FmpDevicePkg: Apply uncrustify changes
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the FmpDevicePkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
This commit is contained in:
committed by
mergify[bot]
parent
bcdcc4160d
commit
45ce0a67bb
@ -50,7 +50,6 @@ CapsuleUpdatePolicyCheckSystemPower (
|
||||
return CheckSystemPower (Good);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Determines if the system thermal state supports a capsule update.
|
||||
|
||||
@ -164,7 +163,8 @@ CapsuleUpdatePolicyInitialize (
|
||||
ASSERT_PROTOCOL_ALREADY_INSTALLED (NULL, &gEdkiiCapsuleUpdatePolicyProtocolGuid);
|
||||
Status = gBS->InstallMultipleProtocolInterfaces (
|
||||
&mHandle,
|
||||
&gEdkiiCapsuleUpdatePolicyProtocolGuid, &mCapsuleUpdatePolicy,
|
||||
&gEdkiiCapsuleUpdatePolicyProtocolGuid,
|
||||
&mCapsuleUpdatePolicy,
|
||||
NULL
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
@ -54,7 +54,7 @@ DetectTestKey (
|
||||
//
|
||||
PublicKeyDataXdr = PcdGetPtr (PcdFmpDevicePkcs7CertBufferXdr);
|
||||
PublicKeyDataXdrEnd = PublicKeyDataXdr + PcdGetSize (PcdFmpDevicePkcs7CertBufferXdr);
|
||||
if (PublicKeyDataXdr == NULL || PublicKeyDataXdr == PublicKeyDataXdrEnd) {
|
||||
if ((PublicKeyDataXdr == NULL) || (PublicKeyDataXdr == PublicKeyDataXdrEnd)) {
|
||||
return;
|
||||
}
|
||||
|
||||
@ -76,6 +76,7 @@ DetectTestKey (
|
||||
//
|
||||
break;
|
||||
}
|
||||
|
||||
//
|
||||
// Read key length stored in big endian format
|
||||
//
|
||||
@ -100,10 +101,12 @@ DetectTestKey (
|
||||
TestKeyUsed = TRUE;
|
||||
break;
|
||||
}
|
||||
|
||||
if (!Sha256Update (HashContext, PublicKeyDataXdr, PublicKeyDataLength)) {
|
||||
TestKeyUsed = TRUE;
|
||||
break;
|
||||
}
|
||||
|
||||
if (!Sha256Final (HashContext, Digest)) {
|
||||
TestKeyUsed = TRUE;
|
||||
break;
|
||||
|
@ -56,7 +56,8 @@ const FIRMWARE_MANAGEMENT_PRIVATE_DATA mFirmwareManagementPrivateDataTemplate =
|
||||
//
|
||||
// ImageTypeId
|
||||
//
|
||||
{ 0x00000000, 0x0000, 0x0000, {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00} },
|
||||
{ 0x00000000, 0x0000,0x0000, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
|
||||
},
|
||||
1, // ImageId
|
||||
NULL, // ImageIdName
|
||||
0, // Version
|
||||
@ -174,6 +175,7 @@ GetImageTypeIdGuid (
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): FmpDeviceLib GetImageTypeIdGuidPtr() returned invalid GUID\n", mImageIdName));
|
||||
Status = EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
ImageTypeIdGuidSize = PcdGetSize (PcdFmpDeviceImageTypeIdGuid);
|
||||
if (ImageTypeIdGuidSize == sizeof (EFI_GUID)) {
|
||||
@ -183,6 +185,7 @@ GetImageTypeIdGuid (
|
||||
FmpDeviceLibGuid = &gEfiCallerIdGuid;
|
||||
}
|
||||
}
|
||||
|
||||
return FmpDeviceLibGuid;
|
||||
}
|
||||
|
||||
@ -288,9 +291,9 @@ PopulateDescriptor (
|
||||
}
|
||||
|
||||
Private->Descriptor.ImageIndex = 1;
|
||||
CopyGuid (&Private->Descriptor.ImageTypeId, GetImageTypeIdGuid());
|
||||
CopyGuid (&Private->Descriptor.ImageTypeId, GetImageTypeIdGuid ());
|
||||
Private->Descriptor.ImageId = Private->Descriptor.ImageIndex;
|
||||
Private->Descriptor.ImageIdName = GetImageTypeNameString();
|
||||
Private->Descriptor.ImageIdName = GetImageTypeNameString ();
|
||||
|
||||
//
|
||||
// Get the hardware instance from FmpDeviceLib
|
||||
@ -319,7 +322,7 @@ PopulateDescriptor (
|
||||
//
|
||||
// Unexpected error. Use default version.
|
||||
//
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): GetVersion() from FmpDeviceLib (%s) returned %r\n", mImageIdName, GetImageTypeNameString(), Status));
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): GetVersion() from FmpDeviceLib (%s) returned %r\n", mImageIdName, GetImageTypeNameString (), Status));
|
||||
Private->Descriptor.Version = DEFAULT_VERSION;
|
||||
}
|
||||
|
||||
@ -492,7 +495,8 @@ GetTheImageInfo (
|
||||
// Confirm that buffer isn't null
|
||||
//
|
||||
if ( (ImageInfo == NULL) || (DescriptorVersion == NULL) || (DescriptorCount == NULL) || (DescriptorSize == NULL)
|
||||
|| (PackageVersion == NULL)) {
|
||||
|| (PackageVersion == NULL))
|
||||
{
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): GetImageInfo() - Pointer Parameter is NULL.\n", mImageIdName));
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto cleanup;
|
||||
@ -606,6 +610,7 @@ GetTheImage (
|
||||
if (EFI_ERROR (Status)) {
|
||||
Size = 0;
|
||||
}
|
||||
|
||||
if (*ImageSize < Size) {
|
||||
*ImageSize = Size;
|
||||
DEBUG ((DEBUG_VERBOSE, "FmpDxe(%s): GetImage() - ImageSize is to small.\n", mImageIdName));
|
||||
@ -650,8 +655,9 @@ GetFmpHeader (
|
||||
//
|
||||
// Check to make sure that operation can be safely performed.
|
||||
//
|
||||
if (((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) + AdditionalHeaderSize < (UINTN)Image || \
|
||||
((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) + AdditionalHeaderSize >= (UINTN)Image + ImageSize) {
|
||||
if ((((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) + AdditionalHeaderSize < (UINTN)Image) || \
|
||||
(((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) + AdditionalHeaderSize >= (UINTN)Image + ImageSize))
|
||||
{
|
||||
//
|
||||
// Pointer overflow. Invalid image.
|
||||
//
|
||||
@ -696,9 +702,10 @@ GetAllHeaderSize (
|
||||
//
|
||||
// Check to make sure that operation can be safely performed.
|
||||
//
|
||||
if (CalculatedSize < sizeof (Image->MonotonicCount) ||
|
||||
CalculatedSize < AdditionalHeaderSize ||
|
||||
CalculatedSize < Image->AuthInfo.Hdr.dwLength ) {
|
||||
if ((CalculatedSize < sizeof (Image->MonotonicCount)) ||
|
||||
(CalculatedSize < AdditionalHeaderSize) ||
|
||||
(CalculatedSize < Image->AuthInfo.Hdr.dwLength))
|
||||
{
|
||||
//
|
||||
// Integer overflow. Invalid image.
|
||||
//
|
||||
@ -827,7 +834,7 @@ CheckTheImageInternal (
|
||||
}
|
||||
|
||||
//
|
||||
//Set to valid and then if any tests fail it will update this flag.
|
||||
// Set to valid and then if any tests fail it will update this flag.
