DataSize);
|
|
|
|
//
|
|
// The actual size of the variable that stores in storage should
|
|
// include pad size.
|
|
//
|
|
VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);
|
|
if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
//
|
|
// Create a nonvolatile variable.
|
|
//
|
|
Volatile = FALSE;
|
|
|
|
IsCommonVariable = FALSE;
|
|
IsCommonUserVariable = FALSE;
|
|
if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) {
|
|
IsCommonVariable = TRUE;
|
|
IsCommonUserVariable = IsUserVariable (NextVariable);
|
|
}
|
|
if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0)
|
|
&& ((VarSize + mVariableModuleGlobal->HwErrVariableTotalSize) > PcdGet32 (PcdHwErrStorageSize)))
|
|
|| (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace))
|
|
|| (IsCommonVariable && AtRuntime () && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace))
|
|
|| (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace))) {
|
|
if (AtRuntime ()) {
|
|
if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
|
|
RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize);
|
|
}
|
|
if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace)) {
|
|
RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize);
|
|
}
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
goto Done;
|
|
}
|
|
//
|
|
// Perform garbage collection & reclaim operation, and integrate the new variable at the same time.
|
|
//
|
|
Status = Reclaim (
|
|
mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
|
|
&mVariableModuleGlobal->NonVolatileLastVariableOffset,
|
|
FALSE,
|
|
Variable,
|
|
NextVariable,
|
|
HEADER_ALIGN (VarSize)
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// The new variable has been integrated successfully during reclaiming.
|
|
//
|
|
if (Variable->CurrPtr != NULL) {
|
|
CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr));
|
|
CacheVariable->InDeletedTransitionPtr = NULL;
|
|
}
|
|
UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, TRUE, FALSE, FALSE);
|
|
FlushHobVariableToFlash (VariableName, VendorGuid);
|
|
} else {
|
|
if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
|
|
RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize);
|
|
}
|
|
if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace)) {
|
|
RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize);
|
|
}
|
|
}
|
|
goto Done;
|
|
}
|
|
|
|
if (!mVariableModuleGlobal->VariableGlobal.EmuNvMode) {
|
|
//
|
|
// Four steps
|
|
// 1. Write variable header
|
|
// 2. Set variable state to header valid
|
|
// 3. Write variable data
|
|
// 4. Set variable state to valid
|
|
//
|
|
//
|
|
// Step 1:
|
|
//
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset,
|
|
(UINT32) GetVariableHeaderSize (),
|
|
(UINT8 *) NextVariable
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Step 2:
|
|
//
|
|
NextVariable->State = VAR_HEADER_VALID_ONLY;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),
|
|
sizeof (UINT8),
|
|
&NextVariable->State
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
//
|
|
// Step 3:
|
|
//
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset + GetVariableHeaderSize (),
|
|
(UINT32) (VarSize - GetVariableHeaderSize ()),
|
|
(UINT8 *) NextVariable + GetVariableHeaderSize ()
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
//
|
|
// Step 4:
|
|
//
|
|
NextVariable->State = VAR_ADDED;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),
|
|
sizeof (UINT8),
|
|
&NextVariable->State
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Update the memory copy of Flash region.
|
|
//
|
|
CopyMem ((UINT8 *)mNvVariableCache + mVariableModuleGlobal->NonVolatileLastVariableOffset, (UINT8 *)NextVariable, VarSize);
|
|
} else {
|
|
//
|
|
// Emulated non-volatile variable mode.
|
|
//
|
|
NextVariable->State = VAR_ADDED;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
FALSE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset,
|
|
(UINT32) VarSize,
|
|
(UINT8 *) NextVariable
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize);
|
|
|
|
if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
|
|
mVariableModuleGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VarSize);
|
|
} else {
|
|
mVariableModuleGlobal->CommonVariableTotalSize += HEADER_ALIGN (VarSize);
|
|
if (IsCommonUserVariable) {
|
|
mVariableModuleGlobal->CommonUserVariableTotalSize += HEADER_ALIGN (VarSize);
|
|
}
|
|
}
|
|
} else {
|
|
//
|
|
// Create a volatile variable.
|
|
//
|
|
Volatile = TRUE;
|
|
|
|
if ((UINT32) (VarSize + mVariableModuleGlobal->VolatileLastVariableOffset) >
|
|
((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {
|
|
//
|
|
// Perform garbage collection & reclaim operation, and integrate the new variable at the same time.
|
|
//
|
|
Status = Reclaim (
|
|
mVariableModuleGlobal->VariableGlobal.VolatileVariableBase,
|
|
&mVariableModuleGlobal->VolatileLastVariableOffset,
|
|
TRUE,
|
|
Variable,
|
|
NextVariable,
|
|
HEADER_ALIGN (VarSize)
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// The new variable has been integrated successfully during reclaiming.
|
|
//
|
|
if (Variable->CurrPtr != NULL) {
|
|
CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr));
|
|
CacheVariable->InDeletedTransitionPtr = NULL;
|
|
}
|
|
UpdateVariableInfo (VariableName, VendorGuid, TRUE, FALSE, TRUE, FALSE, FALSE);
|
|
}
|
|
goto Done;
|
|
}
|
|
|
|
NextVariable->State = VAR_ADDED;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
TRUE,
|
|
TRUE,
|
|
Fvb,
|
|
mVariableModuleGlobal->VolatileLastVariableOffset,
|
|
(UINT32) VarSize,
|
|
(UINT8 *) NextVariable
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
mVariableModuleGlobal->VolatileLastVariableOffset += HEADER_ALIGN (VarSize);
|
|
}
|
|
|
|
//
|
|
// Mark the old variable as deleted.
|
|
//
|
|
if (!EFI_ERROR (Status) && Variable->CurrPtr != NULL) {
|
|
if (Variable->InDeletedTransitionPtr != NULL) {
|
|
//
|
|
// Both ADDED and IN_DELETED_TRANSITION old variable are present,
|
|
// set IN_DELETED_TRANSITION one to DELETED state first.
|
|
//
|
|
ASSERT (CacheVariable->InDeletedTransitionPtr != NULL);
|
|
State = CacheVariable->InDeletedTransitionPtr->State;
|
|
State &= VAR_DELETED;
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
Variable->Volatile,
|
|
FALSE,
|
|
Fvb,
|
|
(UINTN) &Variable->InDeletedTransitionPtr->State,
|
|
sizeof (UINT8),
|
|
&State
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
if (!Variable->Volatile) {
|
|
CacheVariable->InDeletedTransitionPtr->State = State;
|
|
}
|
|
} else {
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
State = CacheVariable->CurrPtr->State;
|
|
State &= VAR_DELETED;
|
|
|
|
Status = UpdateVariableStore (
|
|
&mVariableModuleGlobal->VariableGlobal,
|
|
Variable->Volatile,
|
|
FALSE,
|
|
Fvb,
|
|
(UINTN) &Variable->CurrPtr->State,
|
|
sizeof (UINT8),
|
|
&State
|
|
);
|
|
if (!EFI_ERROR (Status) && !Variable->Volatile) {
|
|
CacheVariable->CurrPtr->State = State;
|
|
}
|
|
}
|
|
|
|
if (!EFI_ERROR (Status)) {
|
|
UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
|
|
if (!Volatile) {
|
|
FlushHobVariableToFlash (VariableName, VendorGuid);
|
|
}
|
|
}
|
|
|
|
Done:
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
|
|
This code finds variable in storage blocks (Volatile or Non-Volatile).
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode, and datasize is external input.
|
|
This function will do basic validation, before parse the data.
|
|
|
|
@param VariableName Name of Variable to be found.
|
|
@param VendorGuid Variable vendor GUID.
|
|
@param Attributes Attribute value of the variable found.
|
|
@param DataSize Size of Data found. If size is less than the
|
|
data, this value contains the required size.
|
|
@param Data The buffer to return the contents of the variable. May be NULL
|
|
with a zero DataSize in order to determine the size buffer needed.
|
|
|
|
@return EFI_INVALID_PARAMETER Invalid parameter.
|
|
@return EFI_SUCCESS Find the specified variable.
|
|
@return EFI_NOT_FOUND Not found.
|
|
@return EFI_BUFFER_TO_SMALL DataSize is too small for the result.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceGetVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
OUT UINT32 *Attributes OPTIONAL,
|
|
IN OUT UINTN *DataSize,
|
|
OUT VOID *Data OPTIONAL
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
UINTN VarDataSize;
|
|
|
|
if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (VariableName[0] == 0) {
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Get data size
|
|
//
|
|
VarDataSize = DataSizeOfVariable (Variable.CurrPtr);
|
|
ASSERT (VarDataSize != 0);
|
|
|
|
if (*DataSize >= VarDataSize) {
|
|
if (Data == NULL) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto Done;
|
|
}
|
|
|
|
CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);
|
|
if (Attributes != NULL) {
|
|
*Attributes = Variable.CurrPtr->Attributes;
|
|
}
|
|
|
|
*DataSize = VarDataSize;
|
|
UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);
|
|
|
|
Status = EFI_SUCCESS;
|
|
goto Done;
|
|
} else {
|
|
*DataSize = VarDataSize;
|
|
Status = EFI_BUFFER_TOO_SMALL;
|
|
goto Done;
|
|
}
|
|
|
|
Done:
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
This code Finds the Next available variable.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
|
|
|
|
@param[in] VariableName Pointer to variable name.
