]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
sync tracker to remove duplicate display mode in ConOut virtual handle GOP instance.
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / Variable.c
CommitLineData
052ad7e1
A
1/** @file\r
2 EFI Runtime Variable services.\r
3 \r
4 Copyright (c) 2006 - 2007, Intel Corporation \r
5 All rights reserved. This program and the accompanying materials \r
6 are licensed and made available under the terms and conditions of the BSD License \r
7 which accompanies this distribution. The full text of the license may be found at \r
8 http://opensource.org/licenses/bsd-license.php \r
8d3a5c82 9\r
052ad7e1
A
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
8d3a5c82 12\r
052ad7e1 13**/\r
8d3a5c82 14\r
15\r
16#include "Variable.h"\r
33a5a666
A
17\r
18\r
052ad7e1
A
19VARIABLE_MODULE_GLOBAL mRuntimeData;\r
20VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal = &mRuntimeData;\r
21EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
22EFI_HANDLE mHandle = NULL;\r
8d3a5c82 23\r
33a5a666 24\r
8d3a5c82 25//\r
26// This is a temperary function which will be removed\r
27// when EfiAcquireLock in UefiLib can handle the\r
28// the call in UEFI Runtimer driver in RT phase.\r
29//\r
8d3a5c82 30VOID\r
31AcquireLockOnlyAtBootTime (\r
32 IN EFI_LOCK *Lock\r
33 )\r
34{\r
35 if (!EfiAtRuntime ()) {\r
36 EfiAcquireLock (Lock);\r
37 }\r
38}\r
39\r
40//\r
41// This is a temperary function which will be removed\r
42// when EfiAcquireLock in UefiLib can handle the\r
43// the call in UEFI Runtimer driver in RT phase.\r
44//\r
8d3a5c82 45VOID\r
46ReleaseLockOnlyAtBootTime (\r
47 IN EFI_LOCK *Lock\r
48 )\r
49{\r
50 if (!EfiAtRuntime ()) {\r
51 EfiReleaseLock (Lock);\r
52 }\r
53}\r
54\r
33a5a666
A
55\r
56GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;\r
57\r
58\r
052ad7e1
A
59/**\r
60 Routine used to track statistical information about variable usage. \r
61 The data is stored in the EFI system table so it can be accessed later.\r
62 VariableInfo.efi can dump out the table. Only Boot Services variable \r
63 accesses are tracked by this code. The PcdVariableCollectStatistics\r
64 build flag controls if this feature is enabled. \r
65\r
66 A read that hits in the cache will have Read and Cache true for \r
67 the transaction. Data is allocated by this routine, but never\r
68 freed.\r
69\r
70 @param[in] VariableName Name of the Variable to track\r
71 @param[in] VendorGuid Guid of the Variable to track\r
72 @param[in] Volatile TRUE if volatile FALSE if non-volatile\r
73 @param[in] Read TRUE if GetVariable() was called\r
74 @param[in] Write TRUE if SetVariable() was called\r
75 @param[in] Delete TRUE if deleted via SetVariable()\r
76 @param[in] Cache TRUE for a cache hit.\r
77\r
78**/\r
33a5a666
A
79VOID\r
80UpdateVariableInfo (\r
81 IN CHAR16 *VariableName,\r
82 IN EFI_GUID *VendorGuid,\r
83 IN BOOLEAN Volatile,\r
84 IN BOOLEAN Read,\r
85 IN BOOLEAN Write,\r
86 IN BOOLEAN Delete,\r
87 IN BOOLEAN Cache\r
88 )\r
89{\r
90 VARIABLE_INFO_ENTRY *Entry;\r
91\r
92 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
93\r
94 if (EfiAtRuntime ()) {\r
95 // Don't collect statistics at runtime\r
96 return;\r
97 }\r
98\r
99 if (gVariableInfo == NULL) {\r
052ad7e1
A
100 //\r
101 // on the first call allocate a entry and place a pointer to it in\r
102 // the EFI System Table\r
103 //\r
33a5a666 104 gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1
A
105 ASSERT (gVariableInfo != NULL);\r
106\r
33a5a666
A
107 CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);\r
108 gVariableInfo->Name = AllocatePool (StrLen (VariableName));\r
109 StrCpy (gVariableInfo->Name, VariableName);\r
110 gVariableInfo->Volatile = Volatile;\r
111\r
112 gBS->InstallConfigurationTable (&gEfiVariableInfoGuid, gVariableInfo);\r
113 }\r
114\r
115 \r
116 for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {\r
117 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
118 if (StrCmp (VariableName, Entry->Name) == 0) {\r
119 if (Read) {\r
120 Entry->ReadCount++;\r
121 }\r
122 if (Write) {\r
123 Entry->WriteCount++;\r
124 }\r
125 if (Delete) {\r
126 Entry->DeleteCount++;\r
127 }\r
128 if (Cache) {\r
129 Entry->CacheCount++;\r
130 }\r
131\r
132 return;\r
133 }\r
134 }\r
135\r
136 if (Entry->Next == NULL) {\r
052ad7e1
A
137 //\r
138 // If the entry is not in the table add it.\r
139 // Next iteration of the loop will fill in the data\r
140 //\r
33a5a666 141 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1 142 ASSERT (Entry->Next != NULL);\r
33a5a666
A
143\r
144 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
145 Entry->Next->Name = AllocatePool (StrLen (VariableName));\r
146 StrCpy (Entry->Next->Name, VariableName);\r
147 Entry->Next->Volatile = Volatile;\r
148 }\r
149\r
150 }\r
151 }\r
152}\r
153\r
154\r
155\r
8d3a5c82 156BOOLEAN\r
8d3a5c82 157IsValidVariableHeader (\r
158 IN VARIABLE_HEADER *Variable\r
159 )\r
160/*++\r
161\r
162Routine Description:\r
163\r
164 This code checks if variable header is valid or not.\r
165\r
166Arguments:\r
167 Variable Pointer to the Variable Header.\r
168\r
169Returns:\r
170 TRUE Variable header is valid.\r
171 FALSE Variable header is not valid.\r
172\r
173--*/\r
174{\r
175 if (Variable == NULL ||\r
176 Variable->StartId != VARIABLE_DATA ||\r
177 (sizeof (VARIABLE_HEADER) + Variable->NameSize + Variable->DataSize) > MAX_VARIABLE_SIZE\r
178 ) {\r
179 return FALSE;\r
180 }\r
181\r
182 return TRUE;\r
183}\r
184\r
052ad7e1 185\r
8d3a5c82 186EFI_STATUS\r
8d3a5c82 187UpdateVariableStore (\r
188 IN VARIABLE_GLOBAL *Global,\r
189 IN BOOLEAN Volatile,\r
190 IN BOOLEAN SetByIndex,\r
191 IN UINTN Instance,\r
192 IN UINTN DataPtrIndex,\r
193 IN UINT32 DataSize,\r
194 IN UINT8 *Buffer\r
195 )\r
196/*++\r
197\r
198Routine Description:\r
199\r
200 This function writes data to the FWH at the correct LBA even if the LBAs\r
201 are fragmented.\r
202\r
203Arguments:\r
204\r
c6492839 205 Global - Pointer to VARAIBLE_GLOBAL structure\r
206 Volatile - If the Variable is Volatile or Non-Volatile\r
207 SetByIndex - TRUE: Target pointer is given as index\r
208 FALSE: Target pointer is absolute\r
209 Instance - Instance of FV Block services\r
210 DataPtrIndex - Pointer to the Data from the end of VARIABLE_STORE_HEADER\r
211 structure\r
212 DataSize - Size of data to be written.\r
213 Buffer - Pointer to the buffer from which data is written\r
8d3a5c82 214\r
215Returns:\r
216\r
c6492839 217 EFI_INVALID_PARAMETER - Parameters not valid\r
218 EFI_SUCCESS - Variable store successfully updated\r
8d3a5c82 219\r
220--*/\r
221{\r
222 EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;\r
223 UINTN BlockIndex2;\r
224 UINTN LinearOffset;\r
225 UINTN CurrWriteSize;\r
226 UINTN CurrWritePtr;\r
227 UINT8 *CurrBuffer;\r
228 EFI_LBA LbaNumber;\r
229 UINTN Size;\r
230 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
231 VARIABLE_STORE_HEADER *VolatileBase;\r
232 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
233 EFI_PHYSICAL_ADDRESS DataPtr;\r
234 EFI_STATUS Status;\r
235\r
236 FwVolHeader = NULL;\r
237 DataPtr = DataPtrIndex;\r
238\r