|
||||
//
|
||||
*ImageUpdatable = IMAGE_UPDATABLE_VALID;
|
||||
|
||||
@ -849,7 +856,7 @@ CheckTheImageInternal (
|
||||
PublicKeyDataXdr = PcdGetPtr (PcdFmpDevicePkcs7CertBufferXdr);
|
||||
PublicKeyDataXdrEnd = PublicKeyDataXdr + PcdGetSize (PcdFmpDevicePkcs7CertBufferXdr);
|
||||
|
||||
if (PublicKeyDataXdr == NULL || (PublicKeyDataXdr == PublicKeyDataXdrEnd)) {
|
||||
if ((PublicKeyDataXdr == NULL) || (PublicKeyDataXdr == PublicKeyDataXdrEnd)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Invalid certificate, skipping it.\n", mImageIdName));
|
||||
Status = EFI_ABORTED;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_CERTIFICATE;
|
||||
@ -878,6 +885,7 @@ CheckTheImageInternal (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH_VALUE;
|
||||
break;
|
||||
}
|
||||
|
||||
//
|
||||
// Read key length stored in big-endian format
|
||||
//
|
||||
@ -895,6 +903,7 @@ CheckTheImageInternal (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH;
|
||||
break;
|
||||
}
|
||||
|
||||
PublicKeyData = PublicKeyDataXdr;
|
||||
Status = AuthenticateFmpImage (
|
||||
(EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image,
|
||||
@ -905,6 +914,7 @@ CheckTheImageInternal (
|
||||
if (!EFI_ERROR (Status)) {
|
||||
break;
|
||||
}
|
||||
|
||||
PublicKeyDataXdr += PublicKeyDataLength;
|
||||
PublicKeyDataXdr = (UINT8 *)ALIGN_POINTER (PublicKeyDataXdr, sizeof (UINT32));
|
||||
}
|
||||
@ -917,6 +927,7 @@ CheckTheImageInternal (
|
||||
} else {
|
||||
*LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_AUTH_FAILURE;
|
||||
}
|
||||
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
@ -935,7 +946,7 @@ CheckTheImageInternal (
|
||||
// Get the dependency from Image.
|
||||
//
|
||||
Dependencies = GetImageDependency (
|
||||
(EFI_FIRMWARE_IMAGE_AUTHENTICATION *) Image,
|
||||
(EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image,
|
||||
ImageSize,
|
||||
&DependenciesSize,
|
||||
LastAttemptStatus
|
||||
@ -948,13 +959,14 @@ CheckTheImageInternal (
|
||||
//
|
||||
// Check the FmpPayloadHeader
|
||||
//
|
||||
FmpPayloadHeader = GetFmpHeader ( (EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, ImageSize, DependenciesSize, &FmpPayloadSize );
|
||||
FmpPayloadHeader = GetFmpHeader ((EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, ImageSize, DependenciesSize, &FmpPayloadSize);
|
||||
if (FmpPayloadHeader == NULL) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): CheckTheImage() - GetFmpHeader failed.\n", mImageIdName));
|
||||
Status = EFI_ABORTED;
|
||||
*LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
Status = GetFmpPayloadHeaderVersion (FmpPayloadHeader, FmpPayloadSize, &Version);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): CheckTheImage() - GetFmpPayloadHeaderVersion failed %r.\n", mImageIdName, Status));
|
||||
@ -1013,19 +1025,20 @@ CheckTheImageInternal (
|
||||
// Call FmpDevice Lib Check Image on the
|
||||
// Raw payload. So all headers need stripped off
|
||||
//
|
||||
AllHeaderSize = GetAllHeaderSize ( (EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, FmpHeaderSize + DependenciesSize);
|
||||
AllHeaderSize = GetAllHeaderSize ((EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, FmpHeaderSize + DependenciesSize);
|
||||
if (AllHeaderSize == 0) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): CheckTheImage() - GetAllHeaderSize failed.\n", mImageIdName));
|
||||
Status = EFI_ABORTED;
|
||||
*LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_ALL_HEADER_SIZE;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
RawSize = ImageSize - AllHeaderSize;
|
||||
|
||||
//
|
||||
// FmpDeviceLib CheckImage function to do any specific checks
|
||||
//
|
||||
Status = FmpDeviceCheckImageWithStatus ((((UINT8 *) Image) + AllHeaderSize), RawSize, ImageUpdatable, LastAttemptStatus);
|
||||
Status = FmpDeviceCheckImageWithStatus ((((UINT8 *)Image) + AllHeaderSize), RawSize, ImageUpdatable, LastAttemptStatus);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): CheckTheImage() - FmpDeviceLib CheckImage failed. Status = %r\n", mImageIdName, Status));
|
||||
|
||||
@ -1034,7 +1047,8 @@ CheckTheImageInternal (
|
||||
// [LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MIN_ERROR_CODE_VALUE, LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE]
|
||||
//
|
||||
if ((*LastAttemptStatus < LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MIN_ERROR_CODE_VALUE) ||
|
||||
(*LastAttemptStatus > LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE)) {
|
||||
(*LastAttemptStatus > LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE))
|
||||
{
|
||||
DEBUG (
|
||||
(DEBUG_ERROR,
|
||||
"FmpDxe(%s): CheckTheImage() - LastAttemptStatus %d from FmpDeviceCheckImageWithStatus() is invalid.\n",
|
||||
@ -1227,13 +1241,14 @@ SetTheImage (
|
||||
// No functional error in CheckTheImage. Attempt to get the Version to
|
||||
// support better error reporting.
|
||||
//
|
||||
FmpHeader = GetFmpHeader ( (EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, ImageSize, DependenciesSize, &FmpPayloadSize );
|
||||
FmpHeader = GetFmpHeader ((EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image, ImageSize, DependenciesSize, &FmpPayloadSize);
|
||||
if (FmpHeader == NULL) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): SetTheImage() - GetFmpHeader failed.\n", mImageIdName));
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER;
|
||||
Status = EFI_ABORTED;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
Status = GetFmpPayloadHeaderVersion (FmpHeader, FmpPayloadSize, &IncomingFwVersion);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
//
|
||||
@ -1242,7 +1257,6 @@ SetTheImage (
|
||||
SetLastAttemptVersionInVariable (Private, IncomingFwVersion);
|
||||
}
|
||||
|
||||
|
||||
if (Updateable != IMAGE_UPDATABLE_VALID) {
|
||||
DEBUG (
|
||||
(DEBUG_ERROR,
|
||||
@ -1252,6 +1266,7 @@ SetTheImage (
|
||||
if (Private->DependenciesSatisfied == FALSE) {
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_UNSATISFIED_DEPENDENCIES;
|
||||
}
|
||||
|
||||
Status = EFI_ABORTED;
|
||||
goto cleanup;
|
||||
}
|
||||
@ -1274,7 +1289,7 @@ SetTheImage (
|
||||
}
|
||||
|
||||
//
|
||||
//Check System Power
|
||||
// Check System Power
|
||||
//
|
||||
Status = CheckSystemPower (&BooleanValue);
|
||||
if (EFI_ERROR (Status)) {
|
||||
@ -1282,6 +1297,7 @@ SetTheImage (
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_POWER_API;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (!BooleanValue) {
|
||||
Status = EFI_ABORTED;
|
||||
DEBUG (
|
||||
@ -1295,7 +1311,7 @@ SetTheImage (
|
||||
Progress (2);
|
||||
|
||||
//
|
||||
//Check System Thermal
|
||||
// Check System Thermal
|
||||
//
|
||||
Status = CheckSystemThermal (&BooleanValue);
|
||||
if (EFI_ERROR (Status)) {
|
||||
@ -1303,6 +1319,7 @@ SetTheImage (
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_THERMAL_API;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (!BooleanValue) {
|
||||
Status = EFI_ABORTED;
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_THERMAL;
|
||||
@ -1316,7 +1333,7 @@ SetTheImage (
