SecurityPkg\VariableAuthenticated\EsalVariableDxeSal\Variable.c AutoUpdateLangVariable() Global->PlatformLangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data); ASSERT (mVariableModuleGlobal->PlatformLangCodes[VirtualMode] != NULL); The patch is to use Global instead of mVariableModuleGlobal in the ASSERT (XXX) to make code more clear although mVariableModuleGlobal is equal to Global actually. Cc: Chao Zhang <chao.b.zhang@intel.com> Cc: Amy Chan <amy.chan@intel.com> Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng <star.zeng@intel.com> Reviewed-by: Chao Zhang <chao.b.zhang@intel.com> Reviewed-by: Amy Chan <amy.chan@intel.com> Reviewed-by: Giri P Mudusuru <giri.p.mudusuru@intel.com>
		
			
				
	
	
		
			3258 lines
		
	
	
		
			121 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			3258 lines
		
	
	
		
			121 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/** @file
 | 
						|
  The implementation of Extended SAL variable services.
 | 
						|
 | 
						|
Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
 | 
						|
This program and the accompanying materials 
 | 
						|
are licensed and made available under the terms and conditions of the BSD License 
 | 
						|
which accompanies this distribution.  The full text of the license may be found at 
 | 
						|
http://opensource.org/licenses/bsd-license.php
 | 
						|
 | 
						|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
 | 
						|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | 
						|
 | 
						|
**/
 | 
						|
 | 
						|
#include "Variable.h"
 | 
						|
#include "AuthService.h"
 | 
						|
 | 
						|
//
 | 
						|
// Don't use module globals after the SetVirtualAddress map is signaled
 | 
						|
//
 | 
						|
ESAL_VARIABLE_GLOBAL  *mVariableModuleGlobal;
 | 
						|
CHAR16 *mVariableName[NUM_VAR_NAME] = {
 | 
						|
  L"PlatformLangCodes",
 | 
						|
  L"LangCodes",
 | 
						|
  L"PlatformLang",
 | 
						|
  L"Lang",
 | 
						|
  L"HwErrRec",
 | 
						|
  AUTHVAR_KEYDB_NAME,
 | 
						|
  EFI_SETUP_MODE_NAME,
 | 
						|
  EFI_PLATFORM_KEY_NAME,
 | 
						|
  EFI_KEY_EXCHANGE_KEY_NAME
 | 
						|
};
 | 
						|
 | 
						|
GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;
 | 
						|
 | 
						|
//
 | 
						|
// The current Hii implementation accesses this variable a larg # of times on every boot.
 | 
						|
// Other common variables are only accessed a single time. This is why this cache algorithm
 | 
						|
// only targets a single variable. Probably to get an performance improvement out of
 | 
						|
// a Cache you would need a cache that improves the search performance for a variable.
 | 
						|
//
 | 
						|
VARIABLE_CACHE_ENTRY mVariableCache[] = {
 | 
						|
  {
 | 
						|
    &gEfiGlobalVariableGuid,
 | 
						|
    L"Lang",
 | 
						|
    0x00000000,
 | 
						|
    0x00,
 | 
						|
    NULL
 | 
						|
  },
 | 
						|
  {
 | 
						|
    &gEfiGlobalVariableGuid,
 | 
						|
    L"PlatformLang",
 | 
						|
    0x00000000,
 | 
						|
    0x00,
 | 
						|
    NULL
 | 
						|
  }
 | 
						|
};
 | 
						|
 | 
						|
/**
 | 
						|
  Acquires lock only at boot time. Simply returns at runtime.
 | 
						|
 | 
						|
  This is a temperary function which will be removed when
 | 
						|
  EfiAcquireLock() in UefiLib can handle the call in UEFI
 | 
						|
  Runtimer driver in RT phase.
 | 
						|
  It calls EfiAcquireLock() at boot time, and simply returns
 | 
						|
  at runtime.
 | 
						|
 | 
						|
  @param[in]  Lock     A pointer to the lock to acquire.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
AcquireLockOnlyAtBootTime (
 | 
						|
  IN EFI_LOCK  *Lock
 | 
						|
  )
 | 
						|
{
 | 
						|
  if (!EfiAtRuntime ()) {
 | 
						|
    EfiAcquireLock (Lock);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Releases lock only at boot time. Simply returns at runtime.
 | 
						|
 | 
						|
  This is a temperary function which will be removed when
 | 
						|
  EfiReleaseLock() in UefiLib can handle the call in UEFI
 | 
						|
  Runtimer driver in RT phase.
 | 
						|
  It calls EfiReleaseLock() at boot time, and simply returns
 | 
						|
  at runtime
 | 
						|
 | 
						|
  @param[in]  Lock    A pointer to the lock to release.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
ReleaseLockOnlyAtBootTime (
 | 
						|
  IN EFI_LOCK  *Lock
 | 
						|
  )
 | 
						|
{
 | 
						|
  if (!EfiAtRuntime ()) {
 | 
						|
    EfiReleaseLock (Lock);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Reads/Writes variable storage, volatile or non-volatile.
 | 
						|
 | 
						|
  This function reads or writes volatile or non-volatile variable stroage.
 | 
						|
  For volatile storage, it performs memory copy.
 | 
						|
  For non-volatile storage, it accesses data on firmware storage. Data
 | 
						|
  area to access can span multiple firmware blocks.
 | 
						|
 | 
						|
  @param[in]      Write           TRUE  - Write variable store.
 | 
						|
                                  FALSE - Read variable store.
 | 
						|
  @param[in]      Global          Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]      Volatile        TRUE  - Variable is volatile.
 | 
						|
                                  FALSE - Variable is non-volatile.
 | 
						|
  @param[in]      Instance        Instance of FV Block services.
 | 
						|
  @param[in]      StartAddress    Start address of data to access.
 | 
						|
  @param[in]      DataSize        Size of data to access.
 | 
						|
  @param[in, out] Buffer          For write, pointer to the buffer from which data is written.
 | 
						|
                                  For read, pointer to the buffer to hold the data read.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS            Variable store successfully accessed.
 | 
						|
  @retval EFI_INVALID_PARAMETER  Data area to access exceeds valid variable storage.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
AccessVariableStore (
 | 
						|
  IN     BOOLEAN                 Write,
 | 
						|
  IN     VARIABLE_GLOBAL         *Global,
 | 
						|
  IN     BOOLEAN                 Volatile,
 | 
						|
  IN     UINTN                   Instance,
 | 
						|
  IN     EFI_PHYSICAL_ADDRESS    StartAddress,
 | 
						|
  IN     UINT32                  DataSize,
 | 
						|
  IN OUT VOID                    *Buffer
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_FV_BLOCK_MAP_ENTRY      *PtrBlockMapEntry;
 | 
						|
  UINTN                       BlockIndex;
 | 
						|
  UINTN                       LinearOffset;
 | 
						|
  UINTN                       CurrWriteSize;
 | 
						|
  UINTN                       CurrWritePtr;
 | 
						|
  UINT8                       *CurrBuffer;
 | 
						|
  EFI_LBA                     LbaNumber;
 | 
						|
  UINTN                       Size;
 | 
						|
  EFI_FIRMWARE_VOLUME_HEADER  *FwVolHeader;
 | 
						|
  VARIABLE_STORE_HEADER       *VolatileBase;
 | 
						|
  EFI_PHYSICAL_ADDRESS        FvVolHdr;
 | 
						|
  EFI_STATUS                  Status;
 | 
						|
  VARIABLE_STORE_HEADER       *VariableStoreHeader;
 | 
						|
 | 
						|
  FvVolHdr = 0;
 | 
						|
  FwVolHeader = NULL;
 | 
						|
 | 
						|
  if (Volatile) {
 | 
						|
    //
 | 
						|
    // If data is volatile, simply calculate the data pointer and copy memory.
 | 
						|
    // Data pointer should point to the actual address where data is to be
 | 
						|
    // accessed.
 | 
						|
    //
 | 
						|
    VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) Global->VolatileVariableBase);
 | 
						|
 | 
						|
    if ((StartAddress + DataSize) > ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {
 | 
						|
      return EFI_INVALID_PARAMETER;
 | 
						|
    }
 | 
						|
    
 | 
						|
    //
 | 
						|
    // For volatile variable, a simple memory copy is enough.
 | 
						|
    //
 | 
						|
    if (Write) {
 | 
						|
      CopyMem ((VOID *) StartAddress, Buffer, DataSize);
 | 
						|
    } else {
 | 
						|
      CopyMem (Buffer, (VOID *) StartAddress, DataSize);
 | 
						|
    }
 | 
						|
 | 
						|
    return EFI_SUCCESS;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // If data is non-volatile, calculate firmware volume header and data pointer.
 | 
						|
  //
 | 
						|
  Status = (EFI_STATUS) EsalCall (
 | 
						|
                          EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                          EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                          GetPhysicalAddressFunctionId, 
 | 
						|
                          Instance, 
 | 
						|
                          (UINT64) &FvVolHdr, 
 | 
						|
                          0, 
 | 
						|
                          0, 
 | 
						|
                          0, 
 | 
						|
                          0, 
 | 
						|
                          0
 | 
						|
                          ).Status;
 | 
						|
  ASSERT_EFI_ERROR (Status);
 | 
						|
 | 
						|
  FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);
 | 
						|
  ASSERT (FwVolHeader != NULL);
 | 
						|
  VariableStoreHeader = (VARIABLE_STORE_HEADER *)(FwVolHeader + 1);
 | 
						|
 | 
						|
  if ((StartAddress + DataSize) > ((EFI_PHYSICAL_ADDRESS) (UINTN) ((CHAR8 *)VariableStoreHeader + VariableStoreHeader->Size))) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
  