239 //\r
240 // Check if the Data is Volatile\r
241 //\r
242 if (!Volatile) {\r
243 EfiFvbGetPhysicalAddress (Instance, &FvVolHdr);\r
244 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
245 //\r
246 // Data Pointer should point to the actual Address where data is to be\r
247 // written\r
248 //\r
249 if (SetByIndex) {\r
052ad7e1 250 DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
8d3a5c82 251 }\r
252\r
253 if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {\r
254 return EFI_INVALID_PARAMETER;\r
255 }\r
256 } else {\r
257 //\r
258 // Data Pointer should point to the actual Address where data is to be\r
259 // written\r
260 //\r
052ad7e1 261 VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 262 if (SetByIndex) {\r
052ad7e1 263 DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
8d3a5c82 264 }\r
265\r
266 if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {\r
267 return EFI_INVALID_PARAMETER;\r
268 }\r
c6492839 269 \r
270 //\r
271 // If Volatile Variable just do a simple mem copy.\r
272 // \r
273 CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);\r
8d3a5c82 274 return EFI_SUCCESS;\r
275 }\r
c6492839 276 \r
8d3a5c82 277 //\r
278 // If we are here we are dealing with Non-Volatile Variables\r
279 //\r
280 LinearOffset = (UINTN) FwVolHeader;\r
281 CurrWritePtr = (UINTN) DataPtr;\r
282 CurrWriteSize = DataSize;\r
283 CurrBuffer = Buffer;\r
284 LbaNumber = 0;\r
285\r
286 if (CurrWritePtr < LinearOffset) {\r
287 return EFI_INVALID_PARAMETER;\r
288 }\r
289\r
290 for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {\r
291 for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {\r
292 //\r
293 // Check to see if the Variable Writes are spanning through multiple\r
294 // blocks.\r
295 //\r
296 if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {\r
297 if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {\r
298 Status = EfiFvbWriteBlock (\r
299 Instance,\r
300 LbaNumber,\r
301 (UINTN) (CurrWritePtr - LinearOffset),\r
302 &CurrWriteSize,\r
303 CurrBuffer\r
304 );\r
8d3a5c82 305 return Status;\r
8d3a5c82 306 } else {\r
307 Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);\r
308 Status = EfiFvbWriteBlock (\r
309 Instance,\r
310 LbaNumber,\r
311 (UINTN) (CurrWritePtr - LinearOffset),\r
312 &Size,\r
313 CurrBuffer\r
314 );\r
315 if (EFI_ERROR (Status)) {\r
316 return Status;\r
317 }\r
318\r
319 CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;\r
320 CurrBuffer = CurrBuffer + Size;\r
321 CurrWriteSize = CurrWriteSize - Size;\r
322 }\r
323 }\r
324\r
325 LinearOffset += PtrBlockMapEntry->Length;\r
326 LbaNumber++;\r
327 }\r
328 }\r
329\r
330 return EFI_SUCCESS;\r
331}\r
332\r
052ad7e1 333\r
8d3a5c82 334VARIABLE_STORE_STATUS\r
8d3a5c82 335GetVariableStoreStatus (\r
336 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
337 )\r
338/*++\r
339\r
340Routine Description:\r
341\r
342 This code gets the current status of Variable Store.\r
343\r
344Arguments:\r
345\r
346 VarStoreHeader Pointer to the Variable Store Header.\r
347\r
348Returns:\r
349\r
350 EfiRaw Variable store status is raw\r
351 EfiValid Variable store status is valid\r
352 EfiInvalid Variable store status is invalid\r
353\r
354--*/\r
355{\r
356 if (VarStoreHeader->Signature == VARIABLE_STORE_SIGNATURE &&\r
357 VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&\r
358 VarStoreHeader->State == VARIABLE_STORE_HEALTHY\r
359 ) {\r
360\r
361 return EfiValid;\r
362 } else if (VarStoreHeader->Signature == 0xffffffff &&\r
363 VarStoreHeader->Size == 0xffffffff &&\r
364 VarStoreHeader->Format == 0xff &&\r
365 VarStoreHeader->State == 0xff\r
366 ) {\r
367\r
368 return EfiRaw;\r
369 } else {\r
370 return EfiInvalid;\r
371 }\r
372}\r
373\r
052ad7e1 374\r
8d3a5c82 375UINT8 *\r
8d3a5c82 376GetVariableDataPtr (\r
377 IN VARIABLE_HEADER *Variable\r
378 )\r
379/*++\r
380\r
381Routine Description:\r
382\r
383 This code gets the pointer to the variable data.\r
384\r
385Arguments:\r
386\r
387 Variable Pointer to the Variable Header.\r
388\r
389Returns:\r
390\r
391 UINT8* Pointer to Variable Data\r
392\r
393--*/\r
394{\r
395 //\r
396 // Be careful about pad size for alignment\r
397 //\r
398 return (UINT8 *) ((UINTN) GET_VARIABLE_NAME_PTR (Variable) + Variable->NameSize + GET_PAD_SIZE (Variable->NameSize));\r
399}\r
400\r
052ad7e1 401\r
8d3a5c82 402VARIABLE_HEADER *\r
8d3a5c82 403GetNextVariablePtr (\r
404 IN VARIABLE_HEADER *Variable\r
405 )\r
406/*++\r
407\r
408Routine Description:\r
409\r
410 This code gets the pointer to the next variable header.\r
411\r
412Arguments:\r
413\r
414 Variable Pointer to the Variable Header.\r
415\r
416Returns:\r
417\r
418 VARIABLE_HEADER* Pointer to next variable header.\r
419\r
420--*/\r
421{\r
422 if (!IsValidVariableHeader (Variable)) {\r
423 return NULL;\r
424 }\r
425 //\r
426 // Be careful about pad size for alignment\r
427 //\r
428 return (VARIABLE_HEADER *) ((UINTN) GetVariableDataPtr (Variable) + Variable->DataSize + GET_PAD_SIZE (Variable->DataSize));\r
429}\r
430\r
052ad7e1 431\r
8d3a5c82 432VARIABLE_HEADER *\r
8d3a5c82 433GetEndPointer (\r
434 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
435 )\r
436/*++\r
437\r
438Routine Description:\r
439\r
440 This code gets the pointer to the last variable memory pointer byte\r
441\r
442Arguments:\r
443\r
444 VarStoreHeader Pointer to the Variable Store Header.\r
445\r
446Returns:\r
447\r
448 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
449\r
450--*/\r
451{\r
452 //\r
453 // The end of variable store\r
454 //\r
455 return (VARIABLE_HEADER *) ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
456}\r
457\r
052ad7e1 458\r
8d3a5c82 459EFI_STATUS\r
8d3a5c82 460Reclaim (\r
461 IN EFI_PHYSICAL_ADDRESS VariableBase,\r
462 OUT UINTN *LastVariableOffset,\r
463 IN BOOLEAN IsVolatile\r
464 )\r
465/*++\r
466\r
467Routine Description:\r
468\r
469 Variable store garbage collection and reclaim operation\r
470\r
471Arguments:\r
472\r
473 VariableBase Base address of variable store\r
474 LastVariableOffset Offset of last variable\r
475 IsVolatile The variable store is volatile or not,\r
476 if it is non-volatile, need FTW\r
477\r
478Returns:\r
479\r
480 EFI STATUS\r
481\r
482--*/\r
483{\r
484 VARIABLE_HEADER *Variable;\r
485 VARIABLE_HEADER *NextVariable;\r
486 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
487 UINT8 *ValidBuffer;\r
488 UINTN ValidBufferSize;\r
489 UINTN VariableSize;\r
490 UINT8 *CurrPtr;\r
491 EFI_STATUS Status;\r
492\r
493 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);\r
494\r
495 //\r
496 // Start Pointers for the variable.\r
497 //\r
498 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
499\r
500 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
501\r
502 while (IsValidVariableHeader (Variable)) {\r
503 NextVariable = GetNextVariablePtr (Variable);\r
504 if (Variable->State == VAR_ADDED) {\r
505 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
506 ValidBufferSize += VariableSize;\r
507 }\r
508\r
509 Variable = NextVariable;\r
510 }\r
511\r
512 ValidBuffer = AllocatePool (ValidBufferSize);\r
513 if (ValidBuffer == NULL) {\r