|
||||
Progress (3);
|
||||
|
||||
//
|
||||
//Check System Environment
|
||||
// Check System Environment
|
||||
//
|
||||
Status = CheckSystemEnvironment (&BooleanValue);
|
||||
if (EFI_ERROR (Status)) {
|
||||
@ -1324,6 +1341,7 @@ SetTheImage (
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_ENV_API;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (!BooleanValue) {
|
||||
Status = EFI_ABORTED;
|
||||
LastAttemptStatus = LAST_ATTEMPT_STATUS_DRIVER_ERROR_SYSTEM_ENV;
|
||||
@ -1366,10 +1384,10 @@ SetTheImage (
|
||||
Progress (5);
|
||||
|
||||
//
|
||||
//Copy the requested image to the firmware using the FmpDeviceLib
|
||||
// Copy the requested image to the firmware using the FmpDeviceLib
|
||||
//
|
||||
Status = FmpDeviceSetImageWithStatus (
|
||||
(((UINT8 *) Image) + AllHeaderSize),
|
||||
(((UINT8 *)Image) + AllHeaderSize),
|
||||
ImageSize - AllHeaderSize,
|
||||
VendorCode,
|
||||
FmpDxeProgress,
|
||||
@ -1385,7 +1403,8 @@ SetTheImage (
|
||||
// [LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MIN_ERROR_CODE_VALUE, LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE]
|
||||
//
|
||||
if ((LastAttemptStatus < LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MIN_ERROR_CODE_VALUE) ||
|
||||
(LastAttemptStatus > LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE)) {
|
||||
(LastAttemptStatus > LAST_ATTEMPT_STATUS_DEVICE_LIBRARY_MAX_ERROR_CODE_VALUE))
|
||||
{
|
||||
DEBUG (
|
||||
(DEBUG_ERROR,
|
||||
"FmpDxe(%s): SetTheImage() - LastAttemptStatus %d from FmpDeviceSetImageWithStatus() is invalid.\n",
|
||||
@ -1406,6 +1425,7 @@ SetTheImage (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): SetTheImage() SaveFmpDependency from FmpDependencyCheckLib failed. (%r)\n", mImageIdName, Status));
|
||||
}
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -1580,7 +1600,7 @@ FmpDxeLockEventNotify (
|
||||
// Lock the firmware device
|
||||
//
|
||||
FmpDeviceSetContext (Private->Handle, &Private->FmpDeviceContext);
|
||||
Status = FmpDeviceLock();
|
||||
Status = FmpDeviceLock ();
|
||||
if (EFI_ERROR (Status)) {
|
||||
if (Status != EFI_UNSUPPORTED) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): FmpDeviceLock() returned error. Status = %r\n", mImageIdName, Status));
|
||||
@ -1588,6 +1608,7 @@ FmpDxeLockEventNotify (
|
||||
DEBUG ((DEBUG_WARN, "FmpDxe(%s): FmpDeviceLock() returned error. Status = %r\n", mImageIdName, Status));
|
||||
}
|
||||
}
|
||||
|
||||
Private->FmpDeviceLocked = TRUE;
|
||||
}
|
||||
}
|
||||
@ -1682,6 +1703,7 @@ InstallFmpInstance (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to register notification. Status = %r\n", mImageIdName, Status));
|
||||
}
|
||||
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
} else {
|
||||
DEBUG ((DEBUG_VERBOSE, "FmpDxe(%s): Not registering notification to call FmpDeviceLock() because mfg mode\n", mImageIdName));
|
||||
@ -1692,8 +1714,10 @@ InstallFmpInstance (
|
||||
//
|
||||
Status = gBS->InstallMultipleProtocolInterfaces (
|
||||
&Private->Handle,
|
||||
&gEfiFirmwareManagementProtocolGuid, &Private->Fmp,
|
||||
&gEdkiiFirmwareManagementProgressProtocolGuid, &mFmpProgress,
|
||||
&gEfiFirmwareManagementProtocolGuid,
|
||||
&Private->Fmp,
|
||||
&gEdkiiFirmwareManagementProgressProtocolGuid,
|
||||
&mFmpProgress,
|
||||
NULL
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
@ -1708,27 +1732,35 @@ cleanup:
|
||||
if (Private->FmpDeviceLockEvent != NULL) {
|
||||
gBS->CloseEvent (Private->FmpDeviceLockEvent);
|
||||
}
|
||||
|
||||
if (Private->Descriptor.VersionName != NULL) {
|
||||
FreePool (Private->Descriptor.VersionName);
|
||||
}
|
||||
|
||||
if (Private->FmpDeviceContext != NULL) {
|
||||
FmpDeviceSetContext (NULL, &Private->FmpDeviceContext);
|
||||
}
|
||||
|
||||
if (Private->VersionVariableName != NULL) {
|
||||
FreePool (Private->VersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->LsvVariableName != NULL) {
|
||||
FreePool (Private->LsvVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptStatusVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptStatusVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptVersionVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptVersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->FmpStateVariableName != NULL) {
|
||||
FreePool (Private->FmpStateVariableName);
|
||||
}
|
||||
|
||||
FreePool (Private);
|
||||
}
|
||||
}
|
||||
@ -1778,8 +1810,10 @@ UninstallFmpInstance (
|
||||
|
||||
Status = gBS->UninstallMultipleProtocolInterfaces (
|
||||
Private->Handle,
|
||||
&gEfiFirmwareManagementProtocolGuid, &Private->Fmp,
|
||||
&gEdkiiFirmwareManagementProgressProtocolGuid, &mFmpProgress,
|
||||
&gEfiFirmwareManagementProtocolGuid,
|
||||
&Private->Fmp,
|
||||
&gEdkiiFirmwareManagementProgressProtocolGuid,
|
||||
&mFmpProgress,
|
||||
NULL
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
@ -1790,24 +1824,31 @@ UninstallFmpInstance (
|
||||
if (Private->Descriptor.VersionName != NULL) {
|
||||
FreePool (Private->Descriptor.VersionName);
|
||||
}
|
||||
|
||||
if (Private->FmpDeviceContext != NULL) {
|
||||
FmpDeviceSetContext (NULL, &Private->FmpDeviceContext);
|
||||
}
|
||||
|
||||
if (Private->VersionVariableName != NULL) {
|
||||
FreePool (Private->VersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->LsvVariableName != NULL) {
|
||||
FreePool (Private->LsvVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptStatusVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptStatusVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptVersionVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptVersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->FmpStateVariableName != NULL) {
|
||||
FreePool (Private->FmpStateVariableName);
|
||||
}
|
||||
|
||||
FreePool (Private);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
@ -1832,6 +1873,7 @@ FmpDxeLibDestructor (
|
||||
if (mFmpSingleInstance) {
|
||||
return UninstallFmpInstance (ImageHandle);
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -1865,8 +1907,8 @@ FmpDxeEntryPoint (
|
||||
//
|
||||
// Get the ImageIdName value for the EFI_FIRMWARE_IMAGE_DESCRIPTOR from a PCD.
|
||||
//
|
||||
mImageIdName = (CHAR16 *) PcdGetPtr (PcdFmpDeviceImageIdName);
|
||||
if (PcdGetSize (PcdFmpDeviceImageIdName) <= 2 || mImageIdName[0] == 0) {
|
||||
mImageIdName = (CHAR16 *)PcdGetPtr (PcdFmpDeviceImageIdName);
|
||||
if ((PcdGetSize (PcdFmpDeviceImageIdName) <= 2) || (mImageIdName[0] == 0)) {
|
||||
//
|
||||
// PcdFmpDeviceImageIdName must be set to a non-empty Unicode string
|
||||
//
|
||||
@ -1895,6 +1937,7 @@ FmpDxeEntryPoint (
|
||||
if (PcdGetSize (PcdFmpDeviceLockEventGuid) == sizeof (EFI_GUID)) {
|
||||
mLockGuid = (EFI_GUID *)PcdGetPtr (PcdFmpDeviceLockEventGuid);
|
||||
}
|
||||
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Lock GUID: %g\n", mImageIdName, mLockGuid));
|
||||
|
||||
//
|
||||
|
@ -183,7 +183,6 @@ GetTheImage (
|
||||
IN OUT UINTN *ImageSize
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Checks if the firmware image is valid for the device.
