]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
Fixed one bug in UefiPxeBc start()/stop(). That would cause stop() failure.
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / Variable.c
CommitLineData
052ad7e1
A
1/** @file\r
2 EFI Runtime Variable services.\r
3 \r
4 Copyright (c) 2006 - 2007, Intel Corporation \r
5 All rights reserved. This program and the accompanying materials \r
6 are licensed and made available under the terms and conditions of the BSD License \r
7 which accompanies this distribution. The full text of the license may be found at \r
8 http://opensource.org/licenses/bsd-license.php \r
8d3a5c82 9\r
052ad7e1
A
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
8d3a5c82 12\r
052ad7e1 13**/\r
8d3a5c82 14\r
15\r
16#include "Variable.h"\r
33a5a666
A
17\r
18\r
052ad7e1
A
19VARIABLE_MODULE_GLOBAL mRuntimeData;\r
20VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal = &mRuntimeData;\r
21EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
22EFI_HANDLE mHandle = NULL;\r
8d3a5c82 23\r
33a5a666 24\r
8d3a5c82 25//\r
26// This is a temperary function which will be removed\r
27// when EfiAcquireLock in UefiLib can handle the\r
28// the call in UEFI Runtimer driver in RT phase.\r
29//\r
8d3a5c82 30VOID\r
31AcquireLockOnlyAtBootTime (\r
32 IN EFI_LOCK *Lock\r
33 )\r
34{\r
35 if (!EfiAtRuntime ()) {\r
36 EfiAcquireLock (Lock);\r
37 }\r
38}\r
39\r
40//\r
41// This is a temperary function which will be removed\r
42// when EfiAcquireLock in UefiLib can handle the\r
43// the call in UEFI Runtimer driver in RT phase.\r
44//\r
8d3a5c82 45VOID\r
46ReleaseLockOnlyAtBootTime (\r
47 IN EFI_LOCK *Lock\r
48 )\r
49{\r
50 if (!EfiAtRuntime ()) {\r
51 EfiReleaseLock (Lock);\r
52 }\r
53}\r
54\r
33a5a666
A
55\r
56GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;\r
57\r
58\r
052ad7e1
A
59/**\r
60 Routine used to track statistical information about variable usage. \r
61 The data is stored in the EFI system table so it can be accessed later.\r
62 VariableInfo.efi can dump out the table. Only Boot Services variable \r
63 accesses are tracked by this code. The PcdVariableCollectStatistics\r
64 build flag controls if this feature is enabled. \r
65\r
66 A read that hits in the cache will have Read and Cache true for \r
67 the transaction. Data is allocated by this routine, but never\r
68 freed.\r
69\r
70 @param[in] VariableName Name of the Variable to track\r
71 @param[in] VendorGuid Guid of the Variable to track\r
72 @param[in] Volatile TRUE if volatile FALSE if non-volatile\r
73 @param[in] Read TRUE if GetVariable() was called\r
74 @param[in] Write TRUE if SetVariable() was called\r
75 @param[in] Delete TRUE if deleted via SetVariable()\r
76 @param[in] Cache TRUE for a cache hit.\r
77\r
78**/\r
33a5a666
A
79VOID\r
80UpdateVariableInfo (\r
81 IN CHAR16 *VariableName,\r
82 IN EFI_GUID *VendorGuid,\r
83 IN BOOLEAN Volatile,\r
84 IN BOOLEAN Read,\r
85 IN BOOLEAN Write,\r
86 IN BOOLEAN Delete,\r
87 IN BOOLEAN Cache\r
88 )\r
89{\r
90 VARIABLE_INFO_ENTRY *Entry;\r
91\r
92 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
93\r
94 if (EfiAtRuntime ()) {\r
95 // Don't collect statistics at runtime\r
96 return;\r
97 }\r
98\r
99 if (gVariableInfo == NULL) {\r
052ad7e1
A
100 //\r
101 // on the first call allocate a entry and place a pointer to it in\r
102 // the EFI System Table\r
103 //\r
33a5a666 104 gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1
A
105 ASSERT (gVariableInfo != NULL);\r
106\r
33a5a666
A
107 CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);\r
108 gVariableInfo->Name = AllocatePool (StrLen (VariableName));\r
109 StrCpy (gVariableInfo->Name, VariableName);\r
110 gVariableInfo->Volatile = Volatile;\r
111\r
112 gBS->InstallConfigurationTable (&gEfiVariableInfoGuid, gVariableInfo);\r
113 }\r
114\r
115 \r
116 for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {\r
117 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
118 if (StrCmp (VariableName, Entry->Name) == 0) {\r
119 if (Read) {\r
120 Entry->ReadCount++;\r
121 }\r
122 if (Write) {\r
123 Entry->WriteCount++;\r
124 }\r
125 if (Delete) {\r
126 Entry->DeleteCount++;\r
127 }\r
128 if (Cache) {\r
129 Entry->CacheCount++;\r
130 }\r
131\r
132 return;\r
133 }\r
134 }\r
135\r
136 if (Entry->Next == NULL) {\r
052ad7e1
A
137 //\r
138 // If the entry is not in the table add it.\r
139 // Next iteration of the loop will fill in the data\r
140 //\r
33a5a666 141 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1 142 ASSERT (Entry->Next != NULL);\r
33a5a666
A
143\r
144 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
145 Entry->Next->Name = AllocatePool (StrLen (VariableName));\r
146 StrCpy (Entry->Next->Name, VariableName);\r
147 Entry->Next->Volatile = Volatile;\r
148 }\r
149\r
150 }\r
151 }\r
152}\r
153\r
154\r
8d3a5c82 155BOOLEAN\r
8d3a5c82 156IsValidVariableHeader (\r
157 IN VARIABLE_HEADER *Variable\r
158 )\r
159/*++\r
160\r
161Routine Description:\r
162\r
163 This code checks if variable header is valid or not.\r
164\r
165Arguments:\r
166 Variable Pointer to the Variable Header.\r
167\r
168Returns:\r
169 TRUE Variable header is valid.\r
170 FALSE Variable header is not valid.\r
171\r
172--*/\r
173{\r
fdb7765f 174 if (Variable == NULL || Variable->StartId != VARIABLE_DATA) {\r
8d3a5c82 175 return FALSE;\r
176 }\r
177\r
178 return TRUE;\r
179}\r
180\r
052ad7e1 181\r
8d3a5c82 182EFI_STATUS\r
8d3a5c82 183UpdateVariableStore (\r
184 IN VARIABLE_GLOBAL *Global,\r
185 IN BOOLEAN Volatile,\r
186 IN BOOLEAN SetByIndex,\r
187 IN UINTN Instance,\r
188 IN UINTN DataPtrIndex,\r
189 IN UINT32 DataSize,\r
190 IN UINT8 *Buffer\r
191 )\r
192/*++\r
193\r
194Routine Description:\r
195\r
196 This function writes data to the FWH at the correct LBA even if the LBAs\r
197 are fragmented.\r
198\r
199Arguments:\r
200\r
c6492839 201 Global - Pointer to VARAIBLE_GLOBAL structure\r
202 Volatile - If the Variable is Volatile or Non-Volatile\r
203 SetByIndex - TRUE: Target pointer is given as index\r
204 FALSE: Target pointer is absolute\r
205 Instance - Instance of FV Block services\r
206 DataPtrIndex - Pointer to the Data from the end of VARIABLE_STORE_HEADER\r
207 structure\r
208 DataSize - Size of data to be written.\r
209 Buffer - Pointer to the buffer from which data is written\r
8d3a5c82 210\r
211Returns:\r
212\r
c6492839 213 EFI_INVALID_PARAMETER - Parameters not valid\r
214 EFI_SUCCESS - Variable store successfully updated\r
8d3a5c82 215\r
216--*/\r
217{\r
218 EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;\r
219 UINTN BlockIndex2;\r
220 UINTN LinearOffset;\r
221 UINTN CurrWriteSize;\r
222 UINTN CurrWritePtr;\r
223 UINT8 *CurrBuffer;\r
224 EFI_LBA LbaNumber;\r
225 UINTN Size;\r
226 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
227 VARIABLE_STORE_HEADER *VolatileBase;\r
228 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
229 EFI_PHYSICAL_ADDRESS DataPtr;\r
230 EFI_STATUS Status;\r
231\r
232 FwVolHeader = NULL;\r
233 DataPtr = DataPtrIndex;\r
234\r
235 //\r
236 // Check if the Data is Volatile\r
237 //\r
238 if (!Volatile) {\r
239 EfiFvbGetPhysicalAddress (Instance, &FvVolHdr);\r
240 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
241 //\r
242 // Data Pointer should point to the actual Address where data is to be\r
243 // written\r
244 //\r