|
|
@param[in] VendorGuid Variable Vendor Guid.
|
|
@param[out] VariablePtr Pointer to variable header address.
|
|
|
|
@retval EFI_SUCCESS The function completed successfully.
|
|
@retval EFI_NOT_FOUND The next variable was not found.
|
|
@retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while VendorGuid is NULL.
|
|
@retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and
|
|
GUID of an existing variable.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceGetNextVariableInternal (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
OUT VARIABLE_HEADER **VariablePtr
|
|
)
|
|
{
|
|
VARIABLE_STORE_TYPE Type;
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
VARIABLE_POINTER_TRACK VariableInHob;
|
|
VARIABLE_POINTER_TRACK VariablePtrTrack;
|
|
EFI_STATUS Status;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader[VariableStoreTypeMax];
|
|
|
|
Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {
|
|
//
|
|
// For VariableName is an empty string, FindVariable() will try to find and return
|
|
// the first qualified variable, and if FindVariable() returns error (EFI_NOT_FOUND)
|
|
// as no any variable is found, still go to return the error (EFI_NOT_FOUND).
|
|
//
|
|
if (VariableName[0] != 0) {
|
|
//
|
|
// For VariableName is not an empty string, and FindVariable() returns error as
|
|
// VariableName and VendorGuid are not a name and GUID of an existing variable,
|
|
// there is no way to get next variable, follow spec to return EFI_INVALID_PARAMETER.
|
|
//
|
|
Status = EFI_INVALID_PARAMETER;
|
|
}
|
|
goto Done;
|
|
}
|
|
|
|
if (VariableName[0] != 0) {
|
|
//
|
|
// If variable name is not NULL, get next variable.
|
|
//
|
|
Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
|
|
}
|
|
|
|
//
|
|
// 0: Volatile, 1: HOB, 2: Non-Volatile.
|
|
// The index and attributes mapping must be kept in this order as FindVariable
|
|
// makes use of this mapping to implement search algorithm.
|
|
//
|
|
VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;
|
|
VariableStoreHeader[VariableStoreTypeHob] = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;
|
|
VariableStoreHeader[VariableStoreTypeNv] = mNvVariableCache;
|
|
|
|
while (TRUE) {
|
|
//
|
|
// Switch from Volatile to HOB, to Non-Volatile.
|
|
//
|
|
while (!IsValidVariableHeader (Variable.CurrPtr, Variable.EndPtr)) {
|
|
//
|
|
// Find current storage index
|
|
//
|
|
for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) {
|
|
if ((VariableStoreHeader[Type] != NULL) && (Variable.StartPtr == GetStartPointer (VariableStoreHeader[Type]))) {
|
|
break;
|
|
}
|
|
}
|
|
ASSERT (Type < VariableStoreTypeMax);
|
|
//
|
|
// Switch to next storage
|
|
//
|
|
for (Type++; Type < VariableStoreTypeMax; Type++) {
|
|
if (VariableStoreHeader[Type] != NULL) {
|
|
break;
|
|
}
|
|
}
|
|
//
|
|
// Capture the case that
|
|
// 1. current storage is the last one, or
|
|
// 2. no further storage
|
|
//
|
|
if (Type == VariableStoreTypeMax) {
|
|
Status = EFI_NOT_FOUND;
|
|
goto Done;
|
|
}
|
|
Variable.StartPtr = GetStartPointer (VariableStoreHeader[Type]);
|
|
Variable.EndPtr = GetEndPointer (VariableStoreHeader[Type]);
|
|
Variable.CurrPtr = Variable.StartPtr;
|
|
}
|
|
|
|
//
|
|
// Variable is found
|
|
//
|
|
if (Variable.CurrPtr->State == VAR_ADDED || Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
if (!AtRuntime () || ((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
|
|
if (Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
//
|
|
// If it is a IN_DELETED_TRANSITION variable,
|
|
// and there is also a same ADDED one at the same time,
|
|
// don't return it.
|
|
//
|
|
VariablePtrTrack.StartPtr = Variable.StartPtr;
|
|
VariablePtrTrack.EndPtr = Variable.EndPtr;
|
|
Status = FindVariableEx (
|
|
GetVariableNamePtr (Variable.CurrPtr),
|
|
GetVendorGuidPtr (Variable.CurrPtr),
|
|
FALSE,
|
|
&VariablePtrTrack
|
|
);
|
|
if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State == VAR_ADDED) {
|
|
Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Don't return NV variable when HOB overrides it
|
|
//
|
|
if ((VariableStoreHeader[VariableStoreTypeHob] != NULL) && (VariableStoreHeader[VariableStoreTypeNv] != NULL) &&
|
|
(Variable.StartPtr == GetStartPointer (VariableStoreHeader[VariableStoreTypeNv]))
|
|
) {
|
|
VariableInHob.StartPtr = GetStartPointer (VariableStoreHeader[VariableStoreTypeHob]);
|
|
VariableInHob.EndPtr = GetEndPointer (VariableStoreHeader[VariableStoreTypeHob]);
|
|
Status = FindVariableEx (
|
|
GetVariableNamePtr (Variable.CurrPtr),
|
|
GetVendorGuidPtr (Variable.CurrPtr),
|
|
FALSE,
|
|
&VariableInHob
|
|
);
|
|
if (!EFI_ERROR (Status)) {
|
|
Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
*VariablePtr = Variable.CurrPtr;
|
|
Status = EFI_SUCCESS;
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
|
|
}
|
|
|
|
Done:
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
|
|
This code Finds the Next available variable.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
|
|
|
|
@param VariableNameSize The size of the VariableName buffer. The size must be large
|
|
enough to fit input string supplied in VariableName buffer.
|
|
@param VariableName Pointer to variable name.
|
|
@param VendorGuid Variable Vendor Guid.
|
|
|
|
@retval EFI_SUCCESS The function completed successfully.
|
|
@retval EFI_NOT_FOUND The next variable was not found.
|
|
@retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result.
|
|
VariableNameSize has been updated with the size needed to complete the request.
|
|
@retval EFI_INVALID_PARAMETER VariableNameSize is NULL.
|
|
@retval EFI_INVALID_PARAMETER VariableName is NULL.
|
|
@retval EFI_INVALID_PARAMETER VendorGuid is NULL.
|
|
@retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and
|
|
GUID of an existing variable.
|
|
@retval EFI_INVALID_PARAMETER Null-terminator is not found in the first VariableNameSize bytes of
|
|
the input VariableName buffer.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceGetNextVariableName (
|
|
IN OUT UINTN *VariableNameSize,
|
|
IN OUT CHAR16 *VariableName,
|
|
IN OUT EFI_GUID *VendorGuid
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN MaxLen;
|
|
UINTN VarNameSize;
|
|
VARIABLE_HEADER *VariablePtr;
|
|
|
|
if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Calculate the possible maximum length of name string, including the Null terminator.
|
|
//
|
|
MaxLen = *VariableNameSize / sizeof (CHAR16);
|
|
if ((MaxLen == 0) || (StrnLenS (VariableName, MaxLen) == MaxLen)) {
|
|
//
|
|
// Null-terminator is not found in the first VariableNameSize bytes of the input VariableName buffer,
|
|
// follow spec to return EFI_INVALID_PARAMETER.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
Status = VariableServiceGetNextVariableInternal (VariableName, VendorGuid, &VariablePtr);
|
|
if (!EFI_ERROR (Status)) {
|
|
VarNameSize = NameSizeOfVariable (VariablePtr);
|
|
ASSERT (VarNameSize != 0);
|
|
if (VarNameSize <= *VariableNameSize) {
|
|
CopyMem (VariableName, GetVariableNamePtr (VariablePtr), VarNameSize);
|
|
CopyMem (VendorGuid, GetVendorGuidPtr (VariablePtr), sizeof (EFI_GUID));
|
|
Status = EFI_SUCCESS;
|
|
} else {
|
|
Status = EFI_BUFFER_TOO_SMALL;
|
|
}
|
|
|
|
*VariableNameSize = VarNameSize;
|
|
}
|
|
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
|
|
This code sets variable in storage blocks (Volatile or Non-Volatile).