 | 
						|
  LinearOffset  = (UINTN) FwVolHeader;
 | 
						|
  CurrWritePtr  = StartAddress;
 | 
						|
  CurrWriteSize = DataSize;
 | 
						|
  CurrBuffer    = Buffer;
 | 
						|
  LbaNumber     = 0;
 | 
						|
 | 
						|
  if (CurrWritePtr < LinearOffset) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Traverse data blocks of this firmware storage to find the one where CurrWritePtr locates
 | 
						|
  //
 | 
						|
  for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {
 | 
						|
    for (BlockIndex = 0; BlockIndex < PtrBlockMapEntry->NumBlocks; BlockIndex++) {
 | 
						|
      if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {
 | 
						|
        //
 | 
						|
        // Check to see if the data area to access spans multiple blocks.
 | 
						|
        //
 | 
						|
        if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {
 | 
						|
          //
 | 
						|
          // If data area to access is contained in one block, just access and return.
 | 
						|
          //
 | 
						|
          if (Write) {
 | 
						|
            Status = (EFI_STATUS) EsalCall (
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                                    WriteFunctionId, 
 | 
						|
                                    Instance, 
 | 
						|
                                    LbaNumber, 
 | 
						|
                                    (CurrWritePtr - LinearOffset), 
 | 
						|
                                    (UINT64) &CurrWriteSize, 
 | 
						|
                                    (UINT64) CurrBuffer, 
 | 
						|
                                    0, 
 | 
						|
                                    0
 | 
						|
                                    ).Status;
 | 
						|
          } else {
 | 
						|
            Status = (EFI_STATUS) EsalCall (
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                                    ReadFunctionId, 
 | 
						|
                                    Instance, 
 | 
						|
                                    LbaNumber, 
 | 
						|
                                    (CurrWritePtr - LinearOffset), 
 | 
						|
                                    (UINT64) &CurrWriteSize, 
 | 
						|
                                    (UINT64) CurrBuffer, 
 | 
						|
                                    0, 
 | 
						|
                                    0
 | 
						|
                                    ).Status;
 | 
						|
          }
 | 
						|
          return Status;
 | 
						|
        } else {
 | 
						|
          //
 | 
						|
          // If data area to access spans multiple blocks, access this one and adjust for the next one.
 | 
						|
          //
 | 
						|
          Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);
 | 
						|
          if (Write) {
 | 
						|
            Status = (EFI_STATUS) EsalCall (
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                                    WriteFunctionId, 
 | 
						|
                                    Instance, 
 | 
						|
                                    LbaNumber, 
 | 
						|
                                    (CurrWritePtr - LinearOffset), 
 | 
						|
                                    (UINT64) &Size, 
 | 
						|
                                    (UINT64) CurrBuffer, 
 | 
						|
                                    0, 
 | 
						|
                                    0
 | 
						|
                                    ).Status;
 | 
						|
          } else {
 | 
						|
            Status = (EFI_STATUS) EsalCall (
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                                    ReadFunctionId, 
 | 
						|
                                    Instance, 
 | 
						|
                                    LbaNumber, 
 | 
						|
                                    (CurrWritePtr - LinearOffset), 
 | 
						|
                                    (UINT64) &Size, 
 | 
						|
                                    (UINT64) CurrBuffer, 
 | 
						|
                                    0, 
 | 
						|
                                    0
 | 
						|
                                    ).Status;
 | 
						|
          }
 | 
						|
          if (EFI_ERROR (Status)) {
 | 
						|
            return Status;
 | 
						|
          }
 | 
						|
          //
 | 
						|
          // Adjust for the remaining data.
 | 
						|
          //
 | 
						|
          CurrWritePtr  = LinearOffset + PtrBlockMapEntry->Length;
 | 
						|
          CurrBuffer    = CurrBuffer + Size;
 | 
						|
          CurrWriteSize = CurrWriteSize - Size;
 | 
						|
        }
 | 
						|
      }
 | 
						|
 | 
						|
      LinearOffset += PtrBlockMapEntry->Length;
 | 
						|
      LbaNumber++;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return EFI_SUCCESS;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Retrieves header of volatile or non-volatile variable stroage.
 | 
						|
 | 
						|
  @param[in]  VarStoreAddress    Start address of variable storage.
 | 
						|
  @param[in]  Volatile           TRUE  - Variable storage is volatile.
 | 
						|
                                 FALSE - Variable storage is non-volatile.
 | 
						|
  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance           Instance of FV Block services.
 | 
						|
  @param[out] VarStoreHeader     Pointer to VARIABLE_STORE_HEADER for output.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
GetVarStoreHeader (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS   VarStoreAddress,
 | 
						|
  IN  BOOLEAN                Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL        *Global,
 | 
						|
  IN  UINTN                  Instance,
 | 
						|
  OUT VARIABLE_STORE_HEADER  *VarStoreHeader
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS            Status;
 | 
						|
 | 
						|
  Status = AccessVariableStore (
 | 
						|
             FALSE,
 | 
						|
             Global,
 | 
						|
             Volatile,
 | 
						|
             Instance,
 | 
						|
             VarStoreAddress,
 | 
						|
             sizeof (VARIABLE_STORE_HEADER),
 | 
						|
             VarStoreHeader    
 | 
						|
             );
 | 
						|
  ASSERT_EFI_ERROR (Status);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Checks variable header.
 | 
						|
 | 
						|
  This function checks if variable header is valid or not.
 | 
						|
 | 
						|
  @param[in]  VariableAddress    Start address of variable header.
 | 
						|
  @param[in]  Volatile           TRUE  - Variable is volatile.
 | 
						|
                                 FALSE - Variable is non-volatile.
 | 
						|
  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance           Instance of FV Block services.
 | 
						|
  @param[out] VariableHeader     Pointer to AUTHENTICATED_VARIABLE_HEADER for output.
 | 
						|
 | 
						|
  @retval TRUE                   Variable header is valid.
 | 
						|
  @retval FALSE                  Variable header is not valid.
 | 
						|
 | 
						|
**/
 | 
						|
BOOLEAN
 | 
						|
IsValidVariableHeader (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS              VariableAddress,
 | 
						|
  IN  BOOLEAN                           Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL                   *Global,
 | 
						|
  IN  UINTN                             Instance,
 | 
						|
  OUT AUTHENTICATED_VARIABLE_HEADER     *VariableHeader  OPTIONAL
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                            Status;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER         LocalVariableHeader;
 | 
						|
 | 
						|
  Status = AccessVariableStore (
 | 
						|
             FALSE,
 | 
						|
             Global,
 | 
						|
             Volatile,
 | 
						|
             Instance,
 | 
						|
             VariableAddress,
 | 
						|
             sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
             &LocalVariableHeader    
 | 
						|
             );
 | 
						|
 | 
						|
  if (EFI_ERROR (Status) || LocalVariableHeader.StartId != VARIABLE_DATA) {
 | 
						|
    return FALSE;
 | 
						|
  }
 | 
						|
 | 
						|
  if (VariableHeader != NULL) {
 | 
						|
    CopyMem (VariableHeader, &LocalVariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
 | 
						|
  }
 | 
						|
 | 
						|
  return TRUE;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets status of variable store.
 | 
						|
 | 
						|
  This function gets the current status of variable store.
 | 
						|
 | 
						|
  @param[in] VarStoreHeader  Pointer to header of variable store.
 | 
						|
 | 
						|
  @retval EfiRaw          Variable store status is raw.
 | 
						|
  @retval EfiValid        Variable store status is valid.
 | 
						|
  @retval EfiInvalid      Variable store status is invalid.
 | 
						|
 | 
						|
**/
 | 
						|
VARIABLE_STORE_STATUS
 | 
						|
GetVariableStoreStatus (
 | 
						|
  IN VARIABLE_STORE_HEADER *VarStoreHeader
 | 
						|
  )
 | 
						|
{
 | 
						|
 | 
						|
  if (CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) &&
 | 
						|
      VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&
 | 
						|
      VarStoreHeader->State == VARIABLE_STORE_HEALTHY
 | 
						|
      ) {
 | 
						|
 | 
						|
    return EfiValid;
 | 
						|
  } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff &&
 | 
						|
             ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff &&
 | 
						|
             ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff &&
 | 
						|
             ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff &&
 | 
						|
             VarStoreHeader->Size == 0xffffffff &&
 | 
						|
             VarStoreHeader->Format == 0xff &&
 | 
						|
             VarStoreHeader->State == 0xff
 | 
						|
          ) {
 | 
						|
 | 
						|
    return EfiRaw;
 | 
						|
  } else {
 | 
						|
    return EfiInvalid;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the size of variable name.
 | 
						|
 | 
						|
  This function gets the size of variable name.
 | 
						|
  The variable is specified by its variable header.
 | 
						|
  If variable header contains raw data, just return 0.
 | 
						|
 | 
						|
  @param[in] Variable  Pointer to the variable header.
 | 
						|
 | 
						|
  @return              Size of variable name in bytes.
 | 
						|
 | 
						|
**/
 | 
						|
UINTN
 | 
						|
NameSizeOfVariable (
 | 
						|
  IN  AUTHENTICATED_VARIABLE_HEADER     *Variable
 | 
						|
  )
 | 
						|
{
 | 
						|
  if (Variable->State    == (UINT8) (-1) ||
 | 
						|
      Variable->DataSize == (UINT32) -1 ||
 | 
						|
      Variable->NameSize == (UINT32) -1 ||
 | 
						|
      Variable->Attributes == (UINT32) -1) {
 | 
						|
    return 0;
 | 
						|
  }
 | 
						|
  return (UINTN) Variable->NameSize;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the size of variable data area.
 | 
						|
 | 
						|
  This function gets the size of variable data area.
 | 
						|
  The variable is specified by its variable header.
 | 
						|
  If variable header contains raw data, just return 0.
 | 
						|
 | 
						|
  @param[in]  Variable  Pointer to the variable header.
 | 
						|
 | 
						|
  @return               Size of variable data area in bytes.
 | 
						|
 | 
						|
**/
 | 
						|
UINTN
 | 
						|
DataSizeOfVariable (
 | 
						|
  IN  AUTHENTICATED_VARIABLE_HEADER     *Variable
 | 
						|
  )
 | 
						|
{
 | 
						|
  if (Variable->State    == (UINT8)  -1 ||
 | 
						|
      Variable->DataSize == (UINT32) -1 ||
 | 
						|
      Variable->NameSize == (UINT32) -1 ||
 | 
						|
      Variable->Attributes == (UINT32) -1) {
 | 
						|
    return 0;
 | 
						|
  }
 | 
						|
  return (UINTN) Variable->DataSize;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the pointer to variable name.
 | 
						|
 | 
						|
  This function gets the pointer to variable name.
 | 
						|
  The variable is specified by its variable header.
 | 
						|
 | 
						|
  @param[in]  VariableAddress    Start address of variable header.
 | 
						|
  @param[in]  Volatile           TRUE  - Variable is volatile.
 | 
						|
                                 FALSE - Variable is non-volatile.
 | 
						|
  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance           Instance of FV Block services.
 | 
						|
  @param[out] VariableName       Buffer to hold variable name for output.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
GetVariableNamePtr (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
 | 
						|
  IN  BOOLEAN                Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL        *Global,
 | 
						|
  IN  UINTN                  Instance,
 | 
						|
  OUT CHAR16                 *VariableName
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                        Status;
 | 
						|
  EFI_PHYSICAL_ADDRESS              Address;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  BOOLEAN                           IsValid;
 | 
						|
 | 
						|
  IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader);
 | 
						|
  ASSERT (IsValid);
 | 
						|
 | 
						|
  //
 | 
						|
  // Name area follows variable header.
 | 
						|
  //
 | 
						|
  Address = VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
 | 
						|
  Status = AccessVariableStore (
 | 
						|
             FALSE,
 | 
						|
             Global,
 | 
						|
             Volatile,
 | 
						|
             Instance,
 | 
						|
             Address,
 | 
						|
             VariableHeader.NameSize,
 | 
						|
             VariableName    
 | 
						|
             );
 | 
						|
  ASSERT_EFI_ERROR (Status);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the pointer to variable data area.
 | 
						|
 | 
						|
  This function gets the pointer to variable data area.
 | 
						|
  The variable is specified by its variable header.
 | 
						|
 | 
						|
  @param[in]  VariableAddress    Start address of variable header.
 | 
						|
  @param[in]  Volatile           TRUE  - Variable is volatile.
 | 
						|
                                 FALSE - Variable is non-volatile.
 | 
						|
  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance           Instance of FV Block services.
 | 
						|
  @param[out] VariableData       Buffer to hold variable data for output.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
GetVariableDataPtr (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
 | 
						|
  IN  BOOLEAN                Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL        *Global,
 | 
						|
  IN  UINTN                  Instance,
 | 
						|
  OUT CHAR16                 *VariableData
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                        Status;
 | 
						|
  EFI_PHYSICAL_ADDRESS              Address;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  BOOLEAN                           IsValid;
 | 
						|
 | 
						|
  IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader);
 | 
						|
  ASSERT (IsValid);
 | 
						|
 | 
						|
  //
 | 
						|
  // Data area follows variable name.
 | 
						|
  // Be careful about pad size for alignment
 | 
						|
  //
 | 
						|
  Address =  VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  Address += NameSizeOfVariable (&VariableHeader);
 | 
						|
  Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader));
 | 
						|
 | 
						|
  Status = AccessVariableStore (
 | 
						|
             FALSE,
 | 
						|
             Global,
 | 
						|
             Volatile,
 | 
						|
             Instance,
 | 
						|
             Address,
 | 
						|
             VariableHeader.DataSize,
 | 
						|
             VariableData    
 | 
						|
             );
 | 
						|
  ASSERT_EFI_ERROR (Status);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the pointer to the next variable header.
 | 
						|
 | 
						|
  This function gets the pointer to the next variable header.
 | 
						|
  The variable is specified by its variable header.
 | 
						|
 | 
						|
  @param[in]  VariableAddress    Start address of variable header.
 | 
						|
  @param[in]  Volatile           TRUE  - Variable is volatile.
 | 
						|
                                 FALSE - Variable is non-volatile.
 | 
						|
  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance           Instance of FV Block services.
 | 
						|
 | 
						|
  @return                        Pointer to the next variable header.
 | 
						|
                                 NULL if variable header is invalid.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_PHYSICAL_ADDRESS
 | 
						|
GetNextVariablePtr (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
 | 
						|
  IN  BOOLEAN                Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL        *Global,
 | 
						|
  IN  UINTN                  Instance
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_PHYSICAL_ADDRESS              Address;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
 | 
						|
  if (!IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader)) {
 | 
						|
    return 0x0;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Header of next variable follows data area of this variable
 | 
						|
  //
 | 
						|
  Address =  VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  Address += NameSizeOfVariable (&VariableHeader);
 | 
						|
  Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader));
 | 
						|
  Address += DataSizeOfVariable (&VariableHeader);
 | 
						|
  Address += GET_PAD_SIZE (DataSizeOfVariable (&VariableHeader));
 | 
						|
 | 
						|
  //
 | 
						|
  // Be careful about pad size for alignment
 | 
						|
  //
 | 
						|
  return HEADER_ALIGN (Address);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the pointer to the first variable header in given variable store area.
 | 
						|
 | 
						|
  This function gets the pointer to the first variable header in given variable 
 | 
						|
  store area. The variable store area is given by its start address.
 | 
						|
 | 
						|
  @param[in] VarStoreHeaderAddress  Pointer to the header of variable store area.
 | 
						|
 | 
						|
  @return                           Pointer to the first variable header.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_PHYSICAL_ADDRESS
 | 
						|
GetStartPointer (
 | 
						|
  IN EFI_PHYSICAL_ADDRESS  VarStoreHeaderAddress
 | 
						|
  )
 | 
						|
{
 | 
						|
  return HEADER_ALIGN (VarStoreHeaderAddress + sizeof (VARIABLE_STORE_HEADER));
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Gets the pointer to the end of given variable store area.
 | 
						|
 | 
						|
  This function gets the pointer to the end of given variable store area.
 | 
						|
  The variable store area is given by its start address.
 | 
						|
 | 
						|
  @param[in]  VarStoreHeaderAddress  Pointer to the header of variable store area.
 | 
						|
  @param[in]  Volatile               TRUE  - Variable is volatile.
 | 
						|
                                     FALSE - Variable is non-volatile.
 | 
						|
  @param[in]  Global                 Pointer to VARAIBLE_GLOBAL structure.
 | 
						|
  @param[in]  Instance               Instance of FV Block services.
 | 
						|
 | 
						|
  @return                            Pointer to the end of given variable store area.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_PHYSICAL_ADDRESS
 | 
						|
GetEndPointer (
 | 
						|
  IN EFI_PHYSICAL_ADDRESS  VarStoreHeaderAddress,
 | 
						|
  IN  BOOLEAN              Volatile,
 | 
						|
  IN  VARIABLE_GLOBAL      *Global,
 | 
						|
  IN  UINTN                Instance
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS            Status;
 | 
						|
  VARIABLE_STORE_HEADER VariableStoreHeader;
 | 
						|
 | 
						|
  Status = AccessVariableStore (
 | 
						|
             FALSE,
 | 
						|
             Global,
 | 
						|
             Volatile,
 | 
						|
             Instance,
 | 
						|
             VarStoreHeaderAddress,
 | 
						|
             sizeof (VARIABLE_STORE_HEADER),
 | 
						|
             &VariableStoreHeader    
 | 
						|
             );
 | 
						|
 | 
						|
  ASSERT_EFI_ERROR (Status);
 | 
						|
  return HEADER_ALIGN (VarStoreHeaderAddress + VariableStoreHeader.Size);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Updates variable info entry in EFI system table for statistical information.
 | 
						|
 | 
						|
  Routine used to track statistical information about variable usage. 
 | 
						|
  The data is stored in the EFI system table so it can be accessed later.
 | 
						|
  VariableInfo.efi can dump out the table. Only Boot Services variable 
 | 
						|
  accesses are tracked by this code. The PcdVariableCollectStatistics
 | 
						|
  build flag controls if this feature is enabled. 
 | 
						|
  A read that hits in the cache will have Read and Cache true for 
 | 
						|
  the transaction. Data is allocated by this routine, but never
 | 
						|
  freed.
 | 
						|
 | 
						|
  @param[in]  VariableName   Name of the Variable to track.
 | 
						|
  @param[in]  VendorGuid     Guid of the Variable to track.
 | 
						|
  @param[in]  Volatile       TRUE if volatile FALSE if non-volatile.
 | 
						|
  @param[in]  Read           TRUE if GetVariable() was called.
 | 
						|
  @param[in]  Write          TRUE if SetVariable() was called.
 | 
						|
  @param[in]  Delete         TRUE if deleted via SetVariable().
 | 
						|
  @param[in]  Cache          TRUE for a cache hit.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
UpdateVariableInfo (
 | 
						|
  IN  CHAR16                  *VariableName,
 | 
						|
  IN  EFI_GUID                *VendorGuid,
 | 
						|
  IN  BOOLEAN                 Volatile,
 | 
						|
  IN  BOOLEAN                 Read,
 | 
						|
  IN  BOOLEAN                 Write,
 | 
						|
  IN  BOOLEAN                 Delete,
 | 
						|
  IN  BOOLEAN                 Cache
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_INFO_ENTRY   *Entry;
 | 
						|
 | 
						|
  if (FeaturePcdGet (PcdVariableCollectStatistics)) {
 | 
						|
 | 
						|
    if (EfiAtRuntime ()) {
 | 
						|
      //
 | 
						|
      // Don't collect statistics at runtime
 | 
						|
      //
 | 
						|
      return;
 | 
						|
    }
 | 
						|
 | 
						|
    if (gVariableInfo == NULL) {
 | 
						|
      //
 | 
						|
      // on the first call allocate a entry and place a pointer to it in
 | 
						|
      // the EFI System Table
 | 
						|
      //
 | 
						|
      gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
 | 
						|
      ASSERT (gVariableInfo != NULL);
 | 
						|
 | 
						|
      CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);
 | 
						|
      gVariableInfo->Name = AllocatePool (StrSize (VariableName));
 | 
						|
      ASSERT (gVariableInfo->Name != NULL);
 | 
						|
      StrCpyS (gVariableInfo->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName);
 | 
						|
      gVariableInfo->Volatile = Volatile;
 | 
						|
 | 
						|
      gBS->InstallConfigurationTable (&gEfiAuthenticatedVariableGuid, gVariableInfo);
 | 
						|
    }
 | 
						|
 | 
						|
    
 | 
						|
    for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {
 | 
						|
      if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {
 | 
						|
        if (StrCmp (VariableName, Entry->Name) == 0) {
 | 
						|
          //
 | 
						|
          // Find the entry matching both variable name and vender GUID,
 | 
						|
          // and update counters for all types.
 | 
						|
          //
 | 
						|
          if (Read) {
 | 
						|
            Entry->ReadCount++;
 | 
						|
          }
 | 
						|
          if (Write) {
 | 
						|
            Entry->WriteCount++;
 | 
						|
          }
 | 
						|
          if (Delete) {
 | 
						|
            Entry->DeleteCount++;
 | 
						|
          }
 | 
						|
          if (Cache) {
 | 
						|
            Entry->CacheCount++;
 | 
						|
          }
 | 
						|
 | 
						|
          return;
 | 
						|
        }
 | 
						|
      }
 | 
						|
 | 
						|
      if (Entry->Next == NULL) {
 | 
						|
        //
 | 
						|
        // If the entry is not in the table add it.
 | 
						|
        // Next iteration of the loop will fill in the data
 | 
						|
        //
 | 
						|
        Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
 | 
						|
        ASSERT (Entry->Next != NULL);
 | 
						|
 | 
						|
        CopyGuid (&Entry->Next->VendorGuid, VendorGuid);
 | 
						|
        Entry->Next->Name = AllocatePool (StrSize (VariableName));
 | 
						|
        ASSERT (Entry->Next->Name != NULL);
 | 
						|
        StrCpyS (Entry->Next->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName);
 | 
						|
        Entry->Next->Volatile = Volatile;
 | 
						|
      }
 | 
						|
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Updates variable in cache.
 | 
						|
 | 
						|
  This function searches the variable cache. If the variable to set exists in the cache,
 | 
						|
  it updates the variable in cache. It has the same parameters with UEFI SetVariable()
 | 
						|
  service.
 | 
						|
 | 
						|
  @param[in]  VariableName  A Null-terminated Unicode string that is the name of the vendor's
 | 
						|
                            variable.  Each VariableName is unique for each VendorGuid.
 | 
						|
  @param[in]  VendorGuid    A unique identifier for the vendor.
 | 
						|
  @param[in]  Attributes    Attributes bitmask to set for the variable.
 | 
						|
  @param[in]  DataSize      The size in bytes of the Data buffer.  A size of zero causes the
 | 
						|
                            variable to be deleted.
 | 
						|
  @param[in]  Data          The contents for the variable.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
UpdateVariableCache (
 | 
						|
  IN      CHAR16            *VariableName,
 | 
						|
  IN      EFI_GUID          *VendorGuid,
 | 
						|
  IN      UINT32            Attributes,
 | 
						|
  IN      UINTN             DataSize,
 | 
						|
  IN      VOID              *Data
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_CACHE_ENTRY      *Entry;
 | 
						|
  UINTN                     Index;
 | 
						|
 | 
						|
  if (EfiAtRuntime ()) {
 | 
						|
    //
 | 
						|
    // Don't use the cache at runtime
 | 
						|
    //
 | 
						|
    return;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Searches cache for the variable to update. If it exists, update it.
 | 
						|
  //
 | 
						|
  for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {
 | 
						|
    if (CompareGuid (VendorGuid, Entry->Guid)) {
 | 
						|
      if (StrCmp (VariableName, Entry->Name) == 0) { 
 | 
						|
        Entry->Attributes = Attributes;
 | 
						|
        if (DataSize == 0) {
 | 
						|
          //
 | 
						|
          // If DataSize is 0, delete the variable.
 | 
						|
          //
 | 
						|
          if (Entry->DataSize != 0) {
 | 
						|
            FreePool (Entry->Data);
 | 
						|
          }
 | 
						|
          Entry->DataSize = DataSize;
 | 
						|
        } else if (DataSize == Entry->DataSize) {
 | 
						|
          //
 | 
						|
          // If size of data does not change, simply copy data
 | 
						|
          //
 | 
						|
          CopyMem (Entry->Data, Data, DataSize);
 | 
						|
        } else {
 | 
						|
          //
 | 
						|
          // If size of data changes, allocate pool and copy data.
 | 
						|
          //
 | 
						|
          Entry->Data = AllocatePool (DataSize);
 | 
						|
          ASSERT (Entry->Data != NULL);
 | 
						|
          Entry->DataSize = DataSize;
 | 
						|
          CopyMem (Entry->Data, Data, DataSize);
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/**
 | 
						|
  Search the cache to check if the variable is in it.
 | 
						|
 | 
						|
  This function searches the variable cache. If the variable to find exists, return its data
 | 
						|
  and attributes.
 | 
						|
 | 
						|
  @param[in]      VariableName   A Null-terminated Unicode string that is the name of the vendor's
 | 
						|
                                 variable.  Each VariableName is unique for each VendorGuid.
 | 
						|
  @param[in]      VendorGuid     A unique identifier for the vendor
 | 
						|
  @param[out]     Attributes     Pointer to the attributes bitmask of the variable for output.
 | 
						|
  @param[in, out] DataSize       On input, size of the buffer of Data.
 | 
						|
                                 On output, size of the variable's data.
 | 
						|
  @param[out]     Data           Pointer to the data buffer for output.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS           VariableGuid & VariableName data was returned.
 | 
						|
  @retval EFI_NOT_FOUND         No matching variable found in cache.
 | 
						|
  @retval EFI_BUFFER_TOO_SMALL  *DataSize is smaller than size of the variable's data to return.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
FindVariableInCache (
 | 
						|
  IN      CHAR16            *VariableName,
 | 
						|
  IN      EFI_GUID          *VendorGuid,
 | 
						|
  OUT     UINT32            *Attributes OPTIONAL,
 | 
						|
  IN OUT  UINTN             *DataSize,
 | 
						|
  OUT     VOID              *Data
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_CACHE_ENTRY      *Entry;
 | 
						|
  UINTN                     Index;
 | 
						|
 | 
						|
  if (EfiAtRuntime ()) {
 | 
						|
    //
 | 
						|
    // Don't use the cache at runtime
 | 
						|
    //
 | 
						|
    return EFI_NOT_FOUND;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Searches cache for the variable
 | 
						|
  //
 | 
						|
  for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {
 | 
						|
    if (CompareGuid (VendorGuid, Entry->Guid)) {
 | 
						|
      if (StrCmp (VariableName, Entry->Name) == 0) {
 | 
						|
        if (Entry->DataSize == 0) {
 | 
						|
          //
 | 
						|
          // Variable has been deleted so return EFI_NOT_FOUND
 | 
						|
          //
 | 
						|
          return EFI_NOT_FOUND;
 | 
						|
        } else if (Entry->DataSize > *DataSize) {
 | 
						|
          //
 | 
						|
          // If buffer is too small, return the size needed and EFI_BUFFER_TOO_SMALL
 | 
						|
          //
 | 
						|
          *DataSize = Entry->DataSize;
 | 
						|
          return EFI_BUFFER_TOO_SMALL;
 | 
						|
        } else {
 | 
						|
          //
 | 
						|
          // If buffer is large enough, return the data
 | 
						|
          //
 | 
						|
          *DataSize = Entry->DataSize;
 | 
						|
          CopyMem (Data, Entry->Data, Entry->DataSize);
 | 
						|
          //
 | 
						|
          // If Attributes is not NULL, return the variable's attribute.
 | 
						|
          //
 | 
						|
          if (Attributes != NULL) {
 | 
						|
            *Attributes = Entry->Attributes;
 | 
						|
          }
 | 
						|
          return EFI_SUCCESS;
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
  