245 if (SetByIndex) {\r
052ad7e1 246 DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
8d3a5c82 247 }\r
248\r
249 if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {\r
250 return EFI_INVALID_PARAMETER;\r
251 }\r
252 } else {\r
253 //\r
254 // Data Pointer should point to the actual Address where data is to be\r
255 // written\r
256 //\r
052ad7e1 257 VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 258 if (SetByIndex) {\r
052ad7e1 259 DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
8d3a5c82 260 }\r
261\r
262 if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {\r
263 return EFI_INVALID_PARAMETER;\r
264 }\r
c6492839 265 \r
266 //\r
267 // If Volatile Variable just do a simple mem copy.\r
268 // \r
269 CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);\r
8d3a5c82 270 return EFI_SUCCESS;\r
271 }\r
c6492839 272 \r
8d3a5c82 273 //\r
274 // If we are here we are dealing with Non-Volatile Variables\r
275 //\r
276 LinearOffset = (UINTN) FwVolHeader;\r
277 CurrWritePtr = (UINTN) DataPtr;\r
278 CurrWriteSize = DataSize;\r
279 CurrBuffer = Buffer;\r
280 LbaNumber = 0;\r
281\r
282 if (CurrWritePtr < LinearOffset) {\r
283 return EFI_INVALID_PARAMETER;\r
284 }\r
285\r
286 for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {\r
287 for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {\r
288 //\r
289 // Check to see if the Variable Writes are spanning through multiple\r
290 // blocks.\r
291 //\r
292 if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {\r
293 if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {\r
294 Status = EfiFvbWriteBlock (\r
295 Instance,\r
296 LbaNumber,\r
297 (UINTN) (CurrWritePtr - LinearOffset),\r
298 &CurrWriteSize,\r
299 CurrBuffer\r
300 );\r
8d3a5c82 301 return Status;\r
8d3a5c82 302 } else {\r
303 Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);\r
304 Status = EfiFvbWriteBlock (\r
305 Instance,\r
306 LbaNumber,\r
307 (UINTN) (CurrWritePtr - LinearOffset),\r
308 &Size,\r
309 CurrBuffer\r
310 );\r
311 if (EFI_ERROR (Status)) {\r
312 return Status;\r
313 }\r
314\r
315 CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;\r
316 CurrBuffer = CurrBuffer + Size;\r
317 CurrWriteSize = CurrWriteSize - Size;\r
318 }\r
319 }\r
320\r
321 LinearOffset += PtrBlockMapEntry->Length;\r
322 LbaNumber++;\r
323 }\r
324 }\r
325\r
326 return EFI_SUCCESS;\r
327}\r
328\r
052ad7e1 329\r
8d3a5c82 330VARIABLE_STORE_STATUS\r
8d3a5c82 331GetVariableStoreStatus (\r
332 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
333 )\r
334/*++\r
335\r
336Routine Description:\r
337\r
338 This code gets the current status of Variable Store.\r
339\r
340Arguments:\r
341\r
342 VarStoreHeader Pointer to the Variable Store Header.\r
343\r
344Returns:\r
345\r
346 EfiRaw Variable store status is raw\r
347 EfiValid Variable store status is valid\r
348 EfiInvalid Variable store status is invalid\r
349\r
350--*/\r
351{\r
352 if (VarStoreHeader->Signature == VARIABLE_STORE_SIGNATURE &&\r
353 VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&\r
354 VarStoreHeader->State == VARIABLE_STORE_HEALTHY\r
355 ) {\r
356\r
357 return EfiValid;\r
358 } else if (VarStoreHeader->Signature == 0xffffffff &&\r
359 VarStoreHeader->Size == 0xffffffff &&\r
360 VarStoreHeader->Format == 0xff &&\r
361 VarStoreHeader->State == 0xff\r
362 ) {\r
363\r
364 return EfiRaw;\r
365 } else {\r
366 return EfiInvalid;\r
367 }\r
368}\r
369\r
8d3a5c82 370UINT8 *\r
8d3a5c82 371GetVariableDataPtr (\r
372 IN VARIABLE_HEADER *Variable\r
373 )\r
374/*++\r
375\r
376Routine Description:\r
377\r
378 This code gets the pointer to the variable data.\r
379\r
380Arguments:\r
381\r
382 Variable Pointer to the Variable Header.\r
383\r
384Returns:\r
385\r
386 UINT8* Pointer to Variable Data\r
387\r
388--*/\r
389{\r
390 //\r
391 // Be careful about pad size for alignment\r
392 //\r
ab5f0d6d 393 return (UINT8 *) ((UINTN) GET_VARIABLE_NAME_PTR (Variable) + NAMESIZE_OF_VARIABLE (Variable) + GET_PAD_SIZE (NAMESIZE_OF_VARIABLE (Variable)));\r
8d3a5c82 394}\r
395\r
052ad7e1 396\r
8d3a5c82 397VARIABLE_HEADER *\r
8d3a5c82 398GetNextVariablePtr (\r
399 IN VARIABLE_HEADER *Variable\r
400 )\r
401/*++\r
402\r
403Routine Description:\r
404\r
405 This code gets the pointer to the next variable header.\r
406\r
407Arguments:\r
408\r
409 Variable Pointer to the Variable Header.\r
410\r
411Returns:\r
412\r
413 VARIABLE_HEADER* Pointer to next variable header.\r
414\r
415--*/\r
416{\r
417 if (!IsValidVariableHeader (Variable)) {\r
418 return NULL;\r
419 }\r
420 //\r
421 // Be careful about pad size for alignment\r
422 //\r
ab5f0d6d 423 return (VARIABLE_HEADER *) HEADER_ALIGN (((UINTN) GetVariableDataPtr (Variable) + DATASIZE_OF_VARIABLE (Variable) + GET_PAD_SIZE (DATASIZE_OF_VARIABLE (Variable))));\r
8d3a5c82 424}\r
425\r
9cad030b 426VARIABLE_HEADER *\r
427GetStartPointer (\r
428 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
429 )\r
430/*++\r
431\r
432Routine Description:\r
433\r
434 This code gets the pointer to the first variable memory pointer byte\r
435\r
436Arguments:\r
437\r
438 VarStoreHeader Pointer to the Variable Store Header.\r
439\r
440Returns:\r
441\r
442 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
443\r
444--*/\r
445{\r
446 //\r
447 // The end of variable store\r
448 //\r
449 return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);\r
450}\r
052ad7e1 451\r
8d3a5c82 452VARIABLE_HEADER *\r
8d3a5c82 453GetEndPointer (\r
454 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
455 )\r
456/*++\r
457\r
458Routine Description:\r
459\r
460 This code gets the pointer to the last variable memory pointer byte\r
461\r
462Arguments:\r
463\r
464 VarStoreHeader Pointer to the Variable Store Header.\r
465\r
466Returns:\r
467\r
468 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
469\r
470--*/\r
471{\r
472 //\r
473 // The end of variable store\r
474 //\r
9cad030b 475 return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
8d3a5c82 476}\r
477\r
052ad7e1 478\r
8d3a5c82 479EFI_STATUS\r
8d3a5c82 480Reclaim (\r
481 IN EFI_PHYSICAL_ADDRESS VariableBase,\r
482 OUT UINTN *LastVariableOffset,\r
483 IN BOOLEAN IsVolatile\r
484 )\r
485/*++\r
486\r
487Routine Description:\r
488\r
489 Variable store garbage collection and reclaim operation\r
490\r
491Arguments:\r
492\r
493 VariableBase Base address of variable store\r
494 LastVariableOffset Offset of last variable\r
495 IsVolatile The variable store is volatile or not,\r
496 if it is non-volatile, need FTW\r
497\r
498Returns:\r
499\r
500 EFI STATUS\r
501\r
502--*/\r
503{\r
504 VARIABLE_HEADER *Variable;\r
505 VARIABLE_HEADER *NextVariable;\r
506 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
507 UINT8 *ValidBuffer;\r
508 UINTN ValidBufferSize;\r
509 UINTN VariableSize;\r
510 UINT8 *CurrPtr;\r
511 EFI_STATUS Status;\r
512\r
513 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);\r
514\r
515 //\r
516 // Start Pointers for the variable.\r
517 //\r
9cad030b 518 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 519 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
520\r
521 while (IsValidVariableHeader (Variable)) {\r
522 NextVariable = GetNextVariablePtr (Variable);\r
523 if (Variable->State == VAR_ADDED) {\r
524 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
525 ValidBufferSize += VariableSize;\r