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode, and datasize and data are external input.
|
|
This function will do basic validation, before parse the data.
|
|
This function will parse the authentication carefully to avoid security issues, like
|
|
buffer overflow, integer overflow.
|
|
This function will check attribute carefully to avoid authentication bypass.
|
|
|
|
@param VariableName Name of Variable to be found.
|
|
@param VendorGuid Variable vendor GUID.
|
|
@param Attributes Attribute value of the variable found
|
|
@param DataSize Size of Data found. If size is less than the
|
|
data, this value contains the required size.
|
|
@param Data Data pointer.
|
|
|
|
@return EFI_INVALID_PARAMETER Invalid parameter.
|
|
@return EFI_SUCCESS Set successfully.
|
|
@return EFI_OUT_OF_RESOURCES Resource not enough to set variable.
|
|
@return EFI_NOT_FOUND Not found.
|
|
@return EFI_WRITE_PROTECTED Variable is read-only.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceSetVariable (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid,
|
|
IN UINT32 Attributes,
|
|
IN UINTN DataSize,
|
|
IN VOID *Data
|
|
)
|
|
{
|
|
VARIABLE_POINTER_TRACK Variable;
|
|
EFI_STATUS Status;
|
|
VARIABLE_HEADER *NextVariable;
|
|
EFI_PHYSICAL_ADDRESS Point;
|
|
UINTN PayloadSize;
|
|
|
|
//
|
|
// Check input parameters.
|
|
//
|
|
if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (DataSize != 0 && Data == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Check for reserverd bit in variable attribute.
|
|
// EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS is deprecated but we still allow
|
|
// the delete operation of common authenticated variable at user physical presence.
|
|
// So leave EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS attribute check to AuthVariableLib
|
|
//
|
|
if ((Attributes & (~(EFI_VARIABLE_ATTRIBUTES_MASK | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS))) != 0) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Make sure if runtime bit is set, boot service bit is set also.
|
|
//
|
|
if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
|
|
if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
|
|
return EFI_UNSUPPORTED;
|
|
} else {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) {
|
|
//
|
|
// Not support authenticated variable write.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
|
|
if (PcdGet32 (PcdHwErrStorageSize) == 0) {
|
|
//
|
|
// Not support harware error record variable variable.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
//
|
|
// EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS and EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute
|
|
// cannot be set both.
|
|
//
|
|
if (((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS)
|
|
&& ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS)) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) {
|
|
//
|
|
// If DataSize == AUTHINFO_SIZE and then PayloadSize is 0.
|
|
// Maybe it's the delete operation of common authenticated variable at user physical presence.
|
|
//
|
|
if (DataSize != AUTHINFO_SIZE) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
PayloadSize = DataSize - AUTHINFO_SIZE;
|
|
} else if ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) {
|
|
//
|
|
// Sanity check for EFI_VARIABLE_AUTHENTICATION_2 descriptor.
|
|
//
|
|
if (DataSize < OFFSET_OF_AUTHINFO2_CERT_DATA ||
|
|
((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength > DataSize - (OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) ||
|
|
((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength < OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData)) {
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
//
|
|
// The VariableSpeculationBarrier() call here is to ensure the above sanity
|
|
// check for the EFI_VARIABLE_AUTHENTICATION_2 descriptor has been completed
|
|
// before the execution of subsequent codes.
|
|
//
|
|
VariableSpeculationBarrier ();
|
|
PayloadSize = DataSize - AUTHINFO2_SIZE (Data);
|
|
} else {
|
|
PayloadSize = DataSize;
|
|
}
|
|
|
|
if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){
|
|
//
|
|
// Prevent whole variable size overflow
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// The size of the VariableName, including the Unicode Null in bytes plus
|
|
// the DataSize is limited to maximum size of PcdGet32 (PcdMaxHardwareErrorVariableSize)
|
|
// bytes for HwErrRec#### variable.
|
|
//
|
|
if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
if (StrSize (VariableName) + PayloadSize > PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize ()) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else {
|
|
//
|
|
// The size of the VariableName, including the Unicode Null in bytes plus
|
|
// the DataSize is limited to maximum size of Max(Auth|Volatile)VariableSize bytes.
|
|
//
|
|
if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ()) {
|
|
DEBUG ((DEBUG_ERROR,
|
|
"%a: Failed to set variable '%s' with Guid %g\n",
|
|
__FUNCTION__, VariableName, VendorGuid));
|
|
DEBUG ((DEBUG_ERROR,
|
|
"NameSize(0x%x) + PayloadSize(0x%x) > "
|
|
"MaxAuthVariableSize(0x%x) - HeaderSize(0x%x)\n",
|
|
StrSize (VariableName), PayloadSize,
|
|
mVariableModuleGlobal->MaxAuthVariableSize,
|
|
GetVariableHeaderSize ()
|
|
));
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize ()) {
|
|
DEBUG ((DEBUG_ERROR,
|
|
"%a: Failed to set variable '%s' with Guid %g\n",
|
|
__FUNCTION__, VariableName, VendorGuid));
|
|
DEBUG ((DEBUG_ERROR,
|
|
"NameSize(0x%x) + PayloadSize(0x%x) > "
|
|
"MaxVariableSize(0x%x) - HeaderSize(0x%x)\n",
|
|
StrSize (VariableName), PayloadSize,
|
|
mVariableModuleGlobal->MaxVariableSize,
|
|
GetVariableHeaderSize ()
|
|
));
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else {
|
|
if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxVolatileVariableSize - GetVariableHeaderSize ()) {
|
|
DEBUG ((DEBUG_ERROR,
|
|
"%a: Failed to set variable '%s' with Guid %g\n",
|
|
__FUNCTION__, VariableName, VendorGuid));
|
|
DEBUG ((DEBUG_ERROR,
|
|
"NameSize(0x%x) + PayloadSize(0x%x) > "
|
|
"MaxVolatileVariableSize(0x%x) - HeaderSize(0x%x)\n",
|
|
StrSize (VariableName), PayloadSize,
|
|
mVariableModuleGlobal->MaxVolatileVariableSize,
|
|
GetVariableHeaderSize ()
|
|
));
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Special Handling for MOR Lock variable.
|
|
//
|
|
Status = SetVariableCheckHandlerMor (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize));
|
|
if (Status == EFI_ALREADY_STARTED) {
|
|
//
|
|
// EFI_ALREADY_STARTED means the SetVariable() action is handled inside of SetVariableCheckHandlerMor().
|
|
// Variable driver can just return SUCCESS.
|
|
//
|
|
return EFI_SUCCESS;
|
|
}
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
Status = VarCheckLibSetVariableCheck (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize), mRequestSource);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
//
|
|
// Consider reentrant in MCA/INIT/NMI. It needs be reupdated.
|
|
//
|
|
if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {
|
|
Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;
|
|
//
|
|
// Parse non-volatile variable data and get last variable offset.
|
|
//
|
|
NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);
|
|
while (IsValidVariableHeader (NextVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point))) {
|
|
NextVariable = GetNextVariablePtr (NextVariable);
|
|
}
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;
|
|
}
|
|
|
|
//
|
|
// Check whether the input variable is already existed.
|
|
//
|
|
Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, TRUE);
|
|
if (!EFI_ERROR (Status)) {
|
|
if (((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) && AtRuntime ()) {
|
|
Status = EFI_WRITE_PROTECTED;
|
|
goto Done;
|
|
}
|
|
if (Attributes != 0 && (Attributes & (~EFI_VARIABLE_APPEND_WRITE)) != Variable.CurrPtr->Attributes) {
|
|
//
|
|
// If a preexisting variable is rewritten with different attributes, SetVariable() shall not
|
|
// modify the variable and shall return EFI_INVALID_PARAMETER. Two exceptions to this rule:
|
|
// 1. No access attributes specified
|
|
// 2. The only attribute differing is EFI_VARIABLE_APPEND_WRITE
|
|
//
|
|
Status = EFI_INVALID_PARAMETER;
|
|
DEBUG ((EFI_D_INFO, "[Variable]: Rewritten a preexisting variable(0x%08x) with different attributes(0x%08x) - %g:%s\n", Variable.CurrPtr->Attributes, Attributes, VendorGuid, VariableName));
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
if (!FeaturePcdGet (PcdUefiVariableDefaultLangDeprecate)) {
|
|
//
|
|
// Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang.
|
|
//
|
|
Status = AutoUpdateLangVariable (VariableName, Data, DataSize);
|
|
if (EFI_ERROR (Status)) {
|
|
//
|
|
// The auto update operation failed, directly return to avoid inconsistency between PlatformLang and Lang.
|
|
//
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthSupport) {
|
|
Status = AuthVariableLibProcessVariable (VariableName, VendorGuid, Data, DataSize, Attributes);
|
|
} else {
|
|
Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, 0, 0, &Variable, NULL);
|
|
}
|
|
|
|
Done:
|
|
InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
if (!AtRuntime ()) {
|
|
if (!EFI_ERROR (Status)) {
|
|
SecureBootHook (
|
|
VariableName,
|
|
VendorGuid
|
|
);
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
|
|
This code returns information about the EFI variables.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
|
|
|
|
@param Attributes Attributes bitmask to specify the type of variables
|
|
on which to return information.
|
|
@param MaximumVariableStorageSize Pointer to the maximum size of the storage space available
|
|
for the EFI variables associated with the attributes specified.
|
|
@param RemainingVariableStorageSize Pointer to the remaining size of the storage space available
|
|
for EFI variables associated with the attributes specified.
