]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
Add SMM Variable implementation.
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / Variable.c
CommitLineData
052ad7e1 1/** @file\r
504214c4 2\r
8a2d4996 3 The common variable operation routines shared by DXE_RINTIME variable \r
4 module and DXE_SMM variable module.\r
052ad7e1 5 \r
e5eed7d3
HT
6Copyright (c) 2006 - 2010, Intel Corporation. All rights reserved.<BR>\r
7This program and the accompanying materials \r
504214c4
LG
8are licensed and made available under the terms and conditions of the BSD License \r
9which accompanies this distribution. The full text of the license may be found at \r
10http://opensource.org/licenses/bsd-license.php \r
11\r
12THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
13WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
8d3a5c82 14\r
052ad7e1 15**/\r
8d3a5c82 16\r
8d3a5c82 17#include "Variable.h"\r
33a5a666 18\r
7800593d 19VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal;\r
8d3a5c82 20\r
7c80e839 21///\r
8a2d4996 22/// Define a memory cache that improves the search performance for a variable.\r
7c80e839 23///\r
8a2d4996 24VARIABLE_STORE_HEADER *mNvVariableCache = NULL;\r
aa79b0b3 25\r
8a2d4996 26///\r
27/// The memory entry used for variable statistics data.\r
28///\r
29VARIABLE_INFO_ENTRY *gVariableInfo = NULL;\r
8d3a5c82 30\r
33a5a666 31\r
052ad7e1
A
32/**\r
33 Routine used to track statistical information about variable usage. \r
34 The data is stored in the EFI system table so it can be accessed later.\r
35 VariableInfo.efi can dump out the table. Only Boot Services variable \r
36 accesses are tracked by this code. The PcdVariableCollectStatistics\r
37 build flag controls if this feature is enabled. \r
38\r
39 A read that hits in the cache will have Read and Cache true for \r
40 the transaction. Data is allocated by this routine, but never\r
41 freed.\r
42\r
8a2d4996 43 @param[in] VariableName Name of the Variable to track.\r
44 @param[in] VendorGuid Guid of the Variable to track.\r
45 @param[in] Volatile TRUE if volatile FALSE if non-volatile.\r
46 @param[in] Read TRUE if GetVariable() was called.\r
47 @param[in] Write TRUE if SetVariable() was called.\r
48 @param[in] Delete TRUE if deleted via SetVariable().\r
052ad7e1
A
49 @param[in] Cache TRUE for a cache hit.\r
50\r
51**/\r
33a5a666
A
52VOID\r
53UpdateVariableInfo (\r
54 IN CHAR16 *VariableName,\r
55 IN EFI_GUID *VendorGuid,\r
56 IN BOOLEAN Volatile,\r
57 IN BOOLEAN Read,\r
58 IN BOOLEAN Write,\r
59 IN BOOLEAN Delete,\r
60 IN BOOLEAN Cache\r
61 )\r
62{\r
63 VARIABLE_INFO_ENTRY *Entry;\r
64\r
65 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
66\r
8a2d4996 67 if (AtRuntime ()) {\r
68 // Don't collect statistics at runtime.\r
33a5a666
A
69 return;\r
70 }\r
71\r
72 if (gVariableInfo == NULL) {\r
052ad7e1 73 //\r
8a2d4996 74 // On the first call allocate a entry and place a pointer to it in\r
75 // the EFI System Table.\r
052ad7e1 76 //\r
33a5a666 77 gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1
A
78 ASSERT (gVariableInfo != NULL);\r
79\r
33a5a666 80 CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);\r
bcd7070d 81 gVariableInfo->Name = AllocatePool (StrSize (VariableName));\r
e6c4ef13 82 ASSERT (gVariableInfo->Name != NULL);\r
33a5a666
A
83 StrCpy (gVariableInfo->Name, VariableName);\r
84 gVariableInfo->Volatile = Volatile;\r
33a5a666
A
85 }\r
86\r
87 \r
88 for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {\r
89 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
90 if (StrCmp (VariableName, Entry->Name) == 0) {\r
91 if (Read) {\r
92 Entry->ReadCount++;\r
93 }\r
94 if (Write) {\r
95 Entry->WriteCount++;\r
96 }\r
97 if (Delete) {\r
98 Entry->DeleteCount++;\r
99 }\r
100 if (Cache) {\r
101 Entry->CacheCount++;\r
102 }\r
103\r
104 return;\r
105 }\r
106 }\r
107\r
108 if (Entry->Next == NULL) {\r
052ad7e1
A
109 //\r
110 // If the entry is not in the table add it.\r
8a2d4996 111 // Next iteration of the loop will fill in the data.\r
052ad7e1 112 //\r
33a5a666 113 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1 114 ASSERT (Entry->Next != NULL);\r
33a5a666
A
115\r
116 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