 | 
						|
  return EFI_NOT_FOUND;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Finds variable in volatile and non-volatile storage areas.
 | 
						|
 | 
						|
  This code finds variable in volatile and non-volatile storage areas.
 | 
						|
  If VariableName is an empty string, then we just return the first
 | 
						|
  qualified variable without comparing VariableName and VendorGuid.
 | 
						|
  Otherwise, VariableName and VendorGuid are compared.
 | 
						|
 | 
						|
  @param[in]  VariableName            Name of the variable to be found.
 | 
						|
  @param[in]  VendorGuid              Vendor GUID to be found.
 | 
						|
  @param[out] PtrTrack                VARIABLE_POINTER_TRACK structure for output,
 | 
						|
                                      including the range searched and the target position.
 | 
						|
  @param[in]  Global                  Pointer to VARIABLE_GLOBAL structure, including
 | 
						|
                                      base of volatile variable storage area, base of
 | 
						|
                                      NV variable storage area, and a lock.
 | 
						|
  @param[in]  Instance                Instance of FV Block services.
 | 
						|
 | 
						|
  @retval EFI_INVALID_PARAMETER       If VariableName is not an empty string, while
 | 
						|
                                      VendorGuid is NULL.
 | 
						|
  @retval EFI_SUCCESS                 Variable successfully found.
 | 
						|
  @retval EFI_INVALID_PARAMETER       Variable not found.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
FindVariable (
 | 
						|
  IN  CHAR16                  *VariableName,
 | 
						|
  IN  EFI_GUID                *VendorGuid,
 | 
						|
  OUT VARIABLE_POINTER_TRACK  *PtrTrack,
 | 
						|
  IN  VARIABLE_GLOBAL         *Global,
 | 
						|
  IN  UINTN                   Instance
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_PHYSICAL_ADDRESS              Variable[2];
 | 
						|
  EFI_PHYSICAL_ADDRESS              InDeletedVariable;
 | 
						|
  EFI_PHYSICAL_ADDRESS              VariableStoreHeader[2];
 | 
						|
  UINTN                             InDeletedStorageIndex;
 | 
						|
  UINTN                             Index;
 | 
						|
  CHAR16                            LocalVariableName[MAX_NAME_SIZE];
 | 
						|
  BOOLEAN                           Volatile;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
 | 
						|
  //
 | 
						|
  // 0: Volatile, 1: Non-Volatile
 | 
						|
  // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName
 | 
						|
  // make use of this mapping to implement search algorithme.
 | 
						|
  //
 | 
						|
  VariableStoreHeader[0]  = Global->VolatileVariableBase;
 | 
						|
  VariableStoreHeader[1]  = Global->NonVolatileVariableBase;
 | 
						|
 | 
						|
  //
 | 
						|
  // Start Pointers for the variable.
 | 
						|
  // Actual Data Pointer where data can be written.
 | 
						|
  //
 | 
						|
  Variable[0] = GetStartPointer (VariableStoreHeader[0]);
 | 
						|
  Variable[1] = GetStartPointer (VariableStoreHeader[1]);
 | 
						|
 | 
						|
  if (VariableName[0] != 0 && VendorGuid == NULL) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Find the variable by walk through volatile and then non-volatile variable store
 | 
						|
  //
 | 
						|
  InDeletedVariable     = 0x0;
 | 
						|
  InDeletedStorageIndex = 0;
 | 
						|
  Volatile = TRUE;
 | 
						|
  for (Index = 0; Index < 2; Index++) {
 | 
						|
    if (Index == 1) {
 | 
						|
      Volatile = FALSE;
 | 
						|
    }
 | 
						|
    while (IsValidVariableHeader (Variable[Index], Volatile, Global, Instance, &VariableHeader)) {
 | 
						|
      if (VariableHeader.State == VAR_ADDED || 
 | 
						|
          VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
 | 
						|
         ) {
 | 
						|
        if (!EfiAtRuntime () || ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
 | 
						|
          if (VariableName[0] == 0) {
 | 
						|
            //
 | 
						|
            // If VariableName is an empty string, then we just find the first qualified variable
 | 
						|
            // without comparing VariableName and VendorGuid
 | 
						|
            //
 | 
						|
            if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | 
						|
              //
 | 
						|
              // If variable is in delete transition, record it.
 | 
						|
              //
 | 
						|
              InDeletedVariable     = Variable[Index];
 | 
						|
              InDeletedStorageIndex = Index;
 | 
						|
            } else {
 | 
						|
              //
 | 
						|
              // If variable is not in delete transition, return it.
 | 
						|
              //
 | 
						|
              PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[Index]);
 | 
						|
              PtrTrack->EndPtr    = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance);
 | 
						|
              PtrTrack->CurrPtr   = Variable[Index];
 | 
						|
              PtrTrack->Volatile  = Volatile;
 | 
						|
 | 
						|
              return EFI_SUCCESS;
 | 
						|
            }
 | 
						|
          } else {
 | 
						|
            //
 | 
						|
            // If VariableName is not an empty string, then VariableName and VendorGuid are compared.
 | 
						|
            //
 | 
						|
            if (CompareGuid (VendorGuid, &VariableHeader.VendorGuid)) {
 | 
						|
              GetVariableNamePtr (
 | 
						|
                Variable[Index],
 | 
						|
                Volatile,
 | 
						|
                Global,
 | 
						|
                Instance,
 | 
						|
                LocalVariableName
 | 
						|
                );
 | 
						|
 | 
						|
              ASSERT (NameSizeOfVariable (&VariableHeader) != 0);
 | 
						|
              if (CompareMem (VariableName, LocalVariableName, NameSizeOfVariable (&VariableHeader)) == 0) {
 | 
						|
                if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | 
						|
                  //
 | 
						|
                  // If variable is in delete transition, record it.
 | 
						|
                  // We will use if only no VAR_ADDED variable is found.
 | 
						|
                  //
 | 
						|
                  InDeletedVariable     = Variable[Index];
 | 
						|
                  InDeletedStorageIndex = Index;
 | 
						|
                } else {
 | 
						|
                  //
 | 
						|
                  // If variable is not in delete transition, return it.
 | 
						|
                  //
 | 
						|
                  PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[Index]);
 | 
						|
                  PtrTrack->EndPtr    = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance);
 | 
						|
                  PtrTrack->CurrPtr   = Variable[Index];
 | 
						|
                  PtrTrack->Volatile  = Volatile;
 | 
						|
 | 
						|
                  return EFI_SUCCESS;
 | 
						|
                }
 | 
						|
              }
 | 
						|
            }
 | 
						|
          }
 | 
						|
        }
 | 
						|
      }
 | 
						|
 | 
						|
      Variable[Index] = GetNextVariablePtr (
 | 
						|
                          Variable[Index],
 | 
						|
                          Volatile,
 | 
						|
                          Global,
 | 
						|
                          Instance
 | 
						|
                          );
 | 
						|
    }
 | 
						|
    if (InDeletedVariable != 0x0) {
 | 
						|
      //
 | 
						|
      // If no VAR_ADDED variable is found, and only variable in delete transition, then use this one.
 | 
						|
      //
 | 
						|
      PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[InDeletedStorageIndex]);
 | 
						|
      PtrTrack->EndPtr    = GetEndPointer (
 | 
						|
                              VariableStoreHeader[InDeletedStorageIndex],
 | 
						|
                              (BOOLEAN)(InDeletedStorageIndex == 0),
 | 
						|
                              Global,
 | 
						|
                              Instance
 | 
						|
                              );
 | 
						|
      PtrTrack->CurrPtr   = InDeletedVariable;
 | 
						|
      PtrTrack->Volatile  = (BOOLEAN)(InDeletedStorageIndex == 0);
 | 
						|
      return EFI_SUCCESS;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  PtrTrack->CurrPtr = 0x0;
 | 
						|
  return EFI_NOT_FOUND;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Variable store garbage collection and reclaim operation.
 | 
						|
 | 
						|
  @param[in]  VariableBase        Base address of variable store area.
 | 
						|
  @param[out] LastVariableOffset  Offset of last variable.
 | 
						|
  @param[in]  IsVolatile          The variable store is volatile or not,
 | 
						|
                                  if it is non-volatile, need FTW.
 | 
						|
  @param[in]  VirtualMode         Current calling mode for this function.
 | 
						|
  @param[in]  Global              Context of this Extended SAL Variable Services Class call.
 | 
						|
  @param[in]  UpdatingVariable    Pointer to header of the variable that is being updated.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS             Variable store successfully reclaimed.
 | 
						|
  @retval EFI_OUT_OF_RESOURCES    Fail to allocate memory buffer to hold all valid variables.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
Reclaim (
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS  VariableBase,
 | 
						|
  OUT UINTN                 *LastVariableOffset,
 | 
						|
  IN  BOOLEAN               IsVolatile,
 | 
						|
  IN  BOOLEAN               VirtualMode,
 | 
						|
  IN  ESAL_VARIABLE_GLOBAL  *Global,
 | 
						|
  IN  EFI_PHYSICAL_ADDRESS  UpdatingVariable
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_PHYSICAL_ADDRESS              Variable;
 | 
						|
  EFI_PHYSICAL_ADDRESS              AddedVariable;
 | 
						|
  EFI_PHYSICAL_ADDRESS              NextVariable;
 | 
						|
  EFI_PHYSICAL_ADDRESS              NextAddedVariable;
 | 
						|
  VARIABLE_STORE_HEADER             VariableStoreHeader;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     AddedVariableHeader;
 | 
						|
  CHAR16                            VariableName[MAX_NAME_SIZE];
 | 
						|
  CHAR16                            AddedVariableName[MAX_NAME_SIZE];
 | 
						|
  UINT8                             *ValidBuffer;
 | 
						|
  UINTN                             MaximumBufferSize;
 | 
						|
  UINTN                             VariableSize;
 | 
						|
  UINTN                             NameSize;
 | 
						|
  UINT8                             *CurrPtr;
 | 
						|
  BOOLEAN                           FoundAdded;
 | 
						|
  EFI_STATUS                        Status;
 | 
						|
  VARIABLE_GLOBAL                   *VariableGlobal;
 | 
						|
  UINT32                            Instance;
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  GetVarStoreHeader (VariableBase, IsVolatile, VariableGlobal, Instance, &VariableStoreHeader);
 | 
						|
  //
 | 
						|
  // recaluate the total size of Common/HwErr type variables in non-volatile area.
 | 
						|
  //
 | 
						|
  if (!IsVolatile) {
 | 
						|
    Global->CommonVariableTotalSize = 0;
 | 
						|
    Global->HwErrVariableTotalSize  = 0;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Calculate the size of buffer needed to gather all valid variables
 | 
						|
  //
 | 
						|
  Variable          = GetStartPointer (VariableBase);
 | 
						|
  MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER);
 | 
						|
 | 
						|
  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
 | 
						|
    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
 | 
						|
    //
 | 
						|
    // Collect VAR_ADDED variables, and variables in delete transition status.
 | 
						|
    //
 | 
						|
    if (VariableHeader.State == VAR_ADDED || 
 | 
						|
        VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
 | 
						|
       ) {
 | 
						|
      VariableSize = NextVariable - Variable;
 | 
						|
      MaximumBufferSize += VariableSize;
 | 
						|
    }
 | 
						|
 | 
						|
    Variable = NextVariable;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Reserve the 1 Bytes with Oxff to identify the 
 | 
						|
  // end of the variable buffer. 
 | 
						|
  // 
 | 
						|
  MaximumBufferSize += 1;
 | 
						|
  ValidBuffer = AllocatePool (MaximumBufferSize);
 | 
						|
  if (ValidBuffer == NULL) {
 | 
						|
    return EFI_OUT_OF_RESOURCES;
 | 
						|
  }
 | 
						|
 | 
						|
  SetMem (ValidBuffer, MaximumBufferSize, 0xff);
 | 
						|
 | 
						|
  //
 | 
						|
  // Copy variable store header
 | 
						|
  //
 | 
						|
  CopyMem (ValidBuffer, &VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));
 | 
						|
  CurrPtr = (UINT8 *) GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer);
 | 
						|
 | 
						|
  //
 | 
						|
  // Reinstall all ADDED variables
 | 
						|
  // 
 | 
						|
  Variable = GetStartPointer (VariableBase);
 | 
						|
  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
 | 
						|
    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
 | 
						|
    if (VariableHeader.State == VAR_ADDED) {
 | 
						|
      VariableSize = NextVariable - Variable;
 | 
						|
      CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
 | 
						|
      CurrPtr += VariableSize;
 | 
						|
      if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
        Global->HwErrVariableTotalSize += VariableSize;
 | 
						|
      } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
        Global->CommonVariableTotalSize += VariableSize;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    Variable = NextVariable;
 | 
						|
  }
 | 
						|
  //
 | 
						|
  // Reinstall in delete transition variables
 | 
						|
  // 
 | 
						|
  Variable = GetStartPointer (VariableBase);
 | 
						|
  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
 | 
						|
    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
 | 
						|
    if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
 | 
						|
 | 
						|
      //
 | 
						|
      // Buffer has cached all ADDED variable. 
 | 
						|
      // Per IN_DELETED variable, we have to guarantee that
 | 
						|
      // no ADDED one in previous buffer. 
 | 
						|
      // 
 | 
						|
      FoundAdded = FALSE;
 | 
						|
      AddedVariable = GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer);
 | 
						|
      while (IsValidVariableHeader (AddedVariable, IsVolatile, VariableGlobal, Instance, &AddedVariableHeader)) {
 | 
						|
        NextAddedVariable = GetNextVariablePtr (AddedVariable, IsVolatile, VariableGlobal, Instance);
 | 
						|
        NameSize = NameSizeOfVariable (&AddedVariableHeader);
 | 
						|
        if (CompareGuid (&AddedVariableHeader.VendorGuid, &VariableHeader.VendorGuid) &&
 | 
						|
            NameSize == NameSizeOfVariable (&VariableHeader)
 | 
						|
           ) {
 | 
						|
          GetVariableNamePtr (Variable, IsVolatile, VariableGlobal, Instance, VariableName);
 | 
						|
          GetVariableNamePtr (AddedVariable, IsVolatile, VariableGlobal, Instance, AddedVariableName);
 | 
						|
          if (CompareMem (VariableName, AddedVariableName, NameSize) == 0) {
 | 
						|
            //
 | 
						|
            // If ADDED variable with the same name and vender GUID has been reinstalled,
 | 
						|
            // then discard this IN_DELETED copy.
 | 
						|
            //
 | 
						|
            FoundAdded = TRUE;
 | 
						|
            break;
 | 
						|
          }
 | 
						|
        }
 | 
						|
        AddedVariable = NextAddedVariable;
 | 
						|
      }
 | 
						|
      //
 | 
						|
      // Add IN_DELETE variables that have not been added to buffer
 | 
						|
      //
 | 
						|
      if (!FoundAdded) {
 | 
						|
        VariableSize = NextVariable - Variable;
 | 
						|
        CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
 | 
						|
        if (Variable != UpdatingVariable) {
 | 
						|
          //
 | 
						|
          // Make this IN_DELETE instance valid if:
 | 
						|
          // 1. No valid instance of this variable exists.
 | 
						|
          // 2. It is not the variable that is going to be updated.
 | 
						|
          //
 | 
						|
          ((AUTHENTICATED_VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
 | 
						|
        }
 | 
						|
        CurrPtr += VariableSize;
 | 
						|
        if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
          Global->HwErrVariableTotalSize += VariableSize;
 | 
						|
        } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
          Global->CommonVariableTotalSize += VariableSize;
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
    Variable = NextVariable;
 | 
						|
  }
 | 
						|
 | 
						|
  if (IsVolatile) {
 | 
						|
    //
 | 
						|
    // If volatile variable store, just copy valid buffer
 | 
						|
    //
 | 
						|
    SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader.Size, 0xff);
 | 
						|
    CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) (CurrPtr - (UINT8 *) ValidBuffer));
 | 
						|
    Status = EFI_SUCCESS;
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // If non-volatile variable store, perform FTW here.
 | 
						|
    // Write ValidBuffer to destination specified by VariableBase.
 | 
						|
    //
 | 
						|
    Status = FtwVariableSpace (
 | 
						|
               VariableBase,
 | 
						|
               ValidBuffer,
 | 
						|
               (UINTN) (CurrPtr - (UINT8 *) ValidBuffer)
 | 
						|
               );
 | 
						|
  }
 | 
						|
  if (!EFI_ERROR (Status)) {
 | 
						|
    *LastVariableOffset = (UINTN) (CurrPtr - (UINT8 *) ValidBuffer);
 | 
						|
  } else {
 | 
						|
    *LastVariableOffset = 0;
 | 
						|
  }
 | 
						|
 | 
						|
  FreePool (ValidBuffer);
 | 
						|
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Get index from supported language codes according to language string.
 | 
						|
 | 
						|
  This code is used to get corresponding index in supported language codes. It can handle
 | 
						|
  RFC4646 and ISO639 language tags.
 | 
						|
  In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.
 | 
						|
  In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.
 | 
						|
 | 
						|
  For example:
 | 
						|
    SupportedLang  = "engfraengfra"
 | 
						|
    Lang           = "eng"
 | 
						|
    Iso639Language = TRUE
 | 
						|
  The return value is "0".
 | 
						|
  Another example:
 | 
						|
    SupportedLang  = "en;fr;en-US;fr-FR"
 | 
						|
    Lang           = "fr-FR"
 | 
						|
    Iso639Language = FALSE
 | 
						|
  The return value is "3".
 | 
						|
 | 
						|
  @param[in]  SupportedLang          Platform supported language codes.
 | 
						|
  @param[in]  Lang                   Configured language.
 | 
						|
  @param[in]  Iso639Language         A bool value to signify if the handler is operated on ISO639 or RFC4646.
 | 
						|
 | 
						|
  @return                            The index of language in the language codes.
 | 
						|
 | 
						|
**/
 | 
						|
UINTN
 | 
						|
GetIndexFromSupportedLangCodes(
 | 
						|
  IN  CHAR8            *SupportedLang,
 | 
						|
  IN  CHAR8            *Lang,
 | 
						|
  IN  BOOLEAN          Iso639Language
 | 
						|
  ) 
 | 
						|
{
 | 
						|
  UINTN    Index;
 | 
						|
  UINTN    CompareLength;
 | 
						|
  UINTN    LanguageLength;
 | 
						|
 | 
						|
  if (Iso639Language) {
 | 
						|
    CompareLength = ISO_639_2_ENTRY_SIZE;
 | 
						|
    for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {
 | 
						|
      if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {
 | 
						|
        //
 | 
						|
        // Successfully find the index of Lang string in SupportedLang string.
 | 
						|
        //
 | 
						|
        Index = Index / CompareLength;
 | 
						|
        return Index;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    ASSERT (FALSE);
 | 
						|
    return 0;
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // Compare RFC4646 language code
 | 
						|
    //
 | 
						|
    Index = 0;
 | 
						|
    for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++);
 | 
						|
 | 
						|
    for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) {
 | 
						|
      //
 | 
						|
      // Skip ';' characters in SupportedLang
 | 
						|
      //
 | 
						|
      for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++);
 | 
						|
      //
 | 
						|
      // Determine the length of the next language code in SupportedLang
 | 
						|
      //
 | 
						|
      for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);
 | 
						|
      