|
|
@param MaximumVariableSize Pointer to the maximum size of an individual EFI variables
|
|
associated with the attributes specified.
|
|
|
|
@return EFI_SUCCESS Query successfully.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceQueryVariableInfoInternal (
|
|
IN UINT32 Attributes,
|
|
OUT UINT64 *MaximumVariableStorageSize,
|
|
OUT UINT64 *RemainingVariableStorageSize,
|
|
OUT UINT64 *MaximumVariableSize
|
|
)
|
|
{
|
|
VARIABLE_HEADER *Variable;
|
|
VARIABLE_HEADER *NextVariable;
|
|
UINT64 VariableSize;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
UINT64 CommonVariableTotalSize;
|
|
UINT64 HwErrVariableTotalSize;
|
|
EFI_STATUS Status;
|
|
VARIABLE_POINTER_TRACK VariablePtrTrack;
|
|
|
|
CommonVariableTotalSize = 0;
|
|
HwErrVariableTotalSize = 0;
|
|
|
|
if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
|
|
//
|
|
// Query is Volatile related.
|
|
//
|
|
VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);
|
|
} else {
|
|
//
|
|
// Query is Non-Volatile related.
|
|
//
|
|
VariableStoreHeader = mNvVariableCache;
|
|
}
|
|
|
|
//
|
|
// Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize
|
|
// with the storage size (excluding the storage header size).
|
|
//
|
|
*MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);
|
|
|
|
//
|
|
// Harware error record variable needs larger size.
|
|
//
|
|
if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
*MaximumVariableStorageSize = PcdGet32 (PcdHwErrStorageSize);
|
|
*MaximumVariableSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize ();
|
|
} else {
|
|
if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
if (AtRuntime ()) {
|
|
*MaximumVariableStorageSize = mVariableModuleGlobal->CommonRuntimeVariableSpace;
|
|
} else {
|
|
*MaximumVariableStorageSize = mVariableModuleGlobal->CommonVariableSpace;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Let *MaximumVariableSize be Max(Auth|Volatile)VariableSize with the exception of the variable header size.
|
|
//
|
|
if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
*MaximumVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ();
|
|
} else if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
|
|
*MaximumVariableSize = mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize ();
|
|
} else {
|
|
*MaximumVariableSize = mVariableModuleGlobal->MaxVolatileVariableSize - GetVariableHeaderSize ();
|
|
}
|
|
}
|
|
|
|
//
|
|
// Point to the starting address of the variables.
|
|
//
|
|
Variable = GetStartPointer (VariableStoreHeader);
|
|
|
|
//
|
|
// Now walk through the related variable store.
|
|
//
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;
|
|
|
|
if (AtRuntime ()) {
|
|
//
|
|
// We don't take the state of the variables in mind
|
|
// when calculating RemainingVariableStorageSize,
|
|
// since the space occupied by variables not marked with
|
|
// VAR_ADDED is not allowed to be reclaimed in Runtime.
|
|
//
|
|
if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
HwErrVariableTotalSize += VariableSize;
|
|
} else {
|
|
CommonVariableTotalSize += VariableSize;
|
|
}
|
|
} else {
|
|
//
|
|
// Only care about Variables with State VAR_ADDED, because
|
|
// the space not marked as VAR_ADDED is reclaimable now.
|
|
//
|
|
if (Variable->State == VAR_ADDED) {
|
|
if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
HwErrVariableTotalSize += VariableSize;
|
|
} else {
|
|
CommonVariableTotalSize += VariableSize;
|
|
}
|
|
} else if (Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
|
|
//
|
|
// If it is a IN_DELETED_TRANSITION variable,
|
|
// and there is not also a same ADDED one at the same time,
|
|
// this IN_DELETED_TRANSITION variable is valid.
|
|
//
|
|
VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader);
|
|
VariablePtrTrack.EndPtr = GetEndPointer (VariableStoreHeader);
|
|
Status = FindVariableEx (
|
|
GetVariableNamePtr (Variable),
|
|
GetVendorGuidPtr (Variable),
|
|
FALSE,
|
|
&VariablePtrTrack
|
|
);
|
|
if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State != VAR_ADDED) {
|
|
if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
HwErrVariableTotalSize += VariableSize;
|
|
} else {
|
|
CommonVariableTotalSize += VariableSize;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Go to the next one.
|
|
//
|
|
Variable = NextVariable;
|
|
}
|
|
|
|
if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){
|
|
*RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;
|
|
} else {
|
|
if (*MaximumVariableStorageSize < CommonVariableTotalSize) {
|
|
*RemainingVariableStorageSize = 0;
|
|
} else {
|
|
*RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;
|
|
}
|
|
}
|
|
|
|
if (*RemainingVariableStorageSize < GetVariableHeaderSize ()) {
|
|
*MaximumVariableSize = 0;
|
|
} else if ((*RemainingVariableStorageSize - GetVariableHeaderSize ()) < *MaximumVariableSize) {
|
|
*MaximumVariableSize = *RemainingVariableStorageSize - GetVariableHeaderSize ();
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
|
|
This code returns information about the EFI variables.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
|
|
|
|
@param Attributes Attributes bitmask to specify the type of variables
|
|
on which to return information.
|
|
@param MaximumVariableStorageSize Pointer to the maximum size of the storage space available
|
|
for the EFI variables associated with the attributes specified.
|
|
@param RemainingVariableStorageSize Pointer to the remaining size of the storage space available
|
|
for EFI variables associated with the attributes specified.
|
|
@param MaximumVariableSize Pointer to the maximum size of an individual EFI variables
|
|
associated with the attributes specified.
|
|
|
|
@return EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.
|
|
@return EFI_SUCCESS Query successfully.
|
|
@return EFI_UNSUPPORTED The attribute is not supported on this platform.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
VariableServiceQueryVariableInfo (
|
|
IN UINT32 Attributes,
|
|
OUT UINT64 *MaximumVariableStorageSize,
|
|
OUT UINT64 *RemainingVariableStorageSize,
|
|
OUT UINT64 *MaximumVariableSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
|
|
//
|
|
// Deprecated attribute, make this check as highest priority.
|
|
//
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if ((Attributes & EFI_VARIABLE_ATTRIBUTES_MASK) == 0) {
|
|
//
|
|
// Make sure the Attributes combination is supported by the platform.
|
|
//
|
|
return EFI_UNSUPPORTED;
|
|
} else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
|
|
//
|
|
// Make sure if runtime bit is set, boot service bit is set also.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
} else if (AtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) {
|
|
//
|
|
// Make sure RT Attribute is set if we are in Runtime phase.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
} else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
|
|
//
|
|
// Make sure Hw Attribute is set with NV.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
} else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
|
|
if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) {
|
|
//
|
|
// Not support authenticated variable write.
|
|
//
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
} else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
|
|
if (PcdGet32 (PcdHwErrStorageSize) == 0) {
|
|
//
|
|
// Not support harware error record variable variable.
|
|
//
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
Status = VariableServiceQueryVariableInfoInternal (
|
|
Attributes,
|
|
MaximumVariableStorageSize,
|
|
RemainingVariableStorageSize,
|
|
MaximumVariableSize
|
|
);
|
|
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
This function reclaims variable storage if free size is below the threshold.
|
|
|
|
Caution: This function may be invoked at SMM mode.
|
|
Care must be taken to make sure not security issue.
|
|
|
|
**/
|
|
VOID
|
|
ReclaimForOS(
|
|
VOID
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN RemainingCommonRuntimeVariableSpace;
|
|
UINTN RemainingHwErrVariableSpace;
|
|
STATIC BOOLEAN Reclaimed;
|
|
|
|
//
|
|
// This function will be called only once at EndOfDxe or ReadyToBoot event.
|
|
//
|
|
if (Reclaimed) {
|
|
return;
|
|
}
|
|
Reclaimed = TRUE;
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
if (mVariableModuleGlobal->CommonRuntimeVariableSpace < mVariableModuleGlobal->CommonVariableTotalSize) {
|
|
RemainingCommonRuntimeVariableSpace = 0;
|
|
} else {
|
|
RemainingCommonRuntimeVariableSpace = mVariableModuleGlobal->CommonRuntimeVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize;
|
|
}
|
|
|
|
RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize;
|
|
|
|
//
|
|
// Check if the free area is below a threshold.
|
|
//
|
|
if (((RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxVariableSize) ||
|
|
(RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxAuthVariableSize)) ||
|
|
((PcdGet32 (PcdHwErrStorageSize) != 0) &&
|
|
(RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){
|
|
Status = Reclaim (
|
|
mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
|
|
&mVariableModuleGlobal->NonVolatileLastVariableOffset,
|
|
FALSE,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
}
|
|
}
|
|
|
|
/**
|
|
Get non-volatile maximum variable size.
|
|
|
|
@return Non-volatile maximum variable size.