526 }\r
527\r
528 Variable = NextVariable;\r
529 }\r
530\r
531 ValidBuffer = AllocatePool (ValidBufferSize);\r
532 if (ValidBuffer == NULL) {\r
533 return EFI_OUT_OF_RESOURCES;\r
534 }\r
535\r
536 SetMem (ValidBuffer, ValidBufferSize, 0xff);\r
537\r
538 CurrPtr = ValidBuffer;\r
539\r
540 //\r
541 // Copy variable store header\r
542 //\r
543 CopyMem (CurrPtr, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
9cad030b 544 CurrPtr = (UINT8 *) GetStartPointer (VariableStoreHeader);\r
8d3a5c82 545\r
546 //\r
547 // Start Pointers for the variable.\r
548 //\r
9cad030b 549 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 550\r
551 while (IsValidVariableHeader (Variable)) {\r
552 NextVariable = GetNextVariablePtr (Variable);\r
553 if (Variable->State == VAR_ADDED) {\r
554 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
555 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
556 CurrPtr += VariableSize;\r
557 }\r
558\r
559 Variable = NextVariable;\r
560 }\r
561\r
562 if (IsVolatile) {\r
563 //\r
564 // If volatile variable store, just copy valid buffer\r
565 //\r
566 SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);\r
567 CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, ValidBufferSize);\r
568 *LastVariableOffset = ValidBufferSize;\r
569 Status = EFI_SUCCESS;\r
570 } else {\r
571 //\r
572 // If non-volatile variable store, perform FTW here.\r
573 //\r
574 Status = FtwVariableSpace (\r
575 VariableBase,\r
576 ValidBuffer,\r
577 ValidBufferSize\r
578 );\r
579 if (!EFI_ERROR (Status)) {\r
580 *LastVariableOffset = ValidBufferSize;\r
581 }\r
582 }\r
583\r
584 FreePool (ValidBuffer);\r
585\r
586 if (EFI_ERROR (Status)) {\r
587 *LastVariableOffset = 0;\r
588 }\r
589\r
590 return Status;\r
591}\r
592\r
33a5a666
A
593\r
594//\r
595// The current Hii implementation accesses this variable a larg # of times on every boot.\r
596// Other common variables are only accessed a single time. This is why this cache algorithm\r
597// only targets a single variable. Probably to get an performance improvement out of\r
598// a Cache you would need a cache that improves the search performance for a variable.\r
599//\r
600VARIABLE_CACHE_ENTRY mVariableCache[] = {\r
601 {\r
602 &gEfiGlobalVariableGuid,\r
603 L"Lang",\r
604 0x00000000,\r
605 0x00,\r
606 NULL\r
607 }\r
608};\r
609\r
052ad7e1
A
610\r
611/**\r
612 Update the Cache with Variable information. These are the same \r
613 arguments as the EFI Variable services.\r
614\r
615 @param[in] VariableName Name of variable\r
616 @param[in] VendorGuid Guid of variable\r
617 @param[in] Attribute Attribue of the variable\r
618 @param[in] DataSize Size of data. 0 means delete\r
619 @param[in] Data Variable data\r
620\r
621**/\r
33a5a666
A
622VOID\r
623UpdateVariableCache (\r
624 IN CHAR16 *VariableName,\r
625 IN EFI_GUID *VendorGuid,\r
052ad7e1
A
626 IN UINT32 Attributes,\r
627 IN UINTN DataSize,\r
628 IN VOID *Data\r
33a5a666
A
629 )\r
630{\r
631 VARIABLE_CACHE_ENTRY *Entry;\r
632 UINTN Index;\r
633\r
634 if (EfiAtRuntime ()) {\r
635 // Don't use the cache at runtime\r
636 return;\r
637 }\r
638\r
639 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
640 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
641 if (StrCmp (VariableName, Entry->Name) == 0) { \r
642 Entry->Attributes = Attributes;\r
643 if (DataSize == 0) {\r
644 // Delete Case\r
645 if (Entry->DataSize != 0) {\r
646 FreePool (Entry->Data);\r
647 }\r
648 Entry->DataSize = DataSize;\r
649 } else if (DataSize == Entry->DataSize) {\r
650 CopyMem (Entry->Data, Data, DataSize);\r
651 } else {\r
652 Entry->Data = AllocatePool (DataSize);\r
653 Entry->DataSize = DataSize;\r
654 CopyMem (Entry->Data, Data, DataSize);\r
655 }\r
656 }\r
657 }\r
658 }\r
659}\r
660\r
661\r
052ad7e1
A
662/**\r
663 Search the cache to see if the variable is in the cache.\r
664\r
665 @param[in] VariableName Name of variable\r
666 @param[in] VendorGuid Guid of variable\r
667 @param[in] Attribute Attribue returned \r
668 @param[in] DataSize Size of data returned\r
669 @param[in] Data Variable data returned\r
670\r
671 @retval EFI_SUCCESS VariableGuid & VariableName data was returned.\r
672 @retval other Not found.\r
673\r
674**/\r
33a5a666
A
675EFI_STATUS\r
676FindVariableInCache (\r
677 IN CHAR16 *VariableName,\r
678 IN EFI_GUID *VendorGuid,\r
679 OUT UINT32 *Attributes OPTIONAL,\r
680 IN OUT UINTN *DataSize,\r
681 OUT VOID *Data\r
682 )\r
683{\r
684 VARIABLE_CACHE_ENTRY *Entry;\r
685 UINTN Index;\r
686\r
687 if (EfiAtRuntime ()) {\r
688 // Don't use the cache at runtime\r
689 return EFI_NOT_FOUND;\r
690 }\r
691\r
692 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
693 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
694 if (StrCmp (VariableName, Entry->Name) == 0) {\r
695 if (Entry->DataSize == 0) {\r
052ad7e1 696 // Variable was deleted so return not found\r
33a5a666 697 return EFI_NOT_FOUND;\r
aa09397b 698 } else if (Entry->DataSize > *DataSize) {\r
052ad7e1 699 // If the buffer is too small return correct size\r
33a5a666
A
700 *DataSize = Entry->DataSize;\r
701 return EFI_BUFFER_TOO_SMALL;\r
702 } else {\r
aa09397b 703 *DataSize = Entry->DataSize;\r
052ad7e1 704 // Return the data\r
33a5a666
A
705 CopyMem (Data, Entry->Data, Entry->DataSize);\r
706 if (Attributes != NULL) {\r
707 *Attributes = Entry->Attributes;\r
708 }\r
709 return EFI_SUCCESS;\r
710 }\r
711 }\r
712 }\r
713 }\r
714 \r
715 return EFI_NOT_FOUND;\r
716}\r
717\r
718\r
8d3a5c82 719EFI_STATUS\r
8d3a5c82 720FindVariable (\r
721 IN CHAR16 *VariableName,\r
722 IN EFI_GUID *VendorGuid,\r
723 OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
724 IN VARIABLE_GLOBAL *Global\r
725 )\r
726/*++\r
727\r
728Routine Description:\r
729\r
730 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
731\r
732Arguments:\r
733\r
734 VariableName Name of the variable to be found\r
735 VendorGuid Vendor GUID to be found.\r
736 PtrTrack Variable Track Pointer structure that contains\r
737 Variable Information.\r
738 Contains the pointer of Variable header.\r
739 Global VARIABLE_GLOBAL pointer\r
740\r
741Returns:\r
742\r
743 EFI STATUS\r
744\r
745--*/\r
746{\r
747 VARIABLE_HEADER *Variable[2];\r
748 VARIABLE_STORE_HEADER *VariableStoreHeader[2];\r
749 UINTN Index;\r
750\r
8d3a5c82 751 //\r
33a5a666 752 // 0: Volatile, 1: Non-Volatile\r
36873a61 753 // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName\r
754 // make use of this mapping to implement search algorithme.\r
8d3a5c82 755 //\r
052ad7e1
A
756 VariableStoreHeader[0] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
757 VariableStoreHeader[1] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 758\r
759 //\r
760 // Start Pointers for the variable.\r
761 // Actual Data Pointer where data can be written.\r
762 //\r
9cad030b 763 Variable[0] = GetStartPointer (VariableStoreHeader[0]);\r
764 Variable[1] = GetStartPointer (VariableStoreHeader[1]);\r
8d3a5c82 765\r
766 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
767 return EFI_INVALID_PARAMETER;\r
768 }\r
769 //\r
33a5a666 770 // Find the variable by walk through volatile and then non-volatile variable store\r
8d3a5c82 771 //\r
772 for (Index = 0; Index < 2; Index++) {\r
9cad030b 773 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]);\r
8d3a5c82 774 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