 | 
						|
      if ((CompareLength == LanguageLength) && 
 | 
						|
          (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {
 | 
						|
        //
 | 
						|
        // Successfully find the index of Lang string in SupportedLang string.
 | 
						|
        //
 | 
						|
        return Index;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    ASSERT (FALSE);
 | 
						|
    return 0;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Get language string from supported language codes according to index.
 | 
						|
 | 
						|
  This code is used to get corresponding language string in supported language codes. It can handle
 | 
						|
  RFC4646 and ISO639 language tags.
 | 
						|
  In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.
 | 
						|
  In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.
 | 
						|
 | 
						|
  For example:
 | 
						|
    SupportedLang  = "engfraengfra"
 | 
						|
    Index          = "1"
 | 
						|
    Iso639Language = TRUE
 | 
						|
  The return value is "fra".
 | 
						|
  Another example:
 | 
						|
    SupportedLang  = "en;fr;en-US;fr-FR"
 | 
						|
    Index          = "1"
 | 
						|
    Iso639Language = FALSE
 | 
						|
  The return value is "fr".
 | 
						|
 | 
						|
  @param[in]  SupportedLang   Platform supported language codes.
 | 
						|
  @param[in]  Index           the index in supported language codes.
 | 
						|
  @param[in]  Iso639Language  A bool value to signify if the handler is operated on ISO639 or RFC4646.
 | 
						|
  @param[in]  VirtualMode     Current calling mode for this function.
 | 
						|
  @param[in]  Global          Context of this Extended SAL Variable Services Class call.
 | 
						|
 | 
						|
  @return                     The language string in the language codes.
 | 
						|
 | 
						|
**/
 | 
						|
CHAR8 *
 | 
						|
GetLangFromSupportedLangCodes (
 | 
						|
  IN  CHAR8                 *SupportedLang,
 | 
						|
  IN  UINTN                 Index,
 | 
						|
  IN  BOOLEAN               Iso639Language,
 | 
						|
  IN  BOOLEAN               VirtualMode,
 | 
						|
  IN  ESAL_VARIABLE_GLOBAL  *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  UINTN    SubIndex;
 | 
						|
  UINTN    CompareLength;
 | 
						|
  CHAR8    *Supported;
 | 
						|
 | 
						|
  SubIndex  = 0;
 | 
						|
  Supported = SupportedLang;
 | 
						|
  if (Iso639Language) {
 | 
						|
    //
 | 
						|
    // according to the index of Lang string in SupportedLang string to get the language.
 | 
						|
    // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
 | 
						|
    // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
 | 
						|
    //
 | 
						|
    CompareLength = ISO_639_2_ENTRY_SIZE;
 | 
						|
    Global->Lang[CompareLength] = '\0';
 | 
						|
    return CopyMem (Global->Lang, SupportedLang + Index * CompareLength, CompareLength);
 | 
						|
 | 
						|
  } else {
 | 
						|
    while (TRUE) {
 | 
						|
      //
 | 
						|
      // take semicolon as delimitation, sequentially traverse supported language codes.
 | 
						|
      //
 | 
						|
      for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {
 | 
						|
        Supported++;
 | 
						|
      }
 | 
						|
      if ((*Supported == '\0') && (SubIndex != Index)) {
 | 
						|
        //
 | 
						|
        // Have completed the traverse, but not find corrsponding string.
 | 
						|
        // This case is not allowed to happen.
 | 
						|
        //
 | 
						|
        ASSERT(FALSE);
 | 
						|
        return NULL;
 | 
						|
      }
 | 
						|
      if (SubIndex == Index) {
 | 
						|
        //
 | 
						|
        // according to the index of Lang string in SupportedLang string to get the language.
 | 
						|
        // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
 | 
						|
        // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
 | 
						|
        //
 | 
						|
        Global->PlatformLang[VirtualMode][CompareLength] = '\0';
 | 
						|
        return CopyMem (Global->PlatformLang[VirtualMode], Supported - CompareLength, CompareLength);
 | 
						|
      }
 | 
						|
      SubIndex++;
 | 
						|
 | 
						|
      //
 | 
						|
      // Skip ';' characters in Supported
 | 
						|
      //
 | 
						|
      for (; *Supported != '\0' && *Supported == ';'; Supported++);
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Returns a pointer to an allocated buffer that contains the best matching language 
 | 
						|
  from a set of supported languages.  
 | 
						|
  