|
|
|
|
**/
|
|
UINTN
|
|
GetNonVolatileMaxVariableSize (
|
|
VOID
|
|
)
|
|
{
|
|
if (PcdGet32 (PcdHwErrStorageSize) != 0) {
|
|
return MAX (MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize)),
|
|
PcdGet32 (PcdMaxHardwareErrorVariableSize));
|
|
} else {
|
|
return MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize));
|
|
}
|
|
}
|
|
|
|
/**
|
|
Get maximum variable size, covering both non-volatile and volatile variables.
|
|
|
|
@return Maximum variable size.
|
|
|
|
**/
|
|
UINTN
|
|
GetMaxVariableSize (
|
|
VOID
|
|
)
|
|
{
|
|
UINTN MaxVariableSize;
|
|
|
|
MaxVariableSize = GetNonVolatileMaxVariableSize();
|
|
//
|
|
// The condition below fails implicitly if PcdMaxVolatileVariableSize equals
|
|
// the default zero value.
|
|
//
|
|
if (MaxVariableSize < PcdGet32 (PcdMaxVolatileVariableSize)) {
|
|
MaxVariableSize = PcdGet32 (PcdMaxVolatileVariableSize);
|
|
}
|
|
return MaxVariableSize;
|
|
}
|
|
|
|
/**
|
|
Init real non-volatile variable store.
|
|
|
|
@param[out] VariableStoreBase Output pointer to real non-volatile variable store base.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.
|
|
@retval EFI_VOLUME_CORRUPTED Variable Store or Firmware Volume for Variable Store is corrupted.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
InitRealNonVolatileVariableStore (
|
|
OUT EFI_PHYSICAL_ADDRESS *VariableStoreBase
|
|
)
|
|
{
|
|
EFI_FIRMWARE_VOLUME_HEADER *FvHeader;
|
|
VARIABLE_STORE_HEADER *VariableStore;
|
|
UINT32 VariableStoreLength;
|
|
EFI_HOB_GUID_TYPE *GuidHob;
|
|
EFI_PHYSICAL_ADDRESS NvStorageBase;
|
|
UINT8 *NvStorageData;
|
|
UINT32 NvStorageSize;
|
|
FAULT_TOLERANT_WRITE_LAST_WRITE_DATA *FtwLastWriteData;
|
|
UINT32 BackUpOffset;
|
|
UINT32 BackUpSize;
|
|
UINT32 HwErrStorageSize;
|
|
UINT32 MaxUserNvVariableSpaceSize;
|
|
UINT32 BoottimeReservedNvVariableSpaceSize;
|
|
EFI_STATUS Status;
|
|
VOID *FtwProtocol;
|
|
|
|
mVariableModuleGlobal->FvbInstance = NULL;
|
|
|
|
//
|
|
// Allocate runtime memory used for a memory copy of the FLASH region.
|
|
// Keep the memory and the FLASH in sync as updates occur.
|
|
//
|
|
NvStorageSize = PcdGet32 (PcdFlashNvStorageVariableSize);
|
|
NvStorageData = AllocateRuntimeZeroPool (NvStorageSize);
|
|
if (NvStorageData == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
NvStorageBase = NV_STORAGE_VARIABLE_BASE;
|
|
ASSERT (NvStorageBase != 0);
|
|
|
|
//
|
|
// Copy NV storage data to the memory buffer.
|
|
//
|
|
CopyMem (NvStorageData, (UINT8 *) (UINTN) NvStorageBase, NvStorageSize);
|
|
|
|
Status = GetFtwProtocol ((VOID **)&FtwProtocol);
|
|
//
|
|
// If FTW protocol has been installed, no need to check FTW last write data hob.
|
|
//
|
|
if (EFI_ERROR (Status)) {
|
|
//
|
|
// Check the FTW last write data hob.
|
|
//
|
|
GuidHob = GetFirstGuidHob (&gEdkiiFaultTolerantWriteGuid);
|
|
if (GuidHob != NULL) {
|
|
FtwLastWriteData = (FAULT_TOLERANT_WRITE_LAST_WRITE_DATA *) GET_GUID_HOB_DATA (GuidHob);
|
|
if (FtwLastWriteData->TargetAddress == NvStorageBase) {
|
|
DEBUG ((EFI_D_INFO, "Variable: NV storage is backed up in spare block: 0x%x\n", (UINTN) FtwLastWriteData->SpareAddress));
|
|
//
|
|
// Copy the backed up NV storage data to the memory buffer from spare block.
|
|
//
|
|
CopyMem (NvStorageData, (UINT8 *) (UINTN) (FtwLastWriteData->SpareAddress), NvStorageSize);
|
|
} else if ((FtwLastWriteData->TargetAddress > NvStorageBase) &&
|
|
(FtwLastWriteData->TargetAddress < (NvStorageBase + NvStorageSize))) {
|
|
//
|
|
// Flash NV storage from the Offset is backed up in spare block.
|
|
//
|
|
BackUpOffset = (UINT32) (FtwLastWriteData->TargetAddress - NvStorageBase);
|
|
BackUpSize = NvStorageSize - BackUpOffset;
|
|
DEBUG ((EFI_D_INFO, "Variable: High partial NV storage from offset: %x is backed up in spare block: 0x%x\n", BackUpOffset, (UINTN) FtwLastWriteData->SpareAddress));
|
|
//
|
|
// Copy the partial backed up NV storage data to the memory buffer from spare block.
|
|
//
|
|
CopyMem (NvStorageData + BackUpOffset, (UINT8 *) (UINTN) FtwLastWriteData->SpareAddress, BackUpSize);
|
|
}
|
|
}
|
|
}
|
|
|
|
FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) NvStorageData;
|
|
|
|
//
|
|
// Check if the Firmware Volume is not corrupted
|
|
//
|
|
if ((FvHeader->Signature != EFI_FVH_SIGNATURE) || (!CompareGuid (&gEfiSystemNvDataFvGuid, &FvHeader->FileSystemGuid))) {
|
|
FreePool (NvStorageData);
|
|
DEBUG ((EFI_D_ERROR, "Firmware Volume for Variable Store is corrupted\n"));
|
|
return EFI_VOLUME_CORRUPTED;
|
|
}
|
|
|
|
VariableStore = (VARIABLE_STORE_HEADER *) ((UINTN) FvHeader + FvHeader->HeaderLength);
|
|
VariableStoreLength = NvStorageSize - FvHeader->HeaderLength;
|
|
ASSERT (sizeof (VARIABLE_STORE_HEADER) <= VariableStoreLength);
|
|
ASSERT (VariableStore->Size == VariableStoreLength);
|
|
|
|
//
|
|
// Check if the Variable Store header is not corrupted
|
|
//
|
|
if (GetVariableStoreStatus (VariableStore) != EfiValid) {
|
|
FreePool (NvStorageData);
|
|
DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n"));
|
|
return EFI_VOLUME_CORRUPTED;
|
|
}
|
|
|
|
mNvFvHeaderCache = FvHeader;
|
|
|
|
*VariableStoreBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VariableStore;
|
|
|
|
HwErrStorageSize = PcdGet32 (PcdHwErrStorageSize);
|
|
MaxUserNvVariableSpaceSize = PcdGet32 (PcdMaxUserNvVariableSpaceSize);
|
|
BoottimeReservedNvVariableSpaceSize = PcdGet32 (PcdBoottimeReservedNvVariableSpaceSize);
|
|
|
|
//
|
|
// Note that in EdkII variable driver implementation, Hardware Error Record type variable
|
|
// is stored with common variable in the same NV region. So the platform integrator should
|
|
// ensure that the value of PcdHwErrStorageSize is less than the value of
|
|
// (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)).
|
|
//
|
|
ASSERT (HwErrStorageSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)));
|
|
//
|
|
// Ensure that the value of PcdMaxUserNvVariableSpaceSize is less than the value of
|
|
// (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize).
|
|
//
|
|
ASSERT (MaxUserNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize));
|
|
//
|
|
// Ensure that the value of PcdBoottimeReservedNvVariableSpaceSize is less than the value of
|
|
// (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize).
|
|
//
|
|
ASSERT (BoottimeReservedNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize));
|
|
|
|
mVariableModuleGlobal->CommonVariableSpace = ((UINTN) VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize);
|
|
mVariableModuleGlobal->CommonMaxUserVariableSpace = ((MaxUserNvVariableSpaceSize != 0) ? MaxUserNvVariableSpaceSize : mVariableModuleGlobal->CommonVariableSpace);
|
|
mVariableModuleGlobal->CommonRuntimeVariableSpace = mVariableModuleGlobal->CommonVariableSpace - BoottimeReservedNvVariableSpaceSize;
|
|
|
|
DEBUG ((EFI_D_INFO, "Variable driver common space: 0x%x 0x%x 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonRuntimeVariableSpace));
|
|
|
|
//
|
|
// The max NV variable size should be < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)).
|
|
//
|
|
ASSERT (GetNonVolatileMaxVariableSize () < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)));
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Init emulated non-volatile variable store.