775\r
776 while (IsValidVariableHeader (Variable[Index]) && (Variable[Index] <= GetEndPointer (VariableStoreHeader[Index]))) {\r
777 if (Variable[Index]->State == VAR_ADDED) {\r
c6492839 778 if (!EfiAtRuntime () || (Variable[Index]->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
8d3a5c82 779 if (VariableName[0] == 0) {\r
780 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 781 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 782 return EFI_SUCCESS;\r
783 } else {\r
784 if (CompareGuid (VendorGuid, &Variable[Index]->VendorGuid)) {\r
ab5f0d6d 785 ASSERT (NAMESIZE_OF_VARIABLE (Variable[Index]) != 0);\r
786 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable[Index]), NAMESIZE_OF_VARIABLE (Variable[Index]))) {\r
8d3a5c82 787 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 788 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 789 return EFI_SUCCESS;\r
790 }\r
791 }\r
792 }\r
793 }\r
794 }\r
795\r
796 Variable[Index] = GetNextVariablePtr (Variable[Index]);\r
797 }\r
8d3a5c82 798 }\r
8d3a5c82 799 PtrTrack->CurrPtr = NULL;\r
800 return EFI_NOT_FOUND;\r
801}\r
802\r
33a5a666 803\r
052ad7e1 804\r
8d3a5c82 805/*++\r
806\r
807Routine Description:\r
808\r
809 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
810\r
811Arguments:\r
812\r
c6492839 813 VariableName Name of Variable to be found\r
814 VendorGuid Variable vendor GUID\r
815 Attributes OPTIONAL Attribute value of the variable found\r
816 DataSize Size of Data found. If size is less than the\r
817 data, this value contains the required size.\r
818 Data Data pointer\r
819 Global Pointer to VARIABLE_GLOBAL structure\r
820 Instance Instance of the Firmware Volume.\r
8d3a5c82 821\r
822Returns:\r
823\r
c6492839 824 EFI_INVALID_PARAMETER - Invalid parameter\r
825 EFI_SUCCESS - Find the specified variable\r
826 EFI_NOT_FOUND - Not found\r
827 EFI_BUFFER_TO_SMALL - DataSize is too small for the result\r
828\r
8d3a5c82 829\r
830--*/\r
052ad7e1
A
831EFI_STATUS\r
832EFIAPI\r
833RuntimeServiceGetVariable (\r
834 IN CHAR16 *VariableName,\r
835 IN EFI_GUID *VendorGuid,\r
836 OUT UINT32 *Attributes OPTIONAL,\r
837 IN OUT UINTN *DataSize,\r
838 OUT VOID *Data\r
839 )\r
8d3a5c82 840{\r
052ad7e1 841 EFI_STATUS Status;\r
8d3a5c82 842 VARIABLE_POINTER_TRACK Variable;\r
843 UINTN VarDataSize;\r
8d3a5c82 844\r
845 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
846 return EFI_INVALID_PARAMETER;\r
847 }\r
33a5a666 848\r
fdb7765f 849 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
850\r
8d3a5c82 851 //\r
852 // Find existing variable\r
853 //\r
33a5a666
A
854 Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
855 if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){\r
856 // Hit in the Cache\r
857 UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);\r
fdb7765f 858 goto Done;\r
33a5a666
A
859 }\r
860 \r
052ad7e1 861 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 862 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
863 goto Done;\r
864 }\r
33a5a666 865\r
8d3a5c82 866 //\r
867 // Get data size\r
868 //\r
ab5f0d6d 869 VarDataSize = DATASIZE_OF_VARIABLE (Variable.CurrPtr);\r
fdb7765f 870 ASSERT (VarDataSize != 0);\r
871\r
8d3a5c82 872 if (*DataSize >= VarDataSize) {\r
873 if (Data == NULL) {\r
874 Status = EFI_INVALID_PARAMETER;\r
875 goto Done;\r
876 }\r
877\r
878 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
879 if (Attributes != NULL) {\r
880 *Attributes = Variable.CurrPtr->Attributes;\r
881 }\r
882\r
883 *DataSize = VarDataSize;\r
33a5a666
A
884 UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);\r
885 UpdateVariableCache (VariableName, VendorGuid, Variable.CurrPtr->Attributes, VarDataSize, Data);\r
886 \r
8d3a5c82 887 Status = EFI_SUCCESS;\r
888 goto Done;\r
889 } else {\r
890 *DataSize = VarDataSize;\r
891 Status = EFI_BUFFER_TOO_SMALL;\r
892 goto Done;\r
893 }\r
894\r
895Done:\r
052ad7e1 896 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 897 return Status;\r
898}\r
899\r
052ad7e1
A
900\r
901\r
8d3a5c82 902/*++\r
903\r
904Routine Description:\r
905\r
906 This code Finds the Next available variable\r
907\r
908Arguments:\r
909\r
910 VariableNameSize Size of the variable\r
911 VariableName Pointer to variable name\r
912 VendorGuid Variable Vendor Guid\r
913 Global VARIABLE_GLOBAL structure pointer.\r
914 Instance FV instance\r
915\r
916Returns:\r
917\r
918 EFI STATUS\r
919\r
920--*/\r
052ad7e1
A
921EFI_STATUS\r
922EFIAPI\r
923RuntimeServiceGetNextVariableName (\r
924 IN OUT UINTN *VariableNameSize,\r
925 IN OUT CHAR16 *VariableName,\r
926 IN OUT EFI_GUID *VendorGuid\r
927 )\r
8d3a5c82 928{\r
929 VARIABLE_POINTER_TRACK Variable;\r
930 UINTN VarNameSize;\r
931 EFI_STATUS Status;\r
932\r
933 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
934 return EFI_INVALID_PARAMETER;\r
935 }\r
936\r
fdb7765f 937 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
938\r
052ad7e1 939 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 940 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
941 goto Done;\r
942 }\r
943\r
944 if (VariableName[0] != 0) {\r
945 //\r
946 // If variable name is not NULL, get next variable\r
947 //\r
948 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
949 }\r
950\r
951 while (TRUE) {\r
952 //\r
953 // If both volatile and non-volatile variable store are parsed,\r
954 // return not found\r
955 //\r
956 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
957 Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));\r
36873a61 958 if (!Variable.Volatile) {\r
9cad030b 959 Variable.StartPtr = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
960 Variable.EndPtr = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase));\r
8d3a5c82 961 } else {\r
962 Status = EFI_NOT_FOUND;\r
963 goto Done;\r
964 }\r
965\r
966 Variable.CurrPtr = Variable.StartPtr;\r
967 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
968 continue;\r
969 }\r
970 }\r
971 //\r
972 // Variable is found\r
973 //\r
974 if (IsValidVariableHeader (Variable.CurrPtr) && Variable.CurrPtr->State == VAR_ADDED) {\r
975 if (!(EfiAtRuntime () && !(Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS))) {\r
ab5f0d6d 976 VarNameSize = NAMESIZE_OF_VARIABLE (Variable.CurrPtr);\r
fdb7765f 977 ASSERT (VarNameSize != 0);\r
978\r
8d3a5c82 979 if (VarNameSize <= *VariableNameSize) {\r
980 CopyMem (\r
981 VariableName,\r
982 GET_VARIABLE_NAME_PTR (Variable.CurrPtr),\r
983 VarNameSize\r
984 );\r
985 CopyMem (\r
986 VendorGuid,\r
987 &Variable.CurrPtr->VendorGuid,\r
988 sizeof (EFI_GUID)\r
989 );\r
990 Status = EFI_SUCCESS;\r
991 } else {\r
992 Status = EFI_BUFFER_TOO_SMALL;\r
993 }\r
994\r
995 *VariableNameSize = VarNameSize;\r
996 goto Done;\r
997 }\r
998 }\r
999\r
1000 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1001 }\r
1002\r
1003Done:\r
052ad7e1 1004 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1005 return Status;\r
1006}\r
1007\r
052ad7e1 1008\r
8d3a5c82 1009/*++\r
1010\r
1011Routine Description:\r
1012\r
1013 This code sets variable in storage blocks (Volatile or Non-Volatile)\r
1014\r
1015Arguments:\r
1016\r
1017 VariableName Name of Variable to be found\r
1018 VendorGuid Variable vendor GUID\r
1019 Attributes Attribute value of the variable found\r
1020 DataSize Size of Data found. If size is less than the\r