 | 
						|
  This function supports both ISO 639-2 and RFC 4646 language codes, but language 
 | 
						|
  code types may not be mixed in a single call to this function. This function
 | 
						|
  supports a variable argument list that allows the caller to pass in a prioritized
 | 
						|
  list of language codes to test against all the language codes in SupportedLanguages.
 | 
						|
 | 
						|
  If SupportedLanguages is NULL, then ASSERT().
 | 
						|
 | 
						|
  @param[in]  SupportedLanguages  A pointer to a Null-terminated ASCII string that
 | 
						|
                                  contains a set of language codes in the format 
 | 
						|
                                  specified by Iso639Language.
 | 
						|
  @param[in]  Iso639Language      If TRUE, then all language codes are assumed to be
 | 
						|
                                  in ISO 639-2 format.  If FALSE, then all language
 | 
						|
                                  codes are assumed to be in RFC 4646 language format.
 | 
						|
  @param[in]  VirtualMode         Current calling mode for this function.
 | 
						|
  @param[in]  ...                 A variable argument list that contains pointers to 
 | 
						|
                                  Null-terminated ASCII strings that contain one or more
 | 
						|
                                  language codes in the format specified by Iso639Language.
 | 
						|
                                  The first language code from each of these language
 | 
						|
                                  code lists is used to determine if it is an exact or
 | 
						|
                                  close match to any of the language codes in 
 | 
						|
                                  SupportedLanguages.  Close matches only apply to RFC 4646
 | 
						|
                                  language codes, and the matching algorithm from RFC 4647
 | 
						|
                                  is used to determine if a close match is present.  If 
 | 
						|
                                  an exact or close match is found, then the matching
 | 
						|
                                  language code from SupportedLanguages is returned.  If
 | 
						|
                                  no matches are found, then the next variable argument
 | 
						|
                                  parameter is evaluated.  The variable argument list 
 | 
						|
                                  is terminated by a NULL.
 | 
						|
 | 
						|
  @retval NULL   The best matching language could not be found in SupportedLanguages.
 | 
						|
  @retval NULL   There are not enough resources available to return the best matching 
 | 
						|
                 language.
 | 
						|
  @retval Other  A pointer to a Null-terminated ASCII string that is the best matching 
 | 
						|
                 language in SupportedLanguages.
 | 
						|
 | 
						|
**/
 | 
						|
CHAR8 *
 | 
						|
VariableGetBestLanguage (
 | 
						|
  IN CONST CHAR8  *SupportedLanguages, 
 | 
						|
  IN BOOLEAN      Iso639Language,
 | 
						|
  IN BOOLEAN      VirtualMode,
 | 
						|
  ...
 | 
						|
  )
 | 
						|
{
 | 
						|
  VA_LIST      Args;
 | 
						|
  CHAR8        *Language;
 | 
						|
  UINTN        CompareLength;
 | 
						|
  UINTN        LanguageLength;
 | 
						|
  CONST CHAR8  *Supported;
 | 
						|
  CHAR8        *Buffer;
 | 
						|
 | 
						|
  ASSERT (SupportedLanguages != NULL);
 | 
						|
 | 
						|
  VA_START (Args, VirtualMode);
 | 
						|
  while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) {
 | 
						|
    //
 | 
						|
    // Default to ISO 639-2 mode
 | 
						|
    //
 | 
						|
    CompareLength  = 3;
 | 
						|
    LanguageLength = MIN (3, AsciiStrLen (Language));
 | 
						|
 | 
						|
    //
 | 
						|
    // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language
 | 
						|
    //
 | 
						|
    if (!Iso639Language) {
 | 
						|
      for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++);
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Trim back the length of Language used until it is empty
 | 
						|
    //
 | 
						|
    while (LanguageLength > 0) {
 | 
						|
      //
 | 
						|
      // Loop through all language codes in SupportedLanguages
 | 
						|
      //
 | 
						|
      for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) {
 | 
						|
        //
 | 
						|
        // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages
 | 
						|
        //
 | 
						|
        if (!Iso639Language) {
 | 
						|
          //
 | 
						|
          // Skip ';' characters in Supported
 | 
						|
          //
 | 
						|
          for (; *Supported != '\0' && *Supported == ';'; Supported++);
 | 
						|
          //
 | 
						|
          // Determine the length of the next language code in Supported
 | 
						|
          //
 | 
						|
          for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++);
 | 
						|
          //
 | 
						|
          // If Language is longer than the Supported, then skip to the next language
 | 
						|
          //
 | 
						|
          if (LanguageLength > CompareLength) {
 | 
						|
            continue;
 | 
						|
          }
 | 
						|
        }
 | 
						|
        //
 | 
						|
        // See if the first LanguageLength characters in Supported match Language
 | 
						|
        //
 | 
						|
        if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) {
 | 
						|
          VA_END (Args);
 | 
						|
 | 
						|
          Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang[VirtualMode];
 | 
						|
          Buffer[CompareLength] = '\0';
 | 
						|
          return CopyMem (Buffer, Supported, CompareLength);
 | 
						|
        }
 | 
						|
      }
 | 
						|
 | 
						|
      if (Iso639Language) {
 | 
						|
        //
 | 
						|
        // If ISO 639 mode, then each language can only be tested once
 | 
						|
        //
 | 
						|
        LanguageLength = 0;
 | 
						|
      } else {
 | 
						|
        //
 | 
						|
        // If RFC 4646 mode, then trim Language from the right to the next '-' character 
 | 
						|
        //
 | 
						|
        for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--);
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
  VA_END (Args);
 | 
						|
 | 
						|
  //
 | 
						|
  // No matches were found 
 | 
						|
  //
 | 
						|
  return NULL;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.
 | 
						|
 | 
						|
  When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.
 | 
						|
  According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,
 | 
						|
  and are read-only. Therefore, in variable driver, only store the original value for other use.
 | 
						|
 | 
						|
  @param[in] VariableName  Name of variable.
 | 
						|
  @param[in] Data          Variable data.
 | 
						|
  @param[in] DataSize      Size of data. 0 means delete.
 | 
						|
  @param[in] VirtualMode   Current calling mode for this function.
 | 
						|
  @param[in] Global        Context of this Extended SAL Variable Services Class call.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
AutoUpdateLangVariable(
 | 
						|
  IN  CHAR16                *VariableName,
 | 
						|
  IN  VOID                  *Data,
 | 
						|
  IN  UINTN                 DataSize,
 | 
						|
  IN  BOOLEAN               VirtualMode,
 | 
						|
  IN  ESAL_VARIABLE_GLOBAL  *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS              Status;
 | 
						|
  CHAR8                   *BestPlatformLang;
 | 
						|
  CHAR8                   *BestLang;
 | 
						|
  UINTN                   Index;
 | 
						|
  UINT32                  Attributes;
 | 
						|
  VARIABLE_POINTER_TRACK  Variable;
 | 
						|
  BOOLEAN                 SetLanguageCodes;
 | 
						|
  CHAR16                  **PredefinedVariableName;
 | 
						|
  VARIABLE_GLOBAL         *VariableGlobal;
 | 
						|
  UINT32                  Instance;
 | 
						|
 | 
						|
  //
 | 
						|
  // Don't do updates for delete operation
 | 
						|
  //
 | 
						|
  if (DataSize == 0) {
 | 
						|
    return;
 | 
						|
  }
 | 
						|
 | 
						|
  SetLanguageCodes = FALSE;
 | 
						|
  VariableGlobal   = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance         = Global->FvbInstance;
 | 
						|
 | 
						|
 | 
						|
  PredefinedVariableName = &Global->VariableName[VirtualMode][0];
 | 
						|
  if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG_CODES]) == 0) {
 | 
						|
    //
 | 
						|
    // PlatformLangCodes is a volatile variable, so it can not be updated at runtime.
 | 
						|
    //
 | 
						|
    if (EfiAtRuntime ()) {
 | 
						|
      return;
 | 
						|
    }
 | 
						|
 | 
						|
    SetLanguageCodes = TRUE;
 | 
						|
 | 
						|
    //
 | 
						|
    // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only
 | 
						|
    // Therefore, in variable driver, only store the original value for other use.
 | 
						|
    //
 | 
						|
    if (Global->PlatformLangCodes[VirtualMode] != NULL) {
 | 
						|
      FreePool (Global->PlatformLangCodes[VirtualMode]);
 | 
						|
    }
 | 
						|
    Global->PlatformLangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data);
 | 
						|
    ASSERT (Global->PlatformLangCodes[VirtualMode] != NULL);
 | 
						|
 | 
						|
    //
 | 
						|
    // PlatformLang holds a single language from PlatformLangCodes, 
 | 
						|
    // so the size of PlatformLangCodes is enough for the PlatformLang.
 | 
						|
    //
 | 
						|
    if (Global->PlatformLang[VirtualMode] != NULL) {
 | 
						|
      FreePool (Global->PlatformLang[VirtualMode]);
 | 
						|
    }
 | 
						|
    Global->PlatformLang[VirtualMode] = AllocateRuntimePool (DataSize);
 | 
						|
    ASSERT (Global->PlatformLang[VirtualMode] != NULL);
 | 
						|
 | 
						|
  } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG_CODES]) == 0) {
 | 
						|
    //
 | 
						|
    // LangCodes is a volatile variable, so it can not be updated at runtime.
 | 
						|
    //
 | 
						|
    if (EfiAtRuntime ()) {
 | 
						|
      return;
 | 
						|
    }
 | 
						|
 | 
						|
    SetLanguageCodes = TRUE;
 | 
						|
 | 
						|
    //
 | 
						|
    // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only
 | 
						|
    // Therefore, in variable driver, only store the original value for other use.
 | 
						|
    //
 | 
						|
    if (Global->LangCodes[VirtualMode] != NULL) {
 | 
						|
      FreePool (Global->LangCodes[VirtualMode]);
 | 
						|
    }
 | 
						|
    Global->LangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data);
 | 
						|
    ASSERT (Global->LangCodes[VirtualMode] != NULL);
 | 
						|
  }
 | 
						|
 | 
						|
  if (SetLanguageCodes 
 | 
						|
      && (Global->PlatformLangCodes[VirtualMode] != NULL)
 | 
						|
      && (Global->LangCodes[VirtualMode] != NULL)) {
 | 
						|
    //
 | 
						|
    // Update Lang if PlatformLang is already set
 | 
						|
    // Update PlatformLang if Lang is already set
 | 
						|
    //
 | 
						|
    Status = FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
 | 
						|
    if (!EFI_ERROR (Status)) {
 | 
						|
      //
 | 
						|
      // Update Lang
 | 
						|
      //
 | 
						|
      VariableName = PredefinedVariableName[VAR_PLATFORM_LANG];
 | 
						|
    } else {
 | 
						|
      Status = FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
 | 
						|
      if (!EFI_ERROR (Status)) {
 | 
						|
        //
 | 
						|
        // Update PlatformLang
 | 
						|
        //
 | 
						|
        VariableName = PredefinedVariableName[VAR_LANG];
 | 
						|
      } else {
 | 
						|
        //
 | 
						|
        // Neither PlatformLang nor Lang is set, directly return
 | 
						|
        //
 | 
						|
        return;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    Data    = (VOID *) GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
 | 
						|
    GetVariableDataPtr ((EFI_PHYSICAL_ADDRESS) Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, (CHAR16 *) Data);
 | 
						|
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               FALSE,
 | 
						|
               VariableGlobal,
 | 
						|
               Variable.Volatile,
 | 
						|
               Instance,
 | 
						|
               (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable.CurrPtr)->DataSize),
 | 
						|
               sizeof (DataSize),
 | 
						|
               &DataSize
 | 
						|
               ); 
 | 
						|
    ASSERT_EFI_ERROR (Status);
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.
 | 
						|
  //
 | 
						|
  Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;
 | 
						|
 | 
						|
  if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG]) == 0) {
 | 
						|
    //
 | 
						|
    // Update Lang when PlatformLangCodes/LangCodes were set.
 | 
						|
    //
 | 
						|
    if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) {
 | 
						|
      //
 | 
						|
      // When setting PlatformLang, firstly get most matched language string from supported language codes.
 | 
						|
      //
 | 
						|
      BestPlatformLang = VariableGetBestLanguage (Global->PlatformLangCodes[VirtualMode], FALSE, VirtualMode, Data, NULL);
 | 
						|
      if (BestPlatformLang != NULL) {
 | 
						|
        //
 | 
						|
        // Get the corresponding index in language codes.
 | 
						|
        //
 | 
						|
        Index = GetIndexFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], BestPlatformLang, FALSE);
 | 
						|
 | 
						|
        //
 | 
						|
        // Get the corresponding ISO639 language tag according to RFC4646 language tag.
 | 
						|
        //
 | 
						|
        BestLang = GetLangFromSupportedLangCodes (Global->LangCodes[VirtualMode], Index, TRUE, VirtualMode, Global);
 | 
						|
 | 
						|
        //
 | 
						|
        // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.
 | 
						|
        //
 | 
						|
        FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
 | 
						|
 | 
						|
        Status = UpdateVariable (
 | 
						|
                   PredefinedVariableName[VAR_LANG],
 | 
						|
                   Global->GlobalVariableGuid[VirtualMode],
 | 
						|
                   BestLang,
 | 
						|
                   ISO_639_2_ENTRY_SIZE + 1,
 | 
						|
                   Attributes,
 | 
						|
                   0,
 | 
						|
                   0,
 | 
						|
                   VirtualMode,
 | 
						|
                   Global,
 | 
						|
                   &Variable
 | 
						|
                   );
 | 
						|
 | 
						|
        DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a\n", BestPlatformLang, BestLang));
 | 
						|
 | 
						|
        ASSERT_EFI_ERROR (Status);
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
  } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG]) == 0) {
 | 
						|
    //
 | 
						|
    // Update PlatformLang when PlatformLangCodes/LangCodes were set.
 | 
						|
    //
 | 
						|
    if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) {
 | 
						|
      //
 | 
						|
      // When setting Lang, firstly get most matched language string from supported language codes.
 | 
						|
      //
 | 
						|
      BestLang = VariableGetBestLanguage (Global->LangCodes[VirtualMode], TRUE, VirtualMode, Data, NULL);
 | 
						|
      if (BestLang != NULL) {
 | 
						|
        //
 | 
						|
        // Get the corresponding index in language codes.
 | 
						|
        //
 | 
						|
        Index = GetIndexFromSupportedLangCodes (Global->LangCodes[VirtualMode], BestLang, TRUE);
 | 
						|
 | 
						|
        //
 | 
						|
        // Get the corresponding RFC4646 language tag according to ISO639 language tag.
 | 
						|
        //
 | 
						|
        BestPlatformLang = GetLangFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], Index, FALSE, VirtualMode, Global);
 | 
						|
 | 
						|
        //
 | 
						|
        // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.
 | 
						|
        //
 | 
						|
        FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
 | 
						|
 | 
						|
        Status = UpdateVariable (
 | 
						|
                   PredefinedVariableName[VAR_PLATFORM_LANG], 
 | 
						|
                   Global->GlobalVariableGuid[VirtualMode], 
 | 
						|
                   BestPlatformLang, 
 | 
						|
                   AsciiStrSize (BestPlatformLang), 
 | 
						|
                   Attributes, 
 | 
						|
                   0,
 | 
						|
                   0,
 | 
						|
                   VirtualMode, 
 | 
						|
                   Global, 
 | 
						|
                   &Variable
 | 
						|
                   );
 | 
						|
 | 
						|
        DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a\n", BestLang, BestPlatformLang));
 | 
						|
        ASSERT_EFI_ERROR (Status);
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Update the variable region with Variable information. These are the same 
 | 
						|
  arguments as the EFI Variable services.
 | 
						|
 | 
						|
  @param[in] VariableName       Name of variable.
 | 
						|
  @param[in] VendorGuid         Guid of variable.
 | 
						|
  @param[in] Data               Variable data.
 | 
						|
  @param[in] DataSize           Size of data. 0 means delete.
 | 
						|
  @param[in] Attributes         Attributes of the variable.
 | 
						|
  @param[in] KeyIndex           Index of associated public key.
 | 
						|
  @param[in] MonotonicCount     Value of associated monotonic count. 
 | 
						|
  @param[in] VirtualMode        Current calling mode for this function.
 | 
						|
  @param[in] Global             Context of this Extended SAL Variable Services Class call.
 | 
						|
  @param[in] Variable           The variable information which is used to keep track of variable usage.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS           The update operation is success.
 | 
						|
  @retval EFI_OUT_OF_RESOURCES  Variable region is full, can not write other data into this region.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
UpdateVariable (
 | 
						|
  IN      CHAR16                  *VariableName,
 | 
						|
  IN      EFI_GUID                *VendorGuid,
 | 
						|
  IN      VOID                    *Data,
 | 
						|
  IN      UINTN                   DataSize,
 | 
						|
  IN      UINT32                  Attributes OPTIONAL,  
 | 
						|
  IN      UINT32                  KeyIndex  OPTIONAL,
 | 
						|
  IN      UINT64                  MonotonicCount  OPTIONAL,
 | 
						|
  IN      BOOLEAN                 VirtualMode,
 | 
						|
  IN      ESAL_VARIABLE_GLOBAL    *Global,
 | 
						|
  IN      VARIABLE_POINTER_TRACK  *Variable
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                          Status;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER       *NextVariable;
 | 
						|
  UINTN                               VarNameOffset;
 | 
						|
  UINTN                               VarDataOffset;
 | 
						|
  UINTN                               VarNameSize;
 | 
						|
  UINTN                               VarSize;
 | 
						|
  BOOLEAN                             Volatile;
 | 
						|
  UINT8                               State;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER       VariableHeader;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER       *NextVariableHeader;
 | 
						|
  BOOLEAN                             Valid;
 | 
						|
  BOOLEAN                             Reclaimed;
 | 
						|
  VARIABLE_STORE_HEADER               VariableStoreHeader;
 | 
						|
  UINTN                               ScratchSize;
 | 
						|
  VARIABLE_GLOBAL                     *VariableGlobal;
 | 
						|
  UINT32                              Instance;
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  Reclaimed  = FALSE;
 | 
						|
 | 
						|
  if (Variable->CurrPtr != 0) {
 | 
						|
 | 
						|
    Valid = IsValidVariableHeader (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, &VariableHeader);
 | 
						|
    if (!Valid) {
 | 
						|
      Status = EFI_NOT_FOUND;
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Update/Delete existing variable
 | 
						|
    //
 | 
						|
    Volatile = Variable->Volatile;
 | 
						|
    
 | 
						|
    if (EfiAtRuntime ()) {        
 | 
						|
      //
 | 
						|
      // If EfiAtRuntime and the variable is Volatile and Runtime Access,  
 | 
						|
      // the volatile is ReadOnly, and SetVariable should be aborted and 
 | 
						|
      // return EFI_WRITE_PROTECTED.
 | 
						|
      //
 | 
						|
      if (Variable->Volatile) {
 | 
						|
        Status = EFI_WRITE_PROTECTED;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
      //
 | 
						|
      // Only variable have NV attribute can be updated/deleted in Runtime
 | 
						|
      //
 | 
						|
      if ((VariableHeader.Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
 | 
						|
        Status = EFI_INVALID_PARAMETER;
 | 
						|
        goto Done;      
 | 
						|
      }
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Setting a data variable with no access, or zero DataSize attributes
 | 
						|
    // specified causes it to be deleted.
 | 
						|
    //
 | 
						|
    if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {    
 | 
						|
      State = VariableHeader.State;
 | 
						|
      State &= VAR_DELETED;
 | 
						|
 | 
						|
      Status = AccessVariableStore (
 | 
						|
                 TRUE,
 | 
						|
                 VariableGlobal,
 | 
						|
                 Variable->Volatile,
 | 
						|
                 Instance,
 | 
						|
                 (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
 | 
						|
                 sizeof (UINT8),
 | 
						|
                 &State
 | 
						|
                 ); 
 | 
						|
      if (!EFI_ERROR (Status)) {
 | 
						|
        UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);
 | 
						|
        UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);
 | 
						|
      }
 | 
						|
      goto Done;     
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Logic comes here to update variable.
 | 
						|
    // If the variable is marked valid and the same data has been passed in
 | 
						|
    // then return to the caller immediately.
 | 
						|
    //
 | 
						|
    if (DataSizeOfVariable (&VariableHeader) == DataSize) {
 | 
						|
      NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
 | 
						|
      GetVariableDataPtr (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, (CHAR16 *) NextVariable);
 | 
						|
      if  (CompareMem (Data, (VOID *) NextVariable, DataSize) == 0) {
 | 
						|
        UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
 | 
						|
        Status = EFI_SUCCESS;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    if ((VariableHeader.State == VAR_ADDED) ||
 | 
						|
        (VariableHeader.State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {
 | 
						|
      //
 | 
						|
      // If new data is different from the old one, mark the old one as VAR_IN_DELETED_TRANSITION.
 | 
						|
      // It will be deleted if new variable is successfully written.
 | 
						|
      //
 | 
						|
      State = VariableHeader.State;
 | 
						|
      State &= VAR_IN_DELETED_TRANSITION;
 | 
						|
 | 
						|
      Status = AccessVariableStore (
 | 
						|
                 TRUE,
 | 
						|
                 VariableGlobal,
 | 
						|
                 Variable->Volatile,
 | 
						|
                 Instance,
 | 
						|
                 (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
 | 
						|
                 sizeof (UINT8),
 | 
						|
                 &State
 | 
						|
                 );      
 | 
						|
      if (EFI_ERROR (Status)) {
 | 
						|
        goto Done;  
 | 
						|
      }
 | 
						|
    }    
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // Create a new variable
 | 
						|
    //  
 | 
						|
    
 | 
						|
    //
 | 
						|
    // Make sure we are trying to create a new variable.
 | 
						|
    // Setting a data variable with no access, or zero DataSize attributes means to delete it.    
 | 
						|
    //
 | 
						|
    if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {
 | 
						|
      Status = EFI_NOT_FOUND;
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
    
 | 
						|
    //
 | 
						|
    // Only variable have NV|RT attribute can be created in Runtime
 | 
						|
    //
 | 
						|
    if (EfiAtRuntime () &&
 | 
						|
        (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) {
 | 
						|
      Status = EFI_INVALID_PARAMETER;
 | 
						|
      goto Done;
 | 
						|
    }         
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Function part - create a new variable and copy the data.
 | 
						|
  // Both update a variable and create a variable will come here.
 | 
						|
  //
 | 
						|
  // Tricky part: Use scratch data area at the end of volatile variable store
 | 
						|
  // as a temporary storage.
 | 
						|
  //
 | 
						|
  NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
 | 
						|
  ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));
 | 
						|
  NextVariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable;
 | 
						|
 | 
						|
  SetMem (NextVariableHeader, ScratchSize, 0xff);
 | 
						|
 | 
						|
  NextVariableHeader->StartId         = VARIABLE_DATA;
 | 
						|
  NextVariableHeader->Attributes      = Attributes;
 | 
						|
  NextVariableHeader->PubKeyIndex     = KeyIndex;
 | 
						|
  NextVariableHeader->MonotonicCount  = MonotonicCount;
 | 
						|
  NextVariableHeader->Reserved        = 0;
 | 
						|
  VarNameOffset                       = sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  VarNameSize                         = StrSize (VariableName);
 | 
						|
  CopyMem (
 | 
						|
    (UINT8 *) ((UINTN)NextVariable + VarNameOffset),
 | 
						|
    VariableName,
 | 
						|
    VarNameSize
 | 
						|
    );
 | 
						|
  VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);
 | 
						|
  CopyMem (
 | 
						|
    (UINT8 *) ((UINTN)NextVariable + VarDataOffset),
 | 
						|
    Data,
 | 
						|
    DataSize
 | 
						|
    );
 | 
						|
  CopyMem (&NextVariableHeader->VendorGuid, VendorGuid, sizeof (EFI_GUID));
 | 
						|
  //
 | 
						|
  // There will be pad bytes after Data, the NextVariable->NameSize and
 | 
						|
  // NextVariable->DataSize should not include pad size so that variable
 | 
						|
  // service can get actual size in GetVariable.
 | 
						|
  //
 | 
						|
  NextVariableHeader->NameSize  = (UINT32)VarNameSize;
 | 
						|
  NextVariableHeader->DataSize  = (UINT32)DataSize;
 | 
						|
 | 
						|
  //
 | 
						|
  // The actual size of the variable that stores in storage should
 | 
						|
  // include pad size.
 | 
						|
  //
 | 
						|
  VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);
 | 
						|
  if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
 | 
						|
    //
 | 
						|
    // Create a nonvolatile variable
 | 
						|
    //
 | 
						|
    Volatile = FALSE;
 | 
						|
    
