There are cases that the operands of an expression are all with rank less
than UINT64/INT64 and the result of the expression is explicitly cast to
UINT64/INT64 to fit the target size.
An example will be:
UINT32 a,b;
// a and b can be any unsigned int type with rank less than UINT64, like
// UINT8, UINT16, etc.
UINT64 c;
c = (UINT64) (a + b);
Some static code checkers may warn that the expression result might
overflow within the rank of "int" (integer promotions) and the result is
then cast to a bigger size.
The commit refines codes by the following rules:
1). When the expression is possible to overflow the range of unsigned int/
int:
c = (UINT64)a + b;
2). When the expression will not overflow within the rank of "int", remove
the explicit type casts:
c = a + b;
3). When the expression will be cast to pointer of possible greater size:
UINT32 a,b;
VOID *c;
c = (VOID *)(UINTN)(a + b); --> c = (VOID *)((UINTN)a + b);
4). When one side of a comparison expression contains only operands with
rank less than UINT32:
UINT8 a;
UINT16 b;
UINTN c;
if ((UINTN)(a + b) > c) {...} --> if (((UINT32)a + b) > c) {...}
For rule 4), if we remove the 'UINTN' type cast like:
if (a + b > c) {...}
The VS compiler will complain with warning C4018 (signed/unsigned
mismatch, level 3 warning) due to promoting 'a + b' to type 'int'.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Hao Wu <hao.a.wu@intel.com>
Reviewed-by: Feng Tian <feng.tian@intel.com>
		
	
		
			
				
	
	
		
			4238 lines
		
	
	
		
			152 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			4238 lines
		
	
	
		
			152 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   The common variable operation routines shared by DXE_RUNTIME variable
 | |
|   module and DXE_SMM variable module.
 | |
| 
 | |
|   Caution: This module requires additional review when modified.
 | |
|   This driver will have external input - variable data. They may be input in SMM mode.
 | |
|   This external input must be validated carefully to avoid security issue like
 | |
|   buffer overflow, integer overflow.
 | |
| 
 | |
|   VariableServiceGetNextVariableName () and VariableServiceQueryVariableInfo() are external API.
 | |
|   They need check input parameter.
 | |
| 
 | |
|   VariableServiceGetVariable() and VariableServiceSetVariable() are external API
 | |
|   to receive datasize and data buffer. The size should be checked carefully.
 | |
| 
 | |
|   VariableServiceSetVariable() should also check authenticate data to avoid buffer overflow,
 | |
|   integer overflow. It should also check attribute to avoid authentication bypass.
 | |
| 
 | |
| Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
 | |
| (C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
 | |
| This program and the accompanying materials
 | |
| are licensed and made available under the terms and conditions of the BSD License
 | |
| which accompanies this distribution.  The full text of the license may be found at
 | |
| http://opensource.org/licenses/bsd-license.php
 | |
| 
 | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | |
| 
 | |
| **/
 | |
| 
 | |
| #include "Variable.h"
 | |
| 
 | |
| VARIABLE_MODULE_GLOBAL  *mVariableModuleGlobal;
 | |
| 
 | |
| ///
 | |
| /// Define a memory cache that improves the search performance for a variable.
 | |
| ///
 | |
| VARIABLE_STORE_HEADER  *mNvVariableCache      = NULL;
 | |
| 
 | |
| ///
 | |
| /// Memory cache of Fv Header.
 | |
| ///
 | |
| EFI_FIRMWARE_VOLUME_HEADER *mNvFvHeaderCache  = NULL;
 | |
| 
 | |
| ///
 | |
| /// The memory entry used for variable statistics data.
 | |
| ///
 | |
| VARIABLE_INFO_ENTRY    *gVariableInfo         = NULL;
 | |
| 
 | |
| ///
 | |
| /// The flag to indicate whether the platform has left the DXE phase of execution.
 | |
| ///
 | |
| BOOLEAN                mEndOfDxe              = FALSE;
 | |
| 
 | |
| ///
 | |
| /// It indicates the var check request source.
 | |
| /// In the implementation, DXE is regarded as untrusted, and SMM is trusted.
 | |
| ///
 | |
| VAR_CHECK_REQUEST_SOURCE mRequestSource       = VarCheckFromUntrusted;
 | |
| 
 | |
| //
 | |
| // It will record the current boot error flag before EndOfDxe.
 | |
| //
 | |
| VAR_ERROR_FLAG         mCurrentBootVarErrFlag = VAR_ERROR_FLAG_NO_ERROR;
 | |
| 
 | |
| VARIABLE_ENTRY_PROPERTY mVariableEntryProperty[] = {
 | |
|   {
 | |
|     &gEdkiiVarErrorFlagGuid,
 | |
|     VAR_ERROR_FLAG_NAME,
 | |
|     {
 | |
|       VAR_CHECK_VARIABLE_PROPERTY_REVISION,
 | |
|       VAR_CHECK_VARIABLE_PROPERTY_READ_ONLY,
 | |
|       VARIABLE_ATTRIBUTE_NV_BS_RT,
 | |
|       sizeof (VAR_ERROR_FLAG),
 | |
|       sizeof (VAR_ERROR_FLAG)
 | |
|     }
 | |
|   },
 | |
| };
 | |
| 
 | |
| AUTH_VAR_LIB_CONTEXT_IN mAuthContextIn = {
 | |
|   AUTH_VAR_LIB_CONTEXT_IN_STRUCT_VERSION,
 | |
|   //
 | |
|   // StructSize, TO BE FILLED
 | |
|   //
 | |
|   0,
 | |
|   //
 | |
|   // MaxAuthVariableSize, TO BE FILLED
 | |
|   //
 | |
|   0,
 | |
|   VariableExLibFindVariable,
 | |
|   VariableExLibFindNextVariable,
 | |
|   VariableExLibUpdateVariable,
 | |
|   VariableExLibGetScratchBuffer,
 | |
|   VariableExLibCheckRemainingSpaceForConsistency,
 | |
|   VariableExLibAtRuntime,
 | |
| };
 | |
| 
 | |
| AUTH_VAR_LIB_CONTEXT_OUT mAuthContextOut;
 | |
| 
 | |
| /**
 | |
| 
 | |
|   SecureBoot Hook for auth variable update.
 | |
| 
 | |
|   @param[in] VariableName                 Name of Variable to be found.
 | |
|   @param[in] VendorGuid                   Variable vendor GUID.
 | |
| **/
 | |
| VOID
 | |
| EFIAPI
 | |
| SecureBootHook (
 | |
|   IN CHAR16                                 *VariableName,
 | |
|   IN EFI_GUID                               *VendorGuid
 | |
|   );
 | |
| 
 | |
| /**
 | |
|   Initialization for MOR Lock Control.
 | |
| 
 | |
|   @retval EFI_SUCEESS     MorLock initialization success.
 | |
|   @return Others          Some error occurs.
 | |
| **/
 | |
| EFI_STATUS
 | |
| MorLockInit (
 | |
|   VOID
 | |
|   );
 | |
| 
 | |
| /**
 | |
|   This service is an MOR/MorLock checker handler for the SetVariable().
 | |
| 
 | |
|   @param  VariableName the name of the vendor's variable, as a
 | |
|                        Null-Terminated Unicode String
 | |
|   @param  VendorGuid   Unify identifier for vendor.
 | |
|   @param  Attributes   Point to memory location to return the attributes of variable. If the point
 | |
|                        is NULL, the parameter would be ignored.
 | |
|   @param  DataSize     The size in bytes of Data-Buffer.
 | |
|   @param  Data         Point to the content of the variable.
 | |
| 
 | |
|   @retval  EFI_SUCCESS            The MOR/MorLock check pass, and Variable driver can store the variable data.
 | |
|   @retval  EFI_INVALID_PARAMETER  The MOR/MorLock data or data size or attributes is not allowed for MOR variable.
 | |
|   @retval  EFI_ACCESS_DENIED      The MOR/MorLock is locked.
 | |
|   @retval  EFI_ALREADY_STARTED    The MorLock variable is handled inside this function.
 | |
|                                   Variable driver can just return EFI_SUCCESS.
 | |
| **/
 | |
| EFI_STATUS
 | |
| SetVariableCheckHandlerMor (
 | |
|   IN CHAR16     *VariableName,
 | |
|   IN EFI_GUID   *VendorGuid,
 | |
|   IN UINT32     Attributes,
 | |
|   IN UINTN      DataSize,
 | |
|   IN VOID       *Data
 | |
|   );
 | |
| 
 | |
| /**
 | |
|   Routine used to track statistical information about variable usage.
 | |
|   The data is stored in the EFI system table so it can be accessed later.
 | |
|   VariableInfo.efi can dump out the table. Only Boot Services variable
 | |
|   accesses are tracked by this code. The PcdVariableCollectStatistics
 | |
|   build flag controls if this feature is enabled.
 | |
| 
 | |
|   A read that hits in the cache will have Read and Cache true for
 | |
|   the transaction. Data is allocated by this routine, but never
 | |
|   freed.
 | |
| 
 | |
|   @param[in] VariableName   Name of the Variable to track.
 | |
|   @param[in] VendorGuid     Guid of the Variable to track.
 | |
|   @param[in] Volatile       TRUE if volatile FALSE if non-volatile.
 | |
|   @param[in] Read           TRUE if GetVariable() was called.
 | |
|   @param[in] Write          TRUE if SetVariable() was called.
 | |
|   @param[in] Delete         TRUE if deleted via SetVariable().
 | |
|   @param[in] Cache          TRUE for a cache hit.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| UpdateVariableInfo (
 | |
|   IN  CHAR16                  *VariableName,
 | |
|   IN  EFI_GUID                *VendorGuid,
 | |
|   IN  BOOLEAN                 Volatile,
 | |
|   IN  BOOLEAN                 Read,
 | |
|   IN  BOOLEAN                 Write,
 | |
|   IN  BOOLEAN                 Delete,
 | |
|   IN  BOOLEAN                 Cache
 | |
|   )
 | |
| {
 | |
|   VARIABLE_INFO_ENTRY   *Entry;
 | |
| 
 | |
|   if (FeaturePcdGet (PcdVariableCollectStatistics)) {
 | |
| 
 | |
|     if (AtRuntime ()) {
 | |
|       // Don't collect statistics at runtime.
 | |
|       return;
 | |
|     }
 | |
| 
 | |
|     if (gVariableInfo == NULL) {
 | |
|       //
 | |
|       // On the first call allocate a entry and place a pointer to it in
 | |
|       // the EFI System Table.
 | |
|       //
 | |
|       gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
 | |
|       ASSERT (gVariableInfo != NULL);
 | |
| 
 | |
|       CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);
 | |
|       gVariableInfo->Name = AllocateZeroPool (StrSize (VariableName));
 | |
|       ASSERT (gVariableInfo->Name != NULL);
 | |
|       StrCpyS (gVariableInfo->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName);
 | |
|       gVariableInfo->Volatile = Volatile;
 | |
|     }
 | |
| 
 | |
| 
 | |
|     for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {
 | |
|       if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {
 | |
|         if (StrCmp (VariableName, Entry->Name) == 0) {
 | |
|           if (Read) {
 | |
|             Entry->ReadCount++;
 | |
|           }
 | |
|           if (Write) {
 | |
|             Entry->WriteCount++;
 | |
|           }
 | |
|           if (Delete) {
 | |
|             Entry->DeleteCount++;
 | |
|           }
 | |
|           if (Cache) {
 | |
|             Entry->CacheCount++;
 | |
|           }
 | |
| 
 | |
|           return;
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       if (Entry->Next == NULL) {
 | |
|         //
 | |
|         // If the entry is not in the table add it.
 | |
|         // Next iteration of the loop will fill in the data.
 | |
|         //
 | |
|         Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
 | |
|         ASSERT (Entry->Next != NULL);
 | |
| 
 | |
|         CopyGuid (&Entry->Next->VendorGuid, VendorGuid);
 | |
|         Entry->Next->Name = AllocateZeroPool (StrSize (VariableName));
 | |
|         ASSERT (Entry->Next->Name != NULL);
 | |
|         StrCpyS (Entry->Next->Name, StrSize(VariableName)/sizeof(CHAR16), VariableName);
 | |
|         Entry->Next->Volatile = Volatile;
 | |
|       }
 | |
| 
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code checks if variable header is valid or not.
 | |
| 
 | |
|   @param Variable           Pointer to the Variable Header.
 | |
|   @param VariableStoreEnd   Pointer to the Variable Store End.
 | |
| 
 | |
|   @retval TRUE              Variable header is valid.
 | |
|   @retval FALSE             Variable header is not valid.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| IsValidVariableHeader (
 | |
|   IN  VARIABLE_HEADER       *Variable,
 | |
|   IN  VARIABLE_HEADER       *VariableStoreEnd
 | |
|   )
 | |
| {
 | |
|   if ((Variable == NULL) || (Variable >= VariableStoreEnd) || (Variable->StartId != VARIABLE_DATA)) {
 | |
|     //
 | |
|     // Variable is NULL or has reached the end of variable store,
 | |
|     // or the StartId is not correct.
 | |
|     //
 | |
|     return FALSE;
 | |
|   }
 | |
| 
 | |
|   return TRUE;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This function writes data to the FWH at the correct LBA even if the LBAs
 | |
|   are fragmented.
 | |
| 
 | |
|   @param Global                  Pointer to VARAIBLE_GLOBAL structure.
 | |
|   @param Volatile                Point out the Variable is Volatile or Non-Volatile.
 | |
|   @param SetByIndex              TRUE if target pointer is given as index.
 | |
|                                  FALSE if target pointer is absolute.
 | |
|   @param Fvb                     Pointer to the writable FVB protocol.
 | |
|   @param DataPtrIndex            Pointer to the Data from the end of VARIABLE_STORE_HEADER
 | |
|                                  structure.
 | |
|   @param DataSize                Size of data to be written.
 | |
|   @param Buffer                  Pointer to the buffer from which data is written.
 | |
| 
 | |
|   @retval EFI_INVALID_PARAMETER  Parameters not valid.
 | |
|   @retval EFI_SUCCESS            Variable store successfully updated.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| UpdateVariableStore (
 | |
|   IN  VARIABLE_GLOBAL                     *Global,
 | |
|   IN  BOOLEAN                             Volatile,
 | |
|   IN  BOOLEAN                             SetByIndex,
 | |
|   IN  EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL  *Fvb,
 | |
|   IN  UINTN                               DataPtrIndex,
 | |
|   IN  UINT32                              DataSize,
 | |
|   IN  UINT8                               *Buffer
 | |
|   )
 | |
| {
 | |
|   EFI_FV_BLOCK_MAP_ENTRY      *PtrBlockMapEntry;
 | |
|   UINTN                       BlockIndex2;
 | |
|   UINTN                       LinearOffset;
 | |
|   UINTN                       CurrWriteSize;
 | |
|   UINTN                       CurrWritePtr;
 | |
|   UINT8                       *CurrBuffer;
 | |
|   EFI_LBA                     LbaNumber;
 | |
|   UINTN                       Size;
 | |
|   EFI_FIRMWARE_VOLUME_HEADER  *FwVolHeader;
 | |
|   VARIABLE_STORE_HEADER       *VolatileBase;
 | |
|   EFI_PHYSICAL_ADDRESS        FvVolHdr;
 | |
|   EFI_PHYSICAL_ADDRESS        DataPtr;
 | |
|   EFI_STATUS                  Status;
 | |
| 
 | |
|   FwVolHeader = NULL;
 | |
|   DataPtr     = DataPtrIndex;
 | |
| 
 | |
|   //
 | |
|   // Check if the Data is Volatile.
 | |
|   //
 | |
|   if (!Volatile) {
 | |
|     if (Fvb == NULL) {
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
|     Status = Fvb->GetPhysicalAddress(Fvb, &FvVolHdr);
 | |
|     ASSERT_EFI_ERROR (Status);
 | |
| 
 | |
|     FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);
 | |
|     //
 | |
|     // Data Pointer should point to the actual Address where data is to be
 | |
|     // written.
 | |
|     //
 | |
|     if (SetByIndex) {
 | |
|       DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;
 | |
|     }
 | |
| 
 | |
|     if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // Data Pointer should point to the actual Address where data is to be
 | |
|     // written.
 | |
|     //
 | |
|     VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);
 | |
|     if (SetByIndex) {
 | |
|       DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;
 | |
|     }
 | |
| 
 | |
|     if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // If Volatile Variable just do a simple mem copy.
 | |
|     //
 | |
|     CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);
 | |
|     return EFI_SUCCESS;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // If we are here we are dealing with Non-Volatile Variables.
 | |
|   //
 | |
|   LinearOffset  = (UINTN) FwVolHeader;
 | |
|   CurrWritePtr  = (UINTN) DataPtr;
 | |
|   CurrWriteSize = DataSize;
 | |
|   CurrBuffer    = Buffer;
 | |
|   LbaNumber     = 0;
 | |
| 
 | |
|   if (CurrWritePtr < LinearOffset) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   for (PtrBlockMapEntry = mNvFvHeaderCache->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {
 | |
|     for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {
 | |
|       //
 | |
|       // Check to see if the Variable Writes are spanning through multiple
 | |
|       // blocks.
 | |
|       //
 | |
|       if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {
 | |
|         if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {
 | |
|           Status = Fvb->Write (
 | |
|                     Fvb,
 | |
|                     LbaNumber,
 | |
|                     (UINTN) (CurrWritePtr - LinearOffset),
 | |
|                     &CurrWriteSize,
 | |
|                     CurrBuffer
 | |
|                     );
 | |
|           return Status;
 | |
|         } else {
 | |
|           Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);
 | |
|           Status = Fvb->Write (
 | |
|                     Fvb,
 | |
|                     LbaNumber,
 | |
|                     (UINTN) (CurrWritePtr - LinearOffset),
 | |
|                     &Size,
 | |
|                     CurrBuffer
 | |
|                     );
 | |
|           if (EFI_ERROR (Status)) {
 | |
|             return Status;
 | |
|           }
 | |
| 
 | |
|           CurrWritePtr  = LinearOffset + PtrBlockMapEntry->Length;
 | |
|           CurrBuffer    = CurrBuffer + Size;
 | |
|           CurrWriteSize = CurrWriteSize - Size;
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       LinearOffset += PtrBlockMapEntry->Length;
 | |
|       LbaNumber++;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the current status of Variable Store.
 | |
| 
 | |
|   @param VarStoreHeader  Pointer to the Variable Store Header.
 | |
| 
 | |
|   @retval EfiRaw         Variable store status is raw.
 | |
|   @retval EfiValid       Variable store status is valid.
 | |
|   @retval EfiInvalid     Variable store status is invalid.
 | |
| 
 | |
| **/
 | |
| VARIABLE_STORE_STATUS
 | |
| GetVariableStoreStatus (
 | |
|   IN VARIABLE_STORE_HEADER *VarStoreHeader
 | |
|   )
 | |
| {
 | |
|   if ((CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) ||
 | |
|        CompareGuid (&VarStoreHeader->Signature, &gEfiVariableGuid)) &&
 | |
|       VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&
 | |
|       VarStoreHeader->State == VARIABLE_STORE_HEALTHY
 | |
|       ) {
 | |
| 
 | |
|     return EfiValid;
 | |
|   } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff &&
 | |
|              ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff &&
 | |
|              ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff &&
 | |
|              ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff &&
 | |
|              VarStoreHeader->Size == 0xffffffff &&
 | |
|              VarStoreHeader->Format == 0xff &&
 | |
|              VarStoreHeader->State == 0xff
 | |
|           ) {
 | |
| 
 | |
|     return EfiRaw;
 | |
|   } else {
 | |
|     return EfiInvalid;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code gets the size of variable header.
 | |
| 
 | |
|   @return Size of variable header in bytes in type UINTN.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| GetVariableHeaderSize (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   UINTN Value;
 | |
| 
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     Value = sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | |
|   } else {
 | |
|     Value = sizeof (VARIABLE_HEADER);
 | |
|   }
 | |
| 
 | |
|   return Value;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the size of name of variable.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return UINTN          Size of variable in bytes.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| NameSizeOfVariable (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     if (AuthVariable->State == (UINT8) (-1) ||
 | |
|        AuthVariable->DataSize == (UINT32) (-1) ||
 | |
|        AuthVariable->NameSize == (UINT32) (-1) ||
 | |
|        AuthVariable->Attributes == (UINT32) (-1)) {
 | |
|       return 0;
 | |
|     }
 | |
|     return (UINTN) AuthVariable->NameSize;
 | |
|   } else {
 | |
|     if (Variable->State == (UINT8) (-1) ||
 | |
|         Variable->DataSize == (UINT32) (-1) ||
 | |
|         Variable->NameSize == (UINT32) (-1) ||
 | |
|         Variable->Attributes == (UINT32) (-1)) {
 | |
|       return 0;
 | |
|     }
 | |
|     return (UINTN) Variable->NameSize;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code sets the size of name of variable.
 | |
| 
 | |
|   @param[in] Variable   Pointer to the Variable Header.