|
||||
|
||||
|
@ -45,10 +45,11 @@ GetFmpVariable (
|
||||
(VOID **)&Buffer,
|
||||
&Size
|
||||
);
|
||||
if (!EFI_ERROR (Status) && Size == sizeof (*Value) && Buffer != NULL) {
|
||||
if (!EFI_ERROR (Status) && (Size == sizeof (*Value)) && (Buffer != NULL)) {
|
||||
*Valid = TRUE;
|
||||
*Value = *Buffer;
|
||||
}
|
||||
|
||||
if (Buffer != NULL) {
|
||||
FreePool (Buffer);
|
||||
}
|
||||
@ -111,17 +112,20 @@ GetFmpControllerState (
|
||||
(VOID **)&FmpControllerState,
|
||||
&Size
|
||||
);
|
||||
if (EFI_ERROR (Status) || FmpControllerState == NULL) {
|
||||
if (EFI_ERROR (Status) || (FmpControllerState == NULL)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to get the controller state. Status = %r\n", mImageIdName, Status));
|
||||
} else {
|
||||
if (Size == sizeof (*FmpControllerState)) {
|
||||
return FmpControllerState;
|
||||
}
|
||||
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Getting controller state returned a size different than expected. Size = 0x%x\n", mImageIdName, Size));
|
||||
}
|
||||
|
||||
if (FmpControllerState != NULL) {
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
@ -160,11 +164,13 @@ GenerateFmpVariableName (
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to generate variable name %s.\n", mImageIdName, BaseVariableName));
|
||||
return VariableName;
|
||||
}
|
||||
|
||||
if (HardwareInstance == 0) {
|
||||
return VariableName;
|
||||
}
|
||||
|
||||
UnicodeValueToStringS (
|
||||
&VariableName[StrLen(BaseVariableName)],
|
||||
&VariableName[StrLen (BaseVariableName)],
|
||||
Size,
|
||||
PREFIX_ZERO | RADIX_HEX,
|
||||
HardwareInstance,
|
||||
@ -209,15 +215,19 @@ GenerateFmpVariableNames (
|
||||
if (Private->VersionVariableName != NULL) {
|
||||
FreePool (Private->VersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->LsvVariableName != NULL) {
|
||||
FreePool (Private->LsvVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptStatusVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptStatusVariableName);
|
||||
}
|
||||
|
||||
if (Private->LastAttemptVersionVariableName != NULL) {
|
||||
FreePool (Private->LastAttemptVersionVariableName);
|
||||
}
|
||||
|
||||
if (Private->FmpStateVariableName != NULL) {
|
||||
FreePool (Private->FmpStateVariableName);
|
||||
}
|
||||
@ -336,15 +346,19 @@ GetVersionFromVariable (
|
||||
if (FmpControllerState != NULL) {
|
||||
if (FmpControllerState->VersionValid) {
|
||||
Value = FmpControllerState->Version;
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Get variable %g %s Version %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Get variable %g %s Version %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
Value
|
||||
));
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
return Value;
|
||||
}
|
||||
|
||||
@ -375,15 +389,19 @@ GetLowestSupportedVersionFromVariable (
|
||||
if (FmpControllerState != NULL) {
|
||||
if (FmpControllerState->LsvValid) {
|
||||
Value = FmpControllerState->Lsv;
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Get variable %g %s LowestSupportedVersion %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Get variable %g %s LowestSupportedVersion %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
Value
|
||||
));
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
return Value;
|
||||
}
|
||||
|
||||
@ -413,15 +431,19 @@ GetLastAttemptStatusFromVariable (
|
||||
if (FmpControllerState != NULL) {
|
||||
if (FmpControllerState->LastAttemptStatusValid) {
|
||||
Value = FmpControllerState->LastAttemptStatus;
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Get variable %g %s LastAttemptStatus %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Get variable %g %s LastAttemptStatus %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
Value
|
||||
));
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
return Value;
|
||||
}
|
||||
|
||||
@ -451,15 +473,19 @@ GetLastAttemptVersionFromVariable (
|
||||
if (FmpControllerState != NULL) {
|
||||
if (FmpControllerState->LastAttemptVersionValid) {
|
||||
Value = FmpControllerState->LastAttemptVersion;
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Get variable %g %s LastAttemptVersion %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Get variable %g %s LastAttemptVersion %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
Value
|
||||
));
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
return Value;
|
||||
}
|
||||
|
||||
@ -495,9 +521,11 @@ SetVersionInVariable (
|
||||
if (!FmpControllerState->VersionValid) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (FmpControllerState->Version != Version) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (!Update) {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): No need to update controller state. Same value as before.\n", mImageIdName));
|
||||
} else {
|
||||
@ -513,7 +541,9 @@ SetVersionInVariable (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to update controller state. Status = %r\n", mImageIdName, Status));
|
||||
} else {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Set variable %g %s Version %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Set variable %g %s Version %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
@ -521,6 +551,7 @@ SetVersionInVariable (
|
||||
));
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
@ -558,9 +589,11 @@ SetLowestSupportedVersionInVariable (
|
||||
if (!FmpControllerState->LsvValid) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (FmpControllerState->Lsv < LowestSupportedVersion) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (!Update) {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): No need to update controller state. Same value as before.\n", mImageIdName));
|
||||
} else {
|
||||
@ -576,7 +609,9 @@ SetLowestSupportedVersionInVariable (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to update controller state. Status = %r\n", mImageIdName, Status));
|
||||
} else {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Set variable %g %s LowestSupportedVersion %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Set variable %g %s LowestSupportedVersion %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
@ -584,6 +619,7 @@ SetLowestSupportedVersionInVariable (
|
||||
));
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
@ -621,9 +657,11 @@ SetLastAttemptStatusInVariable (
|
||||
if (!FmpControllerState->LastAttemptStatusValid) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (FmpControllerState->LastAttemptStatus != LastAttemptStatus) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (!Update) {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): No need to update controller state. Same value as before.\n", mImageIdName));
|
||||
} else {
|
||||
@ -639,7 +677,9 @@ SetLastAttemptStatusInVariable (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to update controller state. Status = %r\n", mImageIdName, Status));
|
||||
} else {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Set variable %g %s LastAttemptStatus %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Set variable %g %s LastAttemptStatus %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
@ -647,6 +687,7 @@ SetLastAttemptStatusInVariable (
|
||||
));
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
@ -684,9 +725,11 @@ SetLastAttemptVersionInVariable (
|
||||
if (!FmpControllerState->LastAttemptVersionValid) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (FmpControllerState->LastAttemptVersion != LastAttemptVersion) {
|
||||
Update = TRUE;
|
||||
}
|
||||
|
||||
if (!Update) {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): No need to update controller state. Same value as before.\n", mImageIdName));
|
||||
} else {
|
||||
@ -702,7 +745,9 @@ SetLastAttemptVersionInVariable (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to update controller state. Status = %r\n", mImageIdName, Status));
|
||||
} else {
|
||||
DEBUG ((DEBUG_INFO, "FmpDxe(%s): Set variable %g %s LastAttemptVersion %08x\n",
|
||||
DEBUG ((
|
||||
DEBUG_INFO,
|
||||
"FmpDxe(%s): Set variable %g %s LastAttemptVersion %08x\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
Private->FmpStateVariableName,
|
||||
@ -710,6 +755,7 @@ SetLastAttemptVersionInVariable (
|
||||
));
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (FmpControllerState);
|
||||
}
|
||||
|
||||
@ -737,25 +783,31 @@ LockFmpVariable (
|
||||
EFI_STATUS Status;
|
||||
|
||||
// If success, go ahead and set the policies to protect the target variables.
|
||||
Status = RegisterBasicVariablePolicy (VariablePolicy,
|
||||
Status = RegisterBasicVariablePolicy (
|
||||
VariablePolicy,
|
||||
&gEfiCallerIdGuid,
|
||||
VariableName,
|
||||
VARIABLE_POLICY_NO_MIN_SIZE,
|
||||
VARIABLE_POLICY_NO_MAX_SIZE,
|
||||
VARIABLE_POLICY_NO_MUST_ATTR,
|
||||
VARIABLE_POLICY_NO_CANT_ATTR,
|
||||
VARIABLE_POLICY_TYPE_LOCK_NOW);
|
||||
VARIABLE_POLICY_TYPE_LOCK_NOW
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe(%s): Failed to lock variable %g %s. Status = %r\n",
|
||||
DEBUG ((
|
||||
DEBUG_ERROR,
|
||||
"FmpDxe(%s): Failed to lock variable %g %s. Status = %r\n",
|
||||
mImageIdName,
|
||||
&gEfiCallerIdGuid,
|
||||
VariableName,
|
||||
Status
|
||||
));
|
||||
}
|
||||
|
||||
if (EFI_ERROR (PreviousStatus)) {
|
||||
return PreviousStatus;
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@ -778,7 +830,7 @@ LockAllFmpVariables (
|
||||
EDKII_VARIABLE_POLICY_PROTOCOL *VariablePolicy;
|
||||
|
||||
// Locate the VariablePolicy protocol.