514 return EFI_OUT_OF_RESOURCES;\r
515 }\r
516\r
517 SetMem (ValidBuffer, ValidBufferSize, 0xff);\r
518\r
519 CurrPtr = ValidBuffer;\r
520\r
521 //\r
522 // Copy variable store header\r
523 //\r
524 CopyMem (CurrPtr, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
525 CurrPtr += sizeof (VARIABLE_STORE_HEADER);\r
526\r
527 //\r
528 // Start Pointers for the variable.\r
529 //\r
530 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
531\r
532 while (IsValidVariableHeader (Variable)) {\r
533 NextVariable = GetNextVariablePtr (Variable);\r
534 if (Variable->State == VAR_ADDED) {\r
535 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
536 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
537 CurrPtr += VariableSize;\r
538 }\r
539\r
540 Variable = NextVariable;\r
541 }\r
542\r
543 if (IsVolatile) {\r
544 //\r
545 // If volatile variable store, just copy valid buffer\r
546 //\r
547 SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);\r
548 CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, ValidBufferSize);\r
549 *LastVariableOffset = ValidBufferSize;\r
550 Status = EFI_SUCCESS;\r
551 } else {\r
552 //\r
553 // If non-volatile variable store, perform FTW here.\r
554 //\r
555 Status = FtwVariableSpace (\r
556 VariableBase,\r
557 ValidBuffer,\r
558 ValidBufferSize\r
559 );\r
560 if (!EFI_ERROR (Status)) {\r
561 *LastVariableOffset = ValidBufferSize;\r
562 }\r
563 }\r
564\r
565 FreePool (ValidBuffer);\r
566\r
567 if (EFI_ERROR (Status)) {\r
568 *LastVariableOffset = 0;\r
569 }\r
570\r
571 return Status;\r
572}\r
573\r
33a5a666
A
574\r
575//\r
576// The current Hii implementation accesses this variable a larg # of times on every boot.\r
577// Other common variables are only accessed a single time. This is why this cache algorithm\r
578// only targets a single variable. Probably to get an performance improvement out of\r
579// a Cache you would need a cache that improves the search performance for a variable.\r
580//\r
581VARIABLE_CACHE_ENTRY mVariableCache[] = {\r
582 {\r
583 &gEfiGlobalVariableGuid,\r
584 L"Lang",\r
585 0x00000000,\r
586 0x00,\r
587 NULL\r
588 }\r
589};\r
590\r
052ad7e1
A
591\r
592/**\r
593 Update the Cache with Variable information. These are the same \r
594 arguments as the EFI Variable services.\r
595\r
596 @param[in] VariableName Name of variable\r
597 @param[in] VendorGuid Guid of variable\r
598 @param[in] Attribute Attribue of the variable\r
599 @param[in] DataSize Size of data. 0 means delete\r
600 @param[in] Data Variable data\r
601\r
602**/\r
33a5a666
A
603VOID\r
604UpdateVariableCache (\r
605 IN CHAR16 *VariableName,\r
606 IN EFI_GUID *VendorGuid,\r
052ad7e1
A
607 IN UINT32 Attributes,\r
608 IN UINTN DataSize,\r
609 IN VOID *Data\r
33a5a666
A
610 )\r
611{\r
612 VARIABLE_CACHE_ENTRY *Entry;\r
613 UINTN Index;\r
614\r
615 if (EfiAtRuntime ()) {\r
616 // Don't use the cache at runtime\r
617 return;\r
618 }\r
619\r
620 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
621 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
622 if (StrCmp (VariableName, Entry->Name) == 0) { \r
623 Entry->Attributes = Attributes;\r
624 if (DataSize == 0) {\r
625 // Delete Case\r
626 if (Entry->DataSize != 0) {\r
627 FreePool (Entry->Data);\r
628 }\r
629 Entry->DataSize = DataSize;\r
630 } else if (DataSize == Entry->DataSize) {\r
631 CopyMem (Entry->Data, Data, DataSize);\r
632 } else {\r
633 Entry->Data = AllocatePool (DataSize);\r
634 Entry->DataSize = DataSize;\r
635 CopyMem (Entry->Data, Data, DataSize);\r
636 }\r
637 }\r
638 }\r
639 }\r
640}\r
641\r
642\r
052ad7e1
A
643/**\r
644 Search the cache to see if the variable is in the cache.\r
645\r
646 @param[in] VariableName Name of variable\r
647 @param[in] VendorGuid Guid of variable\r
648 @param[in] Attribute Attribue returned \r
649 @param[in] DataSize Size of data returned\r
650 @param[in] Data Variable data returned\r
651\r
652 @retval EFI_SUCCESS VariableGuid & VariableName data was returned.\r
653 @retval other Not found.\r
654\r
655**/\r
33a5a666
A
656EFI_STATUS\r
657FindVariableInCache (\r
658 IN CHAR16 *VariableName,\r
659 IN EFI_GUID *VendorGuid,\r
660 OUT UINT32 *Attributes OPTIONAL,\r
661 IN OUT UINTN *DataSize,\r
662 OUT VOID *Data\r
663 )\r
664{\r
665 VARIABLE_CACHE_ENTRY *Entry;\r
666 UINTN Index;\r
667\r
668 if (EfiAtRuntime ()) {\r
669 // Don't use the cache at runtime\r
670 return EFI_NOT_FOUND;\r
671 }\r
672\r
673 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
674 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
675 if (StrCmp (VariableName, Entry->Name) == 0) {\r
676 if (Entry->DataSize == 0) {\r
052ad7e1 677 // Variable was deleted so return not found\r
33a5a666 678 return EFI_NOT_FOUND;\r
aa09397b 679 } else if (Entry->DataSize > *DataSize) {\r
052ad7e1 680 // If the buffer is too small return correct size\r
33a5a666
A
681 *DataSize = Entry->DataSize;\r
682 return EFI_BUFFER_TOO_SMALL;\r
683 } else {\r
aa09397b 684 *DataSize = Entry->DataSize;\r
052ad7e1 685 // Return the data\r
33a5a666
A
686 CopyMem (Data, Entry->Data, Entry->DataSize);\r
687 if (Attributes != NULL) {\r
688 *Attributes = Entry->Attributes;\r
689 }\r
690 return EFI_SUCCESS;\r
691 }\r
692 }\r
693 }\r
694 }\r
695 \r
696 return EFI_NOT_FOUND;\r
697}\r
698\r
699\r
8d3a5c82 700EFI_STATUS\r
8d3a5c82 701FindVariable (\r
702 IN CHAR16 *VariableName,\r
703 IN EFI_GUID *VendorGuid,\r
704 OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
705 IN VARIABLE_GLOBAL *Global\r
706 )\r
707/*++\r
708\r
709Routine Description:\r
710\r
711 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
712\r
713Arguments:\r
714\r
715 VariableName Name of the variable to be found\r
716 VendorGuid Vendor GUID to be found.\r
717 PtrTrack Variable Track Pointer structure that contains\r
718 Variable Information.\r
719 Contains the pointer of Variable header.\r
720 Global VARIABLE_GLOBAL pointer\r
721\r
722Returns:\r
723\r
724 EFI STATUS\r
725\r
726--*/\r
727{\r
728 VARIABLE_HEADER *Variable[2];\r
729 VARIABLE_STORE_HEADER *VariableStoreHeader[2];\r
730 UINTN Index;\r
731\r
732 //\r
733 // We aquire the lock at the entry of FindVariable as GetVariable, GetNextVariableName\r
734 // SetVariable all call FindVariable at entry point. Please move "Aquire Lock" to\r
735 // the correct places if this assumption does not hold TRUE anymore.\r
736 //\r
052ad7e1 737 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 738\r
739 //\r
33a5a666 740 // 0: Volatile, 1: Non-Volatile\r
36873a61 741 // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName\r
742 // make use of this mapping to implement search algorithme.\r
8d3a5c82 743 //\r
052ad7e1
A
744 VariableStoreHeader[0] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
745 VariableStoreHeader[1] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 746\r
747 //\r
748 // Start Pointers for the variable.\r
749 // Actual Data Pointer where data can be written.\r
750 //\r
751 Variable[0] = (VARIABLE_HEADER *) (VariableStoreHeader[0] + 1);\r
752 Variable[1] = (VARIABLE_HEADER *) (VariableStoreHeader[1] + 1);\r
753\r
754 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