 | |
|   @param[in] NameSize   Name size to set.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| SetNameSizeOfVariable (
 | |
|   IN VARIABLE_HEADER    *Variable,
 | |
|   IN UINTN              NameSize
 | |
|   )
 | |
| {
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     AuthVariable->NameSize = (UINT32) NameSize;
 | |
|   } else {
 | |
|     Variable->NameSize = (UINT32) NameSize;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the size of variable data.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return Size of variable in bytes.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| DataSizeOfVariable (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     if (AuthVariable->State == (UINT8) (-1) ||
 | |
|        AuthVariable->DataSize == (UINT32) (-1) ||
 | |
|        AuthVariable->NameSize == (UINT32) (-1) ||
 | |
|        AuthVariable->Attributes == (UINT32) (-1)) {
 | |
|       return 0;
 | |
|     }
 | |
|     return (UINTN) AuthVariable->DataSize;
 | |
|   } else {
 | |
|     if (Variable->State == (UINT8) (-1) ||
 | |
|         Variable->DataSize == (UINT32) (-1) ||
 | |
|         Variable->NameSize == (UINT32) (-1) ||
 | |
|         Variable->Attributes == (UINT32) (-1)) {
 | |
|       return 0;
 | |
|     }
 | |
|     return (UINTN) Variable->DataSize;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code sets the size of variable data.
 | |
| 
 | |
|   @param[in] Variable   Pointer to the Variable Header.
 | |
|   @param[in] DataSize   Data size to set.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| SetDataSizeOfVariable (
 | |
|   IN VARIABLE_HEADER    *Variable,
 | |
|   IN UINTN              DataSize
 | |
|   )
 | |
| {
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     AuthVariable->DataSize = (UINT32) DataSize;
 | |
|   } else {
 | |
|     Variable->DataSize = (UINT32) DataSize;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the pointer to the variable name.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return Pointer to Variable Name which is Unicode encoding.
 | |
| 
 | |
| **/
 | |
| CHAR16 *
 | |
| GetVariableNamePtr (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   return (CHAR16 *) ((UINTN) Variable + GetVariableHeaderSize ());
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code gets the pointer to the variable guid.
 | |
| 
 | |
|   @param Variable   Pointer to the Variable Header.
 | |
| 
 | |
|   @return A EFI_GUID* pointer to Vendor Guid.
 | |
| 
 | |
| **/
 | |
| EFI_GUID *
 | |
| GetVendorGuidPtr (
 | |
|   IN VARIABLE_HEADER    *Variable
 | |
|   )
 | |
| {
 | |
|   AUTHENTICATED_VARIABLE_HEADER *AuthVariable;
 | |
| 
 | |
|   AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) Variable;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     return &AuthVariable->VendorGuid;
 | |
|   } else {
 | |
|     return &Variable->VendorGuid;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the pointer to the variable data.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return Pointer to Variable Data.
 | |
| 
 | |
| **/
 | |
| UINT8 *
 | |
| GetVariableDataPtr (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   UINTN Value;
 | |
| 
 | |
|   //
 | |
|   // Be careful about pad size for alignment.
 | |
|   //
 | |
|   Value =  (UINTN) GetVariableNamePtr (Variable);
 | |
|   Value += NameSizeOfVariable (Variable);
 | |
|   Value += GET_PAD_SIZE (NameSizeOfVariable (Variable));
 | |
| 
 | |
|   return (UINT8 *) Value;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code gets the variable data offset related to variable header.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return Variable Data offset.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| GetVariableDataOffset (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   UINTN Value;
 | |
| 
 | |
|   //
 | |
|   // Be careful about pad size for alignment
 | |
|   //
 | |
|   Value = GetVariableHeaderSize ();
 | |
|   Value += NameSizeOfVariable (Variable);
 | |
|   Value += GET_PAD_SIZE (NameSizeOfVariable (Variable));
 | |
| 
 | |
|   return Value;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code gets the pointer to the next variable header.
 | |
| 
 | |
|   @param Variable        Pointer to the Variable Header.
 | |
| 
 | |
|   @return Pointer to next variable header.
 | |
| 
 | |
| **/
 | |
| VARIABLE_HEADER *
 | |
| GetNextVariablePtr (
 | |
|   IN  VARIABLE_HEADER   *Variable
 | |
|   )
 | |
| {
 | |
|   UINTN Value;
 | |
| 
 | |
|   Value =  (UINTN) GetVariableDataPtr (Variable);
 | |
|   Value += DataSizeOfVariable (Variable);
 | |
|   Value += GET_PAD_SIZE (DataSizeOfVariable (Variable));
 | |
| 
 | |
|   //
 | |
|   // Be careful about pad size for alignment.
 | |
|   //
 | |
|   return (VARIABLE_HEADER *) HEADER_ALIGN (Value);
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   Gets the pointer to the first variable header in given variable store area.
 | |
| 
 | |
|   @param VarStoreHeader  Pointer to the Variable Store Header.
 | |
| 
 | |
|   @return Pointer to the first variable header.
 | |
| 
 | |
| **/
 | |
| VARIABLE_HEADER *
 | |
| GetStartPointer (
 | |
|   IN VARIABLE_STORE_HEADER       *VarStoreHeader
 | |
|   )
 | |
| {
 | |
|   //
 | |
|   // The end of variable store.
 | |
|   //
 | |
|   return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   Gets the pointer to the end of the variable storage area.
 | |
| 
 | |
|   This function gets pointer to the end of the variable storage
 | |
|   area, according to the input variable store header.
 | |
| 
 | |
|   @param VarStoreHeader  Pointer to the Variable Store Header.
 | |
| 
 | |
|   @return Pointer to the end of the variable storage area.
 | |
| 
 | |
| **/
 | |
| VARIABLE_HEADER *
 | |
| GetEndPointer (
 | |
|   IN VARIABLE_STORE_HEADER       *VarStoreHeader
 | |
|   )
 | |
| {
 | |
|   //
 | |
|   // The end of variable store
 | |
|   //
 | |
|   return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Record variable error flag.
 | |
| 
 | |
|   @param[in] Flag               Variable error flag to record.
 | |
|   @param[in] VariableName       Name of variable.
 | |
|   @param[in] VendorGuid         Guid of variable.
 | |
|   @param[in] Attributes         Attributes of the variable.
 | |
|   @param[in] VariableSize       Size of the variable.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| RecordVarErrorFlag (
 | |
|   IN VAR_ERROR_FLAG         Flag,
 | |
|   IN CHAR16                 *VariableName,
 | |
|   IN EFI_GUID               *VendorGuid,
 | |
|   IN UINT32                 Attributes,
 | |
|   IN UINTN                  VariableSize
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                Status;
 | |
|   VARIABLE_POINTER_TRACK    Variable;
 | |
|   VAR_ERROR_FLAG            *VarErrFlag;
 | |
|   VAR_ERROR_FLAG            TempFlag;
 | |
| 
 | |
|   DEBUG_CODE (
 | |
|     DEBUG ((EFI_D_ERROR, "RecordVarErrorFlag (0x%02x) %s:%g - 0x%08x - 0x%x\n", Flag, VariableName, VendorGuid, Attributes, VariableSize));
 | |
|     if (Flag == VAR_ERROR_FLAG_SYSTEM_ERROR) {
 | |
|       if (AtRuntime ()) {
 | |
|         DEBUG ((EFI_D_ERROR, "CommonRuntimeVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonRuntimeVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize));
 | |
|       } else {
 | |
|         DEBUG ((EFI_D_ERROR, "CommonVariableSpace = 0x%x - CommonVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonVariableTotalSize));
 | |
|       }
 | |
|     } else {
 | |
|       DEBUG ((EFI_D_ERROR, "CommonMaxUserVariableSpace = 0x%x - CommonUserVariableTotalSize = 0x%x\n", mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonUserVariableTotalSize));
 | |
|     }
 | |
|   );
 | |
| 
 | |
|   if (!mEndOfDxe) {
 | |
|     //
 | |
|     // Before EndOfDxe, just record the current boot variable error flag to local variable,
 | |
|     // and leave the variable error flag in NV flash as the last boot variable error flag.
 | |
|     // After EndOfDxe in InitializeVarErrorFlag (), the variable error flag in NV flash
 | |
|     // will be initialized to this local current boot variable error flag.
 | |
|     //
 | |
|     mCurrentBootVarErrFlag &= Flag;
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Record error flag (it should have be initialized).
 | |
|   //
 | |
|   Status = FindVariable (
 | |
|              VAR_ERROR_FLAG_NAME,
 | |
|              &gEdkiiVarErrorFlagGuid,
 | |
|              &Variable,
 | |
|              &mVariableModuleGlobal->VariableGlobal,
 | |
|              FALSE
 | |
|              );
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     VarErrFlag = (VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr);
 | |
|     TempFlag = *VarErrFlag;
 | |
|     TempFlag &= Flag;
 | |
|     if (TempFlag == *VarErrFlag) {
 | |
|       return;
 | |
|     }
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                FALSE,
 | |
|                FALSE,
 | |
|                mVariableModuleGlobal->FvbInstance,
 | |
|                (UINTN) VarErrFlag - (UINTN) mNvVariableCache + (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
 | |
|                sizeof (TempFlag),
 | |
|                &TempFlag
 | |
|                );
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       //
 | |
|       // Update the data in NV cache.
 | |
|       //
 | |
|       *VarErrFlag = TempFlag;
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Initialize variable error flag.
 | |
| 
 | |
|   Before EndOfDxe, the variable indicates the last boot variable error flag,
 | |
|   then it means the last boot variable error flag must be got before EndOfDxe.
 | |
|   After EndOfDxe, the variable indicates the current boot variable error flag,
 | |
|   then it means the current boot variable error flag must be got after EndOfDxe.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| InitializeVarErrorFlag (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                Status;
 | |
|   VARIABLE_POINTER_TRACK    Variable;
 | |
|   VAR_ERROR_FLAG            Flag;
 | |
|   VAR_ERROR_FLAG            VarErrFlag;
 | |
| 
 | |
|   if (!mEndOfDxe) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   Flag = mCurrentBootVarErrFlag;
 | |
|   DEBUG ((EFI_D_INFO, "Initialize variable error flag (%02x)\n", Flag));
 | |
| 
 | |
|   Status = FindVariable (
 | |
|              VAR_ERROR_FLAG_NAME,
 | |
|              &gEdkiiVarErrorFlagGuid,
 | |
|              &Variable,
 | |
|              &mVariableModuleGlobal->VariableGlobal,
 | |
|              FALSE
 | |
|              );
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     VarErrFlag = *((VAR_ERROR_FLAG *) GetVariableDataPtr (Variable.CurrPtr));
 | |
|     if (VarErrFlag == Flag) {
 | |
|       return;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   UpdateVariable (
 | |
|     VAR_ERROR_FLAG_NAME,
 | |
|     &gEdkiiVarErrorFlagGuid,
 | |
|     &Flag,
 | |
|     sizeof (Flag),
 | |
|     VARIABLE_ATTRIBUTE_NV_BS_RT,
 | |
|     0,
 | |
|     0,
 | |
|     &Variable,
 | |
|     NULL
 | |
|     );
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Is user variable?
 | |
| 
 | |
|   @param[in] Variable   Pointer to variable header.
 | |
| 
 | |
|   @retval TRUE          User variable.
 | |
|   @retval FALSE         System variable.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| IsUserVariable (
 | |
|   IN VARIABLE_HEADER    *Variable
 | |
|   )
 | |
| {
 | |
|   VAR_CHECK_VARIABLE_PROPERTY   Property;
 | |
| 
 | |
|   //
 | |
|   // Only after End Of Dxe, the variables belong to system variable are fixed.
 | |
|   // If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable,
 | |
|   // then no need to check if the variable is user variable or not specially.
 | |
|   //
 | |
|   if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) {
 | |
|     if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) {
 | |
|       return TRUE;
 | |
|     }
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Calculate common user variable total size.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| CalculateCommonUserVariableTotalSize (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   VARIABLE_HEADER               *Variable;
 | |
|   VARIABLE_HEADER               *NextVariable;
 | |
|   UINTN                         VariableSize;
 | |
|   VAR_CHECK_VARIABLE_PROPERTY   Property;
 | |
| 
 | |
|   //
 | |
|   // Only after End Of Dxe, the variables belong to system variable are fixed.
 | |
|   // If PcdMaxUserNvStorageVariableSize is 0, it means user variable share the same NV storage with system variable,
 | |
|   // then no need to calculate the common user variable total size specially.
 | |
|   //
 | |
|   if (mEndOfDxe && (mVariableModuleGlobal->CommonMaxUserVariableSpace != mVariableModuleGlobal->CommonVariableSpace)) {
 | |
|     Variable = GetStartPointer (mNvVariableCache);
 | |
|     while (IsValidVariableHeader (Variable, GetEndPointer (mNvVariableCache))) {
 | |
|       NextVariable = GetNextVariablePtr (Variable);
 | |
|       VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|       if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|         if (VarCheckLibVariablePropertyGet (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &Property) == EFI_NOT_FOUND) {
 | |
|           //
 | |
|           // No property, it is user variable.
 | |
|           //
 | |
|           mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize;
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       Variable = NextVariable;
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Initialize variable quota.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| InitializeVariableQuota (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   if (!mEndOfDxe) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   InitializeVarErrorFlag ();
 | |
|   CalculateCommonUserVariableTotalSize ();
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   Variable store garbage collection and reclaim operation.
 | |
| 
 | |
|   @param[in]      VariableBase            Base address of variable store.
 | |
|   @param[out]     LastVariableOffset      Offset of last variable.
 | |
|   @param[in]      IsVolatile              The variable store is volatile or not;
 | |
|                                           if it is non-volatile, need FTW.
 | |
|   @param[in, out] UpdatingPtrTrack        Pointer to updating variable pointer track structure.
 | |
|   @param[in]      NewVariable             Pointer to new variable.
 | |
|   @param[in]      NewVariableSize         New variable size.
 | |
| 
 | |
|   @return EFI_SUCCESS                  Reclaim operation has finished successfully.
 | |
|   @return EFI_OUT_OF_RESOURCES         No enough memory resources or variable space.
 | |
|   @return Others                       Unexpect error happened during reclaim operation.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| Reclaim (
 | |
|   IN     EFI_PHYSICAL_ADDRESS         VariableBase,
 | |
|   OUT    UINTN                        *LastVariableOffset,
 | |
|   IN     BOOLEAN                      IsVolatile,
 | |
|   IN OUT VARIABLE_POINTER_TRACK       *UpdatingPtrTrack,
 | |
|   IN     VARIABLE_HEADER              *NewVariable,
 | |
|   IN     UINTN                        NewVariableSize
 | |
|   )
 | |
| {
 | |
|   VARIABLE_HEADER       *Variable;
 | |
|   VARIABLE_HEADER       *AddedVariable;
 | |
|   VARIABLE_HEADER       *NextVariable;
 | |
|   VARIABLE_HEADER       *NextAddedVariable;
 | |
|   VARIABLE_STORE_HEADER *VariableStoreHeader;
 | |
|   UINT8                 *ValidBuffer;
 | |
|   UINTN                 MaximumBufferSize;
 | |
|   UINTN                 VariableSize;
 | |
|   UINTN                 NameSize;
 | |
|   UINT8                 *CurrPtr;
 | |
|   VOID                  *Point0;
 | |
|   VOID                  *Point1;
 | |
|   BOOLEAN               FoundAdded;
 | |
|   EFI_STATUS            Status;
 | |
|   UINTN                 CommonVariableTotalSize;
 | |
|   UINTN                 CommonUserVariableTotalSize;
 | |
|   UINTN                 HwErrVariableTotalSize;
 | |
|   VARIABLE_HEADER       *UpdatingVariable;
 | |
|   VARIABLE_HEADER       *UpdatingInDeletedTransition;
 | |
| 
 | |
|   UpdatingVariable = NULL;
 | |
|   UpdatingInDeletedTransition = NULL;
 | |
|   if (UpdatingPtrTrack != NULL) {
 | |
|     UpdatingVariable = UpdatingPtrTrack->CurrPtr;
 | |
|     UpdatingInDeletedTransition = UpdatingPtrTrack->InDeletedTransitionPtr;
 | |
|   }
 | |
| 
 | |
|   VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);
 | |
| 
 | |
|   CommonVariableTotalSize = 0;
 | |
|   CommonUserVariableTotalSize = 0;
 | |
|   HwErrVariableTotalSize  = 0;
 | |
| 
 | |
|   if (IsVolatile) {
 | |
|     //
 | |
|     // Start Pointers for the variable.
 | |
|     //
 | |
|     Variable          = GetStartPointer (VariableStoreHeader);
 | |
|     MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER);
 | |
| 
 | |
|     while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
 | |
|       NextVariable = GetNextVariablePtr (Variable);
 | |
|       if ((Variable->State == VAR_ADDED || Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) &&
 | |
|           Variable != UpdatingVariable &&
 | |
|           Variable != UpdatingInDeletedTransition
 | |
|          ) {
 | |
|         VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|         MaximumBufferSize += VariableSize;
 | |
|       }
 | |
| 
 | |
|       Variable = NextVariable;
 | |
|     }
 | |
| 
 | |
|     if (NewVariable != NULL) {
 | |
|       //
 | |
|       // Add the new variable size.
 | |
|       //
 | |
|       MaximumBufferSize += NewVariableSize;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Reserve the 1 Bytes with Oxff to identify the
 | |
|     // end of the variable buffer.
 | |
|     //
 | |
|     MaximumBufferSize += 1;
 | |
|     ValidBuffer = AllocatePool (MaximumBufferSize);
 | |
|     if (ValidBuffer == NULL) {
 | |
|       return EFI_OUT_OF_RESOURCES;
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // For NV variable reclaim, don't allocate pool here and just use mNvVariableCache
 | |
|     // as the buffer to reduce SMRAM consumption for SMM variable driver.
 | |
|     //
 | |
|     MaximumBufferSize = mNvVariableCache->Size;
 | |
|     ValidBuffer = (UINT8 *) mNvVariableCache;
 | |
|   }
 | |
| 
 | |
|   SetMem (ValidBuffer, MaximumBufferSize, 0xff);
 | |
| 
 | |
|   //
 | |
|   // Copy variable store header.
 | |
|   //
 | |
|   CopyMem (ValidBuffer, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));
 | |
|   CurrPtr = (UINT8 *) GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);
 | |
| 
 | |
|   //
 | |
|   // Reinstall all ADDED variables as long as they are not identical to Updating Variable.
 | |
|   //
 | |
|   Variable = GetStartPointer (VariableStoreHeader);
 | |
|   while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
 | |
|     NextVariable = GetNextVariablePtr (Variable);
 | |
|     if (Variable != UpdatingVariable && Variable->State == VAR_ADDED) {
 | |
|       VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|       CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
 | |
|       CurrPtr += VariableSize;
 | |
|       if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|         HwErrVariableTotalSize += VariableSize;
 | |
|       } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|         CommonVariableTotalSize += VariableSize;
 | |
|         if (IsUserVariable (Variable)) {
 | |
|           CommonUserVariableTotalSize += VariableSize;
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     Variable = NextVariable;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Reinstall all in delete transition variables.
 | |
|   //
 | |
|   Variable = GetStartPointer (VariableStoreHeader);
 | |
|   while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
 | |
|     NextVariable = GetNextVariablePtr (Variable);
 | |
|     if (Variable != UpdatingVariable && Variable != UpdatingInDeletedTransition && Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
| 
 | |
|       //
 | |
|       // Buffer has cached all ADDED variable.
 | |
|       // Per IN_DELETED variable, we have to guarantee that
 | |
|       // no ADDED one in previous buffer.
 | |
|       //
 | |
| 
 | |
|       FoundAdded = FALSE;
 | |
|       AddedVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);
 | |
|       while (IsValidVariableHeader (AddedVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) ValidBuffer))) {
 | |
|         NextAddedVariable = GetNextVariablePtr (AddedVariable);
 | |
|         NameSize = NameSizeOfVariable (AddedVariable);
 | |
|         if (CompareGuid (GetVendorGuidPtr (AddedVariable), GetVendorGuidPtr (Variable)) &&
 | |
|             NameSize == NameSizeOfVariable (Variable)
 | |
|            ) {
 | |
|           Point0 = (VOID *) GetVariableNamePtr (AddedVariable);
 | |
|           Point1 = (VOID *) GetVariableNamePtr (Variable);
 | |
|           if (CompareMem (Point0, Point1, NameSize) == 0) {
 | |
|             FoundAdded = TRUE;
 | |
|             break;
 | |
|           }
 | |
|         }
 | |
|         AddedVariable = NextAddedVariable;
 | |
|       }
 | |
|       if (!FoundAdded) {
 | |
|         //
 | |
|         // Promote VAR_IN_DELETED_TRANSITION to VAR_ADDED.