1021 data, this value contains the required size.\r
1022 Data Data pointer\r
1023 Global Pointer to VARIABLE_GLOBAL structure\r
1024 VolatileOffset The offset of last volatile variable\r
1025 NonVolatileOffset The offset of last non-volatile variable\r
1026 Instance Instance of the Firmware Volume.\r
1027\r
1028Returns:\r
1029\r
8d3a5c82 1030 EFI_INVALID_PARAMETER - Invalid parameter\r
1031 EFI_SUCCESS - Set successfully\r
1032 EFI_OUT_OF_RESOURCES - Resource not enough to set variable\r
1033 EFI_NOT_FOUND - Not found\r
c6492839 1034 EFI_DEVICE_ERROR - Variable can not be saved due to hardware failure\r
1035 EFI_WRITE_PROTECTED - Variable is read-only\r
8d3a5c82 1036\r
1037--*/\r
052ad7e1
A
1038EFI_STATUS\r
1039EFIAPI\r
1040RuntimeServiceSetVariable (\r
1041 IN CHAR16 *VariableName,\r
1042 IN EFI_GUID *VendorGuid,\r
1043 IN UINT32 Attributes,\r
1044 IN UINTN DataSize,\r
1045 IN VOID *Data\r
1046 )\r
8d3a5c82 1047{\r
1048 VARIABLE_POINTER_TRACK Variable;\r
1049 EFI_STATUS Status;\r
1050 VARIABLE_HEADER *NextVariable;\r
1051 UINTN VarNameSize;\r
1052 UINTN VarNameOffset;\r
1053 UINTN VarDataOffset;\r
1054 UINTN VarSize;\r
1055 UINT8 State;\r
1056 BOOLEAN Reclaimed;\r
052ad7e1
A
1057 UINTN *VolatileOffset;\r
1058 UINTN *NonVolatileOffset;\r
1059 UINT32 Instance;\r
fd51bf70 1060 BOOLEAN Volatile;\r
fdb7765f 1061 EFI_PHYSICAL_ADDRESS Point;\r
8d3a5c82 1062\r
c6492839 1063 //\r
1064 // Check input parameters\r
1065 //\r
8d3a5c82 1066 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1067 return EFI_INVALID_PARAMETER;\r
c6492839 1068 } \r
1069 //\r
1070 // Make sure if runtime bit is set, boot service bit is set also\r
1071 //\r
1072 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1073 return EFI_INVALID_PARAMETER;\r
8d3a5c82 1074 }\r
fdb7765f 1075\r
c6492839 1076 //\r
1077 // The size of the VariableName, including the Unicode Null in bytes plus\r
1078 // the DataSize is limited to maximum size of MAX_HARDWARE_ERROR_VARIABLE_SIZE (32K)\r
1079 // bytes for HwErrRec, and MAX_VARIABLE_SIZE (1024) bytes for the others.\r
1080 //\r
1081 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1082 if ((DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE) || \r
1083 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE)) {\r
1084 return EFI_INVALID_PARAMETER;\r
1085 } \r
1086 } else {\r
1087 //\r
1088 // The size of the VariableName, including the Unicode Null in bytes plus\r
1089 // the DataSize is limited to maximum size of MAX_VARIABLE_SIZE (1024) bytes.\r
1090 //\r
1091 if ((DataSize > MAX_VARIABLE_SIZE) ||\r
1092 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_VARIABLE_SIZE)) {\r
1093 return EFI_INVALID_PARAMETER;\r
1094 } \r
1095 } \r
fdb7765f 1096\r
1097 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1098\r
1099 Reclaimed = FALSE;\r
1100 Instance = mVariableModuleGlobal->FvbInstance;\r
1101 VolatileOffset = &mVariableModuleGlobal->VolatileLastVariableOffset;\r
1102\r
1103 //\r
1104 // Consider reentrant in MCA/INIT/NMI. It needs be reupdated;\r
1105 //\r
1106 if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {\r
fdb7765f 1107 Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;;\r
1108 //\r
1109 // Parse non-volatile variable data and get last variable offset\r
1110 //\r
9cad030b 1111 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);\r
fdb7765f 1112 while (IsValidVariableHeader (NextVariable)) {\r
1113 NextVariable = GetNextVariablePtr (NextVariable);\r
1114 }\r
1115 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;\r
1116 }\r
1117\r
1118 NonVolatileOffset = &mVariableModuleGlobal->NonVolatileLastVariableOffset;\r
1119 \r
1120\r
c6492839 1121 //\r
1122 // Check whether the input variable is already existed\r
1123 //\r
1124 \r
052ad7e1 1125 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
c6492839 1126 if (Status == EFI_SUCCESS && Variable.CurrPtr != NULL) {\r
8d3a5c82 1127 //\r
c6492839 1128 // Update/Delete existing variable\r
8d3a5c82 1129 //\r
fd51bf70 1130 Volatile = Variable.Volatile;\r
c6492839 1131 \r
1132 if (EfiAtRuntime ()) { \r
1133 //\r
1134 // If EfiAtRuntime and the variable is Volatile and Runtime Access, \r
1135 // the volatile is ReadOnly, and SetVariable should be aborted and \r
1136 // return EFI_WRITE_PROTECTED.\r
1137 //\r
1138 if (Variable.Volatile) {\r
1139 Status = EFI_WRITE_PROTECTED;\r
1140 goto Done;\r
1141 }\r
1142 //\r
1143 // Only variable have NV attribute can be updated/deleted in Runtime\r
1144 //\r
1145 if (!(Variable.CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE)) {\r
1146 Status = EFI_INVALID_PARAMETER;\r
1147 goto Done; \r
1148 }\r
1149 }\r
8d3a5c82 1150 //\r
c6492839 1151 // Setting a data variable with no access, or zero DataSize attributes\r
1152 // specified causes it to be deleted.\r
8d3a5c82 1153 //\r
c6492839 1154 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { \r
1155 State = Variable.CurrPtr->State;\r
1156 State &= VAR_DELETED;\r
1157\r
1158 Status = UpdateVariableStore (\r
052ad7e1 1159 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1160 Variable.Volatile,\r
1161 FALSE,\r
1162 Instance,\r
1163 (UINTN) &Variable.CurrPtr->State,\r
1164 sizeof (UINT8),\r
1165 &State\r
1166 ); \r
33a5a666 1167 if (!EFI_ERROR (Status)) {\r
fd51bf70 1168 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);\r
33a5a666
A
1169 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1170 }\r
c6492839 1171 goto Done; \r
1172 }\r
8d3a5c82 1173 //\r
c6492839 1174 // If the variable is marked valid and the same data has been passed in\r
1175 // then return to the caller immediately.\r
8d3a5c82 1176 //\r
ab5f0d6d 1177 if (DATASIZE_OF_VARIABLE (Variable.CurrPtr) == DataSize &&\r
c6492839 1178 (CompareMem (Data, GetVariableDataPtr (Variable.CurrPtr), DataSize) == 0)) {\r
33a5a666 1179 \r
fd51bf70 1180 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
c6492839 1181 Status = EFI_SUCCESS;\r
1182 goto Done;\r
1183 } else if ((Variable.CurrPtr->State == VAR_ADDED) ||\r
1184 (Variable.CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
1185 //\r
1186 // Mark the old variable as in delete transition\r
1187 //\r
1188 State = Variable.CurrPtr->State;\r
1189 State &= VAR_IN_DELETED_TRANSITION;\r
1190\r
1191 Status = UpdateVariableStore (\r
052ad7e1 1192 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1193 Variable.Volatile,\r
1194 FALSE,\r
1195 Instance,\r
1196 (UINTN) &Variable.CurrPtr->State,\r
1197 sizeof (UINT8),\r
1198 &State\r
1199 ); \r
1200 if (EFI_ERROR (Status)) {\r
1201 goto Done; \r
33a5a666 1202 } \r
c6492839 1203 } \r
1204 } else if (Status == EFI_NOT_FOUND) {\r
8d3a5c82 1205 //\r
c6492839 1206 // Create a new variable\r
1207 // \r
1208 \r
8d3a5c82 1209 //\r
c6492839 1210 // Make sure we are trying to create a new variable.\r
1211 // Setting a data variable with no access, or zero DataSize attributes means to delete it. \r
8d3a5c82 1212 //\r
c6492839 1213 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
1214 Status = EFI_NOT_FOUND;\r
1215 goto Done;\r
1216 }\r
1217 \r
8d3a5c82 1218 //\r
c6492839 1219 // Only variable have NV|RT attribute can be created in Runtime\r
1220 //\r
1221 if (EfiAtRuntime () &&\r
1222 (!(Attributes & EFI_VARIABLE_RUNTIME_ACCESS) || !(Attributes & EFI_VARIABLE_NON_VOLATILE))) {\r
1223 Status = EFI_INVALID_PARAMETER;\r