755 return EFI_INVALID_PARAMETER;\r
756 }\r
757 //\r
33a5a666 758 // Find the variable by walk through volatile and then non-volatile variable store\r
8d3a5c82 759 //\r
760 for (Index = 0; Index < 2; Index++) {\r
761 PtrTrack->StartPtr = (VARIABLE_HEADER *) (VariableStoreHeader[Index] + 1);\r
762 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
763\r
764 while (IsValidVariableHeader (Variable[Index]) && (Variable[Index] <= GetEndPointer (VariableStoreHeader[Index]))) {\r
765 if (Variable[Index]->State == VAR_ADDED) {\r
c6492839 766 if (!EfiAtRuntime () || (Variable[Index]->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
8d3a5c82 767 if (VariableName[0] == 0) {\r
768 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 769 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 770 return EFI_SUCCESS;\r
771 } else {\r
772 if (CompareGuid (VendorGuid, &Variable[Index]->VendorGuid)) {\r
773 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable[Index]), Variable[Index]->NameSize)) {\r
774 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 775 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 776 return EFI_SUCCESS;\r
777 }\r
778 }\r
779 }\r
780 }\r
781 }\r
782\r
783 Variable[Index] = GetNextVariablePtr (Variable[Index]);\r
784 }\r
8d3a5c82 785 }\r
8d3a5c82 786 PtrTrack->CurrPtr = NULL;\r
787 return EFI_NOT_FOUND;\r
788}\r
789\r
33a5a666 790\r
052ad7e1 791\r
8d3a5c82 792/*++\r
793\r
794Routine Description:\r
795\r
796 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
797\r
798Arguments:\r
799\r
c6492839 800 VariableName Name of Variable to be found\r
801 VendorGuid Variable vendor GUID\r
802 Attributes OPTIONAL Attribute value of the variable found\r
803 DataSize Size of Data found. If size is less than the\r
804 data, this value contains the required size.\r
805 Data Data pointer\r
806 Global Pointer to VARIABLE_GLOBAL structure\r
807 Instance Instance of the Firmware Volume.\r
8d3a5c82 808\r
809Returns:\r
810\r
c6492839 811 EFI_INVALID_PARAMETER - Invalid parameter\r
812 EFI_SUCCESS - Find the specified variable\r
813 EFI_NOT_FOUND - Not found\r
814 EFI_BUFFER_TO_SMALL - DataSize is too small for the result\r
815\r
8d3a5c82 816\r
817--*/\r
052ad7e1
A
818EFI_STATUS\r
819EFIAPI\r
820RuntimeServiceGetVariable (\r
821 IN CHAR16 *VariableName,\r
822 IN EFI_GUID *VendorGuid,\r
823 OUT UINT32 *Attributes OPTIONAL,\r
824 IN OUT UINTN *DataSize,\r
825 OUT VOID *Data\r
826 )\r
8d3a5c82 827{\r
052ad7e1 828 EFI_STATUS Status;\r
8d3a5c82 829 VARIABLE_POINTER_TRACK Variable;\r
830 UINTN VarDataSize;\r
8d3a5c82 831\r
832 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
833 return EFI_INVALID_PARAMETER;\r
834 }\r
33a5a666 835\r
8d3a5c82 836 //\r
837 // Find existing variable\r
838 //\r
33a5a666
A
839 Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
840 if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){\r
841 // Hit in the Cache\r
842 UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);\r
843 return Status;\r
844 }\r
845 \r
052ad7e1 846 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 847 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
848 goto Done;\r
849 }\r
33a5a666 850\r
8d3a5c82 851 //\r
852 // Get data size\r
853 //\r
854 VarDataSize = Variable.CurrPtr->DataSize;\r
855 if (*DataSize >= VarDataSize) {\r
856 if (Data == NULL) {\r
857 Status = EFI_INVALID_PARAMETER;\r
858 goto Done;\r
859 }\r
860\r
861 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
862 if (Attributes != NULL) {\r
863 *Attributes = Variable.CurrPtr->Attributes;\r
864 }\r
865\r
866 *DataSize = VarDataSize;\r
33a5a666
A
867 UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);\r
868 UpdateVariableCache (VariableName, VendorGuid, Variable.CurrPtr->Attributes, VarDataSize, Data);\r
869 \r
8d3a5c82 870 Status = EFI_SUCCESS;\r
871 goto Done;\r
872 } else {\r
873 *DataSize = VarDataSize;\r
874 Status = EFI_BUFFER_TOO_SMALL;\r
875 goto Done;\r
876 }\r
877\r
878Done:\r
052ad7e1 879 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 880 return Status;\r
881}\r
882\r
052ad7e1
A
883\r
884\r
8d3a5c82 885/*++\r
886\r
887Routine Description:\r
888\r
889 This code Finds the Next available variable\r
890\r
891Arguments:\r
892\r
893 VariableNameSize Size of the variable\r
894 VariableName Pointer to variable name\r
895 VendorGuid Variable Vendor Guid\r
896 Global VARIABLE_GLOBAL structure pointer.\r
897 Instance FV instance\r
898\r
899Returns:\r
900\r
901 EFI STATUS\r
902\r
903--*/\r
052ad7e1
A
904EFI_STATUS\r
905EFIAPI\r
906RuntimeServiceGetNextVariableName (\r
907 IN OUT UINTN *VariableNameSize,\r
908 IN OUT CHAR16 *VariableName,\r
909 IN OUT EFI_GUID *VendorGuid\r
910 )\r
8d3a5c82 911{\r
912 VARIABLE_POINTER_TRACK Variable;\r
913 UINTN VarNameSize;\r
914 EFI_STATUS Status;\r
915\r
916 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
917 return EFI_INVALID_PARAMETER;\r
918 }\r
919\r
052ad7e1 920 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 921 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
922 goto Done;\r
923 }\r
924\r
925 if (VariableName[0] != 0) {\r
926 //\r
927 // If variable name is not NULL, get next variable\r
928 //\r
929 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
930 }\r
931\r
932 while (TRUE) {\r
933 //\r
934 // If both volatile and non-volatile variable store are parsed,\r
935 // return not found\r
936 //\r
937 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
938 Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));\r
36873a61 939 if (!Variable.Volatile) {\r
940 Variable.StartPtr = (VARIABLE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase + sizeof (VARIABLE_STORE_HEADER)));\r
941 Variable.EndPtr = (VARIABLE_HEADER *) GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase));\r
8d3a5c82 942 } else {\r
943 Status = EFI_NOT_FOUND;\r
944 goto Done;\r
945 }\r
946\r
947 Variable.CurrPtr = Variable.StartPtr;\r
948 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
949 continue;\r
950 }\r
951 }\r
952 //\r
953 // Variable is found\r
954 //\r
955 if (IsValidVariableHeader (Variable.CurrPtr) && Variable.CurrPtr->State == VAR_ADDED) {\r
956 if (!(EfiAtRuntime () && !(Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS))) {\r
957 VarNameSize = Variable.CurrPtr->NameSize;\r
958 if (VarNameSize <= *VariableNameSize) {\r
959 CopyMem (\r
960 VariableName,\r
961 GET_VARIABLE_NAME_PTR (Variable.CurrPtr),\r
962 VarNameSize\r
963 );\r
964 CopyMem (\r
965 VendorGuid,\r
966 &Variable.CurrPtr->VendorGuid,\r
967 sizeof (EFI_GUID)\r
968 );\r
969 Status = EFI_SUCCESS;\r
970 } else {\r
971 Status = EFI_BUFFER_TOO_SMALL;\r
972 }\r
973\r
974 *VariableNameSize = VarNameSize;\r
975 goto Done;\r
976 }\r
977 }\r
978\r
979 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
980 }\r
981\r
982Done:\r
052ad7e1 983 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 984 return Status;\r
985}\r
986\r
052ad7e1 987\r
8d3a5c82 988/*++\r
989\r
990Routine Description:\r
991\r
992 This code sets variable in storage blocks (Volatile or Non-Volatile)\r
993\r
994Arguments:\r
995\r