|
||||
Status = gBS->LocateProtocol (&gEdkiiVariablePolicyProtocolGuid, NULL, (VOID**)&VariablePolicy );
|
||||
Status = gBS->LocateProtocol (&gEdkiiVariablePolicyProtocolGuid, NULL, (VOID **)&VariablePolicy);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "FmpDxe %a - Could not locate VariablePolicy protocol! %r\n", __FUNCTION__, Status));
|
||||
return Status;
|
||||
|
@ -42,7 +42,7 @@ SaveFmpDependency (
|
||||
@retval NULL
|
||||
|
||||
**/
|
||||
EFI_FIRMWARE_IMAGE_DEP*
|
||||
EFI_FIRMWARE_IMAGE_DEP *
|
||||
EFIAPI
|
||||
GetFmpDependency (
|
||||
OUT UINT32 *DepexSize
|
||||
|
@ -61,7 +61,7 @@ ValidateDependency (
|
||||
@retval Null
|
||||
|
||||
**/
|
||||
EFI_FIRMWARE_IMAGE_DEP*
|
||||
EFI_FIRMWARE_IMAGE_DEP *
|
||||
EFIAPI
|
||||
GetImageDependency (
|
||||
IN EFI_FIRMWARE_IMAGE_AUTHENTICATION *Image,
|
||||
|
@ -36,6 +36,7 @@ LookupCapsuleUpdatePolicyProtocol (
|
||||
if (mCapsuleUpdatePolicy != NULL) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
Status = gBS->LocateProtocol (
|
||||
&gEdkiiCapsuleUpdatePolicyProtocolGuid,
|
||||
NULL,
|
||||
@ -45,6 +46,7 @@ LookupCapsuleUpdatePolicyProtocol (
|
||||
mCapsuleUpdatePolicy = NULL;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
@ -70,6 +72,7 @@ CheckSystemPower (
|
||||
if (LookupCapsuleUpdatePolicyProtocol ()) {
|
||||
return mCapsuleUpdatePolicy->CheckSystemPower (mCapsuleUpdatePolicy, Good);
|
||||
}
|
||||
|
||||
*Good = TRUE;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
@ -96,6 +99,7 @@ CheckSystemThermal (
|
||||
if (LookupCapsuleUpdatePolicyProtocol ()) {
|
||||
return mCapsuleUpdatePolicy->CheckSystemThermal (mCapsuleUpdatePolicy, Good);
|
||||
}
|
||||
|
||||
*Good = TRUE;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
@ -122,6 +126,7 @@ CheckSystemEnvironment (
|
||||
if (LookupCapsuleUpdatePolicyProtocol ()) {
|
||||
return mCapsuleUpdatePolicy->CheckSystemEnvironment (mCapsuleUpdatePolicy, Good);
|
||||
}
|
||||
|
||||
*Good = TRUE;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
@ -145,6 +150,7 @@ IsLowestSupportedVersionCheckRequired (
|
||||
if (LookupCapsuleUpdatePolicyProtocol ()) {
|
||||
return mCapsuleUpdatePolicy->IsLowestSupportedVersionCheckRequired (mCapsuleUpdatePolicy);
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
@ -167,5 +173,6 @@ IsLockFmpDeviceAtLockEventGuidRequired (
|
||||
if (LookupCapsuleUpdatePolicyProtocol ()) {
|
||||
return mCapsuleUpdatePolicy->IsLockFmpDeviceAtLockEventGuidRequired (mCapsuleUpdatePolicy);
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
@ -91,41 +91,41 @@ CheckFmpDependency (
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
FmpImageInfoBuf = AllocateZeroPool (sizeof(EFI_FIRMWARE_IMAGE_DESCRIPTOR *) * NumberOfFmpInstance);
|
||||
FmpImageInfoBuf = AllocateZeroPool (sizeof (EFI_FIRMWARE_IMAGE_DESCRIPTOR *) * NumberOfFmpInstance);
|
||||
if (FmpImageInfoBuf == NULL) {
|
||||
IsSatisfied = FALSE;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_FMP_INFO_BUFFER_FAILED;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
DescriptorVer = AllocateZeroPool (sizeof(UINT32) * NumberOfFmpInstance);
|
||||
DescriptorVer = AllocateZeroPool (sizeof (UINT32) * NumberOfFmpInstance);
|
||||
if (DescriptorVer == NULL ) {
|
||||
IsSatisfied = FALSE;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_VER_BUFFER_FAILED;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
DescriptorSize = AllocateZeroPool (sizeof(UINTN) * NumberOfFmpInstance);
|
||||
DescriptorSize = AllocateZeroPool (sizeof (UINTN) * NumberOfFmpInstance);
|
||||
if (DescriptorSize == NULL ) {
|
||||
IsSatisfied = FALSE;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_SIZE_BUFFER_FAILED;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
FmpVersions = AllocateZeroPool (sizeof(FMP_DEPEX_CHECK_VERSION_DATA) * NumberOfFmpInstance);
|
||||
FmpVersions = AllocateZeroPool (sizeof (FMP_DEPEX_CHECK_VERSION_DATA) * NumberOfFmpInstance);
|
||||
if (FmpVersions == NULL) {
|
||||
IsSatisfied = FALSE;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_FMP_VER_BUFFER_FAILED;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
for (Index = 0; Index < NumberOfFmpInstance; Index ++) {
|
||||
for (Index = 0; Index < NumberOfFmpInstance; Index++) {
|
||||
Status = gBS->HandleProtocol (
|
||||
HandleBuffer[Index],
|
||||
&gEfiFirmwareManagementProtocolGuid,
|
||||
(VOID **) &Fmp
|
||||
(VOID **)&Fmp
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
if (EFI_ERROR (Status)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
@ -159,7 +159,7 @@ CheckFmpDependency (
|
||||
&PackageVersion, // PackageVersion
|
||||
&PackageVersionName // PackageVersionName
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
if (EFI_ERROR (Status)) {
|
||||
FreePool (FmpImageInfoBuf[Index]);
|
||||
FmpImageInfoBuf[Index] = NULL;
|
||||
continue;
|
||||
@ -172,7 +172,7 @@ CheckFmpDependency (
|
||||
|
||||
CopyGuid (&FmpVersions[FmpVersionsCount].ImageTypeId, &FmpImageInfoBuf[Index]->ImageTypeId);
|
||||
FmpVersions[FmpVersionsCount].Version = FmpImageInfoBuf[Index]->Version;
|
||||
FmpVersionsCount ++;
|
||||
FmpVersionsCount++;
|
||||
}
|
||||
|
||||
//
|
||||
@ -189,11 +189,12 @@ CheckFmpDependency (
|
||||
|
||||
cleanup:
|
||||
if (FmpImageInfoBuf != NULL) {
|
||||
for (Index = 0; Index < NumberOfFmpInstance; Index ++) {
|
||||
for (Index = 0; Index < NumberOfFmpInstance; Index++) {
|
||||
if (FmpImageInfoBuf[Index] != NULL) {
|
||||
FreePool (FmpImageInfoBuf[Index]);
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (FmpImageInfoBuf);
|
||||
}
|
||||
|
||||
|
@ -40,7 +40,7 @@ SaveFmpDependency (
|
||||
@retval NULL
|
||||
|
||||
**/
|
||||
EFI_FIRMWARE_IMAGE_DEP*
|
||||
EFI_FIRMWARE_IMAGE_DEP *
|
||||
EFIAPI
|
||||
GetFmpDependency (
|
||||
OUT UINT32 *DepexSize
|
||||
|
@ -128,7 +128,7 @@ Push (
|
||||
//
|
||||
// Check Type
|
||||
//
|
||||
if (Type != BooleanType && Type != VersionType) {
|
||||
if ((Type != BooleanType) && (Type != VersionType)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
@ -191,6 +191,7 @@ Pop (
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: Popped element type is mismatched!\n"));
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -239,11 +240,11 @@ EvaluateDependency (
|
||||
//
|
||||
// Check if parameter is valid.