bcd7070d 117 Entry->Next->Name = AllocatePool (StrSize (VariableName));\r
e6c4ef13 118 ASSERT (Entry->Next->Name != NULL);\r
33a5a666
A
119 StrCpy (Entry->Next->Name, VariableName);\r
120 Entry->Next->Volatile = Volatile;\r
121 }\r
122\r
123 }\r
124 }\r
125}\r
126\r
127\r
7c80e839 128/**\r
8d3a5c82 129\r
130 This code checks if variable header is valid or not.\r
131\r
7c80e839 132 @param Variable Pointer to the Variable Header.\r
8d3a5c82 133\r
7c80e839 134 @retval TRUE Variable header is valid.\r
135 @retval FALSE Variable header is not valid.\r
8d3a5c82 136\r
7c80e839 137**/\r
138BOOLEAN\r
139IsValidVariableHeader (\r
140 IN VARIABLE_HEADER *Variable\r
141 )\r
8d3a5c82 142{\r
fdb7765f 143 if (Variable == NULL || Variable->StartId != VARIABLE_DATA) {\r
8d3a5c82 144 return FALSE;\r
145 }\r
146\r
147 return TRUE;\r
148}\r
149\r
052ad7e1 150\r
7c80e839 151/**\r
152\r
153 This function writes data to the FWH at the correct LBA even if the LBAs\r
154 are fragmented.\r
155\r
8a2d4996 156 @param Global Pointer to VARAIBLE_GLOBAL structure.\r
157 @param Volatile Point out the Variable is Volatile or Non-Volatile.\r
158 @param SetByIndex TRUE if target pointer is given as index.\r
159 FALSE if target pointer is absolute.\r
160 @param Fvb Pointer to the writable FVB protocol.\r
7c80e839 161 @param DataPtrIndex Pointer to the Data from the end of VARIABLE_STORE_HEADER\r
8a2d4996 162 structure.\r
163 @param DataSize Size of data to be written.\r
164 @param Buffer Pointer to the buffer from which data is written.\r
7c80e839 165\r
8a2d4996 166 @retval EFI_INVALID_PARAMETER Parameters not valid.\r
167 @retval EFI_SUCCESS Variable store successfully updated.\r
7c80e839 168\r
169**/\r
8d3a5c82 170EFI_STATUS\r
8d3a5c82 171UpdateVariableStore (\r
8a9e0b72 172 IN VARIABLE_GLOBAL *Global,\r
173 IN BOOLEAN Volatile,\r
174 IN BOOLEAN SetByIndex,\r
175 IN EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb,\r
176 IN UINTN DataPtrIndex,\r
177 IN UINT32 DataSize,\r
178 IN UINT8 *Buffer\r
8d3a5c82 179 )\r
8d3a5c82 180{\r
181 EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;\r
182 UINTN BlockIndex2;\r
183 UINTN LinearOffset;\r
184 UINTN CurrWriteSize;\r
185 UINTN CurrWritePtr;\r
186 UINT8 *CurrBuffer;\r
187 EFI_LBA LbaNumber;\r
188 UINTN Size;\r
189 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
190 VARIABLE_STORE_HEADER *VolatileBase;\r
191 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
192 EFI_PHYSICAL_ADDRESS DataPtr;\r
193 EFI_STATUS Status;\r
194\r
195 FwVolHeader = NULL;\r
196 DataPtr = DataPtrIndex;\r
197\r
198 //\r
8a2d4996 199 // Check if the Data is Volatile.\r
8d3a5c82 200 //\r
201 if (!Volatile) {\r
8a9e0b72 202 Status = Fvb->GetPhysicalAddress(Fvb, &FvVolHdr);\r
203 ASSERT_EFI_ERROR (Status);\r
204\r
8d3a5c82 205 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
206 //\r
207 // Data Pointer should point to the actual Address where data is to be\r
8a2d4996 208 // written.\r
8d3a5c82 209 //\r
210 if (SetByIndex) {\r
052ad7e1 211 DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
8d3a5c82 212 }\r
213\r
214 if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {\r
215 return EFI_INVALID_PARAMETER;\r
216 }\r
217 } else {\r
218 //\r
219 // Data Pointer should point to the actual Address where data is to be\r
8a2d4996 220 // written.\r
8d3a5c82 221 //\r
052ad7e1 222 VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 223 if (SetByIndex) {\r
052ad7e1 224 DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
8d3a5c82 225 }\r
226\r
227 if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {\r
228 return EFI_INVALID_PARAMETER;\r
229 }\r
c6492839 230 \r
231 //\r
232 // If Volatile Variable just do a simple mem copy.\r
233 // \r
234 CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);\r
8d3a5c82 235 return EFI_SUCCESS;\r
236 }\r
c6492839 237 \r
8d3a5c82 238 //\r
8a2d4996 239 // If we are here we are dealing with Non-Volatile Variables.\r
8d3a5c82 240 //\r
241 LinearOffset = (UINTN) FwVolHeader;\r
242 CurrWritePtr = (UINTN) DataPtr;\r
243 CurrWriteSize = DataSize;\r
244 CurrBuffer = Buffer;\r
245 LbaNumber = 0;\r
246\r
247 if (CurrWritePtr < LinearOffset) {\r
248 return EFI_INVALID_PARAMETER;\r
249 }\r
250\r