 | |
|         //
 | |
|         VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|         CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
 | |
|         ((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
 | |
|         CurrPtr += VariableSize;
 | |
|         if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|           HwErrVariableTotalSize += VariableSize;
 | |
|         } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|           CommonVariableTotalSize += VariableSize;
 | |
|           if (IsUserVariable (Variable)) {
 | |
|             CommonUserVariableTotalSize += VariableSize;
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     Variable = NextVariable;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Install the new variable if it is not NULL.
 | |
|   //
 | |
|   if (NewVariable != NULL) {
 | |
|     if (((UINTN) CurrPtr - (UINTN) ValidBuffer) + NewVariableSize > VariableStoreHeader->Size) {
 | |
|       //
 | |
|       // No enough space to store the new variable.
 | |
|       //
 | |
|       Status = EFI_OUT_OF_RESOURCES;
 | |
|       goto Done;
 | |
|     }
 | |
|     if (!IsVolatile) {
 | |
|       if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|         HwErrVariableTotalSize += NewVariableSize;
 | |
|       } else if ((NewVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|         CommonVariableTotalSize += NewVariableSize;
 | |
|         if (IsUserVariable (NewVariable)) {
 | |
|           CommonUserVariableTotalSize += NewVariableSize;
 | |
|         }
 | |
|       }
 | |
|       if ((HwErrVariableTotalSize > PcdGet32 (PcdHwErrStorageSize)) ||
 | |
|           (CommonVariableTotalSize > mVariableModuleGlobal->CommonVariableSpace) ||
 | |
|           (CommonUserVariableTotalSize > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
 | |
|         //
 | |
|         // No enough space to store the new variable by NV or NV+HR attribute.
 | |
|         //
 | |
|         Status = EFI_OUT_OF_RESOURCES;
 | |
|         goto Done;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     CopyMem (CurrPtr, (UINT8 *) NewVariable, NewVariableSize);
 | |
|     ((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
 | |
|     if (UpdatingVariable != NULL) {
 | |
|       UpdatingPtrTrack->CurrPtr = (VARIABLE_HEADER *)((UINTN)UpdatingPtrTrack->StartPtr + ((UINTN)CurrPtr - (UINTN)GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer)));
 | |
|       UpdatingPtrTrack->InDeletedTransitionPtr = NULL;
 | |
|     }
 | |
|     CurrPtr += NewVariableSize;
 | |
|   }
 | |
| 
 | |
|   if (IsVolatile) {
 | |
|     //
 | |
|     // If volatile variable store, just copy valid buffer.
 | |
|     //
 | |
|     SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);
 | |
|     CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) CurrPtr - (UINTN) ValidBuffer);
 | |
|     *LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer;
 | |
|     Status  = EFI_SUCCESS;
 | |
|   } else {
 | |
|     //
 | |
|     // If non-volatile variable store, perform FTW here.
 | |
|     //
 | |
|     Status = FtwVariableSpace (
 | |
|               VariableBase,
 | |
|               (VARIABLE_STORE_HEADER *) ValidBuffer
 | |
|               );
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       *LastVariableOffset = (UINTN) CurrPtr - (UINTN) ValidBuffer;
 | |
|       mVariableModuleGlobal->HwErrVariableTotalSize = HwErrVariableTotalSize;
 | |
|       mVariableModuleGlobal->CommonVariableTotalSize = CommonVariableTotalSize;
 | |
|       mVariableModuleGlobal->CommonUserVariableTotalSize = CommonUserVariableTotalSize;
 | |
|     } else {
 | |
|       mVariableModuleGlobal->HwErrVariableTotalSize = 0;
 | |
|       mVariableModuleGlobal->CommonVariableTotalSize = 0;
 | |
|       mVariableModuleGlobal->CommonUserVariableTotalSize = 0;
 | |
|       Variable = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase);
 | |
|       while (IsValidVariableHeader (Variable, GetEndPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableBase))) {
 | |
|         NextVariable = GetNextVariablePtr (Variable);
 | |
|         VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|         if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|           mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
 | |
|         } else if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|           mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
 | |
|           if (IsUserVariable (Variable)) {
 | |
|             mVariableModuleGlobal->CommonUserVariableTotalSize += VariableSize;
 | |
|           }
 | |
|         }
 | |
| 
 | |
|         Variable = NextVariable;
 | |
|       }
 | |
|       *LastVariableOffset = (UINTN) Variable - (UINTN) VariableBase;
 | |
|     }
 | |
|   }
 | |
| 
 | |
| Done:
 | |
|   if (IsVolatile) {
 | |
|     FreePool (ValidBuffer);
 | |
|   } else {
 | |
|     //
 | |
|     // For NV variable reclaim, we use mNvVariableCache as the buffer, so copy the data back.
 | |
|     //
 | |
|     CopyMem (mNvVariableCache, (UINT8 *)(UINTN)VariableBase, VariableStoreHeader->Size);
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Find the variable in the specified variable store.
 | |
| 
 | |
|   @param[in]       VariableName        Name of the variable to be found
 | |
|   @param[in]       VendorGuid          Vendor GUID to be found.
 | |
|   @param[in]       IgnoreRtCheck       Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute
 | |
|                                        check at runtime when searching variable.
 | |
|   @param[in, out]  PtrTrack            Variable Track Pointer structure that contains Variable Information.
 | |
| 
 | |
|   @retval          EFI_SUCCESS         Variable found successfully
 | |
|   @retval          EFI_NOT_FOUND       Variable not found
 | |
| **/
 | |
| EFI_STATUS
 | |
| FindVariableEx (
 | |
|   IN     CHAR16                  *VariableName,
 | |
|   IN     EFI_GUID                *VendorGuid,
 | |
|   IN     BOOLEAN                 IgnoreRtCheck,
 | |
|   IN OUT VARIABLE_POINTER_TRACK  *PtrTrack
 | |
|   )
 | |
| {
 | |
|   VARIABLE_HEADER                *InDeletedVariable;
 | |
|   VOID                           *Point;
 | |
| 
 | |
|   PtrTrack->InDeletedTransitionPtr = NULL;
 | |
| 
 | |
|   //
 | |
|   // Find the variable by walk through HOB, volatile and non-volatile variable store.
 | |
|   //
 | |
|   InDeletedVariable  = NULL;
 | |
| 
 | |
|   for ( PtrTrack->CurrPtr = PtrTrack->StartPtr
 | |
|       ; IsValidVariableHeader (PtrTrack->CurrPtr, PtrTrack->EndPtr)
 | |
|       ; PtrTrack->CurrPtr = GetNextVariablePtr (PtrTrack->CurrPtr)
 | |
|       ) {
 | |
|     if (PtrTrack->CurrPtr->State == VAR_ADDED ||
 | |
|         PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
 | |
|        ) {
 | |
|       if (IgnoreRtCheck || !AtRuntime () || ((PtrTrack->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
 | |
|         if (VariableName[0] == 0) {
 | |
|           if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
|             InDeletedVariable   = PtrTrack->CurrPtr;
 | |
|           } else {
 | |
|             PtrTrack->InDeletedTransitionPtr = InDeletedVariable;
 | |
|             return EFI_SUCCESS;
 | |
|           }
 | |
|         } else {
 | |
|           if (CompareGuid (VendorGuid, GetVendorGuidPtr (PtrTrack->CurrPtr))) {
 | |
|             Point = (VOID *) GetVariableNamePtr (PtrTrack->CurrPtr);
 | |
| 
 | |
|             ASSERT (NameSizeOfVariable (PtrTrack->CurrPtr) != 0);
 | |
|             if (CompareMem (VariableName, Point, NameSizeOfVariable (PtrTrack->CurrPtr)) == 0) {
 | |
|               if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
|                 InDeletedVariable     = PtrTrack->CurrPtr;
 | |
|               } else {
 | |
|                 PtrTrack->InDeletedTransitionPtr = InDeletedVariable;
 | |
|                 return EFI_SUCCESS;
 | |
|               }
 | |
|             }
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   PtrTrack->CurrPtr = InDeletedVariable;
 | |
|   return (PtrTrack->CurrPtr  == NULL) ? EFI_NOT_FOUND : EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|   Finds variable in storage blocks of volatile and non-volatile storage areas.
 | |
| 
 | |
|   This code finds variable in storage blocks of volatile and non-volatile storage areas.
 | |
|   If VariableName is an empty string, then we just return the first
 | |
|   qualified variable without comparing VariableName and VendorGuid.
 | |
|   If IgnoreRtCheck is TRUE, then we ignore the EFI_VARIABLE_RUNTIME_ACCESS attribute check
 | |
|   at runtime when searching existing variable, only VariableName and VendorGuid are compared.
 | |
|   Otherwise, variables without EFI_VARIABLE_RUNTIME_ACCESS are not visible at runtime.
 | |
| 
 | |
|   @param[in]   VariableName           Name of the variable to be found.
 | |
|   @param[in]   VendorGuid             Vendor GUID to be found.
 | |
|   @param[out]  PtrTrack               VARIABLE_POINTER_TRACK structure for output,
 | |
|                                       including the range searched and the target position.
 | |
|   @param[in]   Global                 Pointer to VARIABLE_GLOBAL structure, including
 | |
|                                       base of volatile variable storage area, base of
 | |
|                                       NV variable storage area, and a lock.
 | |
|   @param[in]   IgnoreRtCheck          Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute
 | |
|                                       check at runtime when searching variable.
 | |
| 
 | |
|   @retval EFI_INVALID_PARAMETER       If VariableName is not an empty string, while
 | |
|                                       VendorGuid is NULL.
 | |
|   @retval EFI_SUCCESS                 Variable successfully found.
 | |
|   @retval EFI_NOT_FOUND               Variable not found
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| FindVariable (
 | |
|   IN  CHAR16                  *VariableName,
 | |
|   IN  EFI_GUID                *VendorGuid,
 | |
|   OUT VARIABLE_POINTER_TRACK  *PtrTrack,
 | |
|   IN  VARIABLE_GLOBAL         *Global,
 | |
|   IN  BOOLEAN                 IgnoreRtCheck
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS              Status;
 | |
|   VARIABLE_STORE_HEADER   *VariableStoreHeader[VariableStoreTypeMax];
 | |
|   VARIABLE_STORE_TYPE     Type;
 | |
| 
 | |
|   if (VariableName[0] != 0 && VendorGuid == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // 0: Volatile, 1: HOB, 2: Non-Volatile.
 | |
|   // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName
 | |
|   // make use of this mapping to implement search algorithm.
 | |
|   //
 | |
|   VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) Global->VolatileVariableBase;
 | |
|   VariableStoreHeader[VariableStoreTypeHob]      = (VARIABLE_STORE_HEADER *) (UINTN) Global->HobVariableBase;
 | |
|   VariableStoreHeader[VariableStoreTypeNv]       = mNvVariableCache;
 | |
| 
 | |
|   //
 | |
|   // Find the variable by walk through HOB, volatile and non-volatile variable store.
 | |
|   //
 | |
|   for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) {
 | |
|     if (VariableStoreHeader[Type] == NULL) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Type]);
 | |
|     PtrTrack->EndPtr   = GetEndPointer   (VariableStoreHeader[Type]);
 | |
|     PtrTrack->Volatile = (BOOLEAN) (Type == VariableStoreTypeVolatile);
 | |
| 
 | |
|     Status = FindVariableEx (VariableName, VendorGuid, IgnoreRtCheck, PtrTrack);
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       return Status;
 | |
|     }
 | |
|   }
 | |
|   return EFI_NOT_FOUND;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Get index from supported language codes according to language string.
 | |
| 
 | |
|   This code is used to get corresponding index in supported language codes. It can handle
 | |
|   RFC4646 and ISO639 language tags.
 | |
|   In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.
 | |
|   In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.
 | |
| 
 | |
|   For example:
 | |
|     SupportedLang  = "engfraengfra"
 | |
|     Lang           = "eng"
 | |
|     Iso639Language = TRUE
 | |
|   The return value is "0".
 | |
|   Another example:
 | |
|     SupportedLang  = "en;fr;en-US;fr-FR"
 | |
|     Lang           = "fr-FR"
 | |
|     Iso639Language = FALSE
 | |
|   The return value is "3".
 | |
| 
 | |
|   @param  SupportedLang               Platform supported language codes.
 | |
|   @param  Lang                        Configured language.
 | |
|   @param  Iso639Language              A bool value to signify if the handler is operated on ISO639 or RFC4646.
 | |
| 
 | |
|   @retval The index of language in the language codes.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| GetIndexFromSupportedLangCodes(
 | |
|   IN  CHAR8            *SupportedLang,
 | |
|   IN  CHAR8            *Lang,
 | |
|   IN  BOOLEAN          Iso639Language
 | |
|   )
 | |
| {
 | |
|   UINTN    Index;
 | |
|   UINTN    CompareLength;
 | |
|   UINTN    LanguageLength;
 | |
| 
 | |
|   if (Iso639Language) {
 | |
|     CompareLength = ISO_639_2_ENTRY_SIZE;
 | |
|     for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {
 | |
|       if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {
 | |
|         //
 | |
|         // Successfully find the index of Lang string in SupportedLang string.
 | |
|         //
 | |
|         Index = Index / CompareLength;
 | |
|         return Index;
 | |
|       }
 | |
|     }
 | |
|     ASSERT (FALSE);
 | |
|     return 0;
 | |
|   } else {
 | |
|     //
 | |
|     // Compare RFC4646 language code
 | |
|     //
 | |
|     Index = 0;
 | |
|     for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++);
 | |
| 
 | |
|     for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) {
 | |
|       //
 | |
|       // Skip ';' characters in SupportedLang
 | |
|       //
 | |
|       for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++);
 | |
|       //
 | |
|       // Determine the length of the next language code in SupportedLang
 | |
|       //
 | |
|       for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);
 | |
| 
 | |
|       if ((CompareLength == LanguageLength) &&
 | |
|           (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {
 | |
|         //
 | |
|         // Successfully find the index of Lang string in SupportedLang string.
 | |
|         //
 | |
|         return Index;
 | |
|       }
 | |
|     }
 | |
|     ASSERT (FALSE);
 | |
|     return 0;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Get language string from supported language codes according to index.
 | |
| 
 | |
|   This code is used to get corresponding language strings in supported language codes. It can handle
 | |
|   RFC4646 and ISO639 language tags.
 | |
|   In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.
 | |
|   In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.
 | |
| 
 | |
|   For example:
 | |
|     SupportedLang  = "engfraengfra"
 | |
|     Index          = "1"
 | |
|     Iso639Language = TRUE
 | |
|   The return value is "fra".
 | |
|   Another example:
 | |
|     SupportedLang  = "en;fr;en-US;fr-FR"
 | |
|     Index          = "1"
 | |
|     Iso639Language = FALSE
 | |
|   The return value is "fr".
 | |
| 
 | |
|   @param  SupportedLang               Platform supported language codes.
 | |
|   @param  Index                       The index in supported language codes.
 | |
|   @param  Iso639Language              A bool value to signify if the handler is operated on ISO639 or RFC4646.
 | |
| 
 | |
|   @retval The language string in the language codes.
 | |
| 
 | |
| **/
 | |
| CHAR8 *
 | |
| GetLangFromSupportedLangCodes (
 | |
|   IN  CHAR8            *SupportedLang,
 | |
|   IN  UINTN            Index,
 | |
|   IN  BOOLEAN          Iso639Language
 | |
| )
 | |
| {
 | |
|   UINTN    SubIndex;
 | |
|   UINTN    CompareLength;
 | |
|   CHAR8    *Supported;
 | |
| 
 | |
|   SubIndex  = 0;
 | |
|   Supported = SupportedLang;
 | |
|   if (Iso639Language) {
 | |
|     //
 | |
|     // According to the index of Lang string in SupportedLang string to get the language.
 | |
|     // This code will be invoked in RUNTIME, therefore there is not a memory allocate/free operation.
 | |
|     // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
 | |
|     //
 | |
|     CompareLength = ISO_639_2_ENTRY_SIZE;
 | |
|     mVariableModuleGlobal->Lang[CompareLength] = '\0';
 | |
|     return CopyMem (mVariableModuleGlobal->Lang, SupportedLang + Index * CompareLength, CompareLength);
 | |
| 
 | |
|   } else {
 | |
|     while (TRUE) {
 | |
|       //
 | |
|       // Take semicolon as delimitation, sequentially traverse supported language codes.
 | |
|       //
 | |
|       for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {
 | |
|         Supported++;
 | |
|       }
 | |
|       if ((*Supported == '\0') && (SubIndex != Index)) {
 | |
|         //
 | |
|         // Have completed the traverse, but not find corrsponding string.
 | |
|         // This case is not allowed to happen.
 | |
|         //
 | |
|         ASSERT(FALSE);
 | |
|         return NULL;
 | |
|       }
 | |
|       if (SubIndex == Index) {
 | |
|         //
 | |
|         // According to the index of Lang string in SupportedLang string to get the language.
 | |
|         // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
 | |
|         // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
 | |
|         //
 | |
|         mVariableModuleGlobal->PlatformLang[CompareLength] = '\0';
 | |
|         return CopyMem (mVariableModuleGlobal->PlatformLang, Supported - CompareLength, CompareLength);
 | |
|       }
 | |
|       SubIndex++;
 | |
| 
 | |
|       //
 | |
|       // Skip ';' characters in Supported
 | |
|       //
 | |
|       for (; *Supported != '\0' && *Supported == ';'; Supported++);
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Returns a pointer to an allocated buffer that contains the best matching language
 | |
|   from a set of supported languages.
 | |
| 
 | |
|   This function supports both ISO 639-2 and RFC 4646 language codes, but language
 | |
|   code types may not be mixed in a single call to this function. This function
 | |
|   supports a variable argument list that allows the caller to pass in a prioritized
 | |
|   list of language codes to test against all the language codes in SupportedLanguages.
 | |
| 
 | |
|   If SupportedLanguages is NULL, then ASSERT().
 | |
| 
 | |
|   @param[in]  SupportedLanguages  A pointer to a Null-terminated ASCII string that
 | |
|                                   contains a set of language codes in the format
 | |
|                                   specified by Iso639Language.
 | |
|   @param[in]  Iso639Language      If TRUE, then all language codes are assumed to be
 | |
|                                   in ISO 639-2 format.  If FALSE, then all language
 | |
|                                   codes are assumed to be in RFC 4646 language format
 | |
|   @param[in]  ...                 A variable argument list that contains pointers to
 | |
|                                   Null-terminated ASCII strings that contain one or more
 | |
|                                   language codes in the format specified by Iso639Language.
 | |
|                                   The first language code from each of these language
 | |
|                                   code lists is used to determine if it is an exact or
 | |
|                                   close match to any of the language codes in
 | |
|                                   SupportedLanguages.  Close matches only apply to RFC 4646
 | |
|                                   language codes, and the matching algorithm from RFC 4647
 | |
|                                   is used to determine if a close match is present.  If
 | |
|                                   an exact or close match is found, then the matching
 | |
|                                   language code from SupportedLanguages is returned.  If
 | |
|                                   no matches are found, then the next variable argument
 | |
|                                   parameter is evaluated.  The variable argument list
 | |
|                                   is terminated by a NULL.
 | |
| 
 | |
|   @retval NULL   The best matching language could not be found in SupportedLanguages.
 | |
|   @retval NULL   There are not enough resources available to return the best matching
 | |
|                  language.
 | |
|   @retval Other  A pointer to a Null-terminated ASCII string that is the best matching
 | |
|                  language in SupportedLanguages.
 | |
| 
 | |
| **/
 | |
| CHAR8 *
 | |
| EFIAPI
 | |
| VariableGetBestLanguage (
 | |
|   IN CONST CHAR8  *SupportedLanguages,
 | |
|   IN BOOLEAN      Iso639Language,
 | |
|   ...