996 VariableName Name of Variable to be found\r
997 VendorGuid Variable vendor GUID\r
998 Attributes Attribute value of the variable found\r
999 DataSize Size of Data found. If size is less than the\r
1000 data, this value contains the required size.\r
1001 Data Data pointer\r
1002 Global Pointer to VARIABLE_GLOBAL structure\r
1003 VolatileOffset The offset of last volatile variable\r
1004 NonVolatileOffset The offset of last non-volatile variable\r
1005 Instance Instance of the Firmware Volume.\r
1006\r
1007Returns:\r
1008\r
8d3a5c82 1009 EFI_INVALID_PARAMETER - Invalid parameter\r
1010 EFI_SUCCESS - Set successfully\r
1011 EFI_OUT_OF_RESOURCES - Resource not enough to set variable\r
1012 EFI_NOT_FOUND - Not found\r
c6492839 1013 EFI_DEVICE_ERROR - Variable can not be saved due to hardware failure\r
1014 EFI_WRITE_PROTECTED - Variable is read-only\r
8d3a5c82 1015\r
1016--*/\r
052ad7e1
A
1017EFI_STATUS\r
1018EFIAPI\r
1019RuntimeServiceSetVariable (\r
1020 IN CHAR16 *VariableName,\r
1021 IN EFI_GUID *VendorGuid,\r
1022 IN UINT32 Attributes,\r
1023 IN UINTN DataSize,\r
1024 IN VOID *Data\r
1025 )\r
8d3a5c82 1026{\r
1027 VARIABLE_POINTER_TRACK Variable;\r
1028 EFI_STATUS Status;\r
1029 VARIABLE_HEADER *NextVariable;\r
1030 UINTN VarNameSize;\r
1031 UINTN VarNameOffset;\r
1032 UINTN VarDataOffset;\r
1033 UINTN VarSize;\r
1034 UINT8 State;\r
1035 BOOLEAN Reclaimed;\r
052ad7e1
A
1036 UINTN *VolatileOffset;\r
1037 UINTN *NonVolatileOffset;\r
1038 UINT32 Instance;\r
fd51bf70 1039 BOOLEAN Volatile;\r
8d3a5c82 1040\r
052ad7e1
A
1041 Reclaimed = FALSE;\r
1042 VolatileOffset = &mVariableModuleGlobal->VolatileLastVariableOffset;\r
1043 NonVolatileOffset = &mVariableModuleGlobal->NonVolatileLastVariableOffset;\r
1044 Instance = mVariableModuleGlobal->FvbInstance;\r
8d3a5c82 1045\r
c6492839 1046 //\r
1047 // Check input parameters\r
1048 //\r
8d3a5c82 1049 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1050 return EFI_INVALID_PARAMETER;\r
c6492839 1051 } \r
1052 //\r
1053 // Make sure if runtime bit is set, boot service bit is set also\r
1054 //\r
1055 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1056 return EFI_INVALID_PARAMETER;\r
8d3a5c82 1057 }\r
c6492839 1058 //\r
1059 // The size of the VariableName, including the Unicode Null in bytes plus\r
1060 // the DataSize is limited to maximum size of MAX_HARDWARE_ERROR_VARIABLE_SIZE (32K)\r
1061 // bytes for HwErrRec, and MAX_VARIABLE_SIZE (1024) bytes for the others.\r
1062 //\r
1063 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1064 if ((DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE) || \r
1065 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE)) {\r
1066 return EFI_INVALID_PARAMETER;\r
1067 } \r
1068 } else {\r
1069 //\r
1070 // The size of the VariableName, including the Unicode Null in bytes plus\r
1071 // the DataSize is limited to maximum size of MAX_VARIABLE_SIZE (1024) bytes.\r
1072 //\r
1073 if ((DataSize > MAX_VARIABLE_SIZE) ||\r
1074 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_VARIABLE_SIZE)) {\r
1075 return EFI_INVALID_PARAMETER;\r
1076 } \r
1077 } \r
1078 //\r
1079 // Check whether the input variable is already existed\r
1080 //\r
1081 \r
052ad7e1 1082 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
c6492839 1083 if (Status == EFI_SUCCESS && Variable.CurrPtr != NULL) {\r
8d3a5c82 1084 //\r
c6492839 1085 // Update/Delete existing variable\r
8d3a5c82 1086 //\r
fd51bf70 1087 Volatile = Variable.Volatile;\r
c6492839 1088 \r
1089 if (EfiAtRuntime ()) { \r
1090 //\r
1091 // If EfiAtRuntime and the variable is Volatile and Runtime Access, \r
1092 // the volatile is ReadOnly, and SetVariable should be aborted and \r
1093 // return EFI_WRITE_PROTECTED.\r
1094 //\r
1095 if (Variable.Volatile) {\r
1096 Status = EFI_WRITE_PROTECTED;\r
1097 goto Done;\r
1098 }\r
1099 //\r
1100 // Only variable have NV attribute can be updated/deleted in Runtime\r
1101 //\r
1102 if (!(Variable.CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE)) {\r
1103 Status = EFI_INVALID_PARAMETER;\r
1104 goto Done; \r
1105 }\r
1106 }\r
8d3a5c82 1107 //\r
c6492839 1108 // Setting a data variable with no access, or zero DataSize attributes\r
1109 // specified causes it to be deleted.\r
8d3a5c82 1110 //\r
c6492839 1111 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { \r
1112 State = Variable.CurrPtr->State;\r
1113 State &= VAR_DELETED;\r
1114\r
1115 Status = UpdateVariableStore (\r
052ad7e1 1116 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1117 Variable.Volatile,\r
1118 FALSE,\r
1119 Instance,\r
1120 (UINTN) &Variable.CurrPtr->State,\r
1121 sizeof (UINT8),\r
1122 &State\r
1123 ); \r
33a5a666 1124 if (!EFI_ERROR (Status)) {\r
fd51bf70 1125 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);\r
33a5a666
A
1126 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1127 }\r
c6492839 1128 goto Done; \r
1129 }\r
8d3a5c82 1130 //\r
c6492839 1131 // If the variable is marked valid and the same data has been passed in\r
1132 // then return to the caller immediately.\r
8d3a5c82 1133 //\r
c6492839 1134 if (Variable.CurrPtr->DataSize == DataSize &&\r
1135 (CompareMem (Data, GetVariableDataPtr (Variable.CurrPtr), DataSize) == 0)) {\r
33a5a666 1136 \r
fd51bf70 1137 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
c6492839 1138 Status = EFI_SUCCESS;\r
1139 goto Done;\r
1140 } else if ((Variable.CurrPtr->State == VAR_ADDED) ||\r
1141 (Variable.CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
1142 //\r
1143 // Mark the old variable as in delete transition\r
1144 //\r
1145 State = Variable.CurrPtr->State;\r
1146 State &= VAR_IN_DELETED_TRANSITION;\r
1147\r
1148 Status = UpdateVariableStore (\r
052ad7e1 1149 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1150 Variable.Volatile,\r
1151 FALSE,\r
1152 Instance,\r
1153 (UINTN) &Variable.CurrPtr->State,\r
1154 sizeof (UINT8),\r
1155 &State\r
1156 ); \r
1157 if (EFI_ERROR (Status)) {\r
1158 goto Done; \r
33a5a666 1159 } \r
c6492839 1160 } \r
1161 } else if (Status == EFI_NOT_FOUND) {\r
8d3a5c82 1162 //\r
c6492839 1163 // Create a new variable\r
1164 // \r
1165 \r
8d3a5c82 1166 //\r
c6492839 1167 // Make sure we are trying to create a new variable.\r
1168 // Setting a data variable with no access, or zero DataSize attributes means to delete it. \r
8d3a5c82 1169 //\r
c6492839 1170 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
1171 Status = EFI_NOT_FOUND;\r
1172 goto Done;\r
1173 }\r
1174 \r
8d3a5c82 1175 //\r
c6492839 1176 // Only variable have NV|RT attribute can be created in Runtime\r
1177 //\r
1178 if (EfiAtRuntime () &&\r
1179 (!(Attributes & EFI_VARIABLE_RUNTIME_ACCESS) || !(Attributes & EFI_VARIABLE_NON_VOLATILE))) {\r
1180 Status = EFI_INVALID_PARAMETER;\r
1181 goto Done;\r
1182 } \r
1183 } else {\r
8d3a5c82 1184 //\r
c6492839 1185 // Status should be EFI_INVALID_PARAMETER here according to return status of FindVariable().\r
8d3a5c82 1186 //\r
c6492839 1187 ASSERT (Status == EFI_INVALID_PARAMETER);\r
8d3a5c82 1188 goto Done;\r
c6492839 1189 }\r
1190\r
1191 //\r
1192 // Function part - create a new variable and copy the data.\r