251 for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {\r
252 for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {\r
253 //\r
254 // Check to see if the Variable Writes are spanning through multiple\r
255 // blocks.\r
256 //\r
257 if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {\r
258 if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {\r
8a9e0b72 259 Status = Fvb->Write (\r
260 Fvb,\r
8d3a5c82 261 LbaNumber,\r
262 (UINTN) (CurrWritePtr - LinearOffset),\r
263 &CurrWriteSize,\r
264 CurrBuffer\r
265 );\r
8a9e0b72 266 return Status;\r
8d3a5c82 267 } else {\r
268 Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);\r
8a9e0b72 269 Status = Fvb->Write (\r
270 Fvb,\r
8d3a5c82 271 LbaNumber,\r
272 (UINTN) (CurrWritePtr - LinearOffset),\r
273 &Size,\r
274 CurrBuffer\r
275 );\r
276 if (EFI_ERROR (Status)) {\r
277 return Status;\r
278 }\r
279\r
280 CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;\r
281 CurrBuffer = CurrBuffer + Size;\r
282 CurrWriteSize = CurrWriteSize - Size;\r
283 }\r
284 }\r
285\r
286 LinearOffset += PtrBlockMapEntry->Length;\r
287 LbaNumber++;\r
288 }\r
289 }\r
290\r
291 return EFI_SUCCESS;\r
292}\r
293\r
052ad7e1 294\r
7c80e839 295/**\r
8d3a5c82 296\r
297 This code gets the current status of Variable Store.\r
298\r
7c80e839 299 @param VarStoreHeader Pointer to the Variable Store Header.\r
8d3a5c82 300\r
8a2d4996 301 @retval EfiRaw Variable store status is raw.\r
302 @retval EfiValid Variable store status is valid.\r
303 @retval EfiInvalid Variable store status is invalid.\r
8d3a5c82 304\r
7c80e839 305**/\r
306VARIABLE_STORE_STATUS\r
307GetVariableStoreStatus (\r
308 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
309 )\r
8d3a5c82 310{\r
3709c4cd 311 if (CompareGuid (&VarStoreHeader->Signature, &gEfiVariableGuid) &&\r
8d3a5c82 312 VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&\r
313 VarStoreHeader->State == VARIABLE_STORE_HEALTHY\r
314 ) {\r
315\r
316 return EfiValid;\r
3709c4cd 317 } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff &&\r
318 ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff &&\r
319 ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff &&\r
320 ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff &&\r
321 VarStoreHeader->Size == 0xffffffff &&\r
322 VarStoreHeader->Format == 0xff &&\r
323 VarStoreHeader->State == 0xff\r
8d3a5c82 324 ) {\r
325\r
326 return EfiRaw;\r
327 } else {\r
328 return EfiInvalid;\r
329 }\r
330}\r
331\r
130e2569 332\r
7c80e839 333/**\r
130e2569 334\r
335 This code gets the size of name of variable.\r
336\r
8a2d4996 337 @param Variable Pointer to the Variable Header.\r
130e2569 338\r
8a2d4996 339 @return UINTN Size of variable in bytes.\r
130e2569 340\r
7c80e839 341**/\r
342UINTN\r
343NameSizeOfVariable (\r
344 IN VARIABLE_HEADER *Variable\r
345 )\r
130e2569 346{\r
347 if (Variable->State == (UINT8) (-1) ||\r
7c80e839 348 Variable->DataSize == (UINT32) (-1) ||\r
349 Variable->NameSize == (UINT32) (-1) ||\r
350 Variable->Attributes == (UINT32) (-1)) {\r
130e2569 351 return 0;\r
352 }\r
353 return (UINTN) Variable->NameSize;\r
354}\r
355\r
7c80e839 356/**\r
130e2569 357\r
7c80e839 358 This code gets the size of variable data.\r
130e2569 359\r
8a2d4996 360 @param Variable Pointer to the Variable Header.\r
130e2569 361\r
8a2d4996 362 @return Size of variable in bytes.\r
130e2569 363\r
7c80e839 364**/\r
365UINTN\r
366DataSizeOfVariable (\r
367 IN VARIABLE_HEADER *Variable\r
368 )\r
130e2569 369{\r
7c80e839 370 if (Variable->State == (UINT8) (-1) ||\r
371 Variable->DataSize == (UINT32) (-1) ||\r
372 Variable->NameSize == (UINT32) (-1) ||\r
373 Variable->Attributes == (UINT32) (-1)) {\r
130e2569 374 return 0;\r
375 }\r
376 return (UINTN) Variable->DataSize;\r
377}\r
378\r
7c80e839 379/**\r
130e2569 380\r
381 This code gets the pointer to the variable name.\r
382\r
8a2d4996 383 @param Variable Pointer to the Variable Header.\r
130e2569 384\r
8a2d4996 385 @return Pointer to Variable Name which is Unicode encoding.\r
130e2569 386\r
7c80e839 387**/\r
388CHAR16 *\r
389GetVariableNamePtr (\r
390 IN VARIABLE_HEADER *Variable\r
391 )\r
130e2569 392{\r
393\r
394 return (CHAR16 *) (Variable + 1);\r
395}\r
396\r
7c80e839 397/**\r