 | |
|   )
 | |
| {
 | |
|   VA_LIST      Args;
 | |
|   CHAR8        *Language;
 | |
|   UINTN        CompareLength;
 | |
|   UINTN        LanguageLength;
 | |
|   CONST CHAR8  *Supported;
 | |
|   CHAR8        *Buffer;
 | |
| 
 | |
|   if (SupportedLanguages == NULL) {
 | |
|     return NULL;
 | |
|   }
 | |
| 
 | |
|   VA_START (Args, Iso639Language);
 | |
|   while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) {
 | |
|     //
 | |
|     // Default to ISO 639-2 mode
 | |
|     //
 | |
|     CompareLength  = 3;
 | |
|     LanguageLength = MIN (3, AsciiStrLen (Language));
 | |
| 
 | |
|     //
 | |
|     // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language
 | |
|     //
 | |
|     if (!Iso639Language) {
 | |
|       for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++);
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Trim back the length of Language used until it is empty
 | |
|     //
 | |
|     while (LanguageLength > 0) {
 | |
|       //
 | |
|       // Loop through all language codes in SupportedLanguages
 | |
|       //
 | |
|       for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) {
 | |
|         //
 | |
|         // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages
 | |
|         //
 | |
|         if (!Iso639Language) {
 | |
|           //
 | |
|           // Skip ';' characters in Supported
 | |
|           //
 | |
|           for (; *Supported != '\0' && *Supported == ';'; Supported++);
 | |
|           //
 | |
|           // Determine the length of the next language code in Supported
 | |
|           //
 | |
|           for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++);
 | |
|           //
 | |
|           // If Language is longer than the Supported, then skip to the next language
 | |
|           //
 | |
|           if (LanguageLength > CompareLength) {
 | |
|             continue;
 | |
|           }
 | |
|         }
 | |
|         //
 | |
|         // See if the first LanguageLength characters in Supported match Language
 | |
|         //
 | |
|         if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) {
 | |
|           VA_END (Args);
 | |
| 
 | |
|           Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang;
 | |
|           Buffer[CompareLength] = '\0';
 | |
|           return CopyMem (Buffer, Supported, CompareLength);
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       if (Iso639Language) {
 | |
|         //
 | |
|         // If ISO 639 mode, then each language can only be tested once
 | |
|         //
 | |
|         LanguageLength = 0;
 | |
|       } else {
 | |
|         //
 | |
|         // If RFC 4646 mode, then trim Language from the right to the next '-' character
 | |
|         //
 | |
|         for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   VA_END (Args);
 | |
| 
 | |
|   //
 | |
|   // No matches were found
 | |
|   //
 | |
|   return NULL;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function is to check if the remaining variable space is enough to set
 | |
|   all Variables from argument list successfully. The purpose of the check
 | |
|   is to keep the consistency of the Variables to be in variable storage.
 | |
| 
 | |
|   Note: Variables are assumed to be in same storage.
 | |
|   The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
 | |
|   so follow the argument sequence to check the Variables.
 | |
| 
 | |
|   @param[in] Attributes         Variable attributes for Variable entries.
 | |
|   @param[in] Marker             VA_LIST style variable argument list.
 | |
|                                 The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
 | |
|                                 A NULL terminates the list. The VariableSize of
 | |
|                                 VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
 | |
|                                 It will be changed to variable total size as output.
 | |
| 
 | |
|   @retval TRUE                  Have enough variable space to set the Variables successfully.
 | |
|   @retval FALSE                 No enough variable space to set the Variables successfully.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| EFIAPI
 | |
| CheckRemainingSpaceForConsistencyInternal (
 | |
|   IN UINT32                     Attributes,
 | |
|   IN VA_LIST                    Marker
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   VA_LIST                       Args;
 | |
|   VARIABLE_ENTRY_CONSISTENCY    *VariableEntry;
 | |
|   UINT64                        MaximumVariableStorageSize;
 | |
|   UINT64                        RemainingVariableStorageSize;
 | |
|   UINT64                        MaximumVariableSize;
 | |
|   UINTN                         TotalNeededSize;
 | |
|   UINTN                         OriginalVarSize;
 | |
|   VARIABLE_STORE_HEADER         *VariableStoreHeader;
 | |
|   VARIABLE_POINTER_TRACK        VariablePtrTrack;
 | |
|   VARIABLE_HEADER               *NextVariable;
 | |
|   UINTN                         VarNameSize;
 | |
|   UINTN                         VarDataSize;
 | |
| 
 | |
|   //
 | |
|   // Non-Volatile related.
 | |
|   //
 | |
|   VariableStoreHeader = mNvVariableCache;
 | |
| 
 | |
|   Status = VariableServiceQueryVariableInfoInternal (
 | |
|              Attributes,
 | |
|              &MaximumVariableStorageSize,
 | |
|              &RemainingVariableStorageSize,
 | |
|              &MaximumVariableSize
 | |
|              );
 | |
|   ASSERT_EFI_ERROR (Status);
 | |
| 
 | |
|   TotalNeededSize = 0;
 | |
|   VA_COPY (Args, Marker);
 | |
|   VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
 | |
|   while (VariableEntry != NULL) {
 | |
|     //
 | |
|     // Calculate variable total size.
 | |
|     //
 | |
|     VarNameSize  = StrSize (VariableEntry->Name);
 | |
|     VarNameSize += GET_PAD_SIZE (VarNameSize);
 | |
|     VarDataSize  = VariableEntry->VariableSize;
 | |
|     VarDataSize += GET_PAD_SIZE (VarDataSize);
 | |
|     VariableEntry->VariableSize = HEADER_ALIGN (GetVariableHeaderSize () + VarNameSize + VarDataSize);
 | |
| 
 | |
|     TotalNeededSize += VariableEntry->VariableSize;
 | |
|     VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
 | |
|   }
 | |
|   VA_END  (Args);
 | |
| 
 | |
|   if (RemainingVariableStorageSize >= TotalNeededSize) {
 | |
|     //
 | |
|     // Already have enough space.
 | |
|     //
 | |
|     return TRUE;
 | |
|   } else if (AtRuntime ()) {
 | |
|     //
 | |
|     // At runtime, no reclaim.
 | |
|     // The original variable space of Variables can't be reused.
 | |
|     //
 | |
|     return FALSE;
 | |
|   }
 | |
| 
 | |
|   VA_COPY (Args, Marker);
 | |
|   VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
 | |
|   while (VariableEntry != NULL) {
 | |
|     //
 | |
|     // Check if Variable[Index] has been present and get its size.
 | |
|     //
 | |
|     OriginalVarSize = 0;
 | |
|     VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader);
 | |
|     VariablePtrTrack.EndPtr   = GetEndPointer   (VariableStoreHeader);
 | |
|     Status = FindVariableEx (
 | |
|                VariableEntry->Name,
 | |
|                VariableEntry->Guid,
 | |
|                FALSE,
 | |
|                &VariablePtrTrack
 | |
|                );
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       //
 | |
|       // Get size of Variable[Index].
 | |
|       //
 | |
|       NextVariable = GetNextVariablePtr (VariablePtrTrack.CurrPtr);
 | |
|       OriginalVarSize = (UINTN) NextVariable - (UINTN) VariablePtrTrack.CurrPtr;
 | |
|       //
 | |
|       // Add the original size of Variable[Index] to remaining variable storage size.
 | |
|       //
 | |
|       RemainingVariableStorageSize += OriginalVarSize;
 | |
|     }
 | |
|     if (VariableEntry->VariableSize > RemainingVariableStorageSize) {
 | |
|       //
 | |
|       // No enough space for Variable[Index].
 | |
|       //
 | |
|       return FALSE;
 | |
|     }
 | |
|     //
 | |
|     // Sub the (new) size of Variable[Index] from remaining variable storage size.
 | |
|     //
 | |
|     RemainingVariableStorageSize -= VariableEntry->VariableSize;
 | |
|     VariableEntry = VA_ARG (Args, VARIABLE_ENTRY_CONSISTENCY *);
 | |
|   }
 | |
|   VA_END  (Args);
 | |
| 
 | |
|   return TRUE;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function is to check if the remaining variable space is enough to set
 | |
|   all Variables from argument list successfully. The purpose of the check
 | |
|   is to keep the consistency of the Variables to be in variable storage.
 | |
| 
 | |
|   Note: Variables are assumed to be in same storage.
 | |
|   The set sequence of Variables will be same with the sequence of VariableEntry from argument list,
 | |
|   so follow the argument sequence to check the Variables.
 | |
| 
 | |
|   @param[in] Attributes         Variable attributes for Variable entries.
 | |
|   @param ...                    The variable argument list with type VARIABLE_ENTRY_CONSISTENCY *.
 | |
|                                 A NULL terminates the list. The VariableSize of
 | |
|                                 VARIABLE_ENTRY_CONSISTENCY is the variable data size as input.
 | |
|                                 It will be changed to variable total size as output.
 | |
| 
 | |
|   @retval TRUE                  Have enough variable space to set the Variables successfully.
 | |
|   @retval FALSE                 No enough variable space to set the Variables successfully.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| EFIAPI
 | |
| CheckRemainingSpaceForConsistency (
 | |
|   IN UINT32                     Attributes,
 | |
|   ...
 | |
|   )
 | |
| {
 | |
|   VA_LIST Marker;
 | |
|   BOOLEAN Return;
 | |
| 
 | |
|   VA_START (Marker, Attributes);
 | |
| 
 | |
|   Return = CheckRemainingSpaceForConsistencyInternal (Attributes, Marker);
 | |
| 
 | |
|   VA_END (Marker);
 | |
| 
 | |
|   return Return;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.
 | |
| 
 | |
|   When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.
 | |
| 
 | |
|   According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,
 | |
|   and are read-only. Therefore, in variable driver, only store the original value for other use.
 | |
| 
 | |
|   @param[in] VariableName       Name of variable.
 | |
| 
 | |
|   @param[in] Data               Variable data.
 | |
| 
 | |
|   @param[in] DataSize           Size of data. 0 means delete.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The update operation is successful or ignored.
 | |
|   @retval EFI_WRITE_PROTECTED   Update PlatformLangCodes/LangCodes at runtime.
 | |
|   @retval EFI_OUT_OF_RESOURCES  No enough variable space to do the update operation.
 | |
|   @retval Others                Other errors happened during the update operation.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| AutoUpdateLangVariable (
 | |
|   IN  CHAR16             *VariableName,
 | |
|   IN  VOID               *Data,
 | |
|   IN  UINTN              DataSize
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
|   CHAR8                  *BestPlatformLang;
 | |
|   CHAR8                  *BestLang;
 | |
|   UINTN                  Index;
 | |
|   UINT32                 Attributes;
 | |
|   VARIABLE_POINTER_TRACK Variable;
 | |
|   BOOLEAN                SetLanguageCodes;
 | |
|   VARIABLE_ENTRY_CONSISTENCY VariableEntry[2];
 | |
| 
 | |
|   //
 | |
|   // Don't do updates for delete operation
 | |
|   //
 | |
|   if (DataSize == 0) {
 | |
|     return EFI_SUCCESS;
 | |
|   }
 | |
| 
 | |
|   SetLanguageCodes = FALSE;
 | |
| 
 | |
|   if (StrCmp (VariableName, EFI_PLATFORM_LANG_CODES_VARIABLE_NAME) == 0) {
 | |
|     //
 | |
|     // PlatformLangCodes is a volatile variable, so it can not be updated at runtime.
 | |
|     //
 | |
|     if (AtRuntime ()) {
 | |
|       return EFI_WRITE_PROTECTED;
 | |
|     }
 | |
| 
 | |
|     SetLanguageCodes = TRUE;
 | |
| 
 | |
|     //
 | |
|     // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only
 | |
|     // Therefore, in variable driver, only store the original value for other use.
 | |
|     //
 | |
|     if (mVariableModuleGlobal->PlatformLangCodes != NULL) {
 | |
|       FreePool (mVariableModuleGlobal->PlatformLangCodes);
 | |
|     }
 | |
|     mVariableModuleGlobal->PlatformLangCodes = AllocateRuntimeCopyPool (DataSize, Data);
 | |
|     ASSERT (mVariableModuleGlobal->PlatformLangCodes != NULL);
 | |
| 
 | |
|     //
 | |
|     // PlatformLang holds a single language from PlatformLangCodes,
 | |
|     // so the size of PlatformLangCodes is enough for the PlatformLang.
 | |
|     //
 | |
|     if (mVariableModuleGlobal->PlatformLang != NULL) {
 | |
|       FreePool (mVariableModuleGlobal->PlatformLang);
 | |
|     }
 | |
|     mVariableModuleGlobal->PlatformLang = AllocateRuntimePool (DataSize);
 | |
|     ASSERT (mVariableModuleGlobal->PlatformLang != NULL);
 | |
| 
 | |
|   } else if (StrCmp (VariableName, EFI_LANG_CODES_VARIABLE_NAME) == 0) {
 | |
|     //
 | |
|     // LangCodes is a volatile variable, so it can not be updated at runtime.
 | |
|     //
 | |
|     if (AtRuntime ()) {
 | |
|       return EFI_WRITE_PROTECTED;
 | |
|     }
 | |
| 
 | |
|     SetLanguageCodes = TRUE;
 | |
| 
 | |
|     //
 | |
|     // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only
 | |
|     // Therefore, in variable driver, only store the original value for other use.
 | |
|     //
 | |
|     if (mVariableModuleGlobal->LangCodes != NULL) {
 | |
|       FreePool (mVariableModuleGlobal->LangCodes);
 | |
|     }
 | |
|     mVariableModuleGlobal->LangCodes = AllocateRuntimeCopyPool (DataSize, Data);
 | |
|     ASSERT (mVariableModuleGlobal->LangCodes != NULL);
 | |
|   }
 | |
| 
 | |
|   if (SetLanguageCodes
 | |
|       && (mVariableModuleGlobal->PlatformLangCodes != NULL)
 | |
|       && (mVariableModuleGlobal->LangCodes != NULL)) {
 | |
|     //
 | |
|     // Update Lang if PlatformLang is already set
 | |
|     // Update PlatformLang if Lang is already set
 | |
|     //
 | |
|     Status = FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       //
 | |
|       // Update Lang
 | |
|       //
 | |
|       VariableName = EFI_PLATFORM_LANG_VARIABLE_NAME;
 | |
|       Data         = GetVariableDataPtr (Variable.CurrPtr);
 | |
|       DataSize     = DataSizeOfVariable (Variable.CurrPtr);
 | |
|     } else {
 | |
|       Status = FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         //
 | |
|         // Update PlatformLang
 | |
|         //
 | |
|         VariableName = EFI_LANG_VARIABLE_NAME;
 | |
|         Data         = GetVariableDataPtr (Variable.CurrPtr);
 | |
|         DataSize     = DataSizeOfVariable (Variable.CurrPtr);
 | |
|       } else {
 | |
|         //
 | |
|         // Neither PlatformLang nor Lang is set, directly return
 | |
|         //
 | |
|         return EFI_SUCCESS;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   Status = EFI_SUCCESS;
 | |
| 
 | |
|   //
 | |
|   // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.
 | |
|   //
 | |
|   Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;
 | |
| 
 | |
|   if (StrCmp (VariableName, EFI_PLATFORM_LANG_VARIABLE_NAME) == 0) {
 | |
|     //
 | |
|     // Update Lang when PlatformLangCodes/LangCodes were set.
 | |
|     //
 | |
|     if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {
 | |
|       //
 | |
|       // When setting PlatformLang, firstly get most matched language string from supported language codes.
 | |
|       //
 | |
|       BestPlatformLang = VariableGetBestLanguage (mVariableModuleGlobal->PlatformLangCodes, FALSE, Data, NULL);
 | |
|       if (BestPlatformLang != NULL) {
 | |
|         //
 | |
|         // Get the corresponding index in language codes.
 | |
|         //
 | |
|         Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, BestPlatformLang, FALSE);
 | |
| 
 | |
|         //
 | |
|         // Get the corresponding ISO639 language tag according to RFC4646 language tag.
 | |
|         //
 | |
|         BestLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, Index, TRUE);
 | |
| 
 | |
|         //
 | |
|         // Check the variable space for both Lang and PlatformLang variable.
 | |
|         //
 | |
|         VariableEntry[0].VariableSize = ISO_639_2_ENTRY_SIZE + 1;
 | |
|         VariableEntry[0].Guid = &gEfiGlobalVariableGuid;
 | |
|         VariableEntry[0].Name = EFI_LANG_VARIABLE_NAME;
 | |
| 
 | |
|         VariableEntry[1].VariableSize = AsciiStrSize (BestPlatformLang);
 | |
|         VariableEntry[1].Guid = &gEfiGlobalVariableGuid;
 | |
|         VariableEntry[1].Name = EFI_PLATFORM_LANG_VARIABLE_NAME;
 | |
|         if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) {
 | |
|           //
 | |
|           // No enough variable space to set both Lang and PlatformLang successfully.
 | |
|           //
 | |
|           Status = EFI_OUT_OF_RESOURCES;
 | |
|         } else {
 | |
|           //
 | |
|           // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.
 | |
|           //
 | |
|           FindVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
| 
 | |
|           Status = UpdateVariable (EFI_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestLang,
 | |
|                                    ISO_639_2_ENTRY_SIZE + 1, Attributes, 0, 0, &Variable, NULL);
 | |
|         }
 | |
| 
 | |
|         DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a Status: %r\n", BestPlatformLang, BestLang, Status));
 | |
|       }
 | |
|     }
 | |
| 
 | |
|   } else if (StrCmp (VariableName, EFI_LANG_VARIABLE_NAME) == 0) {
 | |
|     //
 | |
|     // Update PlatformLang when PlatformLangCodes/LangCodes were set.
 | |
|     //
 | |
|     if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {
 | |
|       //
 | |
|       // When setting Lang, firstly get most matched language string from supported language codes.
 | |
|       //
 | |
|       BestLang = VariableGetBestLanguage (mVariableModuleGlobal->LangCodes, TRUE, Data, NULL);
 | |
|       if (BestLang != NULL) {
 | |
|         //
 | |
|         // Get the corresponding index in language codes.
 | |
|         //
 | |
|         Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, BestLang, TRUE);
 | |
| 
 | |
|         //
 | |
|         // Get the corresponding RFC4646 language tag according to ISO639 language tag.
 | |
|         //
 | |
|         BestPlatformLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, Index, FALSE);
 | |
| 
 | |
|         //
 | |
|         // Check the variable space for both PlatformLang and Lang variable.
 | |
|         //
 | |
|         VariableEntry[0].VariableSize = AsciiStrSize (BestPlatformLang);
 | |
|         VariableEntry[0].Guid = &gEfiGlobalVariableGuid;
 | |
|         VariableEntry[0].Name = EFI_PLATFORM_LANG_VARIABLE_NAME;
 | |
| 
 | |
|         VariableEntry[1].VariableSize = ISO_639_2_ENTRY_SIZE + 1;
 | |
|         VariableEntry[1].Guid = &gEfiGlobalVariableGuid;
 | |
|         VariableEntry[1].Name = EFI_LANG_VARIABLE_NAME;
 | |
|         if (!CheckRemainingSpaceForConsistency (VARIABLE_ATTRIBUTE_NV_BS_RT, &VariableEntry[0], &VariableEntry[1], NULL)) {
 | |
|           //
 | |
|           // No enough variable space to set both PlatformLang and Lang successfully.
 | |
|           //
 | |
|           Status = EFI_OUT_OF_RESOURCES;
 | |
|         } else {
 | |
|           //
 | |
|           // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.
 | |
|           //
 | |
|           FindVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
| 
 | |
|           Status = UpdateVariable (EFI_PLATFORM_LANG_VARIABLE_NAME, &gEfiGlobalVariableGuid, BestPlatformLang,
 | |
|                                    AsciiStrSize (BestPlatformLang), Attributes, 0, 0, &Variable, NULL);
 | |
|         }
 | |
| 
 | |
|         DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a Status: %r\n", BestLang, BestPlatformLang, Status));
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (SetLanguageCodes) {
 | |
|     //
 | |
|     // Continue to set PlatformLangCodes or LangCodes.
 | |
|     //
 | |
|     return EFI_SUCCESS;
 | |
|   } else {
 | |
|     return Status;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Compare two EFI_TIME data.
 | |
| 
 | |
| 
 | |
|   @param FirstTime           A pointer to the first EFI_TIME data.
 | |
|   @param SecondTime          A pointer to the second EFI_TIME data.
 | |
| 
 | |
|   @retval  TRUE              The FirstTime is not later than the SecondTime.
 | |
|   @retval  FALSE             The FirstTime is later than the SecondTime.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| VariableCompareTimeStampInternal (
 | |
|   IN EFI_TIME               *FirstTime,
 | |
|   IN EFI_TIME               *SecondTime
 | |
|   )
 | |
| {
 | |
|   if (FirstTime->Year != SecondTime->Year) {
 | |
|     return (BOOLEAN) (FirstTime->Year < SecondTime->Year);
 | |
|   } else if (FirstTime->Month != SecondTime->Month) {
 | |
|     return (BOOLEAN) (FirstTime->Month < SecondTime->Month);
 | |
|   } else if (FirstTime->Day != SecondTime->Day) {
 | |
|     return (BOOLEAN) (FirstTime->Day < SecondTime->Day);
 | |
|   } else if (FirstTime->Hour != SecondTime->Hour) {
 | |
|     return (BOOLEAN) (FirstTime->Hour < SecondTime->Hour);
 | |
|   } else if (FirstTime->Minute != SecondTime->Minute) {
 | |
|     return (BOOLEAN) (FirstTime->Minute < SecondTime->Minute);
 | |
|   }
 | |
| 
 | |
|   return (BOOLEAN) (FirstTime->Second <= SecondTime->Second);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Update the variable region with Variable information. If EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS is set,
 | |
|   index of associated public key is needed.
 | |
| 
 | |
|   @param[in] VariableName       Name of variable.
 | |
|   @param[in] VendorGuid         Guid of variable.
 | |
|   @param[in] Data               Variable data.
 | |
|   @param[in] DataSize           Size of data. 0 means delete.
 | |
|   @param[in] Attributes         Attributes of the variable.
 | |
|   @param[in] KeyIndex           Index of associated public key.
 | |
|   @param[in] MonotonicCount     Value of associated monotonic count.