1193 // Both update a variable and create a variable will come here.\r
1194 //\r
1195 // Tricky part: Use scratch data area at the end of volatile variable store\r
1196 // as a temporary storage.\r
1197 //\r
052ad7e1 1198 NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));\r
c6492839 1199\r
1200 SetMem (NextVariable, SCRATCH_SIZE, 0xff);\r
1201\r
1202 NextVariable->StartId = VARIABLE_DATA;\r
1203 NextVariable->Attributes = Attributes;\r
1204 //\r
1205 // NextVariable->State = VAR_ADDED;\r
1206 //\r
1207 NextVariable->Reserved = 0;\r
1208 VarNameOffset = sizeof (VARIABLE_HEADER);\r
1209 VarNameSize = StrSize (VariableName);\r
1210 CopyMem (\r
1211 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
1212 VariableName,\r
1213 VarNameSize\r
1214 );\r
1215 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
1216 CopyMem (\r
1217 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
1218 Data,\r
1219 DataSize\r
1220 );\r
1221 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
1222 //\r
1223 // There will be pad bytes after Data, the NextVariable->NameSize and\r
1224 // NextVariable->DataSize should not include pad size so that variable\r
1225 // service can get actual size in GetVariable\r
1226 //\r
1227 NextVariable->NameSize = (UINT32)VarNameSize;\r
1228 NextVariable->DataSize = (UINT32)DataSize;\r
1229\r
1230 //\r
1231 // The actual size of the variable that stores in storage should\r
1232 // include pad size.\r
1233 //\r
1234 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
1235 if (Attributes & EFI_VARIABLE_NON_VOLATILE) {\r
8d3a5c82 1236 //\r
c6492839 1237 // Create a nonvolatile variable\r
8d3a5c82 1238 //\r
fd51bf70 1239 Volatile = FALSE;\r
c6492839 1240 \r
1241 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1242 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
c6492839 1243 ) {\r
1244 if (EfiAtRuntime ()) {\r
1245 Status = EFI_OUT_OF_RESOURCES;\r
1246 goto Done;\r
1247 }\r
1248 //\r
1249 // Perform garbage collection & reclaim operation\r
1250 //\r
052ad7e1 1251 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, NonVolatileOffset, FALSE);\r
8d3a5c82 1252 if (EFI_ERROR (Status)) {\r
1253 goto Done;\r
1254 }\r
8d3a5c82 1255 //\r
c6492839 1256 // If still no enough space, return out of resources\r
8d3a5c82 1257 //\r
c6492839 1258 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1259 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
8d3a5c82 1260 ) {\r
c6492839 1261 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1262 goto Done;\r
8d3a5c82 1263 }\r
c6492839 1264 \r
1265 Reclaimed = TRUE;\r
8d3a5c82 1266 }\r
1267 //\r
c6492839 1268 // Three steps\r
1269 // 1. Write variable header\r
1270 // 2. Write variable data\r
1271 // 3. Set variable state to valid\r
8d3a5c82 1272 //\r
8d3a5c82 1273 //\r
c6492839 1274 // Step 1:\r
8d3a5c82 1275 //\r
c6492839 1276 Status = UpdateVariableStore (\r
052ad7e1 1277 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1278 FALSE,\r
1279 TRUE,\r
1280 Instance,\r
1281 *NonVolatileOffset,\r
1282 sizeof (VARIABLE_HEADER),\r
1283 (UINT8 *) NextVariable\r
1284 );\r
1285\r
1286 if (EFI_ERROR (Status)) {\r
1287 goto Done;\r
1288 }\r
8d3a5c82 1289 //\r
c6492839 1290 // Step 2:\r
8d3a5c82 1291 //\r
c6492839 1292 Status = UpdateVariableStore (\r
052ad7e1 1293 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1294 FALSE,\r
1295 TRUE,\r
1296 Instance,\r
1297 *NonVolatileOffset + sizeof (VARIABLE_HEADER),\r
1298 (UINT32) VarSize - sizeof (VARIABLE_HEADER),\r
1299 (UINT8 *) NextVariable + sizeof (VARIABLE_HEADER)\r
1300 );\r
1301\r
1302 if (EFI_ERROR (Status)) {\r
1303 goto Done;\r
1304 }\r
8d3a5c82 1305 //\r
c6492839 1306 // Step 3:\r
8d3a5c82 1307 //\r
c6492839 1308 NextVariable->State = VAR_ADDED;\r
1309 Status = UpdateVariableStore (\r
052ad7e1 1310 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1311 FALSE,\r
1312 TRUE,\r
1313 Instance,\r
1314 *NonVolatileOffset,\r
1315 sizeof (VARIABLE_HEADER),\r
1316 (UINT8 *) NextVariable\r
1317 );\r
1318\r
1319 if (EFI_ERROR (Status)) {\r
1320 goto Done;\r
1321 }\r
8d3a5c82 1322\r
c6492839 1323 *NonVolatileOffset = *NonVolatileOffset + VarSize;\r
8d3a5c82 1324\r
c6492839 1325 } else {\r
1326 //\r
1327 // Create a volatile variable\r
1328 // \r
fd51bf70 1329 Volatile = TRUE;\r
c6492839 1330\r
1331 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1332 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {\r
8d3a5c82 1333 //\r
c6492839 1334 // Perform garbage collection & reclaim operation\r
8d3a5c82 1335 //\r
052ad7e1 1336 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, VolatileOffset, TRUE);\r
8d3a5c82 1337 if (EFI_ERROR (Status)) {\r
1338 goto Done;\r
1339 }\r
1340 //\r
c6492839 1341 // If still no enough space, return out of resources\r
8d3a5c82 1342 //\r
8d3a5c82 1343 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1344 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size\r
8d3a5c82 1345 ) {\r
c6492839 1346 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1347 goto Done;\r
1348 }\r
c6492839 1349 \r
1350 Reclaimed = TRUE;\r
8d3a5c82 1351 }\r
8d3a5c82 1352\r
c6492839 1353 NextVariable->State = VAR_ADDED;\r
1354 Status = UpdateVariableStore (\r
052ad7e1 1355 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1356 TRUE,\r
1357 TRUE,\r
1358 Instance,\r
1359 *VolatileOffset,\r
1360 (UINT32) VarSize,\r
1361 (UINT8 *) NextVariable\r
1362 );\r
1363\r
1364 if (EFI_ERROR (Status)) {\r
1365 goto Done;\r
8d3a5c82 1366 }\r
c6492839 1367\r
1368 *VolatileOffset = *VolatileOffset + VarSize;\r
1369 }\r
1370 //\r
1371 // Mark the old variable as deleted\r
1372 //\r
1373 if (!Reclaimed && !EFI_ERROR (Status) && Variable.CurrPtr != NULL) {\r
1374 State = Variable.CurrPtr->State;\r
1375 State &= VAR_DELETED;\r
1376\r
1377 Status = UpdateVariableStore (\r
052ad7e1 1378 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1379 Variable.Volatile,\r
1380 FALSE,\r
1381 Instance,\r
1382 (UINTN) &Variable.CurrPtr->State,\r
1383 sizeof (UINT8),\r
1384 &State\r
1385 );\r
33a5a666
A
1386 \r
1387 if (!EFI_ERROR (Status)) {\r
fd51bf70 1388 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1389 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1390 }\r
c6492839 1391 goto Done; \r
8d3a5c82 1392 }\r
1393\r
1394 Status = EFI_SUCCESS;\r
fd51bf70 1395 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1396 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1397\r
8d3a5c82 1398Done:\r
052ad7e1 1399 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1400 return Status;\r
1401}\r
1402\r
052ad7e1 1403\r
8d3a5c82 1404/*++\r
1405\r
1406Routine Description:\r
1407\r
1408 This code returns information about the EFI variables.\r
1409\r
1410Arguments:\r
1411\r
1412 Attributes Attributes bitmask to specify the type of variables\r
1413 on which to return information.\r
1414 MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
1415 for the EFI variables associated with the attributes specified.\r
1416 RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
c6492839 1417 for EFI variables associated with the attributes specified.\r