8d3a5c82 398\r
399 This code gets the pointer to the variable data.\r
400\r
8a2d4996 401 @param Variable Pointer to the Variable Header.\r
8d3a5c82 402\r
8a2d4996 403 @return Pointer to Variable Data.\r
8d3a5c82 404\r
7c80e839 405**/\r
406UINT8 *\r
407GetVariableDataPtr (\r
408 IN VARIABLE_HEADER *Variable\r
409 )\r
8d3a5c82 410{\r
130e2569 411 UINTN Value;\r
412 \r
8d3a5c82 413 //\r
8a2d4996 414 // Be careful about pad size for alignment.\r
8d3a5c82 415 //\r
130e2569 416 Value = (UINTN) GetVariableNamePtr (Variable);\r
417 Value += NameSizeOfVariable (Variable);\r
418 Value += GET_PAD_SIZE (NameSizeOfVariable (Variable));\r
419\r
420 return (UINT8 *) Value;\r
8d3a5c82 421}\r
422\r
052ad7e1 423\r
7c80e839 424/**\r
8d3a5c82 425\r
426 This code gets the pointer to the next variable header.\r
427\r
8a2d4996 428 @param Variable Pointer to the Variable Header.\r
8d3a5c82 429\r
8a2d4996 430 @return Pointer to next variable header.\r
8d3a5c82 431\r
7c80e839 432**/\r
433VARIABLE_HEADER *\r
434GetNextVariablePtr (\r
435 IN VARIABLE_HEADER *Variable\r
436 )\r
8d3a5c82 437{\r
130e2569 438 UINTN Value;\r
439\r
8d3a5c82 440 if (!IsValidVariableHeader (Variable)) {\r
441 return NULL;\r
442 }\r
130e2569 443\r
444 Value = (UINTN) GetVariableDataPtr (Variable);\r
445 Value += DataSizeOfVariable (Variable);\r
446 Value += GET_PAD_SIZE (DataSizeOfVariable (Variable));\r
447\r
8d3a5c82 448 //\r
8a2d4996 449 // Be careful about pad size for alignment.\r
8d3a5c82 450 //\r
130e2569 451 return (VARIABLE_HEADER *) HEADER_ALIGN (Value);\r
8d3a5c82 452}\r
453\r
7c80e839 454/**\r
9cad030b 455\r
7c80e839 456 Gets the pointer to the first variable header in given variable store area.\r
9cad030b 457\r
7c80e839 458 @param VarStoreHeader Pointer to the Variable Store Header.\r
9cad030b 459\r
8a2d4996 460 @return Pointer to the first variable header.\r
9cad030b 461\r
7c80e839 462**/\r
463VARIABLE_HEADER *\r
464GetStartPointer (\r
465 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
466 )\r
9cad030b 467{\r
468 //\r
8a2d4996 469 // The end of variable store.\r
9cad030b 470 //\r
471 return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);\r
472}\r
052ad7e1 473\r
7c80e839 474/**\r
8d3a5c82 475\r
7c80e839 476 Gets the pointer to the end of the variable storage area.\r
8d3a5c82 477\r
7c80e839 478 This function gets pointer to the end of the variable storage\r
479 area, according to the input variable store header.\r
8d3a5c82 480\r
8a2d4996 481 @param VarStoreHeader Pointer to the Variable Store Header.\r
8d3a5c82 482\r
8a2d4996 483 @return Pointer to the end of the variable storage area. \r
8d3a5c82 484\r
7c80e839 485**/\r
486VARIABLE_HEADER *\r
487GetEndPointer (\r
488 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
489 )\r
8d3a5c82 490{\r
491 //\r
492 // The end of variable store\r
493 //\r
9cad030b 494 return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
8d3a5c82 495}\r
496\r
052ad7e1 497\r
7c80e839 498/**\r
499\r
500 Variable store garbage collection and reclaim operation.\r
501\r
8a2d4996 502 @param VariableBase Base address of variable store.\r
503 @param LastVariableOffset Offset of last variable.\r
504 @param IsVolatile The variable store is volatile or not;\r
505 if it is non-volatile, need FTW.\r
506 @param UpdatingVariable Pointer to updating variable.\r
7c80e839 507\r
508 @return EFI_OUT_OF_RESOURCES\r
509 @return EFI_SUCCESS\r
510 @return Others\r
511\r
512**/\r
8d3a5c82 513EFI_STATUS\r
8d3a5c82 514Reclaim (\r
515 IN EFI_PHYSICAL_ADDRESS VariableBase,\r
516 OUT UINTN *LastVariableOffset,\r
814bae52 517 IN BOOLEAN IsVolatile,\r
518 IN VARIABLE_HEADER *UpdatingVariable\r
8d3a5c82 519 )\r
8d3a5c82 520{\r
521 VARIABLE_HEADER *Variable;\r
814bae52 522 VARIABLE_HEADER *AddedVariable;\r
8d3a5c82 523 VARIABLE_HEADER *NextVariable;\r
814bae52 524 VARIABLE_HEADER *NextAddedVariable;\r
8d3a5c82 525 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
526 UINT8 *ValidBuffer;\r
814bae52 527 UINTN MaximumBufferSize;\r
8d3a5c82 528 UINTN VariableSize;\r
49e70927 529 UINTN VariableNameSize;\r
530 UINTN UpdatingVariableNameSize;\r
814bae52 531 UINTN NameSize;\r
8d3a5c82 532 UINT8 *CurrPtr;\r
814bae52 533 VOID *Point0;\r
534 VOID *Point1;\r