|
|
|
|
@param[out] VariableStoreBase Output pointer to emulated non-volatile variable store base.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
InitEmuNonVolatileVariableStore (
|
|
EFI_PHYSICAL_ADDRESS *VariableStoreBase
|
|
)
|
|
{
|
|
VARIABLE_STORE_HEADER *VariableStore;
|
|
UINT32 VariableStoreLength;
|
|
BOOLEAN FullyInitializeStore;
|
|
UINT32 HwErrStorageSize;
|
|
|
|
FullyInitializeStore = TRUE;
|
|
|
|
VariableStoreLength = PcdGet32 (PcdVariableStoreSize);
|
|
ASSERT (sizeof (VARIABLE_STORE_HEADER) <= VariableStoreLength);
|
|
|
|
//
|
|
// Allocate memory for variable store.
|
|
//
|
|
if (PcdGet64 (PcdEmuVariableNvStoreReserved) == 0) {
|
|
VariableStore = (VARIABLE_STORE_HEADER *) AllocateRuntimePool (VariableStoreLength);
|
|
if (VariableStore == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
//
|
|
// A memory location has been reserved for the NV variable store. Certain
|
|
// platforms may be able to preserve a memory range across system resets,
|
|
// thereby providing better NV variable emulation.
|
|
//
|
|
VariableStore =
|
|
(VARIABLE_STORE_HEADER *)(VOID*)(UINTN)
|
|
PcdGet64 (PcdEmuVariableNvStoreReserved);
|
|
if ((VariableStore->Size == VariableStoreLength) &&
|
|
(CompareGuid (&VariableStore->Signature, &gEfiAuthenticatedVariableGuid) ||
|
|
CompareGuid (&VariableStore->Signature, &gEfiVariableGuid)) &&
|
|
(VariableStore->Format == VARIABLE_STORE_FORMATTED) &&
|
|
(VariableStore->State == VARIABLE_STORE_HEALTHY)) {
|
|
DEBUG((
|
|
DEBUG_INFO,
|
|
"Variable Store reserved at %p appears to be valid\n",
|
|
VariableStore
|
|
));
|
|
FullyInitializeStore = FALSE;
|
|
}
|
|
}
|
|
|
|
if (FullyInitializeStore) {
|
|
SetMem (VariableStore, VariableStoreLength, 0xff);
|
|
//
|
|
// Use gEfiAuthenticatedVariableGuid for potential auth variable support.
|
|
//
|
|
CopyGuid (&VariableStore->Signature, &gEfiAuthenticatedVariableGuid);
|
|
VariableStore->Size = VariableStoreLength;
|
|
VariableStore->Format = VARIABLE_STORE_FORMATTED;
|
|
VariableStore->State = VARIABLE_STORE_HEALTHY;
|
|
VariableStore->Reserved = 0;
|
|
VariableStore->Reserved1 = 0;
|
|
}
|
|
|
|
*VariableStoreBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VariableStore;
|
|
|
|
HwErrStorageSize = PcdGet32 (PcdHwErrStorageSize);
|
|
|
|
//
|
|
// Note that in EdkII variable driver implementation, Hardware Error Record type variable
|
|
// is stored with common variable in the same NV region. So the platform integrator should
|
|
// ensure that the value of PcdHwErrStorageSize is less than the value of
|
|
// (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)).
|
|
//
|
|
ASSERT (HwErrStorageSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)));
|
|
|
|
mVariableModuleGlobal->CommonVariableSpace = ((UINTN) VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize);
|
|
mVariableModuleGlobal->CommonMaxUserVariableSpace = mVariableModuleGlobal->CommonVariableSpace;
|
|
mVariableModuleGlobal->CommonRuntimeVariableSpace = mVariableModuleGlobal->CommonVariableSpace;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Init non-volatile variable store.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.
|
|
@retval EFI_VOLUME_CORRUPTED Variable Store or Firmware Volume for Variable Store is corrupted.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
InitNonVolatileVariableStore (
|
|
VOID
|
|
)
|
|
{
|
|
VARIABLE_HEADER *Variable;
|
|
VARIABLE_HEADER *NextVariable;
|
|
EFI_PHYSICAL_ADDRESS VariableStoreBase;
|
|
UINTN VariableSize;
|
|
EFI_STATUS Status;
|
|
|
|
if (PcdGetBool (PcdEmuVariableNvModeEnable)) {
|
|
Status = InitEmuNonVolatileVariableStore (&VariableStoreBase);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
mVariableModuleGlobal->VariableGlobal.EmuNvMode = TRUE;
|
|
DEBUG ((DEBUG_INFO, "Variable driver will work at emulated non-volatile variable mode!\n"));
|
|
} else {
|
|
Status = InitRealNonVolatileVariableStore (&VariableStoreBase);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
mVariableModuleGlobal->VariableGlobal.EmuNvMode = FALSE;
|
|
}
|
|
|
|
mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;
|
|
mNvVariableCache = (VARIABLE_STORE_HEADER *) (UINTN) VariableStoreBase;
|
|
mVariableModuleGlobal->VariableGlobal.AuthFormat = (BOOLEAN)(CompareGuid (&mNvVariableCache->Signature, &gEfiAuthenticatedVariableGuid));
|
|
|
|
mVariableModuleGlobal->MaxVariableSize = PcdGet32 (PcdMaxVariableSize);
|
|
mVariableModuleGlobal->MaxAuthVariableSize = ((PcdGet32 (PcdMaxAuthVariableSize) != 0) ? PcdGet32 (PcdMaxAuthVariableSize) : mVariableModuleGlobal->MaxVariableSize);
|
|
|
|
//
|
|
// Parse non-volatile variable data and get last variable offset.
|
|
//
|
|
Variable = GetStartPointer (mNvVariableCache);
|
|
while (IsValidVariableHeader (Variable, GetEndPointer (mNvVariableCache))) {
|
|
NextVariable = GetNextVariablePtr (Variable);
|
|
VariableSize = (UINTN) NextVariable - (UINTN) Variable;
|
|
if ((Variable->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
|
|
mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
|
|
} else {
|
|
mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
|
|
}
|
|
|
|
Variable = NextVariable;
|
|
}
|
|
mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) mNvVariableCache;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Flush the HOB variable to flash.
|
|
|
|
@param[in] VariableName Name of variable has been updated or deleted.
|
|
@param[in] VendorGuid Guid of variable has been updated or deleted.
|
|
|
|
**/
|
|
VOID
|
|
FlushHobVariableToFlash (
|
|
IN CHAR16 *VariableName,
|
|
IN EFI_GUID *VendorGuid
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
VARIABLE_HEADER *Variable;
|
|
VOID *VariableData;
|
|
VARIABLE_POINTER_TRACK VariablePtrTrack;
|
|
BOOLEAN ErrorFlag;
|
|
|
|
ErrorFlag = FALSE;
|
|
|
|
//
|
|
// Flush the HOB variable to flash.
|
|
//
|
|
if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) {
|
|
VariableStoreHeader = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;
|
|
//
|
|
// Set HobVariableBase to 0, it can avoid SetVariable to call back.
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.HobVariableBase = 0;
|
|
for ( Variable = GetStartPointer (VariableStoreHeader)
|
|
; IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))
|
|
; Variable = GetNextVariablePtr (Variable)
|
|
) {
|
|
if (Variable->State != VAR_ADDED) {
|
|
//
|
|
// The HOB variable has been set to DELETED state in local.
|
|
//
|
|
continue;
|
|
}
|
|
ASSERT ((Variable->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0);
|
|
if (VendorGuid == NULL || VariableName == NULL ||
|
|
!CompareGuid (VendorGuid, GetVendorGuidPtr (Variable)) ||
|
|
StrCmp (VariableName, GetVariableNamePtr (Variable)) != 0) {
|
|
VariableData = GetVariableDataPtr (Variable);
|
|
FindVariable (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &VariablePtrTrack, &mVariableModuleGlobal->VariableGlobal, FALSE);
|
|
Status = UpdateVariable (
|
|
GetVariableNamePtr (Variable),
|
|
GetVendorGuidPtr (Variable),
|
|
VariableData,
|
|
DataSizeOfVariable (Variable),
|
|
Variable->Attributes,
|
|
0,
|
|
0,
|
|
&VariablePtrTrack,
|
|
NULL
|
|
);
|
|
DEBUG ((EFI_D_INFO, "Variable driver flush the HOB variable to flash: %g %s %r\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable), Status));
|
|
} else {
|
|
//
|
|
// The updated or deleted variable is matched with this HOB variable.
|
|
// Don't break here because we will try to set other HOB variables
|
|
// since this variable could be set successfully.
|
|
//
|
|
Status = EFI_SUCCESS;
|
|
}
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// If set variable successful, or the updated or deleted variable is matched with the HOB variable,
|
|
// set the HOB variable to DELETED state in local.
|
|
//
|
|
DEBUG ((EFI_D_INFO, "Variable driver set the HOB variable to DELETED state in local: %g %s\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable)));
|
|
Variable->State &= VAR_DELETED;
|
|
} else {
|
|
ErrorFlag = TRUE;
|
|
}
|
|
}
|
|
if (ErrorFlag) {
|
|
//
|
|
// We still have HOB variable(s) not flushed in flash.