1418 MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
8d3a5c82 1419 associated with the attributes specified.\r
1420 Global Pointer to VARIABLE_GLOBAL structure.\r
1421 Instance Instance of the Firmware Volume.\r
1422\r
1423Returns:\r
1424\r
1425 EFI STATUS\r
1426 EFI_INVALID_PARAMETER - An invalid combination of attribute bits was supplied.\r
1427 EFI_SUCCESS - Query successfully.\r
1428 EFI_UNSUPPORTED - The attribute is not supported on this platform.\r
1429\r
1430--*/\r
052ad7e1
A
1431EFI_STATUS\r
1432EFIAPI\r
1433RuntimeServiceQueryVariableInfo (\r
1434 IN UINT32 Attributes,\r
1435 OUT UINT64 *MaximumVariableStorageSize,\r
1436 OUT UINT64 *RemainingVariableStorageSize,\r
1437 OUT UINT64 *MaximumVariableSize\r
1438 )\r
8d3a5c82 1439{\r
1440 VARIABLE_HEADER *Variable;\r
1441 VARIABLE_HEADER *NextVariable;\r
1442 UINT64 VariableSize;\r
1443 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1444\r
c6492839 1445 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
8d3a5c82 1446 return EFI_INVALID_PARAMETER;\r
1447 }\r
c6492839 1448 \r
1449 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
8d3a5c82 1450 //\r
1451 // Make sure the Attributes combination is supported by the platform.\r
1452 //\r
c6492839 1453 return EFI_UNSUPPORTED; \r
8d3a5c82 1454 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1455 //\r
1456 // Make sure if runtime bit is set, boot service bit is set also.\r
1457 //\r
1458 return EFI_INVALID_PARAMETER;\r
1459 } else if (EfiAtRuntime () && !(Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1460 //\r
1461 // Make sure RT Attribute is set if we are in Runtime phase.\r
1462 //\r
1463 return EFI_INVALID_PARAMETER;\r
1464 }\r
1465\r
052ad7e1 1466 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1467\r
1468 if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
1469 //\r
1470 // Query is Volatile related.\r
1471 //\r
052ad7e1 1472 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 1473 } else {\r
1474 //\r
1475 // Query is Non-Volatile related.\r
1476 //\r
052ad7e1 1477 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1478 }\r
1479\r
1480 //\r
1481 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
1482 // with the storage size (excluding the storage header size).\r
1483 //\r
1484 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1485 *RemainingVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1486\r
1487 //\r
c6492839 1488 // Let *MaximumVariableSize be MAX_VARIABLE_SIZE with the exception of the variable header size.\r
8d3a5c82 1489 //\r
c6492839 1490 *MaximumVariableSize = MAX_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1491\r
1492 //\r
1493 // Harware error record variable needs larger size.\r
1494 //\r
1495 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1496 *MaximumVariableSize = MAX_HARDWARE_ERROR_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1497 }\r
8d3a5c82 1498\r
1499 //\r
1500 // Point to the starting address of the variables.\r
1501 //\r
1502 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
1503\r
1504 //\r
1505 // Now walk through the related variable store.\r
1506 //\r
1507 while (IsValidVariableHeader (Variable) && (Variable < GetEndPointer (VariableStoreHeader))) {\r
1508 NextVariable = GetNextVariablePtr (Variable);\r
1509 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
1510\r
1511 if (EfiAtRuntime ()) {\r
1512 //\r
1513 // we don't take the state of the variables in mind\r
1514 // when calculating RemainingVariableStorageSize,\r
1515 // since the space occupied by variables not marked with\r
1516 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
1517 //\r
1518 *RemainingVariableStorageSize -= VariableSize;\r
1519 } else {\r
1520 //\r
1521 // Only care about Variables with State VAR_ADDED,because\r
1522 // the space not marked as VAR_ADDED is reclaimable now.\r
1523 //\r
1524 if (Variable->State == VAR_ADDED) {\r
1525 *RemainingVariableStorageSize -= VariableSize;\r
1526 }\r
1527 }\r
1528\r
1529 //\r
1530 // Go to the next one\r
1531 //\r
1532 Variable = NextVariable;\r
1533 }\r
1534\r
c6492839 1535 if (*RemainingVariableStorageSize < sizeof (VARIABLE_HEADER)) {\r
1536 *MaximumVariableSize = 0;\r
1537 } else if ((*RemainingVariableStorageSize - sizeof (VARIABLE_HEADER)) < *MaximumVariableSize) {\r
1538 *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (VARIABLE_HEADER);\r
1539 }\r
1540\r
052ad7e1 1541 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1542 return EFI_SUCCESS;\r
1543}\r
1544\r
1545EFI_STATUS\r
8d3a5c82 1546VariableCommonInitialize (\r
1547 IN EFI_HANDLE ImageHandle,\r
1548 IN EFI_SYSTEM_TABLE *SystemTable\r
1549 )\r
1550/*++\r
1551\r
1552Routine Description:\r
1553 This function does common initialization for variable services\r
1554\r
1555Arguments:\r
1556\r
1557 ImageHandle - The firmware allocated handle for the EFI image.\r
1558 SystemTable - A pointer to the EFI System Table.\r
1559\r
1560Returns:\r
1561\r
1562 Status code.\r
1563\r
1564 EFI_NOT_FOUND - Variable store area not found.\r
1565 EFI_UNSUPPORTED - Currently only one non-volatile variable store is supported.\r
1566 EFI_SUCCESS - Variable services successfully initialized.\r
1567\r
1568--*/\r
1569{\r
1570 EFI_STATUS Status;\r
1571 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
1572 CHAR8 *CurrPtr;\r
1573 VARIABLE_STORE_HEADER *VolatileVariableStore;\r
1574 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1575 VARIABLE_HEADER *NextVariable;\r
1576 UINT32 Instance;\r
1577 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
8d3a5c82 1578 UINT64 TempVariableStoreHeader;\r
8d3a5c82 1579 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
8d3a5c82 1580 UINT64 BaseAddress;\r
1581 UINT64 Length;\r
1582 UINTN Index;\r
1583 UINT8 Data;\r
052ad7e1
A
1584 UINT64 VariableStoreBase;\r
1585 UINT64 VariableStoreLength;\r
8d3a5c82 1586\r
8d3a5c82 1587\r
052ad7e1 1588 EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);\r
8d3a5c82 1589\r
1590 //\r
1591 // Allocate memory for volatile variable store\r
1592 //\r
1593 VolatileVariableStore = AllocateRuntimePool (VARIABLE_STORE_SIZE + SCRATCH_SIZE);\r
1594 if (VolatileVariableStore == NULL) {\r
1595 FreePool (mVariableModuleGlobal);\r
1596 return EFI_OUT_OF_RESOURCES;\r
1597 }\r
1598\r
1599 SetMem (VolatileVariableStore, VARIABLE_STORE_SIZE + SCRATCH_SIZE, 0xff);\r
1600\r
1601 //\r
1602 // Variable Specific Data\r
1603 //\r
052ad7e1 1604 mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;\r
8d3a5c82 1605 mVariableModuleGlobal->VolatileLastVariableOffset = sizeof (VARIABLE_STORE_HEADER);\r
1606\r
1607 VolatileVariableStore->Signature = VARIABLE_STORE_SIGNATURE;\r
1608 VolatileVariableStore->Size = VARIABLE_STORE_SIZE;\r
1609 VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;\r
1610 VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;\r
1611 VolatileVariableStore->Reserved = 0;\r
1612 VolatileVariableStore->Reserved1 = 0;\r
1613\r
1614 //\r
1615 // Get non volatile varaible store\r
1616 //\r
1617\r
1618 TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);\r
052ad7e1 1619 VariableStoreBase = TempVariableStoreHeader + \\r