535 BOOLEAN FoundAdded;\r
8d3a5c82 536 EFI_STATUS Status;\r
49e70927 537 CHAR16 *VariableNamePtr;\r
538 CHAR16 *UpdatingVariableNamePtr;\r
8d3a5c82 539\r
540 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);\r
2fcdca1d 541 //\r
8a2d4996 542 // Recalculate the total size of Common/HwErr type variables in non-volatile area.\r
2fcdca1d 543 //\r
544 if (!IsVolatile) {\r
545 mVariableModuleGlobal->CommonVariableTotalSize = 0;\r
546 mVariableModuleGlobal->HwErrVariableTotalSize = 0;\r
547 }\r
8d3a5c82 548\r
549 //\r
550 // Start Pointers for the variable.\r
551 //\r
814bae52 552 Variable = GetStartPointer (VariableStoreHeader);\r
553 MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
8d3a5c82 554\r
555 while (IsValidVariableHeader (Variable)) {\r
556 NextVariable = GetNextVariablePtr (Variable);\r
814bae52 557 if (Variable->State == VAR_ADDED || \r
558 Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)\r
559 ) {\r
8d3a5c82 560 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
814bae52 561 MaximumBufferSize += VariableSize;\r
8d3a5c82 562 }\r
563\r
564 Variable = NextVariable;\r
565 }\r
566\r
814bae52 567 //\r
568 // Reserve the 1 Bytes with Oxff to identify the \r
569 // end of the variable buffer. \r
570 // \r
571 MaximumBufferSize += 1;\r
572 ValidBuffer = AllocatePool (MaximumBufferSize);\r
8d3a5c82 573 if (ValidBuffer == NULL) {\r
574 return EFI_OUT_OF_RESOURCES;\r
575 }\r
576\r
814bae52 577 SetMem (ValidBuffer, MaximumBufferSize, 0xff);\r
8d3a5c82 578\r
579 //\r
8a2d4996 580 // Copy variable store header.\r
8d3a5c82 581 //\r
814bae52 582 CopyMem (ValidBuffer, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
583 CurrPtr = (UINT8 *) GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);\r
8d3a5c82 584\r
814bae52 585 //\r
8a2d4996 586 // Reinstall all ADDED variables as long as they are not identical to Updating Variable.\r
814bae52 587 // \r
588 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 589 while (IsValidVariableHeader (Variable)) {\r
590 NextVariable = GetNextVariablePtr (Variable);\r
591 if (Variable->State == VAR_ADDED) {\r
5ead4a07 592 if (UpdatingVariable != NULL) {\r
593 if (UpdatingVariable == Variable) {\r
594 Variable = NextVariable;\r
595 continue;\r
596 }\r
49e70927 597\r
598 VariableNameSize = NameSizeOfVariable(Variable);\r
599 UpdatingVariableNameSize = NameSizeOfVariable(UpdatingVariable);\r
600\r
601 VariableNamePtr = GetVariableNamePtr (Variable);\r
602 UpdatingVariableNamePtr = GetVariableNamePtr (UpdatingVariable);\r
5ead4a07 603 if (CompareGuid (&Variable->VendorGuid, &UpdatingVariable->VendorGuid) &&\r
49e70927 604 VariableNameSize == UpdatingVariableNameSize &&\r
605 CompareMem (VariableNamePtr, UpdatingVariableNamePtr, VariableNameSize) == 0 ) {\r
5ead4a07 606 Variable = NextVariable;\r
607 continue;\r
608 }\r
609 }\r
8d3a5c82 610 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
611 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
612 CurrPtr += VariableSize;\r
2fcdca1d 613 if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
614 mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;\r
615 } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
616 mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;\r
617 }\r
8d3a5c82 618 }\r
8d3a5c82 619 Variable = NextVariable;\r
620 }\r
5ead4a07 621\r
622 //\r
8a2d4996 623 // Reinstall the variable being updated if it is not NULL.\r
5ead4a07 624 //\r
625 if (UpdatingVariable != NULL) {\r
626 VariableSize = (UINTN)(GetNextVariablePtr (UpdatingVariable)) - (UINTN)UpdatingVariable;\r
627 CopyMem (CurrPtr, (UINT8 *) UpdatingVariable, VariableSize);\r
628 CurrPtr += VariableSize;\r
2fcdca1d 629 if ((!IsVolatile) && ((UpdatingVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
630 mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;\r
631 } else if ((!IsVolatile) && ((UpdatingVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
632 mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;\r
633 }\r
5ead4a07 634 }\r
635\r
814bae52 636 //\r
8a2d4996 637 // Reinstall all in delete transition variables.\r
814bae52 638 // \r
639 Variable = GetStartPointer (VariableStoreHeader);\r
640 while (IsValidVariableHeader (Variable)) {\r