1224 goto Done;\r
1225 } \r
1226 } else {\r
8d3a5c82 1227 //\r
c6492839 1228 // Status should be EFI_INVALID_PARAMETER here according to return status of FindVariable().\r
8d3a5c82 1229 //\r
c6492839 1230 ASSERT (Status == EFI_INVALID_PARAMETER);\r
8d3a5c82 1231 goto Done;\r
c6492839 1232 }\r
1233\r
1234 //\r
1235 // Function part - create a new variable and copy the data.\r
1236 // Both update a variable and create a variable will come here.\r
1237 //\r
1238 // Tricky part: Use scratch data area at the end of volatile variable store\r
1239 // as a temporary storage.\r
1240 //\r
052ad7e1 1241 NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));\r
c6492839 1242\r
1243 SetMem (NextVariable, SCRATCH_SIZE, 0xff);\r
1244\r
1245 NextVariable->StartId = VARIABLE_DATA;\r
1246 NextVariable->Attributes = Attributes;\r
1247 //\r
1248 // NextVariable->State = VAR_ADDED;\r
1249 //\r
1250 NextVariable->Reserved = 0;\r
1251 VarNameOffset = sizeof (VARIABLE_HEADER);\r
1252 VarNameSize = StrSize (VariableName);\r
1253 CopyMem (\r
1254 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
1255 VariableName,\r
1256 VarNameSize\r
1257 );\r
1258 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
1259 CopyMem (\r
1260 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
1261 Data,\r
1262 DataSize\r
1263 );\r
1264 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
1265 //\r
1266 // There will be pad bytes after Data, the NextVariable->NameSize and\r
1267 // NextVariable->DataSize should not include pad size so that variable\r
1268 // service can get actual size in GetVariable\r
1269 //\r
1270 NextVariable->NameSize = (UINT32)VarNameSize;\r
1271 NextVariable->DataSize = (UINT32)DataSize;\r
1272\r
1273 //\r
1274 // The actual size of the variable that stores in storage should\r
1275 // include pad size.\r
1276 //\r
1277 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
1278 if (Attributes & EFI_VARIABLE_NON_VOLATILE) {\r
8d3a5c82 1279 //\r
c6492839 1280 // Create a nonvolatile variable\r
8d3a5c82 1281 //\r
fd51bf70 1282 Volatile = FALSE;\r
c6492839 1283 \r
1284 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1285 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
c6492839 1286 ) {\r
1287 if (EfiAtRuntime ()) {\r
1288 Status = EFI_OUT_OF_RESOURCES;\r
1289 goto Done;\r
1290 }\r
1291 //\r
1292 // Perform garbage collection & reclaim operation\r
1293 //\r
052ad7e1 1294 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, NonVolatileOffset, FALSE);\r
8d3a5c82 1295 if (EFI_ERROR (Status)) {\r
1296 goto Done;\r
1297 }\r
8d3a5c82 1298 //\r
c6492839 1299 // If still no enough space, return out of resources\r
8d3a5c82 1300 //\r
c6492839 1301 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1302 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
8d3a5c82 1303 ) {\r
c6492839 1304 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1305 goto Done;\r
8d3a5c82 1306 }\r
c6492839 1307 \r
1308 Reclaimed = TRUE;\r
8d3a5c82 1309 }\r
1310 //\r
c6492839 1311 // Three steps\r
1312 // 1. Write variable header\r
1313 // 2. Write variable data\r
1314 // 3. Set variable state to valid\r
8d3a5c82 1315 //\r
8d3a5c82 1316 //\r
c6492839 1317 // Step 1:\r
8d3a5c82 1318 //\r
c6492839 1319 Status = UpdateVariableStore (\r
052ad7e1 1320 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1321 FALSE,\r
1322 TRUE,\r
1323 Instance,\r
1324 *NonVolatileOffset,\r
1325 sizeof (VARIABLE_HEADER),\r
1326 (UINT8 *) NextVariable\r
1327 );\r
1328\r
1329 if (EFI_ERROR (Status)) {\r
1330 goto Done;\r
1331 }\r
8d3a5c82 1332 //\r
c6492839 1333 // Step 2:\r
8d3a5c82 1334 //\r
c6492839 1335 Status = UpdateVariableStore (\r
052ad7e1 1336 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1337 FALSE,\r
1338 TRUE,\r
1339 Instance,\r
1340 *NonVolatileOffset + sizeof (VARIABLE_HEADER),\r
1341 (UINT32) VarSize - sizeof (VARIABLE_HEADER),\r
1342 (UINT8 *) NextVariable + sizeof (VARIABLE_HEADER)\r
1343 );\r
1344\r
1345 if (EFI_ERROR (Status)) {\r
1346 goto Done;\r
1347 }\r
8d3a5c82 1348 //\r
c6492839 1349 // Step 3:\r
8d3a5c82 1350 //\r
c6492839 1351 NextVariable->State = VAR_ADDED;\r
1352 Status = UpdateVariableStore (\r
052ad7e1 1353 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1354 FALSE,\r
1355 TRUE,\r
1356 Instance,\r
1357 *NonVolatileOffset,\r
1358 sizeof (VARIABLE_HEADER),\r
1359 (UINT8 *) NextVariable\r
1360 );\r
1361\r
1362 if (EFI_ERROR (Status)) {\r
1363 goto Done;\r
1364 }\r
8d3a5c82 1365\r
9cad030b 1366 *NonVolatileOffset = HEADER_ALIGN (*NonVolatileOffset + VarSize);\r
8d3a5c82 1367\r
c6492839 1368 } else {\r
1369 //\r
1370 // Create a volatile variable\r
1371 // \r
fd51bf70 1372 Volatile = TRUE;\r
c6492839 1373\r
1374 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1375 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {\r
8d3a5c82 1376 //\r
c6492839 1377 // Perform garbage collection & reclaim operation\r
8d3a5c82 1378 //\r
052ad7e1 1379 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, VolatileOffset, TRUE);\r
8d3a5c82 1380 if (EFI_ERROR (Status)) {\r
1381 goto Done;\r
1382 }\r
1383 //\r
c6492839 1384 // If still no enough space, return out of resources\r
8d3a5c82 1385 //\r
8d3a5c82 1386 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1387 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size\r
8d3a5c82 1388 ) {\r
c6492839 1389 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1390 goto Done;\r
1391 }\r
c6492839 1392 \r
1393 Reclaimed = TRUE;\r
8d3a5c82 1394 }\r
8d3a5c82 1395\r
c6492839 1396 NextVariable->State = VAR_ADDED;\r
1397 Status = UpdateVariableStore (\r
052ad7e1 1398 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1399 TRUE,\r
1400 TRUE,\r
1401 Instance,\r
1402 *VolatileOffset,\r
1403 (UINT32) VarSize,\r
1404 (UINT8 *) NextVariable\r
1405 );\r
1406\r
1407 if (EFI_ERROR (Status)) {\r
1408 goto Done;\r
8d3a5c82 1409 }\r
c6492839 1410\r
9cad030b 1411 *VolatileOffset = HEADER_ALIGN (*VolatileOffset + VarSize);\r
c6492839 1412 }\r
1413 //\r
1414 // Mark the old variable as deleted\r
1415 //\r
1416 if (!Reclaimed && !EFI_ERROR (Status) && Variable.CurrPtr != NULL) {\r
1417 State = Variable.CurrPtr->State;\r
1418 State &= VAR_DELETED;\r
1419\r
1420 Status = UpdateVariableStore (\r
052ad7e1 1421 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1422 Variable.Volatile,\r
1423 FALSE,\r
1424 Instance,\r
1425 (UINTN) &Variable.CurrPtr->State,\r
1426 sizeof (UINT8),\r
1427 &State\r
1428 );\r
33a5a666
A
1429 \r
1430 if (!EFI_ERROR (Status)) {\r
fd51bf70 1431 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1432 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1433 }\r
c6492839 1434 goto Done; \r
8d3a5c82 1435 }\r
1436\r
1437 Status = EFI_SUCCESS;\r
fd51bf70 1438 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1439 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1440\r
8d3a5c82 1441Done:\r
fdb7765f 1442 InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);\r
052ad7e1 1443 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
fdb7765f 1444\r
8d3a5c82 1445 return Status;\r
1446}\r
1447\r
052ad7e1 1448\r
8d3a5c82 1449/*++\r
1450\r
1451Routine Description:\r
1452\r
1453 This code returns information about the EFI variables.\r
1454\r
1455Arguments:\r
1456\r
1457 Attributes Attributes bitmask to specify the type of variables\r