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VariableStoreHeader;
|
|
} else {
|
|
//
|
|
// All HOB variables have been flushed in flash.
|
|
//
|
|
DEBUG ((EFI_D_INFO, "Variable driver: all HOB variables have been flushed in flash.\n"));
|
|
if (!AtRuntime ()) {
|
|
FreePool ((VOID *) VariableStoreHeader);
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
/**
|
|
Initializes variable write service.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval Others Fail to initialize the variable service.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
VariableWriteServiceInitialize (
|
|
VOID
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN Index;
|
|
UINT8 Data;
|
|
VARIABLE_ENTRY_PROPERTY *VariableEntry;
|
|
|
|
AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
//
|
|
// Check if the free area is really free.
|
|
//
|
|
for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < mNvVariableCache->Size; Index++) {
|
|
Data = ((UINT8 *) mNvVariableCache)[Index];
|
|
if (Data != 0xff) {
|
|
//
|
|
// There must be something wrong in variable store, do reclaim operation.
|
|
//
|
|
Status = Reclaim (
|
|
mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
|
|
&mVariableModuleGlobal->NonVolatileLastVariableOffset,
|
|
FALSE,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
return Status;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
FlushHobVariableToFlash (NULL, NULL);
|
|
|
|
Status = EFI_SUCCESS;
|
|
ZeroMem (&mAuthContextOut, sizeof (mAuthContextOut));
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
//
|
|
// Authenticated variable initialize.
|
|
//
|
|
mAuthContextIn.StructSize = sizeof (AUTH_VAR_LIB_CONTEXT_IN);
|
|
mAuthContextIn.MaxAuthVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ();
|
|
Status = AuthVariableLibInitialize (&mAuthContextIn, &mAuthContextOut);
|
|
if (!EFI_ERROR (Status)) {
|
|
DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable support!\n"));
|
|
mVariableModuleGlobal->VariableGlobal.AuthSupport = TRUE;
|
|
if (mAuthContextOut.AuthVarEntry != NULL) {
|
|
for (Index = 0; Index < mAuthContextOut.AuthVarEntryCount; Index++) {
|
|
VariableEntry = &mAuthContextOut.AuthVarEntry[Index];
|
|
Status = VarCheckLibVariablePropertySet (
|
|
VariableEntry->Name,
|
|
VariableEntry->Guid,
|
|
&VariableEntry->VariableProperty
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
}
|
|
}
|
|
} else if (Status == EFI_UNSUPPORTED) {
|
|
DEBUG ((EFI_D_INFO, "NOTICE - AuthVariableLibInitialize() returns %r!\n", Status));
|
|
DEBUG ((EFI_D_INFO, "Variable driver will continue to work without auth variable support!\n"));
|
|
mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
|
|
Status = EFI_SUCCESS;
|
|
}
|
|
}
|
|
|
|
if (!EFI_ERROR (Status)) {
|
|
for (Index = 0; Index < ARRAY_SIZE (mVariableEntryProperty); Index++) {
|
|
VariableEntry = &mVariableEntryProperty[Index];
|
|
Status = VarCheckLibVariablePropertySet (VariableEntry->Name, VariableEntry->Guid, &VariableEntry->VariableProperty);
|
|
ASSERT_EFI_ERROR (Status);
|
|
}
|
|
}
|
|
|
|
ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
|
|
|
|
//
|
|
// Initialize MOR Lock variable.
|
|
//
|
|
MorLockInit ();
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Convert normal variable storage to the allocated auth variable storage.
|
|
|
|
@param[in] NormalVarStorage Pointer to the normal variable storage header
|
|
|
|
@retval the allocated auth variable storage
|
|
**/
|
|
VOID *
|
|
ConvertNormalVarStorageToAuthVarStorage (
|
|
VARIABLE_STORE_HEADER *NormalVarStorage
|
|
)
|
|
{
|
|
VARIABLE_HEADER *StartPtr;
|
|
UINT8 *NextPtr;
|
|
VARIABLE_HEADER *EndPtr;
|
|
UINTN AuthVarStroageSize;
|
|
AUTHENTICATED_VARIABLE_HEADER *AuthStartPtr;
|
|
VARIABLE_STORE_HEADER *AuthVarStorage;
|
|
|
|
AuthVarStroageSize = sizeof (VARIABLE_STORE_HEADER);
|
|
//
|
|
// Set AuthFormat as FALSE for normal variable storage
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.AuthFormat = FALSE;
|
|
|
|
//
|
|
// Calculate Auth Variable Storage Size
|
|
//
|
|
StartPtr = GetStartPointer (NormalVarStorage);
|
|
EndPtr = GetEndPointer (NormalVarStorage);
|
|
while (StartPtr < EndPtr) {
|
|
if (StartPtr->State == VAR_ADDED) {
|
|
AuthVarStroageSize = HEADER_ALIGN (AuthVarStroageSize);
|
|
AuthVarStroageSize += sizeof (AUTHENTICATED_VARIABLE_HEADER);
|
|
AuthVarStroageSize += StartPtr->NameSize + GET_PAD_SIZE (StartPtr->NameSize);
|
|
AuthVarStroageSize += StartPtr->DataSize + GET_PAD_SIZE (StartPtr->DataSize);
|
|
}
|
|
StartPtr = GetNextVariablePtr (StartPtr);
|
|
}
|
|
|
|
//
|
|
// Allocate Runtime memory for Auth Variable Storage
|
|
//
|
|
AuthVarStorage = AllocateRuntimeZeroPool (AuthVarStroageSize);
|
|
ASSERT (AuthVarStorage != NULL);
|
|
if (AuthVarStorage == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
//
|
|
// Copy Variable from Normal storage to Auth storage
|
|
//
|
|
StartPtr = GetStartPointer (NormalVarStorage);
|
|
EndPtr = GetEndPointer (NormalVarStorage);
|
|
AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) GetStartPointer (AuthVarStorage);
|
|
while (StartPtr < EndPtr) {
|
|
if (StartPtr->State == VAR_ADDED) {
|
|
AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN (AuthStartPtr);
|
|
//
|
|
// Copy Variable Header
|
|
//
|
|
AuthStartPtr->StartId = StartPtr->StartId;
|
|
AuthStartPtr->State = StartPtr->State;
|
|
AuthStartPtr->Attributes = StartPtr->Attributes;
|
|
AuthStartPtr->NameSize = StartPtr->NameSize;
|
|
AuthStartPtr->DataSize = StartPtr->DataSize;
|
|
CopyGuid (&AuthStartPtr->VendorGuid, &StartPtr->VendorGuid);
|
|
//
|
|
// Copy Variable Name
|
|
//
|
|
NextPtr = (UINT8 *) (AuthStartPtr + 1);
|
|
CopyMem (NextPtr, GetVariableNamePtr (StartPtr), AuthStartPtr->NameSize);
|
|
//
|
|
// Copy Variable Data
|
|
//
|
|
NextPtr = NextPtr + AuthStartPtr->NameSize + GET_PAD_SIZE (AuthStartPtr->NameSize);
|
|
CopyMem (NextPtr, GetVariableDataPtr (StartPtr), AuthStartPtr->DataSize);
|
|
//
|
|
// Go to next variable
|
|
//
|
|
AuthStartPtr = (AUTHENTICATED_VARIABLE_HEADER *) (NextPtr + AuthStartPtr->DataSize + GET_PAD_SIZE (AuthStartPtr->DataSize));
|
|
}
|
|
StartPtr = GetNextVariablePtr (StartPtr);
|
|
}
|
|
//
|
|
// Update Auth Storage Header
|
|
//
|
|
AuthVarStorage->Format = NormalVarStorage->Format;
|
|
AuthVarStorage->State = NormalVarStorage->State;
|
|
AuthVarStorage->Size = (UINT32)((UINTN)AuthStartPtr - (UINTN)AuthVarStorage);
|
|
CopyGuid (&AuthVarStorage->Signature, &gEfiAuthenticatedVariableGuid);
|
|
ASSERT (AuthVarStorage->Size <= AuthVarStroageSize);
|
|
|
|
//
|
|
// Restore AuthFormat
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.AuthFormat = TRUE;
|
|
return AuthVarStorage;
|
|
}
|
|
|
|
/**
|
|
Get HOB variable store.
|
|
|
|
@param[in] VariableGuid NV variable store signature.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
GetHobVariableStore (
|
|
IN EFI_GUID *VariableGuid
|
|
)
|
|
{
|
|
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
|
UINT64 VariableStoreLength;
|
|
EFI_HOB_GUID_TYPE *GuidHob;
|
|
BOOLEAN NeedConvertNormalToAuth;
|
|
|
|
//
|
|
// Make sure there is no more than one Variable HOB.