641 NextVariable = GetNextVariablePtr (Variable);\r
5ead4a07 642 if (Variable != UpdatingVariable && Variable->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
814bae52 643\r
644 //\r
645 // Buffer has cached all ADDED variable. \r
646 // Per IN_DELETED variable, we have to guarantee that\r
647 // no ADDED one in previous buffer. \r
648 // \r
649 \r
650 FoundAdded = FALSE;\r
651 AddedVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) ValidBuffer);\r
652 while (IsValidVariableHeader (AddedVariable)) {\r
653 NextAddedVariable = GetNextVariablePtr (AddedVariable);\r
654 NameSize = NameSizeOfVariable (AddedVariable);\r
655 if (CompareGuid (&AddedVariable->VendorGuid, &Variable->VendorGuid) &&\r
656 NameSize == NameSizeOfVariable (Variable)\r
657 ) {\r
658 Point0 = (VOID *) GetVariableNamePtr (AddedVariable);\r
659 Point1 = (VOID *) GetVariableNamePtr (Variable);\r
5ead4a07 660 if (CompareMem (Point0, Point1, NameSizeOfVariable (AddedVariable)) == 0) {\r
814bae52 661 FoundAdded = TRUE;\r
662 break;\r
663 }\r
664 }\r
665 AddedVariable = NextAddedVariable;\r
666 }\r
667 if (!FoundAdded) {\r
5ead4a07 668 //\r
8a2d4996 669 // Promote VAR_IN_DELETED_TRANSITION to VAR_ADDED.\r
5ead4a07 670 //\r
814bae52 671 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
672 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
5ead4a07 673 ((VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;\r
814bae52 674 CurrPtr += VariableSize;\r
2fcdca1d 675 if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
676 mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;\r
677 } else if ((!IsVolatile) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
678 mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;\r
679 }\r
814bae52 680 }\r
681 }\r
682\r
683 Variable = NextVariable;\r
684 }\r
8d3a5c82 685\r
686 if (IsVolatile) {\r
687 //\r
8a2d4996 688 // If volatile variable store, just copy valid buffer.\r
8d3a5c82 689 //\r
690 SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);\r
814bae52 691 CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) (CurrPtr - (UINT8 *) ValidBuffer));\r
8a2d4996 692 Status = EFI_SUCCESS;\r
8d3a5c82 693 } else {\r
694 //\r
695 // If non-volatile variable store, perform FTW here.\r
696 //\r
697 Status = FtwVariableSpace (\r
698 VariableBase,\r
699 ValidBuffer,\r
814bae52 700 (UINTN) (CurrPtr - (UINT8 *) ValidBuffer)\r
8d3a5c82 701 );\r
8a2d4996 702 CopyMem (mNvVariableCache, (CHAR8 *)(UINTN)VariableBase, VariableStoreHeader->Size);\r
8d3a5c82 703 }\r
814bae52 704 if (!EFI_ERROR (Status)) {\r
705 *LastVariableOffset = (UINTN) (CurrPtr - (UINT8 *) ValidBuffer);\r
706 } else {\r
8d3a5c82 707 *LastVariableOffset = 0;\r
708 }\r
709\r
814bae52 710 FreePool (ValidBuffer);\r
711\r
8d3a5c82 712 return Status;\r
713}\r
714\r
33a5a666 715\r
7c80e839 716/**\r
717 Finds variable in storage blocks of volatile and non-volatile storage areas.\r
718\r
719 This code finds variable in storage blocks of volatile and non-volatile storage areas.\r
720 If VariableName is an empty string, then we just return the first\r
721 qualified variable without comparing VariableName and VendorGuid.\r
722 Otherwise, VariableName and VendorGuid are compared.\r
723\r
8a2d4996 724 @param VariableName Name of the variable to be found.\r
7c80e839 725 @param VendorGuid Vendor GUID to be found.\r
726 @param PtrTrack VARIABLE_POINTER_TRACK structure for output,\r
727 including the range searched and the target position.\r
728 @param Global Pointer to VARIABLE_GLOBAL structure, including\r
729 base of volatile variable storage area, base of\r
730 NV variable storage area, and a lock.\r
731\r
732 @retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while\r
8a2d4996 733 VendorGuid is NULL.\r
734 @retval EFI_SUCCESS Variable successfully found.\r
255a3f33 735 @retval EFI_NOT_FOUND Variable not found\r
33a5a666 736\r
7c80e839 737**/\r
8d3a5c82 738EFI_STATUS\r
8d3a5c82 739FindVariable (\r
740 IN CHAR16 *VariableName,\r
741 IN EFI_GUID *VendorGuid,\r
742 OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
743 IN VARIABLE_GLOBAL *Global\r
744 )\r
8d3a5c82 745{\r
814bae52 746 VARIABLE_HEADER *Variable[2];\r