 | 
						|
    GetVarStoreHeader (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance, &VariableStoreHeader);
 | 
						|
    if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) 
 | 
						|
             && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize)))
 | 
						|
             || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) 
 | 
						|
             && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) {
 | 
						|
      if (EfiAtRuntime ()) {
 | 
						|
        Status = EFI_OUT_OF_RESOURCES;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
      //
 | 
						|
      // Perform garbage collection & reclaim operation
 | 
						|
      //
 | 
						|
      Status = Reclaim (VariableGlobal->NonVolatileVariableBase, &(Global->NonVolatileLastVariableOffset), FALSE, VirtualMode, Global, Variable->CurrPtr);
 | 
						|
      if (EFI_ERROR (Status)) {
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
 | 
						|
      Reclaimed = TRUE;
 | 
						|
      //
 | 
						|
      // If still no enough space, return out of resources
 | 
						|
      //
 | 
						|
      if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) 
 | 
						|
               && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize)))
 | 
						|
               || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) 
 | 
						|
               && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) {
 | 
						|
        Status = EFI_OUT_OF_RESOURCES;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Four steps
 | 
						|
    // 1. Write variable header
 | 
						|
    // 2. Set variable state to header valid  
 | 
						|
    // 3. Write variable data
 | 
						|
    // 4. Set variable state to valid
 | 
						|
    //
 | 
						|
    //
 | 
						|
    // Step 1:
 | 
						|
    //
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               FALSE,
 | 
						|
               Instance,
 | 
						|
               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
 | 
						|
               sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
               (UINT8 *) NextVariable
 | 
						|
               );
 | 
						|
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Step 2:
 | 
						|
    //
 | 
						|
    NextVariableHeader->State = VAR_HEADER_VALID_ONLY;
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               FALSE,
 | 
						|
               Instance,
 | 
						|
               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
 | 
						|
               sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
               (UINT8 *) NextVariable
 | 
						|
               );
 | 
						|
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Step 3:
 | 
						|
    //
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               FALSE,
 | 
						|
               Instance,
 | 
						|
               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset + sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
               (UINT32) VarSize - sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
               (UINT8 *) NextVariable + sizeof (AUTHENTICATED_VARIABLE_HEADER)
 | 
						|
               );
 | 
						|
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Step 4:
 | 
						|
    //
 | 
						|
    NextVariableHeader->State = VAR_ADDED;
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               FALSE,
 | 
						|
               Instance,
 | 
						|
               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
 | 
						|
               sizeof (AUTHENTICATED_VARIABLE_HEADER),
 | 
						|
               (UINT8 *) NextVariable
 | 
						|
               );
 | 
						|
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
 | 
						|
    Global->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize);
 | 
						|
 | 
						|
    if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
 | 
						|
      Global->HwErrVariableTotalSize += HEADER_ALIGN (VarSize);
 | 
						|
    } else {
 | 
						|
      Global->CommonVariableTotalSize += HEADER_ALIGN (VarSize);
 | 
						|
    }
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // Create a volatile variable
 | 
						|
    //      
 | 
						|
    Volatile = TRUE;
 | 
						|
 | 
						|
    if ((UINT32) (HEADER_ALIGN(VarSize) + Global->VolatileLastVariableOffset) >
 | 
						|
        ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size) {
 | 
						|
      //
 | 
						|
      // Perform garbage collection & reclaim operation
 | 
						|
      //
 | 
						|
      Status = Reclaim (VariableGlobal->VolatileVariableBase, &Global->VolatileLastVariableOffset, TRUE, VirtualMode, Global, Variable->CurrPtr);
 | 
						|
      if (EFI_ERROR (Status)) {
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
      //
 | 
						|
      // If still no enough space, return out of resources
 | 
						|
      //
 | 
						|
      if ((UINT32) (HEADER_ALIGN (VarSize) + Global->VolatileLastVariableOffset) >
 | 
						|
            ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size
 | 
						|
            ) {
 | 
						|
        Status = EFI_OUT_OF_RESOURCES;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
      Reclaimed = TRUE;
 | 
						|
    }
 | 
						|
 | 
						|
    NextVariableHeader->State = VAR_ADDED;
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               TRUE,
 | 
						|
               Instance,
 | 
						|
               VariableGlobal->VolatileVariableBase + Global->VolatileLastVariableOffset,
 | 
						|
               (UINT32) VarSize,
 | 
						|
               (UINT8 *) NextVariable
 | 
						|
               );
 | 
						|
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
 | 
						|
    Global->VolatileLastVariableOffset += HEADER_ALIGN (VarSize);
 | 
						|
  }
 | 
						|
  //
 | 
						|
  // Mark the old variable as deleted
 | 
						|
  // If storage has just been reclaimed, the old variable marked as VAR_IN_DELETED_TRANSITION
 | 
						|
  // has already been eliminated, so no need to delete it.
 | 
						|
  //
 | 
						|
  if (!Reclaimed && !EFI_ERROR (Status) && Variable->CurrPtr != 0) {
 | 
						|
    State = ((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State;
 | 
						|
    State &= VAR_DELETED;
 | 
						|
 | 
						|
    Status = AccessVariableStore (
 | 
						|
               TRUE,
 | 
						|
               VariableGlobal,
 | 
						|
               Variable->Volatile,
 | 
						|
               Instance,
 | 
						|
               (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
 | 
						|
               sizeof (UINT8),
 | 
						|
               &State
 | 
						|
               );
 | 
						|
  }
 | 
						|
 | 
						|
  if (!EFI_ERROR (Status)) {
 | 
						|
    UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
 | 
						|
    UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Implements EsalGetVariable function of Extended SAL Variable Services Class.
 | 
						|
 | 
						|
  This function implements EsalGetVariable function of Extended SAL Variable Services Class.
 | 
						|
  It is equivalent in functionality to the EFI Runtime Service GetVariable().
 | 
						|
  
 | 
						|
  @param[in]      VariableName    A Null-terminated Unicode string that is the name of
 | 
						|
                                  the vendor's variable.
 | 
						|
  @param[in]      VendorGuid      A unique identifier for the vendor.
 | 
						|
  @param[out]     Attributes      If not NULL, a pointer to the memory location to return the 
 | 
						|
                                  attributes bitmask for the variable.
 | 
						|
  @param[in, out] DataSize        Size of Data found. If size is less than the
 | 
						|
                                  data, this value contains the required size.
 | 
						|
  @param[out]     Data            On input, the size in bytes of the return Data buffer.  
 | 
						|
                                  On output, the size of data returned in Data.
 | 
						|
  @param[in]      VirtualMode     Current calling mode for this function.
 | 
						|
  @param[in]      Global          Context of this Extended SAL Variable Services Class call.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS            The function completed successfully. 
 | 
						|
  @retval EFI_NOT_FOUND          The variable was not found.
 | 
						|
  @retval EFI_BUFFER_TOO_SMALL   DataSize is too small for the result.  DataSize has 
 | 
						|
                                 been updated with the size needed to complete the request.
 | 
						|
  @retval EFI_INVALID_PARAMETER  VariableName is NULL.
 | 
						|
  @retval EFI_INVALID_PARAMETER  VendorGuid is NULL.
 | 
						|
  @retval EFI_INVALID_PARAMETER  DataSize is NULL.
 | 
						|
  @retval EFI_INVALID_PARAMETER  DataSize is not too small and Data is NULL.
 | 
						|
  @retval EFI_DEVICE_ERROR       The variable could not be retrieved due to a hardware error.
 | 
						|
  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
EsalGetVariable (
 | 
						|
  IN      CHAR16                *VariableName,
 | 
						|
  IN      EFI_GUID              *VendorGuid,
 | 
						|
  OUT     UINT32                *Attributes OPTIONAL,
 | 
						|
  IN OUT  UINTN                 *DataSize,
 | 
						|
  OUT     VOID                  *Data,
 | 
						|
  IN      BOOLEAN               VirtualMode,
 | 
						|
  IN      ESAL_VARIABLE_GLOBAL  *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_POINTER_TRACK            Variable;
 | 
						|
  UINTN                             VarDataSize;
 | 
						|
  EFI_STATUS                        Status;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  BOOLEAN                           Valid;
 | 
						|
  VARIABLE_GLOBAL                   *VariableGlobal;
 | 
						|
  UINT32                            Instance;
 | 
						|
 | 
						|
  if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
 | 
						|
 | 
						|
  //
 | 
						|
  // Check if this variable exists in cache.
 | 
						|
  //
 | 
						|
  Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);
 | 
						|
  if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){
 | 
						|
    //
 | 
						|
    // If variable exists in cache, just update statistical information for it and finish.
 | 
						|
    // Here UpdateVariableInfo() has already retrieved data & attributes for output.
 | 
						|
    //
 | 
						|
    UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
  //
 | 
						|
  // If variable does not exist in cache, search for it in variable storage area.
 | 
						|
  //
 | 
						|
  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
 | 
						|
  if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) {
 | 
						|
    //
 | 
						|
    // If it cannot be found in variable storage area, goto Done.
 | 
						|
    //
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  Valid = IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader);
 | 
						|
  if (!Valid) {
 | 
						|
    Status = EFI_NOT_FOUND;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
  //
 | 
						|
  // If variable exists, but not in cache, get its data and attributes, update
 | 
						|
  // statistical information, and update cache.
 | 
						|
  //
 | 
						|
  VarDataSize = DataSizeOfVariable (&VariableHeader);
 | 
						|
  ASSERT (VarDataSize != 0);
 | 
						|
 | 
						|
  if (*DataSize >= VarDataSize) {
 | 
						|
    if (Data == NULL) {
 | 
						|
      Status = EFI_INVALID_PARAMETER;
 | 
						|
      goto Done;
 | 
						|
    }
 | 
						|
 | 
						|
    GetVariableDataPtr (
 | 
						|
      Variable.CurrPtr,
 | 
						|
      Variable.Volatile,
 | 
						|
      VariableGlobal,
 | 
						|
      Instance,
 | 
						|
      Data
 | 
						|
      );
 | 
						|
    if (Attributes != NULL) {
 | 
						|
      *Attributes = VariableHeader.Attributes;
 | 
						|
    }
 | 
						|
 | 
						|
    *DataSize = VarDataSize;
 | 
						|
    UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);
 | 
						|
    UpdateVariableCache (VariableName, VendorGuid, VariableHeader.Attributes, VarDataSize, Data);
 | 
						|
 
 | 
						|
    Status = EFI_SUCCESS;
 | 
						|
    goto Done;
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // If DataSize is too small for the result, return EFI_BUFFER_TOO_SMALL.
 | 
						|
    //
 | 
						|
    *DataSize = VarDataSize;
 | 
						|
    Status = EFI_BUFFER_TOO_SMALL;
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
 | 
						|
 | 
						|
  This function implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
 | 
						|
  It is equivalent in functionality to the EFI Runtime Service GetNextVariableName().
 | 
						|
  
 | 
						|
  @param[in, out] VariableNameSize Size of the variable
 | 
						|
  @param[in, out] VariableName     On input, supplies the last VariableName that was returned by GetNextVariableName().
 | 
						|
                                   On output, returns the Null-terminated Unicode string of the current variable.
 | 
						|
  @param[in, out] VendorGuid       On input, supplies the last VendorGuid that was returned by GetNextVariableName().
 | 
						|
                                   On output, returns the VendorGuid of the current variable.  
 | 
						|
  @param[in]      VirtualMode      Current calling mode for this function.
 | 
						|
  @param[in]      Global           Context of this Extended SAL Variable Services Class call.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS             The function completed successfully. 
 | 
						|
  @retval EFI_NOT_FOUND           The next variable was not found.
 | 
						|
  @retval EFI_BUFFER_TOO_SMALL    VariableNameSize is too small for the result. 
 | 
						|
                                  VariableNameSize has been updated with the size needed to complete the request.
 | 
						|
  @retval EFI_INVALID_PARAMETER   VariableNameSize is NULL.
 | 
						|
  @retval EFI_INVALID_PARAMETER   VariableName is NULL.
 | 
						|
  @retval EFI_INVALID_PARAMETER   VendorGuid is NULL.
 | 
						|
  @retval EFI_DEVICE_ERROR        The variable name could not be retrieved due to a hardware error.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
EsalGetNextVariableName (
 | 
						|
  IN OUT  UINTN                 *VariableNameSize,
 | 
						|
  IN OUT  CHAR16                *VariableName,
 | 
						|
  IN OUT  EFI_GUID              *VendorGuid,
 | 
						|
  IN      BOOLEAN               VirtualMode,
 | 
						|
  IN      ESAL_VARIABLE_GLOBAL  *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_POINTER_TRACK            Variable;
 | 
						|
  UINTN                             VarNameSize;
 | 
						|
  EFI_STATUS                        Status;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  VARIABLE_GLOBAL                   *VariableGlobal;
 | 
						|
  UINT32                            Instance;
 | 
						|
 | 
						|
  if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
 | 
						|
 | 
						|
  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
 | 
						|
  //
 | 
						|
  // If the variable does not exist, goto Done and return.
 | 
						|
  //
 | 
						|
  if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) {
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  if (VariableName[0] != 0) {
 | 
						|
    //
 | 
						|
    // If variable name is not NULL, get next variable
 | 
						|
    //
 | 
						|
    Variable.CurrPtr = GetNextVariablePtr (
 | 
						|
                         Variable.CurrPtr,
 | 
						|
                         Variable.Volatile,
 | 
						|
                         VariableGlobal,
 | 
						|
                         Instance
 | 
						|
                         );
 | 
						|
  }
 | 
						|
 | 
						|
  while (TRUE) {
 | 
						|
    if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == 0x0) {
 | 
						|
      //
 | 
						|
      // If fail to find a variable in current area, reverse the volatile attribute of area to search.
 | 
						|
      //
 | 
						|
      Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));
 | 
						|
      //
 | 
						|
      // Here we depend on the searching sequence of FindVariable().
 | 
						|
      // It first searches volatile area, then NV area.
 | 
						|
      // So if the volatile attribute after switching is non-volatile, it means that we have finished searching volatile area,
 | 
						|
      // and EFI_NOT_FOUND is returnd.
 | 
						|
      // Otherwise, it means that we have finished searchig non-volatile area, and we will continue to search volatile area.
 | 
						|
      //
 | 
						|
      if (!Variable.Volatile) {
 | 
						|
        Variable.StartPtr = GetStartPointer (VariableGlobal->NonVolatileVariableBase);
 | 
						|
        Variable.EndPtr   = GetEndPointer (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance);
 | 
						|
      } else {
 | 
						|
        Status = EFI_NOT_FOUND;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
 | 
						|
      Variable.CurrPtr = Variable.StartPtr;
 | 
						|
      if (!IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, NULL)) {
 | 
						|
        continue;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // Variable is found
 | 
						|
    //
 | 
						|
    if (IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader)) {
 | 
						|
      if ((VariableHeader.State == VAR_ADDED) &&
 | 
						|
          (!(EfiAtRuntime () && ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)))) {
 | 
						|
        VarNameSize = NameSizeOfVariable (&VariableHeader);
 | 
						|
        ASSERT (VarNameSize != 0);
 | 
						|
 | 
						|
        if (VarNameSize <= *VariableNameSize) {
 | 
						|
          GetVariableNamePtr (
 | 
						|
            Variable.CurrPtr,
 | 
						|
            Variable.Volatile,
 | 
						|
            VariableGlobal,
 | 
						|
            Instance,
 | 
						|
            VariableName
 | 
						|
            );
 | 
						|
          CopyMem (
 | 
						|
            VendorGuid,
 | 
						|
            &VariableHeader.VendorGuid,
 | 
						|
            sizeof (EFI_GUID)
 | 
						|
            );
 | 
						|
          Status = EFI_SUCCESS;
 | 
						|
        } else {
 | 
						|
          Status = EFI_BUFFER_TOO_SMALL;
 | 
						|
        }
 | 
						|
 | 
						|
        *VariableNameSize = VarNameSize;
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    Variable.CurrPtr = GetNextVariablePtr (
 | 
						|
                         Variable.CurrPtr,
 | 
						|
                         Variable.Volatile,
 | 
						|
                         VariableGlobal,
 | 
						|
                         Instance
 | 
						|
                         );
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Implements EsalSetVariable function of Extended SAL Variable Services Class.
 | 
						|
 | 
						|
  This function implements EsalSetVariable function of Extended SAL Variable Services Class.
 | 
						|
  It is equivalent in functionality to the EFI Runtime Service SetVariable().
 | 
						|
  