|
||||
//
|
||||
if (Dependencies == NULL || DependenciesSize == 0) {
|
||||
if ((Dependencies == NULL) || (DependenciesSize == 0)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (FmpVersions == NULL && FmpVersionsCount > 0) {
|
||||
if ((FmpVersions == NULL) && (FmpVersionsCount > 0)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
@ -253,58 +254,62 @@ EvaluateDependency (
|
||||
//
|
||||
mDepexEvaluationStackPointer = mDepexEvaluationStack;
|
||||
|
||||
Iterator = (UINT8 *) Dependencies->Dependencies;
|
||||
while (Iterator < (UINT8 *) Dependencies->Dependencies + DependenciesSize) {
|
||||
switch (*Iterator)
|
||||
{
|
||||
Iterator = (UINT8 *)Dependencies->Dependencies;
|
||||
while (Iterator < (UINT8 *)Dependencies->Dependencies + DependenciesSize) {
|
||||
switch (*Iterator) {
|
||||
case EFI_FMP_DEP_PUSH_GUID:
|
||||
if (Iterator + sizeof (EFI_GUID) >= (UINT8 *) Dependencies->Dependencies + DependenciesSize) {
|
||||
if (Iterator + sizeof (EFI_GUID) >= (UINT8 *)Dependencies->Dependencies + DependenciesSize) {
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: GUID extends beyond end of dependency expression!\n"));
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_GUID_BEYOND_DEPEX;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
CopyGuid (&ImageTypeId, (EFI_GUID *) (Iterator + 1));
|
||||
CopyGuid (&ImageTypeId, (EFI_GUID *)(Iterator + 1));
|
||||
Iterator = Iterator + sizeof (EFI_GUID);
|
||||
|
||||
for (Index = 0; Index < FmpVersionsCount; Index ++) {
|
||||
if(CompareGuid (&FmpVersions[Index].ImageTypeId, &ImageTypeId)){
|
||||
for (Index = 0; Index < FmpVersionsCount; Index++) {
|
||||
if (CompareGuid (&FmpVersions[Index].ImageTypeId, &ImageTypeId)) {
|
||||
Status = Push (FmpVersions[Index].Version, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (Index == FmpVersionsCount) {
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: %g is not found!\n", &ImageTypeId));
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_FMP_NOT_FOUND;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_PUSH_VERSION:
|
||||
if (Iterator + sizeof (UINT32) >= (UINT8 *) Dependencies->Dependencies + DependenciesSize ) {
|
||||
if (Iterator + sizeof (UINT32) >= (UINT8 *)Dependencies->Dependencies + DependenciesSize ) {
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: VERSION extends beyond end of dependency expression!\n"));
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_BEYOND_DEPEX;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Version = *(UINT32 *) (Iterator + 1);
|
||||
Version = *(UINT32 *)(Iterator + 1);
|
||||
Status = Push (Version, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Iterator = Iterator + sizeof (UINT32);
|
||||
break;
|
||||
case EFI_FMP_DEP_VERSION_STR:
|
||||
Iterator += AsciiStrnLenS ((CHAR8 *) Iterator, DependenciesSize - (Iterator - Dependencies->Dependencies));
|
||||
if (Iterator == (UINT8 *) Dependencies->Dependencies + DependenciesSize) {
|
||||
Iterator += AsciiStrnLenS ((CHAR8 *)Iterator, DependenciesSize - (Iterator - Dependencies->Dependencies));
|
||||
if (Iterator == (UINT8 *)Dependencies->Dependencies + DependenciesSize) {
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: STRING extends beyond end of dependency expression!\n"));
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_STR_BEYOND_DEPEX;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_AND:
|
||||
Status = Pop (&Element1, BooleanType);
|
||||
@ -312,16 +317,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Push (Element1.Value.Boolean & Element2.Value.Boolean, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_OR:
|
||||
Status = Pop (&Element1, BooleanType);
|
||||
@ -329,16 +337,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
Status = Pop(&Element2, BooleanType);
|
||||
|
||||
Status = Pop (&Element2, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Push (Element1.Value.Boolean | Element2.Value.Boolean, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_NOT:
|
||||
Status = Pop (&Element1, BooleanType);
|
||||
@ -346,11 +357,13 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Push (!(Element1.Value.Boolean), BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_TRUE:
|
||||
Status = Push (TRUE, BooleanType);
|
||||
@ -358,6 +371,7 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_FALSE:
|
||||
Status = Push (FALSE, BooleanType);
|
||||
@ -365,6 +379,7 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_EQ:
|
||||
Status = Pop (&Element1, VersionType);
|
||||
@ -372,16 +387,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = (Element1.Value.Version == Element2.Value.Version) ? Push (TRUE, BooleanType) : Push (FALSE, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_GT:
|
||||
Status = Pop (&Element1, VersionType);
|
||||
@ -389,16 +407,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = (Element1.Value.Version > Element2.Value.Version) ? Push (TRUE, BooleanType) : Push (FALSE, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_GTE:
|
||||
Status = Pop (&Element1, VersionType);
|
||||
@ -406,16 +427,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = (Element1.Value.Version >= Element2.Value.Version) ? Push (TRUE, BooleanType) : Push (FALSE, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_LT:
|
||||
Status = Pop (&Element1, VersionType);
|
||||
@ -423,16 +447,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus= LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = (Element1.Value.Version < Element2.Value.Version) ? Push (TRUE, BooleanType) : Push (FALSE, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_LTE:
|
||||
Status = Pop (&Element1, VersionType);
|
||||
@ -440,16 +467,19 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = Pop (&Element2, VersionType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Status = (Element1.Value.Version <= Element2.Value.Version) ? Push (TRUE, BooleanType) : Push (FALSE, BooleanType);
|
||||
if (EFI_ERROR (Status)) {
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
break;
|
||||
case EFI_FMP_DEP_END:
|
||||
Status = Pop (&Element1, BooleanType);
|
||||
@ -457,12 +487,14 @@ EvaluateDependency (
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
return Element1.Value.Boolean;
|
||||
default:
|
||||
DEBUG ((DEBUG_ERROR, "EvaluateDependency: Unknown Opcode - %02x!\n", *Iterator));
|
||||
LocalLastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_UNKNOWN_OPCODE;
|
||||
goto Error;
|
||||
}
|
||||
|
||||
Iterator++;
|
||||
}
|
||||
|
||||
@ -513,8 +545,7 @@ ValidateDependency (
|
||||
|
||||
Depex = Dependencies->Dependencies;
|
||||
while (Depex < Dependencies->Dependencies + MaxDepexSize) {
|
||||
switch (*Depex)
|
||||
{
|
||||
switch (*Depex) {
|
||||
case EFI_FMP_DEP_PUSH_GUID:
|
||||
Depex += sizeof (EFI_GUID) + 1;
|
||||
break;
|
||||
@ -522,7 +553,7 @@ ValidateDependency (
|
||||
Depex += sizeof (UINT32) + 1;
|
||||
break;
|
||||
case EFI_FMP_DEP_VERSION_STR:
|
||||
Depex += AsciiStrnLenS ((CHAR8 *) Depex, Dependencies->Dependencies + MaxDepexSize - Depex) + 1;
|
||||
Depex += AsciiStrnLenS ((CHAR8 *)Depex, Dependencies->Dependencies + MaxDepexSize - Depex) + 1;
|
||||
break;
|
||||
case EFI_FMP_DEP_AND:
|
||||
case EFI_FMP_DEP_OR:
|
||||
@ -541,6 +572,7 @@ ValidateDependency (
|
||||
if (DepexSize != NULL) {
|
||||
*DepexSize = (UINT32)(Depex - Dependencies->Dependencies);
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
default:
|
||||
return FALSE;
|
||||
@ -568,7 +600,7 @@ ValidateDependency (
|
||||
@retval Null
|
||||
|
||||
**/
|
||||
EFI_FIRMWARE_IMAGE_DEP*
|
||||
EFI_FIRMWARE_IMAGE_DEP *
|
||||
EFIAPI
|
||||
GetImageDependency (
|
||||
IN EFI_FIRMWARE_IMAGE_AUTHENTICATION *Image,
|
||||
@ -587,18 +619,20 @@ GetImageDependency (
|
||||
//
|
||||
// Check to make sure that operation can be safely performed.
|
||||
//
|
||||
if (((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) < (UINTN)Image || \
|
||||
((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) >= (UINTN)Image + ImageSize) {
|
||||
if ((((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) < (UINTN)Image) || \
|
||||
(((UINTN)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength) >= (UINTN)Image + ImageSize))
|
||||
{
|
||||
//
|
||||
// Pointer overflow. Invalid image.