747 VARIABLE_HEADER *InDeletedVariable;\r
748 VARIABLE_STORE_HEADER *VariableStoreHeader[2];\r
749 UINTN InDeletedStorageIndex;\r
750 UINTN Index;\r
751 VOID *Point;\r
8d3a5c82 752\r
8d3a5c82 753 //\r
8a2d4996 754 // 0: Volatile, 1: Non-Volatile.\r
36873a61 755 // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName\r
8a2d4996 756 // make use of this mapping to implement search algorithm.\r
8d3a5c82 757 //\r
052ad7e1 758 VariableStoreHeader[0] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8a2d4996 759 VariableStoreHeader[1] = mNvVariableCache;\r
8d3a5c82 760\r
761 //\r
762 // Start Pointers for the variable.\r
763 // Actual Data Pointer where data can be written.\r
764 //\r
9cad030b 765 Variable[0] = GetStartPointer (VariableStoreHeader[0]);\r
766 Variable[1] = GetStartPointer (VariableStoreHeader[1]);\r
8d3a5c82 767\r
768 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
769 return EFI_INVALID_PARAMETER;\r
770 }\r
814bae52 771\r
8d3a5c82 772 //\r
8a2d4996 773 // Find the variable by walk through volatile and then non-volatile variable store.\r
8d3a5c82 774 //\r
814bae52 775 InDeletedVariable = NULL;\r
776 InDeletedStorageIndex = 0;\r
8d3a5c82 777 for (Index = 0; Index < 2; Index++) {\r
79749182 778 while ((Variable[Index] < GetEndPointer (VariableStoreHeader[Index])) && IsValidVariableHeader (Variable[Index])) {\r
814bae52 779 if (Variable[Index]->State == VAR_ADDED || \r
780 Variable[Index]->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)\r
781 ) {\r
8a2d4996 782 if (!AtRuntime () || ((Variable[Index]->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {\r
8d3a5c82 783 if (VariableName[0] == 0) {\r
814bae52 784 if (Variable[Index]->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
785 InDeletedVariable = Variable[Index];\r
786 InDeletedStorageIndex = Index;\r
787 } else {\r
788 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]);\r
789 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
790 PtrTrack->CurrPtr = Variable[Index];\r
791 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
792\r
793 return EFI_SUCCESS;\r
794 }\r
8d3a5c82 795 } else {\r
796 if (CompareGuid (VendorGuid, &Variable[Index]->VendorGuid)) {\r
130e2569 797 Point = (VOID *) GetVariableNamePtr (Variable[Index]);\r
798\r
799 ASSERT (NameSizeOfVariable (Variable[Index]) != 0);\r
c24b392c 800 if (CompareMem (VariableName, Point, NameSizeOfVariable (Variable[Index])) == 0) {\r
814bae52 801 if (Variable[Index]->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
802 InDeletedVariable = Variable[Index];\r
803 InDeletedStorageIndex = Index;\r
804 } else {\r
805 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]);\r
806 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
807 PtrTrack->CurrPtr = Variable[Index];\r
808 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
809\r
810 return EFI_SUCCESS;\r
811 }\r
8d3a5c82 812 }\r
813 }\r
814 }\r
815 }\r
816 }\r
817\r
818 Variable[Index] = GetNextVariablePtr (Variable[Index]);\r
819 }\r
814bae52 820 if (InDeletedVariable != NULL) {\r
821 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[InDeletedStorageIndex]);\r
822 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[InDeletedStorageIndex]);\r
823 PtrTrack->CurrPtr = InDeletedVariable;\r
824 PtrTrack->Volatile = (BOOLEAN)(InDeletedStorageIndex == 0);\r
825 return EFI_SUCCESS;\r
826 }\r
8d3a5c82 827 }\r
8d3a5c82 828 PtrTrack->CurrPtr = NULL;\r
829 return EFI_NOT_FOUND;\r
830}\r
831\r
7c80e839 832/**\r
72399dae 833 Get index from supported language codes according to language string.\r
834\r
835 This code is used to get corresponding index in supported language codes. It can handle\r
0254efc0 836 RFC4646 and ISO639 language tags.\r
72399dae 837 In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.\r
0254efc0 838 In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.\r
72399dae 839\r
840 For example:\r
841 SupportedLang = "engfraengfra"\r
842 Lang = "eng"\r
843 Iso639Language = TRUE\r
844 The return value is "0".\r
845 Another example:\r
846 SupportedLang = "en;fr;en-US;fr-FR"\r
847 Lang = "fr-FR"\r
848 Iso639Language = FALSE\r
849 The return value is "3".\r
850\r
851 @param SupportedLang Platform supported language codes.\r