 | 
						|
  @param[in]  VariableName       A Null-terminated Unicode string that is the name of the vendor's
 | 
						|
                                 variable.  Each VariableName is unique for each 
 | 
						|
                                 VendorGuid.  VariableName must contain 1 or more 
 | 
						|
                                 Unicode characters.  If VariableName is an empty Unicode 
 | 
						|
                                 string, then EFI_INVALID_PARAMETER is returned.
 | 
						|
  @param[in]  VendorGuid         A unique identifier for the vendor.
 | 
						|
  @param[in]  Attributes         Attributes bitmask to set for the variable.
 | 
						|
  @param[in]  DataSize           The size in bytes of the Data buffer.  A size of zero causes the
 | 
						|
                                 variable to be deleted.
 | 
						|
  @param[in]  Data               The contents for the variable.
 | 
						|
  @param[in]  VirtualMode        Current calling mode for this function.
 | 
						|
  @param[in]  Global             Context of this Extended SAL Variable Services Class call.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS            The firmware has successfully stored the variable and its data as 
 | 
						|
                                 defined by the Attributes.
 | 
						|
  @retval EFI_INVALID_PARAMETER  An invalid combination of attribute bits was supplied, or the 
 | 
						|
                                 DataSize exceeds the maximum allowed.
 | 
						|
  @retval EFI_INVALID_PARAMETER  VariableName is an empty Unicode string.
 | 
						|
  @retval EFI_OUT_OF_RESOURCES   Not enough storage is available to hold the variable and its data.
 | 
						|
  @retval EFI_DEVICE_ERROR       The variable could not be saved due to a hardware failure.
 | 
						|
  @retval EFI_WRITE_PROTECTED    The variable in question is read-only.
 | 
						|
  @retval EFI_WRITE_PROTECTED    The variable in question cannot be deleted.
 | 
						|
  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
 | 
						|
  @retval EFI_NOT_FOUND          The variable trying to be updated or deleted was not found.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
EsalSetVariable (
 | 
						|
  IN CHAR16                  *VariableName,
 | 
						|
  IN EFI_GUID                *VendorGuid,
 | 
						|
  IN UINT32                  Attributes,
 | 
						|
  IN UINTN                   DataSize,
 | 
						|
  IN VOID                    *Data,
 | 
						|
  IN BOOLEAN                 VirtualMode,
 | 
						|
  IN ESAL_VARIABLE_GLOBAL    *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  VARIABLE_POINTER_TRACK  Variable;
 | 
						|
  EFI_STATUS              Status;
 | 
						|
  EFI_PHYSICAL_ADDRESS    NextVariable;
 | 
						|
  EFI_PHYSICAL_ADDRESS    Point;
 | 
						|
  VARIABLE_GLOBAL         *VariableGlobal;
 | 
						|
  UINT32                  Instance;
 | 
						|
  UINT32                  KeyIndex;
 | 
						|
  UINT64                  MonotonicCount;
 | 
						|
  UINTN                   PayloadSize;
 | 
						|
 | 
						|
  //
 | 
						|
  // Check input parameters
 | 
						|
  //
 | 
						|
  if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }  
 | 
						|
 | 
						|
  if (DataSize != 0 && Data == NULL) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // EFI_VARIABLE_RUNTIME_ACCESS bit cannot be set without EFI_VARIABLE_BOOTSERVICE_ACCESS bit.
 | 
						|
  //
 | 
						|
  if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) {
 | 
						|
    if (DataSize < AUTHINFO_SIZE) {
 | 
						|
      //
 | 
						|
      // Try to write Authencated Variable without AuthInfo
 | 
						|
      //
 | 
						|
      return EFI_SECURITY_VIOLATION;
 | 
						|
    } 
 | 
						|
    PayloadSize = DataSize - AUTHINFO_SIZE; 
 | 
						|
  } else {
 | 
						|
    PayloadSize = DataSize; 
 | 
						|
  }
 | 
						|
 | 
						|
  
 | 
						|
  if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){
 | 
						|
    //
 | 
						|
    // Prevent whole variable size overflow 
 | 
						|
    // 
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | 
						|
    //
 | 
						|
    // For variable for hardware error record, the size of the VariableName, including the Unicode Null
 | 
						|
    // in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxHardwareErrorVariableSize) bytes.
 | 
						|
    //
 | 
						|
    if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
 | 
						|
      return EFI_INVALID_PARAMETER;
 | 
						|
    }
 | 
						|
    //
 | 
						|
    // According to UEFI spec, HARDWARE_ERROR_RECORD variable name convention should be L"HwErrRecXXXX"
 | 
						|
    //
 | 
						|
    if (StrnCmp (VariableName, \
 | 
						|
                 Global->VariableName[VirtualMode][VAR_HW_ERR_REC], \
 | 
						|
                 StrLen(Global->VariableName[VirtualMode][VAR_HW_ERR_REC])) != 0) {
 | 
						|
      return EFI_INVALID_PARAMETER;
 | 
						|
    }
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // For variable not for hardware error record, the size of the VariableName, including the
 | 
						|
    // Unicode Null in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxVariableSize) bytes.
 | 
						|
    //
 | 
						|
    if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
 | 
						|
      return EFI_INVALID_PARAMETER;
 | 
						|
    }  
 | 
						|
  }  
 | 
						|
 | 
						|
  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
 | 
						|
 | 
						|
  //
 | 
						|
  // Consider reentrant in MCA/INIT/NMI. It needs be reupdated;
 | 
						|
  //
 | 
						|
  if (InterlockedIncrement (&Global->ReentrantState) > 1) {
 | 
						|
    Point = VariableGlobal->NonVolatileVariableBase;;
 | 
						|
    //
 | 
						|
    // Parse non-volatile variable data and get last variable offset
 | 
						|
    //
 | 
						|
    NextVariable  = GetStartPointer (Point);
 | 
						|
    while (IsValidVariableHeader (NextVariable, FALSE, VariableGlobal, Instance, NULL)) {
 | 
						|
      NextVariable = GetNextVariablePtr (NextVariable, FALSE, VariableGlobal, Instance);
 | 
						|
    }
 | 
						|
    Global->NonVolatileLastVariableOffset = NextVariable - Point;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Check whether the input variable exists
 | 
						|
  //
 | 
						|
 | 
						|
  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
 | 
						|
 | 
						|
  //
 | 
						|
  // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang
 | 
						|
  //
 | 
						|
  AutoUpdateLangVariable (VariableName, Data, PayloadSize, VirtualMode, Global);
 | 
						|
 | 
						|
  //
 | 
						|
  // Process PK, KEK, Sigdb seperately
 | 
						|
  //
 | 
						|
  if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_PLATFORM_KEY]) == 0)) {
 | 
						|
    Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, TRUE);
 | 
						|
  } else if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_KEY_EXCHANGE_KEY]) == 0)) {
 | 
						|
    Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, FALSE);
 | 
						|
  } else if (CompareGuid (VendorGuid, Global->ImageSecurityDatabaseGuid[VirtualMode])) {
 | 
						|
    Status = ProcessVarWithKek (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes);
 | 
						|
  } else {
 | 
						|
    Status = VerifyVariable (Data, DataSize, VirtualMode, Global, &Variable, Attributes, &KeyIndex, &MonotonicCount);
 | 
						|
    if (!EFI_ERROR(Status)) {
 | 
						|
      //
 | 
						|
      // Verification pass
 | 
						|
      //
 | 
						|
      if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
 | 
						|
        //
 | 
						|
        // Cut the certificate size before set
 | 
						|
        //
 | 
						|
        Status = UpdateVariable (
 | 
						|
                   VariableName, 
 | 
						|
                   VendorGuid, 
 | 
						|
                   (UINT8*)Data + AUTHINFO_SIZE, 
 | 
						|
                   DataSize - AUTHINFO_SIZE, 
 | 
						|
                   Attributes, 
 | 
						|
                   KeyIndex, 
 | 
						|
                   MonotonicCount, 
 | 
						|
                   VirtualMode, 
 | 
						|
                   Global, 
 | 
						|
                   &Variable
 | 
						|
                   );
 | 
						|
      } else {
 | 
						|
        //
 | 
						|
        // Update variable as usual 
 | 
						|
        //
 | 
						|
        Status = UpdateVariable (
 | 
						|
                   VariableName, 
 | 
						|
                   VendorGuid, 
 | 
						|
                   Data, 
 | 
						|
                   DataSize, 
 | 
						|
                   Attributes, 
 | 
						|
                   0, 
 | 
						|
                   0, 
 | 
						|
                   VirtualMode, 
 | 
						|
                   Global, 
 | 
						|
                   &Variable
 | 
						|
                   );
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  InterlockedDecrement (&Global->ReentrantState);
 | 
						|
  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
 | 
						|
  return Status;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
 | 
						|
 | 
						|
  This function implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
 | 
						|
  It is equivalent in functionality to the EFI Runtime Service QueryVariableInfo().
 | 
						|
 | 
						|
  @param[in]  Attributes                   Attributes bitmask to specify the type of variables
 | 
						|
                                           on which to return information.
 | 
						|
  @param[out] MaximumVariableStorageSize   On output the maximum size of the storage space available for 
 | 
						|
                                           the EFI variables associated with the attributes specified.  
 | 
						|
  @param[out] RemainingVariableStorageSize Returns the remaining size of the storage space available for EFI 
 | 
						|
                                           variables associated with the attributes specified.
 | 
						|
  @param[out] MaximumVariableSize          Returns the maximum size of an individual EFI variable 
 | 
						|
                                           associated with the attributes specified.
 | 
						|
  @param[in]  VirtualMode                  Current calling mode for this function
 | 
						|
  @param[in]  Global                       Context of this Extended SAL Variable Services Class call
 | 
						|
 | 
						|
  @retval EFI_SUCCESS                      Valid answer returned.
 | 
						|
  @retval EFI_INVALID_PARAMETER            An invalid combination of attribute bits was supplied.
 | 
						|
  @retval EFI_UNSUPPORTED                  The attribute is not supported on this platform, and the 
 | 
						|
                                           MaximumVariableStorageSize, RemainingVariableStorageSize, 
 | 
						|
                                           MaximumVariableSize are undefined.
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
EFIAPI
 | 
						|
EsalQueryVariableInfo (
 | 
						|
  IN  UINT32                 Attributes,
 | 
						|
  OUT UINT64                 *MaximumVariableStorageSize,
 | 
						|
  OUT UINT64                 *RemainingVariableStorageSize,
 | 
						|
  OUT UINT64                 *MaximumVariableSize,
 | 
						|
  IN  BOOLEAN                VirtualMode,
 | 
						|
  IN  ESAL_VARIABLE_GLOBAL   *Global
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_PHYSICAL_ADDRESS              Variable;
 | 
						|
  EFI_PHYSICAL_ADDRESS              NextVariable;
 | 
						|
  UINT64                            VariableSize;
 | 
						|
  EFI_PHYSICAL_ADDRESS              VariableStoreHeaderAddress;
 | 
						|
  BOOLEAN                           Volatile;
 | 
						|
  VARIABLE_STORE_HEADER             VarStoreHeader;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
 | 
						|
  UINT64                            CommonVariableTotalSize;
 | 
						|
  UINT64                            HwErrVariableTotalSize;
 | 
						|
  VARIABLE_GLOBAL                   *VariableGlobal;
 | 
						|
  UINT32                            Instance;
 | 
						|
 | 
						|
  CommonVariableTotalSize = 0;
 | 
						|
  HwErrVariableTotalSize = 0;
 | 
						|
 | 
						|
  if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
  
 | 
						|
  if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {
 | 
						|
    //
 | 
						|
    // Make sure the Attributes combination is supported by the platform.
 | 
						|
    //
 | 
						|
    return EFI_UNSUPPORTED;  
 | 
						|
  } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
 | 
						|
    //
 | 
						|
    // Make sure if runtime bit is set, boot service bit is set also.
 | 
						|
    //
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  } else if (EfiAtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) {
 | 
						|
    //
 | 
						|
    // Make sure RT Attribute is set if we are in Runtime phase.
 | 
						|
    //
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | 
						|
    //
 | 
						|
    // Make sure Hw Attribute is set with NV.
 | 
						|
    //
 | 
						|
    return EFI_INVALID_PARAMETER;
 | 
						|
  }
 | 
						|
 | 
						|
  VariableGlobal = &Global->VariableGlobal[VirtualMode];
 | 
						|
  Instance = Global->FvbInstance;
 | 
						|
 | 
						|
  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
 | 
						|
 | 
						|
  if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
 | 
						|
    //
 | 
						|
    // Query is Volatile related.
 | 
						|
    //
 | 
						|
    Volatile = TRUE;
 | 
						|
    VariableStoreHeaderAddress = VariableGlobal->VolatileVariableBase;
 | 
						|
  } else {
 | 
						|
    //
 | 
						|
    // Query is Non-Volatile related.
 | 
						|
    //
 | 
						|
    Volatile = FALSE;
 | 
						|
    VariableStoreHeaderAddress = VariableGlobal->NonVolatileVariableBase;
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize
 | 
						|
  // with the storage size (excluding the storage header size).
 | 
						|
  //
 | 
						|
  GetVarStoreHeader (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance, &VarStoreHeader);
 | 
						|
 | 
						|
  *MaximumVariableStorageSize   = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER);
 | 
						|
 | 
						|
  // Harware error record variable needs larger size.
 | 
						|
  //
 | 
						|
  if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
    *MaximumVariableStorageSize = PcdGet32(PcdHwErrStorageSize);
 | 
						|
    *MaximumVariableSize = PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  } else {
 | 
						|
    if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
 | 
						|
      ASSERT (PcdGet32(PcdHwErrStorageSize) < VarStoreHeader.Size);
 | 
						|
      *MaximumVariableStorageSize = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize);
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Let *MaximumVariableSize be PcdGet32(PcdMaxVariableSize) with the exception of the variable header size.
 | 
						|
    //
 | 
						|
    *MaximumVariableSize = PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  }
 | 
						|
 | 
						|
  //
 | 
						|
  // Point to the starting address of the variables.
 | 
						|
  //
 | 
						|
  Variable = GetStartPointer (VariableStoreHeaderAddress);
 | 
						|
 | 
						|
  //
 | 
						|
  // Now walk through the related variable store.
 | 
						|
  //
 | 
						|
  while (IsValidVariableHeader (Variable, Volatile, VariableGlobal, Instance, &VariableHeader) &&
 | 
						|
         (Variable < GetEndPointer (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance))) {
 | 
						|
    NextVariable = GetNextVariablePtr (Variable, Volatile, VariableGlobal, Instance);
 | 
						|
    VariableSize = NextVariable - Variable;
 | 
						|
 | 
						|
    if (EfiAtRuntime ()) {
 | 
						|
      //
 | 
						|
      // we don't take the state of the variables in mind
 | 
						|
      // when calculating RemainingVariableStorageSize,
 | 
						|
      // since the space occupied by variables not marked with
 | 
						|
      // VAR_ADDED is not allowed to be reclaimed in Runtime.
 | 
						|
      //
 | 
						|
      if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | 
						|
        HwErrVariableTotalSize += VariableSize;
 | 
						|
      } else {
 | 
						|
        CommonVariableTotalSize += VariableSize;
 | 
						|
      }
 | 
						|
    } else {
 | 
						|
      //
 | 
						|
      // Only care about Variables with State VAR_ADDED,because
 | 
						|
      // the space not marked as VAR_ADDED is reclaimable now.
 | 
						|
      //
 | 
						|
      if (VariableHeader.State == VAR_ADDED) {
 | 
						|
        if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
 | 
						|
          HwErrVariableTotalSize += VariableSize;
 | 
						|
        } else {
 | 
						|
          CommonVariableTotalSize += VariableSize;
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Go to the next one
 | 
						|
    //
 | 
						|
    Variable = NextVariable;
 | 
						|
  }
 | 
						|
 | 
						|
  if ((Attributes  & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){
 | 
						|
    *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;
 | 
						|
  }else {
 | 
						|
    *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;
 | 
						|
  }
 | 
						|
 | 
						|
  if (*RemainingVariableStorageSize < sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
 | 
						|
    *MaximumVariableSize = 0;
 | 
						|
  } else if ((*RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER)) < *MaximumVariableSize) {
 | 
						|
    *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER);
 | 
						|
  }
 | 
						|
 | 
						|
  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
 | 
						|
  return EFI_SUCCESS;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Notification function of EVT_GROUP_READY_TO_BOOT event group.
 | 
						|
 | 
						|
  This is a notification function registered on EVT_GROUP_READY_TO_BOOT event group.
 | 
						|
  When the Boot Manager is about to load and execute a boot option, it reclaims variable
 | 
						|
  storage if free size is below the threshold.
 | 
						|
 | 
						|
  @param[in]  Event        Event whose notification function is being invoked.
 | 
						|
  @param[in]  Context      Pointer to the notification function's context.
 | 
						|
 | 
						|
**/
 | 
						|
VOID
 | 
						|
EFIAPI
 | 
						|
ReclaimForOS(
 | 
						|
  IN EFI_EVENT  Event,
 | 
						|
  IN VOID       *Context
 | 
						|
  )
 | 
						|
{
 | 
						|
  UINT32                          VarSize;
 | 
						|
  EFI_STATUS                      Status;
 | 
						|
  UINTN                           CommonVariableSpace;
 | 
						|
  UINTN                           RemainingCommonVariableSpace;
 | 
						|
  UINTN                           RemainingHwErrVariableSpace;
 | 
						|
 | 
						|
  VarSize = ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase))->Size;
 | 
						|
  Status  = EFI_SUCCESS; 
 | 
						|
  //
 | 
						|
  //Allowable max size of common variable storage space
 | 
						|
  //
 | 
						|
  CommonVariableSpace = VarSize - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize);
 | 
						|
 | 
						|
  RemainingCommonVariableSpace = CommonVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize;
 | 
						|
 