|
||||
//
|
||||
if (LastAttemptStatus != NULL) {
|
||||
*LastAttemptStatus = LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_GET_DEPEX_FAILURE;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
Depex = (EFI_FIRMWARE_IMAGE_DEP*)((UINT8 *)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength);
|
||||
Depex = (EFI_FIRMWARE_IMAGE_DEP *)((UINT8 *)Image + sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength);
|
||||
MaxDepexSize = ImageSize - (sizeof (Image->MonotonicCount) + Image->AuthInfo.Hdr.dwLength);
|
||||
|
||||
//
|
||||
|
@ -131,6 +131,7 @@ FmpDeviceGetSize (
|
||||
if (Size == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
*Size = 0;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
@ -188,9 +189,10 @@ FmpDeviceGetAttributes (
|
||||
OUT UINT64 *Setting
|
||||
)
|
||||
{
|
||||
if (Supported == NULL || Setting == NULL) {
|
||||
if ((Supported == NULL) || (Setting == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
*Supported = 0;
|
||||
*Setting = 0;
|
||||
return EFI_SUCCESS;
|
||||
@ -268,6 +270,7 @@ FmpDeviceGetVersionString (
|
||||
if (VersionString == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
*VersionString = NULL;
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
@ -61,14 +61,15 @@ GetFmpPayloadHeaderSize (
|
||||
|
||||
FmpPayloadHeader = NULL;
|
||||
|
||||
if (Header == NULL || Size == NULL) {
|
||||
if ((Header == NULL) || (Size == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
|
||||
if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader ||
|
||||
(UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize ||
|
||||
FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
|
||||
if (((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader) ||
|
||||
((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize) ||
|
||||
(FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)))
|
||||
{
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
@ -106,14 +107,15 @@ GetFmpPayloadHeaderVersion (
|
||||
|
||||
FmpPayloadHeader = NULL;
|
||||
|
||||
if (Header == NULL || Version == NULL) {
|
||||
if ((Header == NULL) || (Version == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
|
||||
if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader ||
|
||||
(UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize ||
|
||||
FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
|
||||
if (((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader) ||
|
||||
((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize) ||
|
||||
(FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)))
|
||||
{
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
@ -151,14 +153,15 @@ GetFmpPayloadHeaderLowestSupportedVersion (
|
||||
|
||||
FmpPayloadHeader = NULL;
|
||||
|
||||
if (Header == NULL || LowestSupportedVersion == NULL) {
|
||||
if ((Header == NULL) || (LowestSupportedVersion == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
|
||||
if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader ||
|
||||
(UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize ||
|
||||
FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
|
||||
if (((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) < (UINTN)FmpPayloadHeader) ||
|
||||
((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >= (UINTN)FmpPayloadHeader + FmpPayloadSize) ||
|
||||
(FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)))
|
||||
{
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
|
@ -29,52 +29,51 @@
|
||||
/// The value of pre-existing last attempt status codes should never be modified to ensure the values remain
|
||||
/// consistent over time.
|
||||
///
|
||||
enum LAST_ATTEMPT_STATUS_EXPANDED_ERROR_LIST
|
||||
{
|
||||
enum LAST_ATTEMPT_STATUS_EXPANDED_ERROR_LIST {
|
||||
///
|
||||
/// Last attempt status codes used in FmpDxe
|
||||
///
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER = LAST_ATTEMPT_STATUS_DRIVER_MIN_ERROR_CODE_VALUE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_PROGRESS_CALLBACK_ERROR ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_POWER_API ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_THERMAL_API ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_THERMAL ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_ENV_API ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_SYSTEM_ENV ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER_SIZE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_ALL_HEADER_SIZE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER_VERSION ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_NOT_PROVIDED ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_NOT_UPDATABLE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_CERTIFICATE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_IMAGE_INDEX ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH_VALUE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_VERSION_TOO_LOW ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_DEVICE_LOCKED ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_AUTH_FAILURE ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_PROTOCOL_ARG_MISSING ,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_PROGRESS_CALLBACK_ERROR,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_POWER_API,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_THERMAL_API,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_THERMAL,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_CHECK_SYS_ENV_API,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_SYSTEM_ENV,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER_SIZE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_ALL_HEADER_SIZE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_GET_FMP_HEADER_VERSION,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_NOT_PROVIDED,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_NOT_UPDATABLE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_CERTIFICATE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_IMAGE_INDEX,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_INVALID_KEY_LENGTH_VALUE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_VERSION_TOO_LOW,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_DEVICE_LOCKED,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_IMAGE_AUTH_FAILURE,
|
||||
LAST_ATTEMPT_STATUS_DRIVER_ERROR_PROTOCOL_ARG_MISSING,
|
||||
|
||||
///
|
||||
/// Last attempt status codes used in FmpDependencyLib
|
||||
///
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_GET_DEPEX_FAILURE = LAST_ATTEMPT_STATUS_FMP_DEPENDENCY_LIB_MIN_ERROR_CODE_VALUE,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_NO_END_OPCODE ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_UNKNOWN_OPCODE ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_GUID_BEYOND_DEPEX ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_BEYOND_DEPEX ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_STR_BEYOND_DEPEX ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_FMP_NOT_FOUND ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_NO_END_OPCODE,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_UNKNOWN_OPCODE,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_GUID_BEYOND_DEPEX,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_BEYOND_DEPEX,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_VERSION_STR_BEYOND_DEPEX,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_FMP_NOT_FOUND,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_PUSH_FAILURE,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_LIB_ERROR_POP_FAILURE,
|
||||
|
||||
///
|
||||
/// Last attempt status codes used in FmpDependencyCheckLib
|
||||
///
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_FMP_PROTOCOL_NOT_FOUND = LAST_ATTEMPT_STATUS_FMP_DEPENDENCY_CHECK_LIB_MIN_ERROR_CODE_VALUE,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_FMP_INFO_BUFFER_FAILED ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_VER_BUFFER_FAILED ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_SIZE_BUFFER_FAILED ,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_FMP_INFO_BUFFER_FAILED,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_VER_BUFFER_FAILED,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_DESC_SIZE_BUFFER_FAILED,
|
||||
LAST_ATTEMPT_STATUS_DEPENDENCY_CHECK_LIB_ERROR_MEM_ALLOC_FMP_VER_BUFFER_FAILED
|
||||
};
|
||||
|
||||
|
@ -33,7 +33,7 @@ typedef struct _EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL EDKII_CAPSULE_UPDATE_POLIC
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI * EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_POWER) (
|
||||
(EFIAPI *EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_POWER)(
|
||||
IN EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL *This,
|
||||
OUT BOOLEAN *Good
|
||||
);
|
||||
@ -54,7 +54,7 @@ EFI_STATUS