 | |
|   @param[in, out] CacheVariable The variable information which is used to keep track of variable usage.
 | |
|   @param[in] TimeStamp          Value of associated TimeStamp.
 | |
| 
 | |
|   @retval EFI_SUCCESS           The update operation is success.
 | |
|   @retval EFI_OUT_OF_RESOURCES  Variable region is full, can not write other data into this region.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| UpdateVariable (
 | |
|   IN      CHAR16                      *VariableName,
 | |
|   IN      EFI_GUID                    *VendorGuid,
 | |
|   IN      VOID                        *Data,
 | |
|   IN      UINTN                       DataSize,
 | |
|   IN      UINT32                      Attributes      OPTIONAL,
 | |
|   IN      UINT32                      KeyIndex        OPTIONAL,
 | |
|   IN      UINT64                      MonotonicCount  OPTIONAL,
 | |
|   IN OUT  VARIABLE_POINTER_TRACK      *CacheVariable,
 | |
|   IN      EFI_TIME                    *TimeStamp      OPTIONAL
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                          Status;
 | |
|   VARIABLE_HEADER                     *NextVariable;
 | |
|   UINTN                               ScratchSize;
 | |
|   UINTN                               MaxDataSize;
 | |
|   UINTN                               VarNameOffset;
 | |
|   UINTN                               VarDataOffset;
 | |
|   UINTN                               VarNameSize;
 | |
|   UINTN                               VarSize;
 | |
|   BOOLEAN                             Volatile;
 | |
|   EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL  *Fvb;
 | |
|   UINT8                               State;
 | |
|   VARIABLE_POINTER_TRACK              *Variable;
 | |
|   VARIABLE_POINTER_TRACK              NvVariable;
 | |
|   VARIABLE_STORE_HEADER               *VariableStoreHeader;
 | |
|   UINTN                               CacheOffset;
 | |
|   UINT8                               *BufferForMerge;
 | |
|   UINTN                               MergedBufSize;
 | |
|   BOOLEAN                             DataReady;
 | |
|   UINTN                               DataOffset;
 | |
|   BOOLEAN                             IsCommonVariable;
 | |
|   BOOLEAN                             IsCommonUserVariable;
 | |
|   AUTHENTICATED_VARIABLE_HEADER       *AuthVariable;
 | |
| 
 | |
|   if (mVariableModuleGlobal->FvbInstance == NULL) {
 | |
|     //
 | |
|     // The FVB protocol is not ready, so the EFI_VARIABLE_WRITE_ARCH_PROTOCOL is not installed.
 | |
|     //
 | |
|     if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
 | |
|       //
 | |
|       // Trying to update NV variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL
 | |
|       //
 | |
|       DEBUG ((EFI_D_ERROR, "Update NV variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET));
 | |
|       return EFI_NOT_AVAILABLE_YET;
 | |
|     } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|       //
 | |
|       // Trying to update volatile authenticated variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL
 | |
|       // The authenticated variable perhaps is not initialized, just return here.
 | |
|       //
 | |
|       DEBUG ((EFI_D_ERROR, "Update AUTH variable before EFI_VARIABLE_WRITE_ARCH_PROTOCOL ready - %r\n", EFI_NOT_AVAILABLE_YET));
 | |
|       return EFI_NOT_AVAILABLE_YET;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check if CacheVariable points to the variable in variable HOB.
 | |
|   // If yes, let CacheVariable points to the variable in NV variable cache.
 | |
|   //
 | |
|   if ((CacheVariable->CurrPtr != NULL) &&
 | |
|       (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) &&
 | |
|       (CacheVariable->StartPtr == GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase))
 | |
|      ) {
 | |
|     CacheVariable->StartPtr = GetStartPointer (mNvVariableCache);
 | |
|     CacheVariable->EndPtr   = GetEndPointer   (mNvVariableCache);
 | |
|     CacheVariable->Volatile = FALSE;
 | |
|     Status = FindVariableEx (VariableName, VendorGuid, FALSE, CacheVariable);
 | |
|     if (CacheVariable->CurrPtr == NULL || EFI_ERROR (Status)) {
 | |
|       //
 | |
|       // There is no matched variable in NV variable cache.
 | |
|       //
 | |
|       if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0)) || (Attributes == 0)) {
 | |
|         //
 | |
|         // It is to delete variable,
 | |
|         // go to delete this variable in variable HOB and
 | |
|         // try to flush other variables from HOB to flash.
 | |
|         //
 | |
|         UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, FALSE, TRUE, FALSE);
 | |
|         FlushHobVariableToFlash (VariableName, VendorGuid);
 | |
|         return EFI_SUCCESS;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if ((CacheVariable->CurrPtr == NULL) || CacheVariable->Volatile) {
 | |
|     Variable = CacheVariable;
 | |
|   } else {
 | |
|     //
 | |
|     // Update/Delete existing NV variable.
 | |
|     // CacheVariable points to the variable in the memory copy of Flash area
 | |
|     // Now let Variable points to the same variable in Flash area.
 | |
|     //
 | |
|     VariableStoreHeader  = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);
 | |
|     Variable = &NvVariable;
 | |
|     Variable->StartPtr = GetStartPointer (VariableStoreHeader);
 | |
|     Variable->EndPtr   = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->EndPtr - (UINTN)CacheVariable->StartPtr));
 | |
| 
 | |
|     Variable->CurrPtr  = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->CurrPtr - (UINTN)CacheVariable->StartPtr));
 | |
|     if (CacheVariable->InDeletedTransitionPtr != NULL) {
 | |
|       Variable->InDeletedTransitionPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->InDeletedTransitionPtr - (UINTN)CacheVariable->StartPtr));
 | |
|     } else {
 | |
|       Variable->InDeletedTransitionPtr = NULL;
 | |
|     }
 | |
|     Variable->Volatile = FALSE;
 | |
|   }
 | |
| 
 | |
|   Fvb       = mVariableModuleGlobal->FvbInstance;
 | |
| 
 | |
|   //
 | |
|   // Tricky part: Use scratch data area at the end of volatile variable store
 | |
|   // as a temporary storage.
 | |
|   //
 | |
|   NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));
 | |
|   ScratchSize = mVariableModuleGlobal->ScratchBufferSize;
 | |
|   SetMem (NextVariable, ScratchSize, 0xff);
 | |
|   DataReady = FALSE;
 | |
| 
 | |
|   if (Variable->CurrPtr != NULL) {
 | |
|     //
 | |
|     // Update/Delete existing variable.
 | |
|     //
 | |
|     if (AtRuntime ()) {
 | |
|       //
 | |
|       // If AtRuntime and the variable is Volatile and Runtime Access,
 | |
|       // the volatile is ReadOnly, and SetVariable should be aborted and
 | |
|       // return EFI_WRITE_PROTECTED.
 | |
|       //
 | |
|       if (Variable->Volatile) {
 | |
|         Status = EFI_WRITE_PROTECTED;
 | |
|         goto Done;
 | |
|       }
 | |
|       //
 | |
|       // Only variable that have NV attributes can be updated/deleted in Runtime.
 | |
|       //
 | |
|       if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
 | |
|         Status = EFI_INVALID_PARAMETER;
 | |
|         goto Done;
 | |
|       }
 | |
| 
 | |
|       //
 | |
|       // Only variable that have RT attributes can be updated/deleted in Runtime.
 | |
|       //
 | |
|       if ((CacheVariable->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) {
 | |
|         Status = EFI_INVALID_PARAMETER;
 | |
|         goto Done;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Setting a data variable with no access, or zero DataSize attributes
 | |
|     // causes it to be deleted.
 | |
|     // When the EFI_VARIABLE_APPEND_WRITE attribute is set, DataSize of zero will
 | |
|     // not delete the variable.
 | |
|     //
 | |
|     if ((((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) && (DataSize == 0))|| ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0)) {
 | |
|       if (Variable->InDeletedTransitionPtr != NULL) {
 | |
|         //
 | |
|         // Both ADDED and IN_DELETED_TRANSITION variable are present,
 | |
|         // set IN_DELETED_TRANSITION one to DELETED state first.
 | |
|         //
 | |
|         ASSERT (CacheVariable->InDeletedTransitionPtr != NULL);
 | |
|         State = CacheVariable->InDeletedTransitionPtr->State;
 | |
|         State &= VAR_DELETED;
 | |
|         Status = UpdateVariableStore (
 | |
|                    &mVariableModuleGlobal->VariableGlobal,
 | |
|                    Variable->Volatile,
 | |
|                    FALSE,
 | |
|                    Fvb,
 | |
|                    (UINTN) &Variable->InDeletedTransitionPtr->State,
 | |
|                    sizeof (UINT8),
 | |
|                    &State
 | |
|                    );
 | |
|         if (!EFI_ERROR (Status)) {
 | |
|           if (!Variable->Volatile) {
 | |
|             CacheVariable->InDeletedTransitionPtr->State = State;
 | |
|           }
 | |
|         } else {
 | |
|           goto Done;
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       State = CacheVariable->CurrPtr->State;
 | |
|       State &= VAR_DELETED;
 | |
| 
 | |
|       Status = UpdateVariableStore (
 | |
|                  &mVariableModuleGlobal->VariableGlobal,
 | |
|                  Variable->Volatile,
 | |
|                  FALSE,
 | |
|                  Fvb,
 | |
|                  (UINTN) &Variable->CurrPtr->State,
 | |
|                  sizeof (UINT8),
 | |
|                  &State
 | |
|                  );
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, FALSE, TRUE, FALSE);
 | |
|         if (!Variable->Volatile) {
 | |
|           CacheVariable->CurrPtr->State = State;
 | |
|           FlushHobVariableToFlash (VariableName, VendorGuid);
 | |
|         }
 | |
|       }
 | |
|       goto Done;
 | |
|     }
 | |
|     //
 | |
|     // If the variable is marked valid, and the same data has been passed in,
 | |
|     // then return to the caller immediately.
 | |
|     //
 | |
|     if (DataSizeOfVariable (CacheVariable->CurrPtr) == DataSize &&
 | |
|         (CompareMem (Data, GetVariableDataPtr (CacheVariable->CurrPtr), DataSize) == 0) &&
 | |
|         ((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) &&
 | |
|         (TimeStamp == NULL)) {
 | |
|       //
 | |
|       // Variable content unchanged and no need to update timestamp, just return.
 | |
|       //
 | |
|       UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, TRUE, FALSE, FALSE);
 | |
|       Status = EFI_SUCCESS;
 | |
|       goto Done;
 | |
|     } else if ((CacheVariable->CurrPtr->State == VAR_ADDED) ||
 | |
|                (CacheVariable->CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {
 | |
| 
 | |
|       //
 | |
|       // EFI_VARIABLE_APPEND_WRITE attribute only effects for existing variable.
 | |
|       //
 | |
|       if ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0) {
 | |
|         //
 | |
|         // NOTE: From 0 to DataOffset of NextVariable is reserved for Variable Header and Name.
 | |
|         // From DataOffset of NextVariable is to save the existing variable data.
 | |
|         //
 | |
|         DataOffset = GetVariableDataOffset (CacheVariable->CurrPtr);
 | |
|         BufferForMerge = (UINT8 *) ((UINTN) NextVariable + DataOffset);
 | |
|         CopyMem (BufferForMerge, (UINT8 *) ((UINTN) CacheVariable->CurrPtr + DataOffset), DataSizeOfVariable (CacheVariable->CurrPtr));
 | |
| 
 | |
|         //
 | |
|         // Set Max Common/Auth Variable Data Size as default MaxDataSize.
 | |
|         //
 | |
|         if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|           MaxDataSize = mVariableModuleGlobal->MaxAuthVariableSize - DataOffset;
 | |
|         } else {
 | |
|           MaxDataSize = mVariableModuleGlobal->MaxVariableSize - DataOffset;
 | |
|         }
 | |
| 
 | |
|         //
 | |
|         // Append the new data to the end of existing data.
 | |
|         // Max Harware error record variable data size is different from common/auth variable.
 | |
|         //
 | |
|         if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|           MaxDataSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - DataOffset;
 | |
|         }
 | |
| 
 | |
|         if (DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize > MaxDataSize) {
 | |
|           //
 | |
|           // Existing data size + new data size exceed maximum variable size limitation.
 | |
|           //
 | |
|           Status = EFI_INVALID_PARAMETER;
 | |
|           goto Done;
 | |
|         }
 | |
|         CopyMem ((UINT8*) ((UINTN) BufferForMerge + DataSizeOfVariable (CacheVariable->CurrPtr)), Data, DataSize);
 | |
|         MergedBufSize = DataSizeOfVariable (CacheVariable->CurrPtr) + DataSize;
 | |
| 
 | |
|         //
 | |
|         // BufferForMerge(from DataOffset of NextVariable) has included the merged existing and new data.
 | |
|         //
 | |
|         Data      = BufferForMerge;
 | |
|         DataSize  = MergedBufSize;
 | |
|         DataReady = TRUE;
 | |
|       }
 | |
| 
 | |
|       //
 | |
|       // Mark the old variable as in delete transition.
 | |
|       //
 | |
|       State = CacheVariable->CurrPtr->State;
 | |
|       State &= VAR_IN_DELETED_TRANSITION;
 | |
| 
 | |
|       Status = UpdateVariableStore (
 | |
|                  &mVariableModuleGlobal->VariableGlobal,
 | |
|                  Variable->Volatile,
 | |
|                  FALSE,
 | |
|                  Fvb,
 | |
|                  (UINTN) &Variable->CurrPtr->State,
 | |
|                  sizeof (UINT8),
 | |
|                  &State
 | |
|                  );
 | |
|       if (EFI_ERROR (Status)) {
 | |
|         goto Done;
 | |
|       }
 | |
|       if (!Variable->Volatile) {
 | |
|         CacheVariable->CurrPtr->State = State;
 | |
|       }
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     // Not found existing variable. Create a new variable.
 | |
|     //
 | |
| 
 | |
|     if ((DataSize == 0) && ((Attributes & EFI_VARIABLE_APPEND_WRITE) != 0)) {
 | |
|       Status = EFI_SUCCESS;
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Make sure we are trying to create a new variable.
 | |
|     // Setting a data variable with zero DataSize or no access attributes means to delete it.
 | |
|     //
 | |
|     if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {
 | |
|       Status = EFI_NOT_FOUND;
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Only variable have NV|RT attribute can be created in Runtime.
 | |
|     //
 | |
|     if (AtRuntime () &&
 | |
|         (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) {
 | |
|       Status = EFI_INVALID_PARAMETER;
 | |
|       goto Done;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Function part - create a new variable and copy the data.
 | |
|   // Both update a variable and create a variable will come here.
 | |
|   //
 | |
|   NextVariable->StartId     = VARIABLE_DATA;
 | |
|   //
 | |
|   // NextVariable->State = VAR_ADDED;
 | |
|   //
 | |
|   NextVariable->Reserved        = 0;
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable;
 | |
|     AuthVariable->PubKeyIndex    = KeyIndex;
 | |
|     AuthVariable->MonotonicCount = MonotonicCount;
 | |
|     ZeroMem (&AuthVariable->TimeStamp, sizeof (EFI_TIME));
 | |
| 
 | |
|     if (((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) != 0) &&
 | |
|         (TimeStamp != NULL)) {
 | |
|       if ((Attributes & EFI_VARIABLE_APPEND_WRITE) == 0) {
 | |
|         CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
 | |
|       } else {
 | |
|         //
 | |
|         // In the case when the EFI_VARIABLE_APPEND_WRITE attribute is set, only
 | |
|         // when the new TimeStamp value is later than the current timestamp associated
 | |
|         // with the variable, we need associate the new timestamp with the updated value.
 | |
|         //
 | |
|         if (Variable->CurrPtr != NULL) {
 | |
|           if (VariableCompareTimeStampInternal (&(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), TimeStamp)) {
 | |
|             CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // The EFI_VARIABLE_APPEND_WRITE attribute will never be set in the returned
 | |
|   // Attributes bitmask parameter of a GetVariable() call.
 | |
|   //
 | |
|   NextVariable->Attributes  = Attributes & (~EFI_VARIABLE_APPEND_WRITE);
 | |
| 
 | |
|   VarNameOffset                 = GetVariableHeaderSize ();
 | |
|   VarNameSize                   = StrSize (VariableName);
 | |
|   CopyMem (
 | |
|     (UINT8 *) ((UINTN) NextVariable + VarNameOffset),
 | |
|     VariableName,
 | |
|     VarNameSize
 | |
|     );
 | |
|   VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);
 | |
| 
 | |
|   //
 | |
|   // If DataReady is TRUE, it means the variable data has been saved into
 | |
|   // NextVariable during EFI_VARIABLE_APPEND_WRITE operation preparation.
 | |
|   //
 | |
|   if (!DataReady) {
 | |
|     CopyMem (
 | |
|       (UINT8 *) ((UINTN) NextVariable + VarDataOffset),
 | |
|       Data,
 | |
|       DataSize
 | |
|       );
 | |
|   }
 | |
| 
 | |
|   CopyMem (GetVendorGuidPtr (NextVariable), VendorGuid, sizeof (EFI_GUID));
 | |
|   //
 | |
|   // There will be pad bytes after Data, the NextVariable->NameSize and
 | |
|   // NextVariable->DataSize should not include pad size so that variable
 | |
|   // service can get actual size in GetVariable.
 | |
|   //
 | |
|   SetNameSizeOfVariable (NextVariable, VarNameSize);
 | |
|   SetDataSizeOfVariable (NextVariable, DataSize);
 | |
| 
 | |
|   //
 | |
|   // The actual size of the variable that stores in storage should
 | |
|   // include pad size.
 | |
|   //
 | |
|   VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);
 | |
|   if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
 | |
|     //
 | |
|     // Create a nonvolatile variable.
 | |
|     //
 | |
|     Volatile = FALSE;
 | |
| 
 | |
|     IsCommonVariable = FALSE;
 | |
|     IsCommonUserVariable = FALSE;
 | |
|     if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) {
 | |
|       IsCommonVariable = TRUE;
 | |
|       IsCommonUserVariable = IsUserVariable (NextVariable);
 | |
|     }
 | |
|     if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0)
 | |
|       && ((VarSize + mVariableModuleGlobal->HwErrVariableTotalSize) > PcdGet32 (PcdHwErrStorageSize)))
 | |
|       || (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace))
 | |
|       || (IsCommonVariable && AtRuntime () && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace))
 | |
|       || (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace))) {
 | |
|       if (AtRuntime ()) {
 | |
|         if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
 | |
|           RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize);
 | |
|         }
 | |
|         if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonRuntimeVariableSpace)) {
 | |
|           RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize);
 | |
|         }
 | |
|         Status = EFI_OUT_OF_RESOURCES;
 | |
|         goto Done;
 | |
|       }
 | |
|       //
 | |
|       // Perform garbage collection & reclaim operation, and integrate the new variable at the same time.
 | |
|       //
 | |
|       Status = Reclaim (
 | |
|                  mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
 | |
|                  &mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | |
|                  FALSE,
 | |
|                  Variable,
 | |
|                  NextVariable,
 | |
|                  HEADER_ALIGN (VarSize)
 | |
|                  );
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         //
 | |
|         // The new variable has been integrated successfully during reclaiming.