 | 
						|
  RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize;
 | 
						|
  //
 | 
						|
  // If the free area is below a threshold, then performs reclaim operation.
 | 
						|
  //
 | 
						|
  if ((RemainingCommonVariableSpace < PcdGet32 (PcdMaxVariableSize))
 | 
						|
    || ((PcdGet32 (PcdHwErrStorageSize) != 0) && 
 | 
						|
       (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){
 | 
						|
    Status = Reclaim (
 | 
						|
               mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase,
 | 
						|
               &mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | 
						|
               FALSE,
 | 
						|
               Physical,
 | 
						|
               mVariableModuleGlobal,
 | 
						|
               0x0
 | 
						|
               );
 | 
						|
    ASSERT_EFI_ERROR (Status);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Flush the HOB variable to NV variable storage.
 | 
						|
**/
 | 
						|
VOID
 | 
						|
FlushHob2Nv (
 | 
						|
  VOID
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                      Status;
 | 
						|
  VOID                            *GuidHob;
 | 
						|
  VARIABLE_STORE_HEADER           *VariableStoreHeader;
 | 
						|
  AUTHENTICATED_VARIABLE_HEADER   *VariableHeader;
 | 
						|
  //
 | 
						|
  // Get HOB variable store.
 | 
						|
  //
 | 
						|
  GuidHob = GetFirstGuidHob (&gEfiAuthenticatedVariableGuid);
 | 
						|
  if (GuidHob != NULL) {
 | 
						|
    VariableStoreHeader = (VARIABLE_STORE_HEADER *) GET_GUID_HOB_DATA (GuidHob);
 | 
						|
    if (CompareGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) &&
 | 
						|
        (VariableStoreHeader->Format == VARIABLE_STORE_FORMATTED) &&
 | 
						|
        (VariableStoreHeader->State == VARIABLE_STORE_HEALTHY)
 | 
						|
       ) {
 | 
						|
      DEBUG ((EFI_D_INFO, "HOB Variable Store appears to be valid.\n"));
 | 
						|
      //
 | 
						|
      // Flush the HOB variable to NV Variable storage.
 | 
						|
      //
 | 
						|
      for ( VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN (VariableStoreHeader + 1)
 | 
						|
          ; (VariableHeader < (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VariableStoreHeader + VariableStoreHeader->Size)
 | 
						|
            &&
 | 
						|
            (VariableHeader->StartId == VARIABLE_DATA))
 | 
						|
          ; VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) (VariableHeader + 1)
 | 
						|
                           + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize)
 | 
						|
                           + VariableHeader->DataSize + GET_PAD_SIZE (VariableHeader->DataSize)
 | 
						|
                           )
 | 
						|
          ) {
 | 
						|
        ASSERT (VariableHeader->State == VAR_ADDED);
 | 
						|
        ASSERT ((VariableHeader->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0);
 | 
						|
        Status = EsalSetVariable (
 | 
						|
                   (CHAR16 *) (VariableHeader + 1),
 | 
						|
                   &VariableHeader->VendorGuid,
 | 
						|
                   VariableHeader->Attributes,
 | 
						|
                   VariableHeader->DataSize,
 | 
						|
                   (UINT8 *) (VariableHeader + 1) + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize),
 | 
						|
                   Physical,
 | 
						|
                   mVariableModuleGlobal
 | 
						|
                   );
 | 
						|
        ASSERT_EFI_ERROR (Status);
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
  Initializes variable store area for non-volatile and volatile variable.
 | 
						|
 | 
						|
  This function allocates and initializes memory space for global context of ESAL
 | 
						|
  variable service and variable store area for non-volatile and volatile variable.
 | 
						|
 | 
						|
  @param[in]  ImageHandle       The Image handle of this driver.
 | 
						|
  @param[in]  SystemTable       The pointer of EFI_SYSTEM_TABLE.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS           Function successfully executed.
 | 
						|
  @retval EFI_OUT_OF_RESOURCES  Fail to allocate enough memory resource.
 | 
						|
 | 
						|
**/
 | 
						|
EFI_STATUS
 | 
						|
VariableCommonInitialize (
 | 
						|
  IN EFI_HANDLE         ImageHandle,
 | 
						|
  IN EFI_SYSTEM_TABLE   *SystemTable
 | 
						|
  )
 | 
						|
{
 | 
						|
  EFI_STATUS                      Status;
 | 
						|
  EFI_FIRMWARE_VOLUME_HEADER      *FwVolHeader;
 | 
						|
  EFI_PHYSICAL_ADDRESS            CurrPtr;
 | 
						|
  VARIABLE_STORE_HEADER           *VolatileVariableStore;
 | 
						|
  VARIABLE_STORE_HEADER           *VariableStoreHeader;
 | 
						|
  EFI_PHYSICAL_ADDRESS            Variable;
 | 
						|
  EFI_PHYSICAL_ADDRESS            NextVariable;
 | 
						|
  UINTN                           VariableSize;
 | 
						|
  UINT32                          Instance;
 | 
						|
  EFI_PHYSICAL_ADDRESS            FvVolHdr;
 | 
						|
  EFI_PHYSICAL_ADDRESS            TempVariableStoreHeader;
 | 
						|
  EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;
 | 
						|
  UINT64                          BaseAddress;
 | 
						|
  UINT64                          Length;
 | 
						|
  UINTN                           Index;
 | 
						|
  UINT8                           Data;
 | 
						|
  EFI_PHYSICAL_ADDRESS            VariableStoreBase;
 | 
						|
  UINT64                          VariableStoreLength;
 | 
						|
  EFI_EVENT                       ReadyToBootEvent;
 | 
						|
  UINTN                           ScratchSize;
 | 
						|
 | 
						|
  //
 | 
						|
  // Allocate memory for mVariableModuleGlobal
 | 
						|
  //
 | 
						|
  mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (ESAL_VARIABLE_GLOBAL));
 | 
						|
  if (mVariableModuleGlobal == NULL) {
 | 
						|
    return EFI_OUT_OF_RESOURCES;
 | 
						|
  }
 | 
						|
 | 
						|
  mVariableModuleGlobal->GlobalVariableGuid[Physical] = &gEfiGlobalVariableGuid;
 | 
						|
  CopyMem (
 | 
						|
    mVariableModuleGlobal->VariableName[Physical],
 | 
						|
    mVariableName,
 | 
						|
    sizeof (mVariableName)
 | 
						|
    );
 | 
						|
 | 
						|
  EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal[Physical].VariableServicesLock, TPL_NOTIFY);
 | 
						|
 | 
						|
  //
 | 
						|
  // Note that in EdkII variable driver implementation, Hardware Error Record type variable
 | 
						|
  // is stored with common variable in the same NV region. So the platform integrator should
 | 
						|
  // ensure that the value of PcdHwErrStorageSize is less than or equal to the value of 
 | 
						|
  // PcdFlashNvStorageVariableSize.
 | 
						|
  //
 | 
						|
  ASSERT (PcdGet32(PcdHwErrStorageSize) <= PcdGet32 (PcdFlashNvStorageVariableSize));
 | 
						|
 | 
						|
  //
 | 
						|
  // Allocate memory for volatile variable store
 | 
						|
  //
 | 
						|
  ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));
 | 
						|
  VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize);
 | 
						|
  if (VolatileVariableStore == NULL) {
 | 
						|
    FreePool (mVariableModuleGlobal);
 | 
						|
    return EFI_OUT_OF_RESOURCES;
 | 
						|
  }
 | 
						|
 | 
						|
  SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff);
 | 
						|
 | 
						|
  //
 | 
						|
  // Variable Specific Data
 | 
						|
  //
 | 
						|
  mVariableModuleGlobal->VariableGlobal[Physical].VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;
 | 
						|
  mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer ((EFI_PHYSICAL_ADDRESS) VolatileVariableStore) - (UINTN) VolatileVariableStore;
 | 
						|
 | 
						|
  CopyGuid (&VolatileVariableStore->Signature, &gEfiAuthenticatedVariableGuid);
 | 
						|
  VolatileVariableStore->Size                       = PcdGet32 (PcdVariableStoreSize);
 | 
						|
  VolatileVariableStore->Format                     = VARIABLE_STORE_FORMATTED;
 | 
						|
  VolatileVariableStore->State                      = VARIABLE_STORE_HEALTHY;
 | 
						|
  VolatileVariableStore->Reserved                   = 0;
 | 
						|
  VolatileVariableStore->Reserved1                  = 0;
 | 
						|
 | 
						|
  //
 | 
						|
  // Get non volatile varaible store
 | 
						|
  //
 | 
						|
  TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);
 | 
						|
  VariableStoreBase = TempVariableStoreHeader + \
 | 
						|
                              (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);
 | 
						|
  VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \
 | 
						|
                                (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);
 | 
						|
  //
 | 
						|
  // Mark the variable storage region of the FLASH as RUNTIME
 | 
						|
  //
 | 
						|
  BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);
 | 
						|
  Length      = VariableStoreLength + (VariableStoreBase - BaseAddress);
 | 
						|
  Length      = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);
 | 
						|
 | 
						|
  Status      = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);
 | 
						|
  if (EFI_ERROR (Status)) {
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
 | 
						|
  Status = gDS->SetMemorySpaceAttributes (
 | 
						|
                  BaseAddress,
 | 
						|
                  Length,
 | 
						|
                  GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME
 | 
						|
                  );
 | 
						|
  if (EFI_ERROR (Status)) {
 | 
						|
    goto Done;
 | 
						|
  }
 | 
						|
  //
 | 
						|
  // Get address of non volatile variable store base.
 | 
						|
  //
 | 
						|
  mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = VariableStoreBase;
 | 
						|
 | 
						|
  //
 | 
						|
  // Check Integrity
 | 
						|
  //
 | 
						|
  //
 | 
						|
  // Find the Correct Instance of the FV Block Service.
 | 
						|
  //
 | 
						|
  Instance  = 0;
 | 
						|
  CurrPtr   = mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase;
 | 
						|
 | 
						|
  do {
 | 
						|
    FvVolHdr = 0;
 | 
						|
    Status    = (EFI_STATUS) EsalCall (
 | 
						|
                               EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
 | 
						|
                               EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
 | 
						|
                               GetPhysicalAddressFunctionId, 
 | 
						|
                               Instance, 
 | 
						|
                               (UINT64) &FvVolHdr, 
 | 
						|
                               0, 
 | 
						|
                               0, 
 | 
						|
                               0, 
 | 
						|
                               0, 
 | 
						|
                               0
 | 
						|
                               ).Status;
 | 
						|
    if (EFI_ERROR (Status)) {
 | 
						|
      break;
 | 
						|
    }
 | 
						|
    FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);
 | 
						|
    ASSERT (FwVolHeader != NULL);
 | 
						|
    if (CurrPtr >= (EFI_PHYSICAL_ADDRESS) FwVolHeader &&
 | 
						|
        CurrPtr <  ((EFI_PHYSICAL_ADDRESS) FwVolHeader + FwVolHeader->FvLength)) {
 | 
						|
      mVariableModuleGlobal->FvbInstance = Instance;
 | 
						|
      break;
 | 
						|
    }
 | 
						|
 | 
						|
    Instance++;
 | 
						|
  } while (Status == EFI_SUCCESS);
 | 
						|
 | 
						|
  VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;
 | 
						|
  if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {
 | 
						|
    if (~VariableStoreHeader->Size == 0) {
 | 
						|
      Status = AccessVariableStore (
 | 
						|
                 TRUE,
 | 
						|
                 &mVariableModuleGlobal->VariableGlobal[Physical],
 | 
						|
                 FALSE,
 | 
						|
                 mVariableModuleGlobal->FvbInstance,
 | 
						|
                 (UINTN) &VariableStoreHeader->Size,
 | 
						|
                 sizeof (UINT32),
 | 
						|
                 (UINT8 *) &VariableStoreLength
 | 
						|
                 );
 | 
						|
      //
 | 
						|
      // As Variables are stored in NV storage, which are slow devices,such as flash.
 | 
						|
      // Variable operation may skip checking variable program result to improve performance,
 | 
						|
      // We can assume Variable program is OK through some check point.
 | 
						|
      // Variable Store Size Setting should be the first Variable write operation,
 | 
						|
      // We can assume all Read/Write is OK if we can set Variable store size successfully.
 | 
						|
      // If write fail, we will assert here.
 | 
						|
      //
 | 
						|
      ASSERT(VariableStoreHeader->Size == VariableStoreLength);
 | 
						|
 | 
						|
      if (EFI_ERROR (Status)) {
 | 
						|
        goto Done;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);
 | 
						|
    //
 | 
						|
    // Parse non-volatile variable data and get last variable offset.
 | 
						|
    //
 | 
						|
    Variable = GetStartPointer (CurrPtr);
 | 
						|
    Status   = EFI_SUCCESS;
 | 
						|
 | 
						|
    while (IsValidVariableHeader (Variable, FALSE, &(mVariableModuleGlobal->VariableGlobal[Physical]), Instance, NULL)) {
 | 
						|
      NextVariable = GetNextVariablePtr (
 | 
						|
                       Variable,
 | 
						|
                       FALSE,
 | 
						|
                       &(mVariableModuleGlobal->VariableGlobal[Physical]),
 | 
						|
                       Instance
 | 
						|
                       );
 | 
						|
      VariableSize = NextVariable - Variable;
 | 
						|
      if ((((AUTHENTICATED_VARIABLE_HEADER *)Variable)->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
 | 
						|
        mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
 | 
						|
      } else {
 | 
						|
        mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
 | 
						|
      }
 | 
						|
 | 
						|
      Variable = NextVariable;
 | 
						|
    }
 | 
						|
 | 
						|
    mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) CurrPtr;
 | 
						|
 | 
						|
    //
 | 
						|
    // Check if the free area is really free.
 | 
						|
    //
 | 
						|
    for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {
 | 
						|
      Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase)[Index];
 | 
						|
      if (Data != 0xff) {
 | 
						|
        //
 | 
						|
        // There must be something wrong in variable store, do reclaim operation.
 | 
						|
        //
 | 
						|
        Status = Reclaim (
 | 
						|
                   mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase,
 | 
						|
                   &mVariableModuleGlobal->NonVolatileLastVariableOffset,
 | 
						|
                   FALSE,
 | 
						|
                   Physical,
 | 
						|
                   mVariableModuleGlobal,
 | 
						|
                   0x0
 | 
						|
                   );
 | 
						|
        if (EFI_ERROR (Status)) {
 | 
						|
          goto Done;
 | 
						|
        }
 | 
						|
        break;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    //
 | 
						|
    // Register the event handling function to reclaim variable for OS usage.
 | 
						|
    //
 | 
						|
    Status = EfiCreateEventReadyToBootEx (
 | 
						|
               TPL_NOTIFY, 
 | 
						|
               ReclaimForOS, 
 | 
						|
               NULL, 
 | 
						|
               &ReadyToBootEvent
 | 
						|
               );
 | 
						|
  } else {
 | 
						|
    Status = EFI_VOLUME_CORRUPTED;
 | 
						|
    DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n"));
 | 
						|
  }
 | 
						|
 | 
						|
Done:
 | 
						|
  if (EFI_ERROR (Status)) {
 | 
						|
    FreePool (mVariableModuleGlobal);
 | 
						|
    FreePool (VolatileVariableStore);
 | 
						|
  }
 | 
						|
 | 
						|
  return Status;
 | 
						|
}
 |