|
|
//
|
|
DEBUG_CODE (
|
|
GuidHob = GetFirstGuidHob (&gEfiAuthenticatedVariableGuid);
|
|
if (GuidHob != NULL) {
|
|
if ((GetNextGuidHob (&gEfiAuthenticatedVariableGuid, GET_NEXT_HOB (GuidHob)) != NULL)) {
|
|
DEBUG ((DEBUG_ERROR, "ERROR: Found two Auth Variable HOBs\n"));
|
|
ASSERT (FALSE);
|
|
} else if (GetFirstGuidHob (&gEfiVariableGuid) != NULL) {
|
|
DEBUG ((DEBUG_ERROR, "ERROR: Found one Auth + one Normal Variable HOBs\n"));
|
|
ASSERT (FALSE);
|
|
}
|
|
} else {
|
|
GuidHob = GetFirstGuidHob (&gEfiVariableGuid);
|
|
if (GuidHob != NULL) {
|
|
if ((GetNextGuidHob (&gEfiVariableGuid, GET_NEXT_HOB (GuidHob)) != NULL)) {
|
|
DEBUG ((DEBUG_ERROR, "ERROR: Found two Normal Variable HOBs\n"));
|
|
ASSERT (FALSE);
|
|
}
|
|
}
|
|
}
|
|
);
|
|
|
|
//
|
|
// Combinations supported:
|
|
// 1. Normal NV variable store +
|
|
// Normal HOB variable store
|
|
// 2. Auth NV variable store +
|
|
// Auth HOB variable store
|
|
// 3. Auth NV variable store +
|
|
// Normal HOB variable store (code will convert it to Auth Format)
|
|
//
|
|
NeedConvertNormalToAuth = FALSE;
|
|
GuidHob = GetFirstGuidHob (VariableGuid);
|
|
if (GuidHob == NULL && VariableGuid == &gEfiAuthenticatedVariableGuid) {
|
|
//
|
|
// Try getting it from normal variable HOB
|
|
//
|
|
GuidHob = GetFirstGuidHob (&gEfiVariableGuid);
|
|
NeedConvertNormalToAuth = TRUE;
|
|
}
|
|
if (GuidHob != NULL) {
|
|
VariableStoreHeader = GET_GUID_HOB_DATA (GuidHob);
|
|
VariableStoreLength = GuidHob->Header.HobLength - sizeof (EFI_HOB_GUID_TYPE);
|
|
if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {
|
|
if (!NeedConvertNormalToAuth) {
|
|
mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) AllocateRuntimeCopyPool ((UINTN) VariableStoreLength, (VOID *) VariableStoreHeader);
|
|
} else {
|
|
mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) ConvertNormalVarStorageToAuthVarStorage ((VOID *) VariableStoreHeader);
|
|
}
|
|
if (mVariableModuleGlobal->VariableGlobal.HobVariableBase == 0) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
DEBUG ((EFI_D_ERROR, "HOB Variable Store header is corrupted!\n"));
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Initializes variable store area for non-volatile and volatile variable.
|
|
|
|
@retval EFI_SUCCESS Function successfully executed.
|
|
@retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
VariableCommonInitialize (
|
|
VOID
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VARIABLE_STORE_HEADER *VolatileVariableStore;
|
|
UINTN ScratchSize;
|
|
EFI_GUID *VariableGuid;
|
|
|
|
//
|
|
// Allocate runtime memory for variable driver global structure.
|
|
//
|
|
mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (VARIABLE_MODULE_GLOBAL));
|
|
if (mVariableModuleGlobal == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
InitializeLock (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);
|
|
|
|
//
|
|
// Init non-volatile variable store.
|
|
//
|
|
Status = InitNonVolatileVariableStore ();
|
|
if (EFI_ERROR (Status)) {
|
|
FreePool (mVariableModuleGlobal);
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// mVariableModuleGlobal->VariableGlobal.AuthFormat
|
|
// has been initialized in InitNonVolatileVariableStore().
|
|
//
|
|
if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
|
|
DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable format!\n"));
|
|
//
|
|
// Set AuthSupport to FALSE first, VariableWriteServiceInitialize() will initialize it.
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
|
|
VariableGuid = &gEfiAuthenticatedVariableGuid;
|
|
} else {
|
|
DEBUG ((EFI_D_INFO, "Variable driver will work without auth variable support!\n"));
|
|
mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
|
|
VariableGuid = &gEfiVariableGuid;
|
|
}
|
|
|
|
//
|
|
// Get HOB variable store.
|
|
//
|
|
Status = GetHobVariableStore (VariableGuid);
|
|
if (EFI_ERROR (Status)) {
|
|
if (mNvFvHeaderCache != NULL) {
|
|
FreePool (mNvFvHeaderCache);
|
|
}
|
|
FreePool (mVariableModuleGlobal);
|
|
return Status;
|
|
}
|
|
|
|
mVariableModuleGlobal->MaxVolatileVariableSize = ((PcdGet32 (PcdMaxVolatileVariableSize) != 0) ?
|
|
PcdGet32 (PcdMaxVolatileVariableSize) :
|
|
mVariableModuleGlobal->MaxVariableSize
|
|
);
|
|
//
|
|
// Allocate memory for volatile variable store, note that there is a scratch space to store scratch data.
|
|
//
|
|
ScratchSize = GetMaxVariableSize ();
|
|
mVariableModuleGlobal->ScratchBufferSize = ScratchSize;
|
|
VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize);
|
|
if (VolatileVariableStore == NULL) {
|
|
if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) {
|
|
FreePool ((VOID *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase);
|
|
}
|
|
if (mNvFvHeaderCache != NULL) {
|
|
FreePool (mNvFvHeaderCache);
|
|
}
|
|
FreePool (mVariableModuleGlobal);
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff);
|
|
|
|
//
|
|
// Initialize Variable Specific Data.
|
|
//
|
|
mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;
|
|
mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;
|
|
|
|
CopyGuid (&VolatileVariableStore->Signature, VariableGuid);
|
|
VolatileVariableStore->Size = PcdGet32 (PcdVariableStoreSize);
|
|
VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;
|
|
VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;
|
|
VolatileVariableStore->Reserved = 0;
|
|
VolatileVariableStore->Reserved1 = 0;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
Get the proper fvb handle and/or fvb protocol by the given Flash address.
|
|
|
|
@param[in] Address The Flash address.
|
|
@param[out] FvbHandle In output, if it is not NULL, it points to the proper FVB handle.
|
|
@param[out] FvbProtocol In output, if it is not NULL, it points to the proper FVB protocol.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
GetFvbInfoByAddress (
|
|
IN EFI_PHYSICAL_ADDRESS Address,
|
|
OUT EFI_HANDLE *FvbHandle OPTIONAL,
|
|
OUT EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL **FvbProtocol OPTIONAL
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_HANDLE *HandleBuffer;
|
|
UINTN HandleCount;
|
|
UINTN Index;
|
|
EFI_PHYSICAL_ADDRESS FvbBaseAddress;
|
|
EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb;
|
|
EFI_FVB_ATTRIBUTES_2 Attributes;
|
|
UINTN BlockSize;
|
|
UINTN NumberOfBlocks;
|
|
|
|
HandleBuffer = NULL;
|
|
//
|
|
// Get all FVB handles.
|
|
//
|
|
Status = GetFvbCountAndBuffer (&HandleCount, &HandleBuffer);
|
|
if (EFI_ERROR (Status)) {
|
|
return EFI_NOT_FOUND;
|
|
}
|
|
|
|
//
|
|
// Get the FVB to access variable store.
|
|
//
|
|
Fvb = NULL;
|
|
for (Index = 0; Index < HandleCount; Index += 1, Status = EFI_NOT_FOUND, Fvb = NULL) {
|
|
Status = GetFvbByHandle (HandleBuffer[Index], &Fvb);
|
|
if (EFI_ERROR (Status)) {
|
|
Status = EFI_NOT_FOUND;
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Ensure this FVB protocol supported Write operation.
|
|
//
|
|
Status = Fvb->GetAttributes (Fvb, &Attributes);
|
|
if (EFI_ERROR (Status) || ((Attributes & EFI_FVB2_WRITE_STATUS) == 0)) {
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Compare the address and select the right one.
|
|
//
|
|
Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress);
|
|
if (EFI_ERROR (Status)) {
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Assume one FVB has one type of BlockSize.
|
|
//
|
|
Status = Fvb->GetBlockSize (Fvb, 0, &BlockSize, &NumberOfBlocks);
|
|
if (EFI_ERROR (Status)) {
|
|
continue;
|
|
}
|
|
|
|
if ((Address >= FvbBaseAddress) && (Address < (FvbBaseAddress + BlockSize * NumberOfBlocks))) {
|
|
if (FvbHandle != NULL) {
|
|
*FvbHandle = HandleBuffer[Index];
|
|
}
|
|
if (FvbProtocol != NULL) {
|
|
*FvbProtocol = Fvb;
|
|
}
|
|
Status = EFI_SUCCESS;
|
|
break;
|
|
}
|
|
}
|
|
FreePool (HandleBuffer);
|
|
|
|
if (Fvb == NULL) {
|
|
Status = EFI_NOT_FOUND;
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|