1458 on which to return information.\r
1459 MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
1460 for the EFI variables associated with the attributes specified.\r
1461 RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
c6492839 1462 for EFI variables associated with the attributes specified.\r
1463 MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
8d3a5c82 1464 associated with the attributes specified.\r
1465 Global Pointer to VARIABLE_GLOBAL structure.\r
1466 Instance Instance of the Firmware Volume.\r
1467\r
1468Returns:\r
1469\r
1470 EFI STATUS\r
1471 EFI_INVALID_PARAMETER - An invalid combination of attribute bits was supplied.\r
1472 EFI_SUCCESS - Query successfully.\r
1473 EFI_UNSUPPORTED - The attribute is not supported on this platform.\r
1474\r
1475--*/\r
052ad7e1
A
1476EFI_STATUS\r
1477EFIAPI\r
1478RuntimeServiceQueryVariableInfo (\r
1479 IN UINT32 Attributes,\r
1480 OUT UINT64 *MaximumVariableStorageSize,\r
1481 OUT UINT64 *RemainingVariableStorageSize,\r
1482 OUT UINT64 *MaximumVariableSize\r
1483 )\r
8d3a5c82 1484{\r
1485 VARIABLE_HEADER *Variable;\r
1486 VARIABLE_HEADER *NextVariable;\r
1487 UINT64 VariableSize;\r
1488 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1489\r
c6492839 1490 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
8d3a5c82 1491 return EFI_INVALID_PARAMETER;\r
1492 }\r
c6492839 1493 \r
1494 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
8d3a5c82 1495 //\r
1496 // Make sure the Attributes combination is supported by the platform.\r
1497 //\r
c6492839 1498 return EFI_UNSUPPORTED; \r
8d3a5c82 1499 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1500 //\r
1501 // Make sure if runtime bit is set, boot service bit is set also.\r
1502 //\r
1503 return EFI_INVALID_PARAMETER;\r
1504 } else if (EfiAtRuntime () && !(Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1505 //\r
1506 // Make sure RT Attribute is set if we are in Runtime phase.\r
1507 //\r
1508 return EFI_INVALID_PARAMETER;\r
1509 }\r
1510\r
052ad7e1 1511 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1512\r
1513 if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
1514 //\r
1515 // Query is Volatile related.\r
1516 //\r
052ad7e1 1517 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 1518 } else {\r
1519 //\r
1520 // Query is Non-Volatile related.\r
1521 //\r
052ad7e1 1522 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1523 }\r
1524\r
1525 //\r
1526 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
1527 // with the storage size (excluding the storage header size).\r
1528 //\r
1529 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1530 *RemainingVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1531\r
1532 //\r
c6492839 1533 // Let *MaximumVariableSize be MAX_VARIABLE_SIZE with the exception of the variable header size.\r
8d3a5c82 1534 //\r
c6492839 1535 *MaximumVariableSize = MAX_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1536\r
1537 //\r
1538 // Harware error record variable needs larger size.\r
1539 //\r
1540 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1541 *MaximumVariableSize = MAX_HARDWARE_ERROR_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1542 }\r
8d3a5c82 1543\r
1544 //\r
1545 // Point to the starting address of the variables.\r
1546 //\r
9cad030b 1547 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 1548\r
1549 //\r
1550 // Now walk through the related variable store.\r
1551 //\r
1552 while (IsValidVariableHeader (Variable) && (Variable < GetEndPointer (VariableStoreHeader))) {\r
1553 NextVariable = GetNextVariablePtr (Variable);\r
1554 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
1555\r
1556 if (EfiAtRuntime ()) {\r
1557 //\r
1558 // we don't take the state of the variables in mind\r
1559 // when calculating RemainingVariableStorageSize,\r
1560 // since the space occupied by variables not marked with\r
1561 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
1562 //\r
1563 *RemainingVariableStorageSize -= VariableSize;\r
1564 } else {\r
1565 //\r
1566 // Only care about Variables with State VAR_ADDED,because\r
1567 // the space not marked as VAR_ADDED is reclaimable now.\r
1568 //\r
1569 if (Variable->State == VAR_ADDED) {\r
1570 *RemainingVariableStorageSize -= VariableSize;\r
1571 }\r
1572 }\r
1573\r
1574 //\r
1575 // Go to the next one\r
1576 //\r
1577 Variable = NextVariable;\r
1578 }\r
1579\r
c6492839 1580 if (*RemainingVariableStorageSize < sizeof (VARIABLE_HEADER)) {\r
1581 *MaximumVariableSize = 0;\r
1582 } else if ((*RemainingVariableStorageSize - sizeof (VARIABLE_HEADER)) < *MaximumVariableSize) {\r
1583 *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (VARIABLE_HEADER);\r
1584 }\r
1585\r
052ad7e1 1586 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1587 return EFI_SUCCESS;\r
1588}\r
1589\r
1590EFI_STATUS\r
8d3a5c82 1591VariableCommonInitialize (\r
1592 IN EFI_HANDLE ImageHandle,\r
1593 IN EFI_SYSTEM_TABLE *SystemTable\r
1594 )\r
1595/*++\r
1596\r
1597Routine Description:\r
1598 This function does common initialization for variable services\r
1599\r
1600Arguments:\r
1601\r
1602 ImageHandle - The firmware allocated handle for the EFI image.\r
1603 SystemTable - A pointer to the EFI System Table.\r
1604\r
1605Returns:\r
1606\r
1607 Status code.\r
1608\r
1609 EFI_NOT_FOUND - Variable store area not found.\r
1610 EFI_UNSUPPORTED - Currently only one non-volatile variable store is supported.\r
1611 EFI_SUCCESS - Variable services successfully initialized.\r
1612\r
1613--*/\r
1614{\r
1615 EFI_STATUS Status;\r
1616 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
1617 CHAR8 *CurrPtr;\r
1618 VARIABLE_STORE_HEADER *VolatileVariableStore;\r
1619 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1620 VARIABLE_HEADER *NextVariable;\r
1621 UINT32 Instance;\r
1622 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
8d3a5c82 1623 UINT64 TempVariableStoreHeader;\r
8d3a5c82 1624 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
8d3a5c82 1625 UINT64 BaseAddress;\r
1626 UINT64 Length;\r
1627 UINTN Index;\r
1628 UINT8 Data;\r
052ad7e1
A
1629 UINT64 VariableStoreBase;\r
1630 UINT64 VariableStoreLength;\r
8d3a5c82 1631\r
8d3a5c82 1632\r
052ad7e1 1633 EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);\r
fdb7765f 1634 mVariableModuleGlobal->VariableGlobal.ReentrantState = 0;\r
8d3a5c82 1635\r
1636 //\r
1637 // Allocate memory for volatile variable store\r
1638 //\r
1639 VolatileVariableStore = AllocateRuntimePool (VARIABLE_STORE_SIZE + SCRATCH_SIZE);\r
1640 if (VolatileVariableStore == NULL) {\r
1641 FreePool (mVariableModuleGlobal);\r
1642 return EFI_OUT_OF_RESOURCES;\r
1643 }\r
1644\r
1645 SetMem (VolatileVariableStore, VARIABLE_STORE_SIZE + SCRATCH_SIZE, 0xff);\r
1646\r
1647 //\r
1648 // Variable Specific Data\r
1649 //\r
052ad7e1 1650 mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;\r
9cad030b 1651 mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;\r
8d3a5c82 1652\r
1653 VolatileVariableStore->Signature = VARIABLE_STORE_SIGNATURE;\r
1654 VolatileVariableStore->Size = VARIABLE_STORE_SIZE;\r
1655 VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;\r
1656 VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;\r
1657 VolatileVariableStore->Reserved = 0;\r
1658 VolatileVariableStore->Reserved1 = 0;\r