8d3a5c82 1620 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
052ad7e1 1621 VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \\r
8d3a5c82 1622 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
1623 //\r
1624 // Mark the variable storage region of the FLASH as RUNTIME\r
1625 //\r
052ad7e1
A
1626 BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);\r
1627 Length = VariableStoreLength + (VariableStoreBase - BaseAddress);\r
8d3a5c82 1628 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
1629\r
1630 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
1631 if (EFI_ERROR (Status)) {\r
1632 FreePool (mVariableModuleGlobal);\r
1633 FreePool (VolatileVariableStore);\r
1634 return EFI_UNSUPPORTED;\r
1635 }\r
1636\r
1637 Status = gDS->SetMemorySpaceAttributes (\r
1638 BaseAddress,\r
1639 Length,\r
1640 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
1641 );\r
1642 if (EFI_ERROR (Status)) {\r
1643 FreePool (mVariableModuleGlobal);\r
1644 FreePool (VolatileVariableStore);\r
1645 return EFI_UNSUPPORTED;\r
1646 }\r
1647 //\r
1648 // Get address of non volatile variable store base\r
1649 //\r
052ad7e1 1650 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;\r
8d3a5c82 1651\r
1652 //\r
1653 // Check Integrity\r
1654 //\r
1655 //\r
1656 // Find the Correct Instance of the FV Block Service.\r
1657 //\r
1658 Instance = 0;\r
052ad7e1 1659 CurrPtr = (CHAR8 *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1660 while (EfiFvbGetPhysicalAddress (Instance, &FvVolHdr) == EFI_SUCCESS) {\r
1661 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
1662 if (CurrPtr >= (CHAR8 *) FwVolHeader && CurrPtr < (((CHAR8 *) FwVolHeader) + FwVolHeader->FvLength)) {\r
1663 mVariableModuleGlobal->FvbInstance = Instance;\r
1664 break;\r
1665 }\r
1666\r
1667 Instance++;\r
1668 }\r
1669\r
1670 VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;\r
1671 if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {\r
1672 if (~VariableStoreHeader->Size == 0) {\r
1673 Status = UpdateVariableStore (\r
052ad7e1 1674 &mVariableModuleGlobal->VariableGlobal,\r
8d3a5c82 1675 FALSE,\r
1676 FALSE,\r
1677 mVariableModuleGlobal->FvbInstance,\r
1678 (UINTN) &VariableStoreHeader->Size,\r
1679 sizeof (UINT32),\r
052ad7e1 1680 (UINT8 *) &VariableStoreLength\r
8d3a5c82 1681 );\r
1682 //\r
1683 // As Variables are stored in NV storage, which are slow devices,such as flash.\r
1684 // Variable operation may skip checking variable program result to improve performance,\r
1685 // We can assume Variable program is OK through some check point.\r
1686 // Variable Store Size Setting should be the first Variable write operation,\r
1687 // We can assume all Read/Write is OK if we can set Variable store size successfully.\r
1688 // If write fail, we will assert here\r
1689 //\r
052ad7e1 1690 ASSERT(VariableStoreHeader->Size == VariableStoreLength);\r
8d3a5c82 1691\r
1692 if (EFI_ERROR (Status)) {\r
1693 return Status;\r
1694 }\r
1695 }\r
1696\r
052ad7e1 1697 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);\r
8d3a5c82 1698 //\r
1699 // Parse non-volatile variable data and get last variable offset\r
1700 //\r
1701 NextVariable = (VARIABLE_HEADER *) (CurrPtr + sizeof (VARIABLE_STORE_HEADER));\r
1702 Status = EFI_SUCCESS;\r
1703\r
1704 while (IsValidVariableHeader (NextVariable)) {\r
1705 NextVariable = GetNextVariablePtr (NextVariable);\r
1706 }\r
1707\r
1708 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) CurrPtr;\r
1709\r
1710 //\r
1711 // Check if the free area is blow a threshold\r
1712 //\r
1713 if ((((VARIABLE_STORE_HEADER *)((UINTN) CurrPtr))->Size - mVariableModuleGlobal->NonVolatileLastVariableOffset) < VARIABLE_RECLAIM_THRESHOLD) {\r
1714 Status = Reclaim (\r
052ad7e1 1715 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1716 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1717 FALSE\r
1718 );\r
1719 }\r
1720\r
1721 if (EFI_ERROR (Status)) {\r
1722 FreePool (mVariableModuleGlobal);\r
1723 FreePool (VolatileVariableStore);\r
1724 return Status;\r
1725 }\r
1726\r
1727 //\r
1728 // Check if the free area is really free.\r
1729 //\r
1730 for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {\r
052ad7e1 1731 Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)[Index];\r
8d3a5c82 1732 if (Data != 0xff) {\r
1733 //\r
1734 // There must be something wrong in variable store, do reclaim operation.\r
1735 //\r
1736 Status = Reclaim (\r
052ad7e1 1737 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1738 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1739 FALSE\r
1740 );\r
1741 break;\r
1742 }\r
1743 }\r
1744 }\r
1745\r
1746 if (EFI_ERROR (Status)) {\r
1747 FreePool (mVariableModuleGlobal);\r
1748 FreePool (VolatileVariableStore);\r
1749 }\r
1750\r
1751 return Status;\r
1752}\r
052ad7e1
A
1753\r
1754\r
1755\r
1756\r
1757VOID\r
1758EFIAPI\r
1759VariableClassAddressChangeEvent (\r
1760 IN EFI_EVENT Event,\r
1761 IN VOID *Context\r
1762 )\r
1763{\r
1764 EfiConvertPointer (\r
1765 0x0,\r
1766 (VOID **) &mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase\r
1767 );\r
1768 EfiConvertPointer (\r
1769 0x0,\r
1770 (VOID **) &mVariableModuleGlobal->VariableGlobal.VolatileVariableBase\r
1771 );\r
1772 EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal);\r
1773}\r
1774\r
1775\r
1776/**\r
1777 Variable Driver main entry point. The Variable driver places the 4 EFI\r
1778 runtime services in the EFI System Table and installs arch protocols \r
1779 for variable read and write services being availible. \r
1780\r
1781 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
1782 @param[in] SystemTable A pointer to the EFI System Table.\r
1783 \r
1784 @retval EFI_SUCCESS The entry point is executed successfully.\r
1785 @retval other Some error occurs when executing this entry point.\r
1786\r
1787**/\r
1788EFI_STATUS\r
1789EFIAPI\r
1790VariableServiceInitialize (\r
1791 IN EFI_HANDLE ImageHandle,\r
1792 IN EFI_SYSTEM_TABLE *SystemTable\r
1793 )\r
1794{\r
1795 EFI_STATUS Status;\r
1796\r
1797 Status = VariableCommonInitialize (ImageHandle, SystemTable);\r
1798 ASSERT_EFI_ERROR (Status);\r
1799\r
1800 SystemTable->RuntimeServices->GetVariable = RuntimeServiceGetVariable;\r
1801 SystemTable->RuntimeServices->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
1802 SystemTable->RuntimeServices->SetVariable = RuntimeServiceSetVariable;\r
1803 SystemTable->RuntimeServices->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
1804\r
1805 //\r
1806 // Now install the Variable Runtime Architectural Protocol on a new handle\r
1807 //\r
1808 Status = gBS->InstallMultipleProtocolInterfaces (\r
1809 &mHandle,\r
1810 &gEfiVariableArchProtocolGuid, NULL,\r
1811 &gEfiVariableWriteArchProtocolGuid, NULL,\r
1812 NULL\r
1813 );\r
1814 ASSERT_EFI_ERROR (Status);\r
1815\r
1816 Status = gBS->CreateEvent (\r
1817 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE,\r
1818 TPL_NOTIFY,\r
1819 VariableClassAddressChangeEvent,\r
1820 NULL,\r
1821 &mVirtualAddressChangeEvent\r
1822 );\r
1823 ASSERT_EFI_ERROR (Status);\r
1824\r
1825 return EFI_SUCCESS;\r
1826}\r
1827\r