 | |
|         //
 | |
|         if (Variable->CurrPtr != NULL) {
 | |
|           CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr));
 | |
|           CacheVariable->InDeletedTransitionPtr = NULL;
 | |
|         }
 | |
|         UpdateVariableInfo (VariableName, VendorGuid, FALSE, FALSE, TRUE, FALSE, FALSE);
 | |
|         FlushHobVariableToFlash (VariableName, VendorGuid);
 | |
|       } else {
 | |
|         if (IsCommonUserVariable && ((VarSize + mVariableModuleGlobal->CommonUserVariableTotalSize) > mVariableModuleGlobal->CommonMaxUserVariableSpace)) {
 | |
|           RecordVarErrorFlag (VAR_ERROR_FLAG_USER_ERROR, VariableName, VendorGuid, Attributes, VarSize);
 | |
|         }
 | |
|         if (IsCommonVariable && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > mVariableModuleGlobal->CommonVariableSpace)) {
 | |
|           RecordVarErrorFlag (VAR_ERROR_FLAG_SYSTEM_ERROR, VariableName, VendorGuid, Attributes, VarSize);
 | |
|         }
 | |
|       }
 | |
|       goto Done;
 | |
|     }
 | |
|     //
 | |
|     // Four steps
 | |
|     // 1. Write variable header
 | |
|     // 2. Set variable state to header valid
 | |
|     // 3. Write variable data
 | |
|     // 4. Set variable state to valid
 | |
|     //
 | |
|     //
 | |
|     // Step 1:
 | |
|     //
 | |
|     CacheOffset = mVariableModuleGlobal->NonVolatileLastVariableOffset;
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                FALSE,
 | |
|                TRUE,
 | |
|                Fvb,
 | |
|                mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | |
|                (UINT32) GetVariableHeaderSize (),
 | |
|                (UINT8 *) NextVariable
 | |
|                );
 | |
| 
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Step 2:
 | |
|     //
 | |
|     NextVariable->State = VAR_HEADER_VALID_ONLY;
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                FALSE,
 | |
|                TRUE,
 | |
|                Fvb,
 | |
|                mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),
 | |
|                sizeof (UINT8),
 | |
|                &NextVariable->State
 | |
|                );
 | |
| 
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Done;
 | |
|     }
 | |
|     //
 | |
|     // Step 3:
 | |
|     //
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                FALSE,
 | |
|                TRUE,
 | |
|                Fvb,
 | |
|                mVariableModuleGlobal->NonVolatileLastVariableOffset + GetVariableHeaderSize (),
 | |
|                (UINT32) (VarSize - GetVariableHeaderSize ()),
 | |
|                (UINT8 *) NextVariable + GetVariableHeaderSize ()
 | |
|                );
 | |
| 
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Done;
 | |
|     }
 | |
|     //
 | |
|     // Step 4:
 | |
|     //
 | |
|     NextVariable->State = VAR_ADDED;
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                FALSE,
 | |
|                TRUE,
 | |
|                Fvb,
 | |
|                mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),
 | |
|                sizeof (UINT8),
 | |
|                &NextVariable->State
 | |
|                );
 | |
| 
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     mVariableModuleGlobal->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize);
 | |
| 
 | |
|     if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
 | |
|       mVariableModuleGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VarSize);
 | |
|     } else {
 | |
|       mVariableModuleGlobal->CommonVariableTotalSize += HEADER_ALIGN (VarSize);
 | |
|       if (IsCommonUserVariable) {
 | |
|         mVariableModuleGlobal->CommonUserVariableTotalSize += HEADER_ALIGN (VarSize);
 | |
|       }
 | |
|     }
 | |
|     //
 | |
|     // update the memory copy of Flash region.
 | |
|     //
 | |
|     CopyMem ((UINT8 *)mNvVariableCache + CacheOffset, (UINT8 *)NextVariable, VarSize);
 | |
|   } else {
 | |
|     //
 | |
|     // Create a volatile variable.
 | |
|     //
 | |
|     Volatile = TRUE;
 | |
| 
 | |
|     if ((UINT32) (VarSize + mVariableModuleGlobal->VolatileLastVariableOffset) >
 | |
|         ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {
 | |
|       //
 | |
|       // Perform garbage collection & reclaim operation, and integrate the new variable at the same time.
 | |
|       //
 | |
|       Status = Reclaim (
 | |
|                  mVariableModuleGlobal->VariableGlobal.VolatileVariableBase,
 | |
|                  &mVariableModuleGlobal->VolatileLastVariableOffset,
 | |
|                  TRUE,
 | |
|                  Variable,
 | |
|                  NextVariable,
 | |
|                  HEADER_ALIGN (VarSize)
 | |
|                  );
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         //
 | |
|         // The new variable has been integrated successfully during reclaiming.
 | |
|         //
 | |
|         if (Variable->CurrPtr != NULL) {
 | |
|           CacheVariable->CurrPtr = (VARIABLE_HEADER *)((UINTN) CacheVariable->StartPtr + ((UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr));
 | |
|           CacheVariable->InDeletedTransitionPtr = NULL;
 | |
|         }
 | |
|         UpdateVariableInfo (VariableName, VendorGuid, TRUE, FALSE, TRUE, FALSE, FALSE);
 | |
|       }
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     NextVariable->State = VAR_ADDED;
 | |
|     Status = UpdateVariableStore (
 | |
|                &mVariableModuleGlobal->VariableGlobal,
 | |
|                TRUE,
 | |
|                TRUE,
 | |
|                Fvb,
 | |
|                mVariableModuleGlobal->VolatileLastVariableOffset,
 | |
|                (UINT32) VarSize,
 | |
|                (UINT8 *) NextVariable
 | |
|                );
 | |
| 
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     mVariableModuleGlobal->VolatileLastVariableOffset += HEADER_ALIGN (VarSize);
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Mark the old variable as deleted.
 | |
|   //
 | |
|   if (!EFI_ERROR (Status) && Variable->CurrPtr != NULL) {
 | |
|     if (Variable->InDeletedTransitionPtr != NULL) {
 | |
|       //
 | |
|       // Both ADDED and IN_DELETED_TRANSITION old variable are present,
 | |
|       // set IN_DELETED_TRANSITION one to DELETED state first.
 | |
|       //
 | |
|       ASSERT (CacheVariable->InDeletedTransitionPtr != NULL);
 | |
|       State = CacheVariable->InDeletedTransitionPtr->State;
 | |
|       State &= VAR_DELETED;
 | |
|       Status = UpdateVariableStore (
 | |
|                  &mVariableModuleGlobal->VariableGlobal,
 | |
|                  Variable->Volatile,
 | |
|                  FALSE,
 | |
|                  Fvb,
 | |
|                  (UINTN) &Variable->InDeletedTransitionPtr->State,
 | |
|                  sizeof (UINT8),
 | |
|                  &State
 | |
|                  );
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         if (!Variable->Volatile) {
 | |
|           CacheVariable->InDeletedTransitionPtr->State = State;
 | |
|         }
 | |
|       } else {
 | |
|         goto Done;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     State = Variable->CurrPtr->State;
 | |
|     State &= VAR_DELETED;
 | |
| 
 | |
|     Status = UpdateVariableStore (
 | |
|              &mVariableModuleGlobal->VariableGlobal,
 | |
|              Variable->Volatile,
 | |
|              FALSE,
 | |
|              Fvb,
 | |
|              (UINTN) &Variable->CurrPtr->State,
 | |
|              sizeof (UINT8),
 | |
|              &State
 | |
|              );
 | |
|     if (!EFI_ERROR (Status) && !Variable->Volatile) {
 | |
|       CacheVariable->CurrPtr->State = State;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
 | |
|     if (!Volatile) {
 | |
|       FlushHobVariableToFlash (VariableName, VendorGuid);
 | |
|     }
 | |
|   }
 | |
| 
 | |
| Done:
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code finds variable in storage blocks (Volatile or Non-Volatile).
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode, and datasize is external input.
 | |
|   This function will do basic validation, before parse the data.
 | |
| 
 | |
|   @param VariableName               Name of Variable to be found.
 | |
|   @param VendorGuid                 Variable vendor GUID.
 | |
|   @param Attributes                 Attribute value of the variable found.
 | |
|   @param DataSize                   Size of Data found. If size is less than the
 | |
|                                     data, this value contains the required size.
 | |
|   @param Data                       The buffer to return the contents of the variable. May be NULL
 | |
|                                     with a zero DataSize in order to determine the size buffer needed.
 | |
| 
 | |
|   @return EFI_INVALID_PARAMETER     Invalid parameter.
 | |
|   @return EFI_SUCCESS               Find the specified variable.
 | |
|   @return EFI_NOT_FOUND             Not found.
 | |
|   @return EFI_BUFFER_TO_SMALL       DataSize is too small for the result.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceGetVariable (
 | |
|   IN      CHAR16            *VariableName,
 | |
|   IN      EFI_GUID          *VendorGuid,
 | |
|   OUT     UINT32            *Attributes OPTIONAL,
 | |
|   IN OUT  UINTN             *DataSize,
 | |
|   OUT     VOID              *Data OPTIONAL
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS              Status;
 | |
|   VARIABLE_POINTER_TRACK  Variable;
 | |
|   UINTN                   VarDataSize;
 | |
| 
 | |
|   if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if (VariableName[0] == 0) {
 | |
|     return EFI_NOT_FOUND;
 | |
|   }
 | |
| 
 | |
|   AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|   if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {
 | |
|     goto Done;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Get data size
 | |
|   //
 | |
|   VarDataSize = DataSizeOfVariable (Variable.CurrPtr);
 | |
|   ASSERT (VarDataSize != 0);
 | |
| 
 | |
|   if (*DataSize >= VarDataSize) {
 | |
|     if (Data == NULL) {
 | |
|       Status = EFI_INVALID_PARAMETER;
 | |
|       goto Done;
 | |
|     }
 | |
| 
 | |
|     CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);
 | |
|     if (Attributes != NULL) {
 | |
|       *Attributes = Variable.CurrPtr->Attributes;
 | |
|     }
 | |
| 
 | |
|     *DataSize = VarDataSize;
 | |
|     UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);
 | |
| 
 | |
|     Status = EFI_SUCCESS;
 | |
|     goto Done;
 | |
|   } else {
 | |
|     *DataSize = VarDataSize;
 | |
|     Status = EFI_BUFFER_TOO_SMALL;
 | |
|     goto Done;
 | |
|   }
 | |
| 
 | |
| Done:
 | |
|   ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This code Finds the Next available variable.
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
 | |
| 
 | |
|   @param[in]  VariableName  Pointer to variable name.
 | |
|   @param[in]  VendorGuid    Variable Vendor Guid.
 | |
|   @param[out] VariablePtr   Pointer to variable header address.
 | |
| 
 | |
|   @return EFI_SUCCESS       Find the specified variable.
 | |
|   @return EFI_NOT_FOUND     Not found.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceGetNextVariableInternal (
 | |
|   IN  CHAR16                *VariableName,
 | |
|   IN  EFI_GUID              *VendorGuid,
 | |
|   OUT VARIABLE_HEADER       **VariablePtr
 | |
|   )
 | |
| {
 | |
|   VARIABLE_STORE_TYPE     Type;
 | |
|   VARIABLE_POINTER_TRACK  Variable;
 | |
|   VARIABLE_POINTER_TRACK  VariableInHob;
 | |
|   VARIABLE_POINTER_TRACK  VariablePtrTrack;
 | |
|   EFI_STATUS              Status;
 | |
|   VARIABLE_STORE_HEADER   *VariableStoreHeader[VariableStoreTypeMax];
 | |
| 
 | |
|   Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|   if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {
 | |
|     goto Done;
 | |
|   }
 | |
| 
 | |
|   if (VariableName[0] != 0) {
 | |
|     //
 | |
|     // If variable name is not NULL, get next variable.
 | |
|     //
 | |
|     Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // 0: Volatile, 1: HOB, 2: Non-Volatile.
 | |
|   // The index and attributes mapping must be kept in this order as FindVariable
 | |
|   // makes use of this mapping to implement search algorithm.
 | |
|   //
 | |
|   VariableStoreHeader[VariableStoreTypeVolatile] = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;
 | |
|   VariableStoreHeader[VariableStoreTypeHob]      = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;
 | |
|   VariableStoreHeader[VariableStoreTypeNv]       = mNvVariableCache;
 | |
| 
 | |
|   while (TRUE) {
 | |
|     //
 | |
|     // Switch from Volatile to HOB, to Non-Volatile.
 | |
|     //
 | |
|     while (!IsValidVariableHeader (Variable.CurrPtr, Variable.EndPtr)) {
 | |
|       //
 | |
|       // Find current storage index
 | |
|       //
 | |
|       for (Type = (VARIABLE_STORE_TYPE) 0; Type < VariableStoreTypeMax; Type++) {
 | |
|         if ((VariableStoreHeader[Type] != NULL) && (Variable.StartPtr == GetStartPointer (VariableStoreHeader[Type]))) {
 | |
|           break;
 | |
|         }
 | |
|       }
 | |
|       ASSERT (Type < VariableStoreTypeMax);
 | |
|       //
 | |
|       // Switch to next storage
 | |
|       //
 | |
|       for (Type++; Type < VariableStoreTypeMax; Type++) {
 | |
|         if (VariableStoreHeader[Type] != NULL) {
 | |
|           break;
 | |
|         }
 | |
|       }
 | |
|       //
 | |
|       // Capture the case that
 | |
|       // 1. current storage is the last one, or
 | |
|       // 2. no further storage
 | |
|       //
 | |
|       if (Type == VariableStoreTypeMax) {
 | |
|         Status = EFI_NOT_FOUND;
 | |
|         goto Done;
 | |
|       }
 | |
|       Variable.StartPtr = GetStartPointer (VariableStoreHeader[Type]);
 | |
|       Variable.EndPtr   = GetEndPointer   (VariableStoreHeader[Type]);
 | |
|       Variable.CurrPtr  = Variable.StartPtr;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Variable is found
 | |
|     //
 | |
|     if (Variable.CurrPtr->State == VAR_ADDED || Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
|       if (!AtRuntime () || ((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
 | |
|         if (Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
|           //
 | |
|           // If it is a IN_DELETED_TRANSITION variable,
 | |
|           // and there is also a same ADDED one at the same time,
 | |
|           // don't return it.
 | |
|           //
 | |
|           VariablePtrTrack.StartPtr = Variable.StartPtr;
 | |
|           VariablePtrTrack.EndPtr = Variable.EndPtr;
 | |
|           Status = FindVariableEx (
 | |
|                      GetVariableNamePtr (Variable.CurrPtr),
 | |
|                      GetVendorGuidPtr (Variable.CurrPtr),
 | |
|                      FALSE,
 | |
|                      &VariablePtrTrack
 | |
|                      );
 | |
|           if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State == VAR_ADDED) {
 | |
|             Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
 | |
|             continue;
 | |
|           }
 | |
|         }
 | |
| 
 | |
|         //
 | |
|         // Don't return NV variable when HOB overrides it
 | |
|         //
 | |
|         if ((VariableStoreHeader[VariableStoreTypeHob] != NULL) && (VariableStoreHeader[VariableStoreTypeNv] != NULL) &&
 | |
|             (Variable.StartPtr == GetStartPointer (VariableStoreHeader[VariableStoreTypeNv]))
 | |
|            ) {
 | |
|           VariableInHob.StartPtr = GetStartPointer (VariableStoreHeader[VariableStoreTypeHob]);
 | |
|           VariableInHob.EndPtr   = GetEndPointer   (VariableStoreHeader[VariableStoreTypeHob]);
 | |
|           Status = FindVariableEx (
 | |
|                      GetVariableNamePtr (Variable.CurrPtr),
 | |
|                      GetVendorGuidPtr (Variable.CurrPtr),
 | |
|                      FALSE,
 | |
|                      &VariableInHob
 | |
|                      );
 | |
|           if (!EFI_ERROR (Status)) {
 | |
|             Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
 | |
|             continue;
 | |
|           }
 | |
|         }
 | |
| 
 | |
|         *VariablePtr = Variable.CurrPtr;
 | |
|         Status = EFI_SUCCESS;
 | |
|         goto Done;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);
 | |
|   }
 | |
| 
 | |
| Done:
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code Finds the Next available variable.
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
 | |
| 
 | |
|   @param VariableNameSize           Size of the variable name.
 | |
|   @param VariableName               Pointer to variable name.
 | |
|   @param VendorGuid                 Variable Vendor Guid.
 | |
| 
 | |
|   @return EFI_INVALID_PARAMETER     Invalid parameter.
 | |
|   @return EFI_SUCCESS               Find the specified variable.
 | |
|   @return EFI_NOT_FOUND             Not found.
 | |
|   @return EFI_BUFFER_TO_SMALL       DataSize is too small for the result.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceGetNextVariableName (
 | |
|   IN OUT  UINTN             *VariableNameSize,
 | |
|   IN OUT  CHAR16            *VariableName,
 | |
|   IN OUT  EFI_GUID          *VendorGuid
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS              Status;
 | |
|   UINTN                   VarNameSize;
 | |
|   VARIABLE_HEADER         *VariablePtr;
 | |
| 
 | |
|   if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   Status = VariableServiceGetNextVariableInternal (VariableName, VendorGuid, &VariablePtr);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     VarNameSize = NameSizeOfVariable (VariablePtr);
 | |
|     ASSERT (VarNameSize != 0);
 | |
|     if (VarNameSize <= *VariableNameSize) {
 | |
|       CopyMem (VariableName, GetVariableNamePtr (VariablePtr), VarNameSize);
 | |
|       CopyMem (VendorGuid, GetVendorGuidPtr (VariablePtr), sizeof (EFI_GUID));
 | |
|       Status = EFI_SUCCESS;
 | |
|     } else {
 | |
|       Status = EFI_BUFFER_TOO_SMALL;
 | |
|     }
 | |
| 
 | |
|     *VariableNameSize = VarNameSize;
 | |
|   }
 | |
| 
 | |
|   ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code sets variable in storage blocks (Volatile or Non-Volatile).
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode, and datasize and data are external input.
 | |
|   This function will do basic validation, before parse the data.
 | |
|   This function will parse the authentication carefully to avoid security issues, like
 | |
|   buffer overflow, integer overflow.
 | |
|   This function will check attribute carefully to avoid authentication bypass.
 | |
| 
 | |
|   @param VariableName                     Name of Variable to be found.
 | |
|   @param VendorGuid                       Variable vendor GUID.
 | |
|   @param Attributes                       Attribute value of the variable found
 | |
|   @param DataSize                         Size of Data found. If size is less than the
 | |
|                                           data, this value contains the required size.
 | |
|   @param Data                             Data pointer.
 | |
| 
 | |
|   @return EFI_INVALID_PARAMETER           Invalid parameter.
 | |
|   @return EFI_SUCCESS                     Set successfully.
 | |
|   @return EFI_OUT_OF_RESOURCES            Resource not enough to set variable.
 | |
|   @return EFI_NOT_FOUND                   Not found.
 | |
|   @return EFI_WRITE_PROTECTED             Variable is read-only.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceSetVariable (
 | |
|   IN CHAR16                  *VariableName,
 | |
|   IN EFI_GUID                *VendorGuid,
 | |
|   IN UINT32                  Attributes,
 | |
|   IN UINTN                   DataSize,
 | |
|   IN VOID                    *Data
 | |
|   )
 | |
| {
 | |
|   VARIABLE_POINTER_TRACK              Variable;
 | |
|   EFI_STATUS                          Status;
 | |
|   VARIABLE_HEADER                     *NextVariable;
 | |
|   EFI_PHYSICAL_ADDRESS                Point;
 | |
|   UINTN                               PayloadSize;
 | |
| 
 | |
|   //
 | |
|   // Check input parameters.
 | |
|   //
 | |
|   if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if (DataSize != 0 && Data == NULL) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check for reserverd bit in variable attribute.
 | |
|   //
 | |
|   if ((Attributes & (~EFI_VARIABLE_ATTRIBUTES_MASK)) != 0) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   //  Make sure if runtime bit is set, boot service bit is set also.
 | |
|   //
 | |
|   if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|     if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) {
 | |
|       //
 | |
|       // Not support authenticated variable write.
 | |
|       //
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
|   } else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
 | |
|     if (PcdGet32 (PcdHwErrStorageSize) == 0) {
 | |
|       //
 | |
|       // Not support harware error record variable variable.
 | |
|       //
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS and EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute
 | |
|   // cannot be set both.
 | |
|   //
 | |
|   if (((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS)
 | |
|      && ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS)) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) {
 | |
|     if (DataSize < AUTHINFO_SIZE) {
 | |
|       //
 | |
|       // Try to write Authenticated Variable without AuthInfo.
 | |
|       //
 | |
|       return EFI_SECURITY_VIOLATION;
 | |
|     }
 | |
|     PayloadSize = DataSize - AUTHINFO_SIZE;
 | |
|   } else if ((Attributes & EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS) {
 | |
|     //
 | |
|     // Sanity check for EFI_VARIABLE_AUTHENTICATION_2 descriptor.
 | |
|     //
 | |
|     if (DataSize < OFFSET_OF_AUTHINFO2_CERT_DATA ||
 | |
|       ((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength > DataSize - (OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) ||
 | |
|       ((EFI_VARIABLE_AUTHENTICATION_2 *) Data)->AuthInfo.Hdr.dwLength < OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData)) {
 | |
|       return EFI_SECURITY_VIOLATION;
 | |
|     }
 | |
|     PayloadSize = DataSize - AUTHINFO2_SIZE (Data);
 | |
|   } else {
 | |
|     PayloadSize = DataSize;
 | |
|   }
 | |
| 
 | |
|   if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){
 | |
|     //
 | |
|     // Prevent whole variable size overflow
 | |
|     //
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   //  The size of the VariableName, including the Unicode Null in bytes plus
 | |
|   //  the DataSize is limited to maximum size of PcdGet32 (PcdMaxHardwareErrorVariableSize)
 | |
|   //  bytes for HwErrRec#### variable.
 | |
|   //
 | |
|   if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|     if (StrSize (VariableName) + PayloadSize > PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize ()) {
 | |
|       return EFI_INVALID_PARAMETER;
 | |
|     }
 | |
|   } else {
 | |
|     //
 | |
|     //  The size of the VariableName, including the Unicode Null in bytes plus
 | |
|     //  the DataSize is limited to maximum size of Max(Auth)VariableSize bytes.
 | |
|     //
 | |
|     if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|       if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ()) {
 | |
|         return EFI_INVALID_PARAMETER;
 | |
|       }
 | |
|     } else {
 | |
|       if (StrSize (VariableName) + PayloadSize > mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize ()) {
 | |
|         return EFI_INVALID_PARAMETER;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Special Handling for MOR Lock variable.