1659\r
1660 //\r
1661 // Get non volatile varaible store\r
1662 //\r
1663\r
1664 TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);\r
052ad7e1 1665 VariableStoreBase = TempVariableStoreHeader + \\r
8d3a5c82 1666 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
052ad7e1 1667 VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \\r
8d3a5c82 1668 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
1669 //\r
1670 // Mark the variable storage region of the FLASH as RUNTIME\r
1671 //\r
052ad7e1
A
1672 BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);\r
1673 Length = VariableStoreLength + (VariableStoreBase - BaseAddress);\r
8d3a5c82 1674 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
1675\r
1676 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
1677 if (EFI_ERROR (Status)) {\r
1678 FreePool (mVariableModuleGlobal);\r
1679 FreePool (VolatileVariableStore);\r
1680 return EFI_UNSUPPORTED;\r
1681 }\r
1682\r
1683 Status = gDS->SetMemorySpaceAttributes (\r
1684 BaseAddress,\r
1685 Length,\r
1686 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
1687 );\r
1688 if (EFI_ERROR (Status)) {\r
1689 FreePool (mVariableModuleGlobal);\r
1690 FreePool (VolatileVariableStore);\r
1691 return EFI_UNSUPPORTED;\r
1692 }\r
1693 //\r
1694 // Get address of non volatile variable store base\r
1695 //\r
052ad7e1 1696 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;\r
8d3a5c82 1697\r
1698 //\r
1699 // Check Integrity\r
1700 //\r
1701 //\r
1702 // Find the Correct Instance of the FV Block Service.\r
1703 //\r
1704 Instance = 0;\r
052ad7e1 1705 CurrPtr = (CHAR8 *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1706 while (EfiFvbGetPhysicalAddress (Instance, &FvVolHdr) == EFI_SUCCESS) {\r
1707 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
1708 if (CurrPtr >= (CHAR8 *) FwVolHeader && CurrPtr < (((CHAR8 *) FwVolHeader) + FwVolHeader->FvLength)) {\r
1709 mVariableModuleGlobal->FvbInstance = Instance;\r
1710 break;\r
1711 }\r
1712\r
1713 Instance++;\r
1714 }\r
1715\r
1716 VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;\r
1717 if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {\r
1718 if (~VariableStoreHeader->Size == 0) {\r
1719 Status = UpdateVariableStore (\r
052ad7e1 1720 &mVariableModuleGlobal->VariableGlobal,\r
8d3a5c82 1721 FALSE,\r
1722 FALSE,\r
1723 mVariableModuleGlobal->FvbInstance,\r
1724 (UINTN) &VariableStoreHeader->Size,\r
1725 sizeof (UINT32),\r
052ad7e1 1726 (UINT8 *) &VariableStoreLength\r
8d3a5c82 1727 );\r
1728 //\r
1729 // As Variables are stored in NV storage, which are slow devices,such as flash.\r
1730 // Variable operation may skip checking variable program result to improve performance,\r
1731 // We can assume Variable program is OK through some check point.\r
1732 // Variable Store Size Setting should be the first Variable write operation,\r
1733 // We can assume all Read/Write is OK if we can set Variable store size successfully.\r
1734 // If write fail, we will assert here\r
1735 //\r
052ad7e1 1736 ASSERT(VariableStoreHeader->Size == VariableStoreLength);\r
8d3a5c82 1737\r
1738 if (EFI_ERROR (Status)) {\r
1739 return Status;\r
1740 }\r
1741 }\r
1742\r
052ad7e1 1743 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);\r
8d3a5c82 1744 //\r
1745 // Parse non-volatile variable data and get last variable offset\r
1746 //\r
9cad030b 1747 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) CurrPtr);\r
8d3a5c82 1748 Status = EFI_SUCCESS;\r
1749\r
1750 while (IsValidVariableHeader (NextVariable)) {\r
1751 NextVariable = GetNextVariablePtr (NextVariable);\r
1752 }\r
1753\r
1754 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) CurrPtr;\r
1755\r
1756 //\r
1757 // Check if the free area is blow a threshold\r
1758 //\r
1759 if ((((VARIABLE_STORE_HEADER *)((UINTN) CurrPtr))->Size - mVariableModuleGlobal->NonVolatileLastVariableOffset) < VARIABLE_RECLAIM_THRESHOLD) {\r
1760 Status = Reclaim (\r
052ad7e1 1761 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1762 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1763 FALSE\r
1764 );\r
1765 }\r
1766\r
1767 if (EFI_ERROR (Status)) {\r
1768 FreePool (mVariableModuleGlobal);\r
1769 FreePool (VolatileVariableStore);\r
1770 return Status;\r
1771 }\r
1772\r
1773 //\r
1774 // Check if the free area is really free.\r
1775 //\r
1776 for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {\r
052ad7e1 1777 Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)[Index];\r
8d3a5c82 1778 if (Data != 0xff) {\r
1779 //\r
1780 // There must be something wrong in variable store, do reclaim operation.\r
1781 //\r
1782 Status = Reclaim (\r
052ad7e1 1783 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1784 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1785 FALSE\r
1786 );\r
1787 break;\r
1788 }\r
1789 }\r
1790 }\r
1791\r
1792 if (EFI_ERROR (Status)) {\r
1793 FreePool (mVariableModuleGlobal);\r
1794 FreePool (VolatileVariableStore);\r
1795 }\r
1796\r
1797 return Status;\r
1798}\r
052ad7e1
A
1799\r
1800\r
1801\r
1802\r
1803VOID\r
1804EFIAPI\r
1805VariableClassAddressChangeEvent (\r
1806 IN EFI_EVENT Event,\r
1807 IN VOID *Context\r
1808 )\r
1809{\r
1810 EfiConvertPointer (\r
1811 0x0,\r
1812 (VOID **) &mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase\r
1813 );\r
1814 EfiConvertPointer (\r
1815 0x0,\r
1816 (VOID **) &mVariableModuleGlobal->VariableGlobal.VolatileVariableBase\r
1817 );\r
1818 EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal);\r
1819}\r
1820\r
1821\r
1822/**\r
1823 Variable Driver main entry point. The Variable driver places the 4 EFI\r
1824 runtime services in the EFI System Table and installs arch protocols \r
1825 for variable read and write services being availible. \r
1826\r
1827 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
1828 @param[in] SystemTable A pointer to the EFI System Table.\r
1829 \r
1830 @retval EFI_SUCCESS The entry point is executed successfully.\r
1831 @retval other Some error occurs when executing this entry point.\r
1832\r
1833**/\r
1834EFI_STATUS\r
1835EFIAPI\r
1836VariableServiceInitialize (\r
1837 IN EFI_HANDLE ImageHandle,\r
1838 IN EFI_SYSTEM_TABLE *SystemTable\r
1839 )\r
1840{\r
1841 EFI_STATUS Status;\r
1842\r
1843 Status = VariableCommonInitialize (ImageHandle, SystemTable);\r
1844 ASSERT_EFI_ERROR (Status);\r
1845\r
1846 SystemTable->RuntimeServices->GetVariable = RuntimeServiceGetVariable;\r
1847 SystemTable->RuntimeServices->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
1848 SystemTable->RuntimeServices->SetVariable = RuntimeServiceSetVariable;\r
1849 SystemTable->RuntimeServices->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
1850\r
1851 //\r
1852 // Now install the Variable Runtime Architectural Protocol on a new handle\r
1853 //\r
1854 Status = gBS->InstallMultipleProtocolInterfaces (\r
1855 &mHandle,\r
1856 &gEfiVariableArchProtocolGuid, NULL,\r
1857 &gEfiVariableWriteArchProtocolGuid, NULL,\r
1858 NULL\r
1859 );\r
1860 ASSERT_EFI_ERROR (Status);\r
1861\r
1862 Status = gBS->CreateEvent (\r
1863 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE,\r
1864 TPL_NOTIFY,\r
1865 VariableClassAddressChangeEvent,\r
1866 NULL,\r
1867 &mVirtualAddressChangeEvent\r
1868 );\r
1869 ASSERT_EFI_ERROR (Status);\r
1870\r
1871 return EFI_SUCCESS;\r
1872}\r
1873\r