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI * EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_THERMAL) (
|
||||
(EFIAPI *EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_THERMAL)(
|
||||
IN EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL *This,
|
||||
OUT BOOLEAN *Good
|
||||
);
|
||||
@ -75,7 +75,7 @@ EFI_STATUS
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI * EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_ENVIRONMENT) (
|
||||
(EFIAPI *EDKII_CAPSULE_UPDATE_POLICY_CHECK_SYSTEM_ENVIRONMENT)(
|
||||
IN EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL *This,
|
||||
OUT BOOLEAN *Good
|
||||
);
|
||||
@ -94,7 +94,7 @@ EFI_STATUS
|
||||
**/
|
||||
typedef
|
||||
BOOLEAN
|
||||
(EFIAPI * EDKII_CAPSULE_UPDATE_POLICY_IS_LOWEST_SUPPORTED_VERSION_CHECK_REQUIRED) (
|
||||
(EFIAPI *EDKII_CAPSULE_UPDATE_POLICY_IS_LOWEST_SUPPORTED_VERSION_CHECK_REQUIRED)(
|
||||
IN EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL *This
|
||||
);
|
||||
|
||||
@ -112,7 +112,7 @@ BOOLEAN
|
||||
**/
|
||||
typedef
|
||||
BOOLEAN
|
||||
(EFIAPI * EDKII_CAPSULE_UPDATE_POLICY_IS_FMP_DEVICE_AT_LOCK_EVENT_REQUIRED) (
|
||||
(EFIAPI *EDKII_CAPSULE_UPDATE_POLICY_IS_FMP_DEVICE_AT_LOCK_EVENT_REQUIRED)(
|
||||
IN EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL *This
|
||||
);
|
||||
|
||||
|
@ -39,17 +39,17 @@ typedef struct {
|
||||
// Device B's version is 0x00000003
|
||||
//
|
||||
static FMP_DEPEX_CHECK_VERSION_DATA mFmpVersions[] = {
|
||||
{IMAGE_TYPE_ID_1, 0x00000002},
|
||||
{IMAGE_TYPE_ID_2, 0x00000003}
|
||||
{ IMAGE_TYPE_ID_1, 0x00000002 },
|
||||
{ IMAGE_TYPE_ID_2, 0x00000003 }
|
||||
};
|
||||
|
||||
// Valid Dependency Expression 1: (Version(A) > 0x00000001) && (Version(B) >= 0x00000003)
|
||||
static UINT8 mExpression1[] = {
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x01, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97, 0x8E, 0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97,0x8E, 0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_GT,
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x03, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0x70, 0x73, 0x2A, 0xA4, 0x3A, 0x43, 0x4D, 0x68, 0x9A, 0xA1, 0xDE, 0x62, 0x23, 0x30, 0x6C, 0xF3,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0x70, 0x73, 0x2A, 0xA4,0x3A, 0x43, 0x4D, 0x68, 0x9A, 0xA1, 0xDE, 0x62, 0x23, 0x30, 0x6C, 0xF3,
|
||||
EFI_FMP_DEP_GTE,
|
||||
EFI_FMP_DEP_AND,
|
||||
EFI_FMP_DEP_END
|
||||
@ -58,10 +58,10 @@ static UINT8 mExpression1[] = {
|
||||
// Valid Dependency Expression 2: (Version(A) < 0x00000002) || (Version(B) <= 0x00000003)
|
||||
static UINT8 mExpression2[] = {
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x02, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97, 0x8E, 0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97,0x8E, 0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_LT,
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x03, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0x70, 0x73, 0x2A, 0xA4, 0x3A, 0x43, 0x4D, 0x68, 0x9A, 0xA1, 0xDE, 0x62, 0x23, 0x30, 0x6C, 0xF3,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0x70, 0x73, 0x2A, 0xA4,0x3A, 0x43, 0x4D, 0x68, 0x9A, 0xA1, 0xDE, 0x62, 0x23, 0x30, 0x6C, 0xF3,
|
||||
EFI_FMP_DEP_LTE,
|
||||
EFI_FMP_DEP_OR,
|
||||
EFI_FMP_DEP_END
|
||||
@ -70,7 +70,7 @@ static UINT8 mExpression2[] = {
|
||||
// Valid Dependency Expression 3: !(Version(A) == 0x0000002)
|
||||
static UINT8 mExpression3[] = {
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x02, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97, 0x8E, 0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xFA, 0x4D, 0x14, 0x97,0x8E,0xEB, 0x4D, 0xD1, 0x8B, 0x4D, 0x39, 0x88, 0x24, 0x96, 0x56, 0x42,
|
||||
EFI_FMP_DEP_EQ,
|
||||
EFI_FMP_DEP_NOT,
|
||||
EFI_FMP_DEP_END
|
||||
@ -86,10 +86,10 @@ static UINT8 mExpression4[] = {
|
||||
};
|
||||
|
||||
// Invalid Dependency Expression 1: Invalid Op-code
|
||||
static UINT8 mExpression5[] = {EFI_FMP_DEP_TRUE, 0xAA, EFI_FMP_DEP_END};
|
||||
static UINT8 mExpression5[] = { EFI_FMP_DEP_TRUE, 0xAA, EFI_FMP_DEP_END };
|
||||
|
||||
// Invalid Dependency Expression 2: String doesn't end with '\0'
|
||||
static UINT8 mExpression6[] = {EFI_FMP_DEP_VERSION_STR, 'T', 'e', 's', 't', EFI_FMP_DEP_TRUE, EFI_FMP_DEP_END};
|
||||
static UINT8 mExpression6[] = { EFI_FMP_DEP_VERSION_STR, 'T', 'e', 's', 't', EFI_FMP_DEP_TRUE, EFI_FMP_DEP_END };
|
||||
|
||||
// Invalid Dependency Expression 3: GUID is in invalid size
|
||||
static UINT8 mExpression7[] = {
|
||||
@ -102,18 +102,18 @@ static UINT8 mExpression7[] = {
|
||||
// Invalid Dependency Expression 4: Version is in invalid size
|
||||
static UINT8 mExpression8[] = {
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x02, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xDA, 0xCB, 0x25, 0xAC, 0x9E, 0xCD, 0x5E, 0xE2, 0x9C, 0x5E, 0x4A, 0x99, 0x35, 0xA7, 0x67, 0x53,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xDA, 0xCB,0x25,0xAC, 0x9E, 0xCD, 0x5E, 0xE2, 0x9C, 0x5E, 0x4A, 0x99, 0x35, 0xA7, 0x67, 0x53,
|
||||
EFI_FMP_DEP_GTE,
|
||||
EFI_FMP_DEP_END
|
||||
};
|
||||
|
||||
// Invalid Dependency Expression 5: Operand and operator mismatch
|
||||
static UINT8 mExpression9[] = {EFI_FMP_DEP_TRUE, EFI_FMP_DEP_FALSE, EFI_FMP_DEP_GTE, EFI_FMP_DEP_END};
|
||||
static UINT8 mExpression9[] = { EFI_FMP_DEP_TRUE, EFI_FMP_DEP_FALSE, EFI_FMP_DEP_GTE, EFI_FMP_DEP_END };
|
||||
|
||||
// Invalid Dependency Expression 6: GUID is NOT FOUND
|
||||
static UINT8 mExpression10[] = {
|
||||
EFI_FMP_DEP_PUSH_VERSION, 0x02, 0x00, 0x00, 0x00,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xDA, 0xCB, 0x25, 0xAC, 0x9E, 0xCD, 0x5E, 0xE2, 0x9C, 0x5E, 0x4A, 0x99, 0x35, 0xA7, 0x67, 0x53,
|
||||
EFI_FMP_DEP_PUSH_GUID, 0xDA, 0xCB, 0x25, 0xAC,0x9E,0xCD, 0x5E, 0xE2, 0x9C, 0x5E, 0x4A, 0x99, 0x35, 0xA7, 0x67, 0x53,
|
||||
EFI_FMP_DEP_GT,
|
||||
EFI_FMP_DEP_END
|
||||
};
|
||||
@ -126,18 +126,18 @@ static UINT8 mExpression11[] = {
|
||||
};
|
||||
|
||||
// ------------------------------------------------Test Depex------Depex Size----------------Expected Result
|
||||
static BASIC_TEST_CONTEXT mBasicTestTrue1 = {mExpression1, sizeof(mExpression1), TRUE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestTrue2 = {mExpression2, sizeof(mExpression2), TRUE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestFalse1 = {mExpression3, sizeof(mExpression3), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestFalse2 = {mExpression4, sizeof(mExpression4), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid1 = {mExpression1, sizeof(mExpression1) - 1, FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid2 = {mExpression5, sizeof(mExpression5), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid3 = {mExpression6, sizeof(mExpression6), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid4 = {mExpression7, sizeof(mExpression7), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid5 = {mExpression8, sizeof(mExpression8), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid6 = {mExpression9, sizeof(mExpression9), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid7 = {mExpression10, sizeof(mExpression10), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid8 = {mExpression11, sizeof(mExpression11), FALSE};
|
||||
static BASIC_TEST_CONTEXT mBasicTestTrue1 = { mExpression1, sizeof (mExpression1), TRUE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestTrue2 = { mExpression2, sizeof (mExpression2), TRUE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestFalse1 = { mExpression3, sizeof (mExpression3), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestFalse2 = { mExpression4, sizeof (mExpression4), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid1 = { mExpression1, sizeof (mExpression1) - 1, FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid2 = { mExpression5, sizeof (mExpression5), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid3 = { mExpression6, sizeof (mExpression6), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid4 = { mExpression7, sizeof (mExpression7), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid5 = { mExpression8, sizeof (mExpression8), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid6 = { mExpression9, sizeof (mExpression9), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid7 = { mExpression10, sizeof (mExpression10), FALSE };
|
||||
static BASIC_TEST_CONTEXT mBasicTestInvalid8 = { mExpression11, sizeof (mExpression11), FALSE };
|
||||
|
||||
/**
|
||||
Unit test for EvaluateDependency() API of the FmpDependencyLib.
|
||||
@ -171,7 +171,7 @@ EvaluateDependencyTest (
|
||||
(EFI_FIRMWARE_IMAGE_DEP *)TestContext->Dependencies,
|
||||
TestContext->DependenciesSize,
|
||||
mFmpVersions,
|
||||
sizeof(mFmpVersions)/sizeof(FMP_DEPEX_CHECK_VERSION_DATA),
|
||||
sizeof (mFmpVersions)/sizeof (FMP_DEPEX_CHECK_VERSION_DATA),
|
||||
&LastAttemptStatus
|
||||
);
|
||||
|
||||
|
Reference in New Issue
Block a user