 | |
|   //
 | |
|   Status = SetVariableCheckHandlerMor (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize));
 | |
|   if (Status == EFI_ALREADY_STARTED) {
 | |
|     //
 | |
|     // EFI_ALREADY_STARTED means the SetVariable() action is handled inside of SetVariableCheckHandlerMor().
 | |
|     // Variable driver can just return SUCCESS.
 | |
|     //
 | |
|     return EFI_SUCCESS;
 | |
|   }
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   Status = VarCheckLibSetVariableCheck (VariableName, VendorGuid, Attributes, PayloadSize, (VOID *) ((UINTN) Data + DataSize - PayloadSize), mRequestSource);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   //
 | |
|   // Consider reentrant in MCA/INIT/NMI. It needs be reupdated.
 | |
|   //
 | |
|   if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {
 | |
|     Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;
 | |
|     //
 | |
|     // Parse non-volatile variable data and get last variable offset.
 | |
|     //
 | |
|     NextVariable  = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);
 | |
|     while (IsValidVariableHeader (NextVariable, GetEndPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point))) {
 | |
|       NextVariable = GetNextVariablePtr (NextVariable);
 | |
|     }
 | |
|     mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check whether the input variable is already existed.
 | |
|   //
 | |
|   Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal, TRUE);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     if (((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) && AtRuntime ()) {
 | |
|       Status = EFI_WRITE_PROTECTED;
 | |
|       goto Done;
 | |
|     }
 | |
|     if (Attributes != 0 && (Attributes & (~EFI_VARIABLE_APPEND_WRITE)) != Variable.CurrPtr->Attributes) {
 | |
|       //
 | |
|       // If a preexisting variable is rewritten with different attributes, SetVariable() shall not
 | |
|       // modify the variable and shall return EFI_INVALID_PARAMETER. Two exceptions to this rule:
 | |
|       // 1. No access attributes specified
 | |
|       // 2. The only attribute differing is EFI_VARIABLE_APPEND_WRITE
 | |
|       //
 | |
|       Status = EFI_INVALID_PARAMETER;
 | |
|       DEBUG ((EFI_D_INFO, "[Variable]: Rewritten a preexisting variable(0x%08x) with different attributes(0x%08x) - %g:%s\n", Variable.CurrPtr->Attributes, Attributes, VendorGuid, VariableName));
 | |
|       goto Done;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (!FeaturePcdGet (PcdUefiVariableDefaultLangDeprecate)) {
 | |
|     //
 | |
|     // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang.
 | |
|     //
 | |
|     Status = AutoUpdateLangVariable (VariableName, Data, DataSize);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       //
 | |
|       // The auto update operation failed, directly return to avoid inconsistency between PlatformLang and Lang.
 | |
|       //
 | |
|       goto Done;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthSupport) {
 | |
|     Status = AuthVariableLibProcessVariable (VariableName, VendorGuid, Data, DataSize, Attributes);
 | |
|   } else {
 | |
|     Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, 0, 0, &Variable, NULL);
 | |
|   }
 | |
| 
 | |
| Done:
 | |
|   InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);
 | |
|   ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   if (!AtRuntime ()) {
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       SecureBootHook (
 | |
|         VariableName,
 | |
|         VendorGuid
 | |
|         );
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code returns information about the EFI variables.
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
 | |
| 
 | |
|   @param Attributes                     Attributes bitmask to specify the type of variables
 | |
|                                         on which to return information.
 | |
|   @param MaximumVariableStorageSize     Pointer to the maximum size of the storage space available
 | |
|                                         for the EFI variables associated with the attributes specified.
 | |
|   @param RemainingVariableStorageSize   Pointer to the remaining size of the storage space available
 | |
|                                         for EFI variables associated with the attributes specified.
 | |
|   @param MaximumVariableSize            Pointer to the maximum size of an individual EFI variables
 | |
|                                         associated with the attributes specified.
 | |
| 
 | |
|   @return EFI_SUCCESS                   Query successfully.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceQueryVariableInfoInternal (
 | |
|   IN  UINT32                 Attributes,
 | |
|   OUT UINT64                 *MaximumVariableStorageSize,
 | |
|   OUT UINT64                 *RemainingVariableStorageSize,
 | |
|   OUT UINT64                 *MaximumVariableSize
 | |
|   )
 | |
| {
 | |
|   VARIABLE_HEADER        *Variable;
 | |
|   VARIABLE_HEADER        *NextVariable;
 | |
|   UINT64                 VariableSize;
 | |
|   VARIABLE_STORE_HEADER  *VariableStoreHeader;
 | |
|   UINT64                 CommonVariableTotalSize;
 | |
|   UINT64                 HwErrVariableTotalSize;
 | |
|   EFI_STATUS             Status;
 | |
|   VARIABLE_POINTER_TRACK VariablePtrTrack;
 | |
| 
 | |
|   CommonVariableTotalSize = 0;
 | |
|   HwErrVariableTotalSize = 0;
 | |
| 
 | |
|   if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
 | |
|     //
 | |
|     // Query is Volatile related.
 | |
|     //
 | |
|     VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);
 | |
|   } else {
 | |
|     //
 | |
|     // Query is Non-Volatile related.
 | |
|     //
 | |
|     VariableStoreHeader = mNvVariableCache;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize
 | |
|   // with the storage size (excluding the storage header size).
 | |
|   //
 | |
|   *MaximumVariableStorageSize   = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);
 | |
| 
 | |
|   //
 | |
|   // Harware error record variable needs larger size.
 | |
|   //
 | |
|   if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|     *MaximumVariableStorageSize = PcdGet32 (PcdHwErrStorageSize);
 | |
|     *MaximumVariableSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - GetVariableHeaderSize ();
 | |
|   } else {
 | |
|     if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
 | |
|       if (AtRuntime ()) {
 | |
|         *MaximumVariableStorageSize = mVariableModuleGlobal->CommonRuntimeVariableSpace;
 | |
|       } else {
 | |
|         *MaximumVariableStorageSize = mVariableModuleGlobal->CommonVariableSpace;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Let *MaximumVariableSize be Max(Auth)VariableSize with the exception of the variable header size.
 | |
|     //
 | |
|     if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|       *MaximumVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ();
 | |
|     } else {
 | |
|       *MaximumVariableSize = mVariableModuleGlobal->MaxVariableSize - GetVariableHeaderSize ();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Point to the starting address of the variables.
 | |
|   //
 | |
|   Variable = GetStartPointer (VariableStoreHeader);
 | |
| 
 | |
|   //
 | |
|   // Now walk through the related variable store.
 | |
|   //
 | |
|   while (IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))) {
 | |
|     NextVariable = GetNextVariablePtr (Variable);
 | |
|     VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;
 | |
| 
 | |
|     if (AtRuntime ()) {
 | |
|       //
 | |
|       // We don't take the state of the variables in mind
 | |
|       // when calculating RemainingVariableStorageSize,
 | |
|       // since the space occupied by variables not marked with
 | |
|       // VAR_ADDED is not allowed to be reclaimed in Runtime.
 | |
|       //
 | |
|       if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|         HwErrVariableTotalSize += VariableSize;
 | |
|       } else {
 | |
|         CommonVariableTotalSize += VariableSize;
 | |
|       }
 | |
|     } else {
 | |
|       //
 | |
|       // Only care about Variables with State VAR_ADDED, because
 | |
|       // the space not marked as VAR_ADDED is reclaimable now.
 | |
|       //
 | |
|       if (Variable->State == VAR_ADDED) {
 | |
|         if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|           HwErrVariableTotalSize += VariableSize;
 | |
|         } else {
 | |
|           CommonVariableTotalSize += VariableSize;
 | |
|         }
 | |
|       } else if (Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | |
|         //
 | |
|         // If it is a IN_DELETED_TRANSITION variable,
 | |
|         // and there is not also a same ADDED one at the same time,
 | |
|         // this IN_DELETED_TRANSITION variable is valid.
 | |
|         //
 | |
|         VariablePtrTrack.StartPtr = GetStartPointer (VariableStoreHeader);
 | |
|         VariablePtrTrack.EndPtr   = GetEndPointer   (VariableStoreHeader);
 | |
|         Status = FindVariableEx (
 | |
|                    GetVariableNamePtr (Variable),
 | |
|                    GetVendorGuidPtr (Variable),
 | |
|                    FALSE,
 | |
|                    &VariablePtrTrack
 | |
|                    );
 | |
|         if (!EFI_ERROR (Status) && VariablePtrTrack.CurrPtr->State != VAR_ADDED) {
 | |
|           if ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|             HwErrVariableTotalSize += VariableSize;
 | |
|           } else {
 | |
|             CommonVariableTotalSize += VariableSize;
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Go to the next one.
 | |
|     //
 | |
|     Variable = NextVariable;
 | |
|   }
 | |
| 
 | |
|   if ((Attributes  & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){
 | |
|     *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;
 | |
|   } else {
 | |
|     if (*MaximumVariableStorageSize < CommonVariableTotalSize) {
 | |
|       *RemainingVariableStorageSize = 0;
 | |
|     } else {
 | |
|       *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (*RemainingVariableStorageSize < GetVariableHeaderSize ()) {
 | |
|     *MaximumVariableSize = 0;
 | |
|   } else if ((*RemainingVariableStorageSize - GetVariableHeaderSize ()) < *MaximumVariableSize) {
 | |
|     *MaximumVariableSize = *RemainingVariableStorageSize - GetVariableHeaderSize ();
 | |
|   }
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This code returns information about the EFI variables.
 | |
| 
 | |
|   Caution: This function may receive untrusted input.
 | |
|   This function may be invoked in SMM mode. This function will do basic validation, before parse the data.
 | |
| 
 | |
|   @param Attributes                     Attributes bitmask to specify the type of variables
 | |
|                                         on which to return information.
 | |
|   @param MaximumVariableStorageSize     Pointer to the maximum size of the storage space available
 | |
|                                         for the EFI variables associated with the attributes specified.
 | |
|   @param RemainingVariableStorageSize   Pointer to the remaining size of the storage space available
 | |
|                                         for EFI variables associated with the attributes specified.
 | |
|   @param MaximumVariableSize            Pointer to the maximum size of an individual EFI variables
 | |
|                                         associated with the attributes specified.
 | |
| 
 | |
|   @return EFI_INVALID_PARAMETER         An invalid combination of attribute bits was supplied.
 | |
|   @return EFI_SUCCESS                   Query successfully.
 | |
|   @return EFI_UNSUPPORTED               The attribute is not supported on this platform.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| EFIAPI
 | |
| VariableServiceQueryVariableInfo (
 | |
|   IN  UINT32                 Attributes,
 | |
|   OUT UINT64                 *MaximumVariableStorageSize,
 | |
|   OUT UINT64                 *RemainingVariableStorageSize,
 | |
|   OUT UINT64                 *MaximumVariableSize
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS             Status;
 | |
| 
 | |
|   if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   }
 | |
| 
 | |
|   if ((Attributes & EFI_VARIABLE_ATTRIBUTES_MASK) == 0) {
 | |
|     //
 | |
|     // Make sure the Attributes combination is supported by the platform.
 | |
|     //
 | |
|     return EFI_UNSUPPORTED;
 | |
|   } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
 | |
|     //
 | |
|     // Make sure if runtime bit is set, boot service bit is set also.
 | |
|     //
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   } else if (AtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) {
 | |
|     //
 | |
|     // Make sure RT Attribute is set if we are in Runtime phase.
 | |
|     //
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | |
|     //
 | |
|     // Make sure Hw Attribute is set with NV.
 | |
|     //
 | |
|     return EFI_INVALID_PARAMETER;
 | |
|   } else if ((Attributes & VARIABLE_ATTRIBUTE_AT_AW) != 0) {
 | |
|     if (!mVariableModuleGlobal->VariableGlobal.AuthSupport) {
 | |
|       //
 | |
|       // Not support authenticated variable write.
 | |
|       //
 | |
|       return EFI_UNSUPPORTED;
 | |
|     }
 | |
|   } else if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
 | |
|     if (PcdGet32 (PcdHwErrStorageSize) == 0) {
 | |
|       //
 | |
|       // Not support harware error record variable variable.
 | |
|       //
 | |
|       return EFI_UNSUPPORTED;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   Status = VariableServiceQueryVariableInfoInternal (
 | |
|              Attributes,
 | |
|              MaximumVariableStorageSize,
 | |
|              RemainingVariableStorageSize,
 | |
|              MaximumVariableSize
 | |
|              );
 | |
| 
 | |
|   ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function reclaims variable storage if free size is below the threshold.
 | |
| 
 | |
|   Caution: This function may be invoked at SMM mode.
 | |
|   Care must be taken to make sure not security issue.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| ReclaimForOS(
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                     Status;
 | |
|   UINTN                          RemainingCommonRuntimeVariableSpace;
 | |
|   UINTN                          RemainingHwErrVariableSpace;
 | |
|   STATIC BOOLEAN                 Reclaimed;
 | |
| 
 | |
|   //
 | |
|   // This function will be called only once at EndOfDxe or ReadyToBoot event.
 | |
|   //
 | |
|   if (Reclaimed) {
 | |
|     return;
 | |
|   }
 | |
|   Reclaimed = TRUE;
 | |
| 
 | |
|   Status  = EFI_SUCCESS;
 | |
| 
 | |
|   if (mVariableModuleGlobal->CommonRuntimeVariableSpace < mVariableModuleGlobal->CommonVariableTotalSize) {
 | |
|     RemainingCommonRuntimeVariableSpace = 0;
 | |
|   } else {
 | |
|     RemainingCommonRuntimeVariableSpace = mVariableModuleGlobal->CommonRuntimeVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize;
 | |
|   }
 | |
| 
 | |
|   RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize;
 | |
| 
 | |
|   //
 | |
|   // Check if the free area is below a threshold.
 | |
|   //
 | |
|   if (((RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxVariableSize) ||
 | |
|        (RemainingCommonRuntimeVariableSpace < mVariableModuleGlobal->MaxAuthVariableSize)) ||
 | |
|       ((PcdGet32 (PcdHwErrStorageSize) != 0) &&
 | |
|        (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){
 | |
|     Status = Reclaim (
 | |
|             mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
 | |
|             &mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | |
|             FALSE,
 | |
|             NULL,
 | |
|             NULL,
 | |
|             0
 | |
|             );
 | |
|     ASSERT_EFI_ERROR (Status);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Get non-volatile maximum variable size.
 | |
| 
 | |
|   @return Non-volatile maximum variable size.
 | |
| 
 | |
| **/
 | |
| UINTN
 | |
| GetNonVolatileMaxVariableSize (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   if (PcdGet32 (PcdHwErrStorageSize) != 0) {
 | |
|     return MAX (MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize)),
 | |
|                 PcdGet32 (PcdMaxHardwareErrorVariableSize));
 | |
|   } else {
 | |
|     return MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxAuthVariableSize));
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Init non-volatile variable store.
 | |
| 
 | |
|   @param[out] NvFvHeader        Output pointer to non-volatile FV header address.
 | |
| 
 | |
|   @retval EFI_SUCCESS           Function successfully executed.
 | |
|   @retval EFI_OUT_OF_RESOURCES  Fail to allocate enough memory resource.
 | |
|   @retval EFI_VOLUME_CORRUPTED  Variable Store or Firmware Volume for Variable Store is corrupted.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| InitNonVolatileVariableStore (
 | |
|   OUT EFI_FIRMWARE_VOLUME_HEADER    **NvFvHeader
 | |
|   )
 | |
| {
 | |
|   EFI_FIRMWARE_VOLUME_HEADER            *FvHeader;
 | |
|   VARIABLE_HEADER                       *Variable;
 | |
|   VARIABLE_HEADER                       *NextVariable;
 | |
|   EFI_PHYSICAL_ADDRESS                  VariableStoreBase;
 | |
|   UINT64                                VariableStoreLength;
 | |
|   UINTN                                 VariableSize;
 | |
|   EFI_HOB_GUID_TYPE                     *GuidHob;
 | |
|   EFI_PHYSICAL_ADDRESS                  NvStorageBase;
 | |
|   UINT8                                 *NvStorageData;
 | |
|   UINT32                                NvStorageSize;
 | |
|   FAULT_TOLERANT_WRITE_LAST_WRITE_DATA  *FtwLastWriteData;
 | |
|   UINT32                                BackUpOffset;
 | |
|   UINT32                                BackUpSize;
 | |
|   UINT32                                HwErrStorageSize;
 | |
|   UINT32                                MaxUserNvVariableSpaceSize;
 | |
|   UINT32                                BoottimeReservedNvVariableSpaceSize;
 | |
|   EFI_STATUS                            Status;
 | |
|   VOID                                  *FtwProtocol;
 | |
| 
 | |
|   mVariableModuleGlobal->FvbInstance = NULL;
 | |
| 
 | |
|   //
 | |
|   // Allocate runtime memory used for a memory copy of the FLASH region.
 | |
|   // Keep the memory and the FLASH in sync as updates occur.
 | |
|   //
 | |
|   NvStorageSize = PcdGet32 (PcdFlashNvStorageVariableSize);
 | |
|   NvStorageData = AllocateRuntimeZeroPool (NvStorageSize);
 | |
|   if (NvStorageData == NULL) {
 | |
|     return EFI_OUT_OF_RESOURCES;
 | |
|   }
 | |
| 
 | |
|   NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet64 (PcdFlashNvStorageVariableBase64);
 | |
|   if (NvStorageBase == 0) {
 | |
|     NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet32 (PcdFlashNvStorageVariableBase);
 | |
|   }
 | |
|   //
 | |
|   // Copy NV storage data to the memory buffer.
 | |
|   //
 | |
|   CopyMem (NvStorageData, (UINT8 *) (UINTN) NvStorageBase, NvStorageSize);
 | |
| 
 | |
|   Status = GetFtwProtocol ((VOID **)&FtwProtocol);
 | |
|   //
 | |
|   // If FTW protocol has been installed, no need to check FTW last write data hob.
 | |
|   //
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     //
 | |
|     // Check the FTW last write data hob.
 | |
|     //
 | |
|     GuidHob = GetFirstGuidHob (&gEdkiiFaultTolerantWriteGuid);
 | |
|     if (GuidHob != NULL) {
 | |
|       FtwLastWriteData = (FAULT_TOLERANT_WRITE_LAST_WRITE_DATA *) GET_GUID_HOB_DATA (GuidHob);
 | |
|       if (FtwLastWriteData->TargetAddress == NvStorageBase) {
 | |
|         DEBUG ((EFI_D_INFO, "Variable: NV storage is backed up in spare block: 0x%x\n", (UINTN) FtwLastWriteData->SpareAddress));
 | |
|         //
 | |
|         // Copy the backed up NV storage data to the memory buffer from spare block.
 | |
|         //
 | |
|         CopyMem (NvStorageData, (UINT8 *) (UINTN) (FtwLastWriteData->SpareAddress), NvStorageSize);
 | |
|       } else if ((FtwLastWriteData->TargetAddress > NvStorageBase) &&
 | |
|                  (FtwLastWriteData->TargetAddress < (NvStorageBase + NvStorageSize))) {
 | |
|         //
 | |
|         // Flash NV storage from the Offset is backed up in spare block.
 | |
|         //
 | |
|         BackUpOffset = (UINT32) (FtwLastWriteData->TargetAddress - NvStorageBase);
 | |
|         BackUpSize = NvStorageSize - BackUpOffset;
 | |
|         DEBUG ((EFI_D_INFO, "Variable: High partial NV storage from offset: %x is backed up in spare block: 0x%x\n", BackUpOffset, (UINTN) FtwLastWriteData->SpareAddress));
 | |
|         //
 | |
|         // Copy the partial backed up NV storage data to the memory buffer from spare block.
 | |
|         //
 | |
|         CopyMem (NvStorageData + BackUpOffset, (UINT8 *) (UINTN) FtwLastWriteData->SpareAddress, BackUpSize);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) NvStorageData;
 | |
| 
 | |
|   //
 | |
|   // Check if the Firmware Volume is not corrupted
 | |
|   //
 | |
|   if ((FvHeader->Signature != EFI_FVH_SIGNATURE) || (!CompareGuid (&gEfiSystemNvDataFvGuid, &FvHeader->FileSystemGuid))) {
 | |
|     FreePool (NvStorageData);
 | |
|     DEBUG ((EFI_D_ERROR, "Firmware Volume for Variable Store is corrupted\n"));
 | |
|     return EFI_VOLUME_CORRUPTED;
 | |
|   }
 | |
| 
 | |
|   VariableStoreBase = (UINTN) FvHeader + FvHeader->HeaderLength;
 | |
|   VariableStoreLength = NvStorageSize - FvHeader->HeaderLength;
 | |
| 
 | |
|   mNvFvHeaderCache = FvHeader;
 | |
|   mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;
 | |
|   mNvVariableCache = (VARIABLE_STORE_HEADER *) (UINTN) VariableStoreBase;
 | |
|   if (GetVariableStoreStatus (mNvVariableCache) != EfiValid) {
 | |
|     FreePool (NvStorageData);
 | |
|     mNvFvHeaderCache = NULL;
 | |
|     mNvVariableCache = NULL;
 | |
|     DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n"));
 | |
|     return EFI_VOLUME_CORRUPTED;
 | |
|   }
 | |
|   ASSERT(mNvVariableCache->Size == VariableStoreLength);
 | |
| 
 | |
|   ASSERT (sizeof (VARIABLE_STORE_HEADER) <= VariableStoreLength);
 | |
| 
 | |
|   mVariableModuleGlobal->VariableGlobal.AuthFormat = (BOOLEAN)(CompareGuid (&mNvVariableCache->Signature, &gEfiAuthenticatedVariableGuid));
 | |
| 
 | |
|   HwErrStorageSize = PcdGet32 (PcdHwErrStorageSize);
 | |
|   MaxUserNvVariableSpaceSize = PcdGet32 (PcdMaxUserNvVariableSpaceSize);
 | |
|   BoottimeReservedNvVariableSpaceSize = PcdGet32 (PcdBoottimeReservedNvVariableSpaceSize);
 | |
| 
 | |
|   //
 | |
|   // Note that in EdkII variable driver implementation, Hardware Error Record type variable
 | |
|   // is stored with common variable in the same NV region. So the platform integrator should
 | |
|   // ensure that the value of PcdHwErrStorageSize is less than the value of
 | |
|   // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)).
 | |
|   //
 | |
|   ASSERT (HwErrStorageSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)));
 | |
|   //
 | |
|   // Ensure that the value of PcdMaxUserNvVariableSpaceSize is less than the value of
 | |
|   // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize).
 | |
|   //
 | |
|   ASSERT (MaxUserNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize));
 | |
|   //
 | |
|   // Ensure that the value of PcdBoottimeReservedNvVariableSpaceSize is less than the value of
 | |
|   // (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)) - PcdGet32 (PcdHwErrStorageSize).
 | |
|   //
 | |
|   ASSERT (BoottimeReservedNvVariableSpaceSize < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize));
 | |
| 
 | |
|   mVariableModuleGlobal->CommonVariableSpace = ((UINTN) VariableStoreLength - sizeof (VARIABLE_STORE_HEADER) - HwErrStorageSize);
 | |
|   mVariableModuleGlobal->CommonMaxUserVariableSpace = ((MaxUserNvVariableSpaceSize != 0) ? MaxUserNvVariableSpaceSize : mVariableModuleGlobal->CommonVariableSpace);
 | |
|   mVariableModuleGlobal->CommonRuntimeVariableSpace = mVariableModuleGlobal->CommonVariableSpace - BoottimeReservedNvVariableSpaceSize;
 | |
| 
 | |
|   DEBUG ((EFI_D_INFO, "Variable driver common space: 0x%x 0x%x 0x%x\n", mVariableModuleGlobal->CommonVariableSpace, mVariableModuleGlobal->CommonMaxUserVariableSpace, mVariableModuleGlobal->CommonRuntimeVariableSpace));
 | |
| 
 | |
|   //
 | |
|   // The max NV variable size should be < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)).
 | |
|   //
 | |
|   ASSERT (GetNonVolatileMaxVariableSize () < (VariableStoreLength - sizeof (VARIABLE_STORE_HEADER)));
 | |
| 
 | |
|   mVariableModuleGlobal->MaxVariableSize = PcdGet32 (PcdMaxVariableSize);
 | |
|   mVariableModuleGlobal->MaxAuthVariableSize = ((PcdGet32 (PcdMaxAuthVariableSize) != 0) ? PcdGet32 (PcdMaxAuthVariableSize) : mVariableModuleGlobal->MaxVariableSize);
 | |
| 
 | |
|   //
 | |
|   // Parse non-volatile variable data and get last variable offset.
 | |
|   //
 | |
|   Variable  = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase);
 | |
|   while (IsValidVariableHeader (Variable, GetEndPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase))) {
 | |
|     NextVariable = GetNextVariablePtr (Variable);
 | |
|     VariableSize = (UINTN) NextVariable - (UINTN) Variable;
 | |
|     if ((Variable->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | |
|       mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
 | |
|     } else {
 | |
|       mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
 | |
|     }
 | |
| 
 | |
|     Variable = NextVariable;
 | |
|   }
 | |
|   mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) VariableStoreBase;
 | |
| 
 | |
|   *NvFvHeader = FvHeader;
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Flush the HOB variable to flash.
 | |
| 
 | |
|   @param[in] VariableName       Name of variable has been updated or deleted.
 | |
|   @param[in] VendorGuid         Guid of variable has been updated or deleted.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| FlushHobVariableToFlash (
 | |
|   IN CHAR16                     *VariableName,
 | |
|   IN EFI_GUID                   *VendorGuid
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   VARIABLE_STORE_HEADER         *VariableStoreHeader;
 | |
|   VARIABLE_HEADER               *Variable;
 | |
|   VOID                          *VariableData;
 | |
|   VARIABLE_POINTER_TRACK        VariablePtrTrack;
 | |
|   BOOLEAN                       ErrorFlag;
 | |
| 
 | |
|   ErrorFlag = FALSE;
 | |
| 
 | |
|   //
 | |
|   // Flush the HOB variable to flash.
 | |
|   //
 | |
|   if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) {
 | |
|     VariableStoreHeader = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;
 | |
|     //
 | |
|     // Set HobVariableBase to 0, it can avoid SetVariable to call back.
 | |
|     //
 | |
|     mVariableModuleGlobal->VariableGlobal.HobVariableBase = 0;
 | |
|     for ( Variable = GetStartPointer (VariableStoreHeader)
 | |
|         ; IsValidVariableHeader (Variable, GetEndPointer (VariableStoreHeader))
 | |
|         ; Variable = GetNextVariablePtr (Variable)
 | |
|         ) {
 | |
|       if (Variable->State != VAR_ADDED) {
 | |
|         //
 | |
|         // The HOB variable has been set to DELETED state in local.
 | |
|         //
 | |
|         continue;
 | |
|       }
 | |
|       ASSERT ((Variable->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0);
 | |
|       if (VendorGuid == NULL || VariableName == NULL ||
 | |
|           !CompareGuid (VendorGuid, GetVendorGuidPtr (Variable)) ||
 | |
|           StrCmp (VariableName, GetVariableNamePtr (Variable)) != 0) {
 | |
|         VariableData = GetVariableDataPtr (Variable);
 | |
|         FindVariable (GetVariableNamePtr (Variable), GetVendorGuidPtr (Variable), &VariablePtrTrack, &mVariableModuleGlobal->VariableGlobal, FALSE);
 | |
|         Status = UpdateVariable (
 | |
|                    GetVariableNamePtr (Variable),
 | |
|                    GetVendorGuidPtr (Variable),
 | |
|                    VariableData,
 | |
|                    DataSizeOfVariable (Variable),
 | |
|                    Variable->Attributes,
 | |
|                    0,
 | |
|                    0,
 | |
|                    &VariablePtrTrack,
 | |
|                    NULL
 | |
|                  );
 | |
|         DEBUG ((EFI_D_INFO, "Variable driver flush the HOB variable to flash: %g %s %r\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable), Status));
 | |
|       } else {
 | |
|         //
 | |
|         // The updated or deleted variable is matched with this HOB variable.
 | |
|         // Don't break here because we will try to set other HOB variables
 | |
|         // since this variable could be set successfully.
 | |
|         //
 | |
|         Status = EFI_SUCCESS;
 | |
|       }
 | |
|       if (!EFI_ERROR (Status)) {
 | |
|         //
 | |
|         // If set variable successful, or the updated or deleted variable is matched with the HOB variable,
 | |
|         // set the HOB variable to DELETED state in local.
 | |
|         //
 | |
|         DEBUG ((EFI_D_INFO, "Variable driver set the HOB variable to DELETED state in local: %g %s\n", GetVendorGuidPtr (Variable), GetVariableNamePtr (Variable)));
 | |
|         Variable->State &= VAR_DELETED;
 | |
|       } else {
 | |
|         ErrorFlag = TRUE;
 | |
|       }
 | |
|     }
 | |
|     if (ErrorFlag) {
 | |
|       //
 | |
|       // We still have HOB variable(s) not flushed in flash.
 | |
|       //
 | |
|       mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VariableStoreHeader;
 | |
|     } else {
 | |
|       //
 | |
|       // All HOB variables have been flushed in flash.
 | |
|       //
 | |
|       DEBUG ((EFI_D_INFO, "Variable driver: all HOB variables have been flushed in flash.\n"));
 | |
|       if (!AtRuntime ()) {
 | |
|         FreePool ((VOID *) VariableStoreHeader);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Initializes variable write service after FTW was ready.
 | |
| 
 | |
|   @retval EFI_SUCCESS          Function successfully executed.
 | |
|   @retval Others               Fail to initialize the variable service.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| VariableWriteServiceInitialize (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                      Status;
 | |
|   UINTN                           Index;
 | |
|   UINT8                           Data;
 | |
|   EFI_PHYSICAL_ADDRESS            VariableStoreBase;
 | |
|   EFI_PHYSICAL_ADDRESS            NvStorageBase;
 | |
|   VARIABLE_ENTRY_PROPERTY         *VariableEntry;
 | |
| 
 | |
|   AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet64 (PcdFlashNvStorageVariableBase64);
 | |
|   if (NvStorageBase == 0) {
 | |
|     NvStorageBase = (EFI_PHYSICAL_ADDRESS) PcdGet32 (PcdFlashNvStorageVariableBase);
 | |
|   }
 | |
|   VariableStoreBase = NvStorageBase + (mNvFvHeaderCache->HeaderLength);
 | |
| 
 | |
|   //
 | |
|   // Let NonVolatileVariableBase point to flash variable store base directly after FTW ready.
 | |
|   //
 | |
|   mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;
 | |
| 
 | |
|   //
 | |
|   // Check if the free area is really free.
 | |
|   //
 | |
|   for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < mNvVariableCache->Size; Index++) {
 | |
|     Data = ((UINT8 *) mNvVariableCache)[Index];
 | |
|     if (Data != 0xff) {
 | |
|       //
 | |
|       // There must be something wrong in variable store, do reclaim operation.
 | |
|       //
 | |
|       Status = Reclaim (
 | |
|                  mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,
 | |
|                  &mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | |
|                  FALSE,
 | |
|                  NULL,
 | |
|                  NULL,
 | |
|                  0
 | |
|                  );
 | |
|       if (EFI_ERROR (Status)) {
 | |
|         ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
|         return Status;
 | |
|       }
 | |
|       break;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   FlushHobVariableToFlash (NULL, NULL);
 | |
| 
 | |
|   Status = EFI_SUCCESS;
 | |
|   ZeroMem (&mAuthContextOut, sizeof (mAuthContextOut));
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     //
 | |
|     // Authenticated variable initialize.
 | |
|     //
 | |
|     mAuthContextIn.StructSize = sizeof (AUTH_VAR_LIB_CONTEXT_IN);
 | |
|     mAuthContextIn.MaxAuthVariableSize = mVariableModuleGlobal->MaxAuthVariableSize - GetVariableHeaderSize ();
 | |
|     Status = AuthVariableLibInitialize (&mAuthContextIn, &mAuthContextOut);
 | |
|     if (!EFI_ERROR (Status)) {
 | |
|       DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable support!\n"));
 | |
|       mVariableModuleGlobal->VariableGlobal.AuthSupport = TRUE;
 | |
|       if (mAuthContextOut.AuthVarEntry != NULL) {
 | |
|         for (Index = 0; Index < mAuthContextOut.AuthVarEntryCount; Index++) {
 | |
|           VariableEntry = &mAuthContextOut.AuthVarEntry[Index];
 | |
|           Status = VarCheckLibVariablePropertySet (
 | |
|                      VariableEntry->Name,
 | |
|                      VariableEntry->Guid,
 | |
|                      &VariableEntry->VariableProperty
 | |
|                      );
 | |
|           ASSERT_EFI_ERROR (Status);
 | |
|         }
 | |
|       }
 | |
|     } else if (Status == EFI_UNSUPPORTED) {
 | |
|       DEBUG ((EFI_D_INFO, "NOTICE - AuthVariableLibInitialize() returns %r!\n", Status));
 | |
|       DEBUG ((EFI_D_INFO, "Variable driver will continue to work without auth variable support!\n"));
 | |
|       mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
 | |
|       Status = EFI_SUCCESS;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     for (Index = 0; Index < ARRAY_SIZE (mVariableEntryProperty); Index++) {
 | |
|       VariableEntry = &mVariableEntryProperty[Index];
 | |
|       Status = VarCheckLibVariablePropertySet (VariableEntry->Name, VariableEntry->Guid, &VariableEntry->VariableProperty);
 | |
|       ASSERT_EFI_ERROR (Status);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);
 | |
| 
 | |
|   //
 | |
|   // Initialize MOR Lock variable.
 | |
|   //
 | |
|   MorLockInit ();
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|   Initializes variable store area for non-volatile and volatile variable.
 | |
| 
 | |
|   @retval EFI_SUCCESS           Function successfully executed.
 | |
|   @retval EFI_OUT_OF_RESOURCES  Fail to allocate enough memory resource.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| VariableCommonInitialize (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                      Status;
 | |
|   VARIABLE_STORE_HEADER           *VolatileVariableStore;
 | |
|   VARIABLE_STORE_HEADER           *VariableStoreHeader;
 | |
|   UINT64                          VariableStoreLength;
 | |
|   UINTN                           ScratchSize;
 | |
|   EFI_HOB_GUID_TYPE               *GuidHob;
 | |
|   EFI_GUID                        *VariableGuid;
 | |
|   EFI_FIRMWARE_VOLUME_HEADER      *NvFvHeader;
 | |
| 
 | |
|   //
 | |
|   // Allocate runtime memory for variable driver global structure.
 | |
|   //
 | |
|   mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (VARIABLE_MODULE_GLOBAL));
 | |
|   if (mVariableModuleGlobal == NULL) {
 | |
|     return EFI_OUT_OF_RESOURCES;
 | |
|   }
 | |
| 
 | |
|   InitializeLock (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);
 | |
| 
 | |
|   //
 | |
|   // Init non-volatile variable store.
 | |
|   //
 | |
|   NvFvHeader = NULL;
 | |
|   Status = InitNonVolatileVariableStore (&NvFvHeader);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     FreePool (mVariableModuleGlobal);
 | |
|     return Status;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // mVariableModuleGlobal->VariableGlobal.AuthFormat
 | |
|   // has been initialized in InitNonVolatileVariableStore().
 | |
|   //
 | |
|   if (mVariableModuleGlobal->VariableGlobal.AuthFormat) {
 | |
|     DEBUG ((EFI_D_INFO, "Variable driver will work with auth variable format!\n"));
 | |
|     //
 | |
|     // Set AuthSupport to FALSE first, VariableWriteServiceInitialize() will initialize it.
 | |
|     //
 | |
|     mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
 | |
|     VariableGuid = &gEfiAuthenticatedVariableGuid;
 | |
|   } else {
 | |
|     DEBUG ((EFI_D_INFO, "Variable driver will work without auth variable support!\n"));
 | |
|     mVariableModuleGlobal->VariableGlobal.AuthSupport = FALSE;
 | |
|     VariableGuid = &gEfiVariableGuid;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Get HOB variable store.
 | |
|   //
 | |
|   GuidHob = GetFirstGuidHob (VariableGuid);
 | |
|   if (GuidHob != NULL) {
 | |
|     VariableStoreHeader = GET_GUID_HOB_DATA (GuidHob);
 | |
|     VariableStoreLength = GuidHob->Header.HobLength - sizeof (EFI_HOB_GUID_TYPE);
 | |
|     if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {
 | |
|       mVariableModuleGlobal->VariableGlobal.HobVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) AllocateRuntimeCopyPool ((UINTN) VariableStoreLength, (VOID *) VariableStoreHeader);
 | |
|       if (mVariableModuleGlobal->VariableGlobal.HobVariableBase == 0) {
 | |
|         FreePool (NvFvHeader);
 | |
|         FreePool (mVariableModuleGlobal);
 | |
|         return EFI_OUT_OF_RESOURCES;
 | |
|       }
 | |
|     } else {
 | |
|       DEBUG ((EFI_D_ERROR, "HOB Variable Store header is corrupted!\n"));
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Allocate memory for volatile variable store, note that there is a scratch space to store scratch data.
 | |
|   //
 | |
|   ScratchSize = GetNonVolatileMaxVariableSize ();
 | |
|   mVariableModuleGlobal->ScratchBufferSize = ScratchSize;
 | |
|   VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize);
 | |
|   if (VolatileVariableStore == NULL) {
 | |
|     if (mVariableModuleGlobal->VariableGlobal.HobVariableBase != 0) {
 | |
|       FreePool ((VOID *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase);
 | |
|     }
 | |
|     FreePool (NvFvHeader);
 | |
|     FreePool (mVariableModuleGlobal);
 | |
|     return EFI_OUT_OF_RESOURCES;
 | |
|   }
 | |
| 
 | |
|   SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff);
 | |
| 
 | |
|   //
 | |
|   // Initialize Variable Specific Data.
 | |
|   //
 | |
|   mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;
 | |
|   mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;
 | |
| 
 | |
|   CopyGuid (&VolatileVariableStore->Signature, VariableGuid);
 | |
|   VolatileVariableStore->Size        = PcdGet32 (PcdVariableStoreSize);
 | |
|   VolatileVariableStore->Format      = VARIABLE_STORE_FORMATTED;
 | |
|   VolatileVariableStore->State       = VARIABLE_STORE_HEALTHY;
 | |
|   VolatileVariableStore->Reserved    = 0;
 | |
|   VolatileVariableStore->Reserved1   = 0;
 | |
| 
 | |
|   return EFI_SUCCESS;
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|   Get the proper fvb handle and/or fvb protocol by the given Flash address.
 | |
| 
 | |
|   @param[in]  Address       The Flash address.
 | |
|   @param[out] FvbHandle     In output, if it is not NULL, it points to the proper FVB handle.
 | |
|   @param[out] FvbProtocol   In output, if it is not NULL, it points to the proper FVB protocol.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| GetFvbInfoByAddress (
 | |
|   IN  EFI_PHYSICAL_ADDRESS                Address,
 | |
|   OUT EFI_HANDLE                          *FvbHandle OPTIONAL,
 | |
|   OUT EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL  **FvbProtocol OPTIONAL
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                              Status;
 | |
|   EFI_HANDLE                              *HandleBuffer;
 | |
|   UINTN                                   HandleCount;
 | |
|   UINTN                                   Index;
 | |
|   EFI_PHYSICAL_ADDRESS                    FvbBaseAddress;
 | |
|   EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL      *Fvb;
 | |
|   EFI_FVB_ATTRIBUTES_2                    Attributes;
 | |
|   UINTN                                   BlockSize;
 | |
|   UINTN                                   NumberOfBlocks;
 | |
| 
 | |
|   HandleBuffer = NULL;
 | |
|   //
 | |
|   // Get all FVB handles.
 | |
|   //
 | |
|   Status = GetFvbCountAndBuffer (&HandleCount, &HandleBuffer);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return EFI_NOT_FOUND;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Get the FVB to access variable store.
 | |
|   //
 | |
|   Fvb = NULL;
 | |
|   for (Index = 0; Index < HandleCount; Index += 1, Status = EFI_NOT_FOUND, Fvb = NULL) {
 | |
|     Status = GetFvbByHandle (HandleBuffer[Index], &Fvb);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       Status = EFI_NOT_FOUND;
 | |
|       break;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Ensure this FVB protocol supported Write operation.
 | |
|     //
 | |
|     Status = Fvb->GetAttributes (Fvb, &Attributes);
 | |
|     if (EFI_ERROR (Status) || ((Attributes & EFI_FVB2_WRITE_STATUS) == 0)) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Compare the address and select the right one.
 | |
|     //
 | |
|     Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Assume one FVB has one type of BlockSize.
 | |
|     //
 | |
|     Status = Fvb->GetBlockSize (Fvb, 0, &BlockSize, &NumberOfBlocks);
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     if ((Address >= FvbBaseAddress) && (Address < (FvbBaseAddress + BlockSize * NumberOfBlocks))) {
 | |
|       if (FvbHandle != NULL) {
 | |
|         *FvbHandle  = HandleBuffer[Index];
 | |
|       }
 | |
|       if (FvbProtocol != NULL) {
 | |
|         *FvbProtocol = Fvb;
 | |
|       }
 | |
|       Status = EFI_SUCCESS;
 | |
|       break;
 | |
|     }
 | |
|   }
 | |
|   FreePool (HandleBuffer);
 | |
| 
 | |
|   if (Fvb == NULL) {
 | |
|     Status = EFI_NOT_FOUND;
 | |
|   }
 | |
| 
 | |
|   return Status;
 | |
| }
 | |
| 
 |