852 @param Lang Configured language.\r
0254efc0 853 @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.\r
72399dae 854\r
8a2d4996 855 @retval The index of language in the language codes.\r
8d3a5c82 856\r
7c80e839 857**/\r
72399dae 858UINTN\r
72399dae 859GetIndexFromSupportedLangCodes(\r
860 IN CHAR8 *SupportedLang,\r
861 IN CHAR8 *Lang,\r
862 IN BOOLEAN Iso639Language\r
863 ) \r
8d3a5c82 864{\r
72399dae 865 UINTN Index;\r
255a3f33
RN
866 UINTN CompareLength;\r
867 UINTN LanguageLength;\r
72399dae 868\r
72399dae 869 if (Iso639Language) {\r
255a3f33 870 CompareLength = ISO_639_2_ENTRY_SIZE;\r
72399dae 871 for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {\r
872 if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {\r
873 //\r
874 // Successfully find the index of Lang string in SupportedLang string.\r
875 //\r
876 Index = Index / CompareLength;\r
877 return Index;\r
878 }\r
879 }\r
880 ASSERT (FALSE);\r
881 return 0;\r
882 } else {\r
883 //\r
0254efc0 884 // Compare RFC4646 language code\r
72399dae 885 //\r
255a3f33
RN
886 Index = 0;\r
887 for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++);\r
888\r
889 for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) {\r
72399dae 890 //\r
255a3f33 891 // Skip ';' characters in SupportedLang\r
72399dae 892 //\r
255a3f33
RN
893 for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++);\r
894 //\r
895 // Determine the length of the next language code in SupportedLang\r
896 //\r
897 for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);\r
898 \r
899 if ((CompareLength == LanguageLength) && \r
900 (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {\r
72399dae 901 //\r
902 // Successfully find the index of Lang string in SupportedLang string.\r
903 //\r
904 return Index;\r
905 }\r
72399dae 906 }\r
907 ASSERT (FALSE);\r
908 return 0;\r
8d3a5c82 909 }\r
72399dae 910}\r
33a5a666 911\r
72399dae 912/**\r
913 Get language string from supported language codes according to index.\r
914\r
8a2d4996 915 This code is used to get corresponding language strings in supported language codes. It can handle\r
0254efc0 916 RFC4646 and ISO639 language tags.\r
72399dae 917 In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.\r
0254efc0 918 In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.\r
72399dae 919\r
920 For example:\r
921 SupportedLang = "engfraengfra"\r
922 Index = "1"\r
923 Iso639Language = TRUE\r
924 The return value is "fra".\r
925 Another example:\r
926 SupportedLang = "en;fr;en-US;fr-FR"\r
927 Index = "1"\r
928 Iso639Language = FALSE\r
929 The return value is "fr".\r
930\r
931 @param SupportedLang Platform supported language codes.\r
8a2d4996 932 @param Index The index in supported language codes.\r
0254efc0 933 @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.\r
72399dae 934\r
8a2d4996 935 @retval The language string in the language codes.\r
8d3a5c82 936\r
72399dae 937**/\r
938CHAR8 *\r
72399dae 939GetLangFromSupportedLangCodes (\r
940 IN CHAR8 *SupportedLang,\r
941 IN UINTN Index,\r
942 IN BOOLEAN Iso639Language\r
943)\r
944{\r
945 UINTN SubIndex;\r
255a3f33 946 UINTN CompareLength;\r
72399dae 947 CHAR8 *Supported;\r
8d3a5c82 948\r
72399dae 949 SubIndex = 0;\r
950 Supported = SupportedLang;\r
951 if (Iso639Language) {\r
952 //\r
8a2d4996 953 // According to the index of Lang string in SupportedLang string to get the language.\r
954 // This code will be invoked in RUNTIME, therefore there is not a memory allocate/free operation.\r
72399dae 955 // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.\r
956 //\r
255a3f33
RN
957 CompareLength = ISO_639_2_ENTRY_SIZE;\r
958 mVariableModuleGlobal->Lang[CompareLength] = '\0';\r
72399dae 959 return CopyMem (mVariableModuleGlobal->Lang, SupportedLang + Index * CompareLength, CompareLength);\r
8a2d4996 960 \r
8d3a5c82 961 } else {\r
72399dae 962 while (TRUE) {\r
963 //\r
8a2d4996 964 // Take semicolon as delimitation, sequentially traverse supported language codes.\r
72399dae 965 //\r
966 for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {\r
967 Supported++;\r
968 }\r
969 if ((*Supported == '\0') && (SubIndex != Index)) {\r
970 //\r
971 // Have completed the traverse, but not find corrsponding string.\r
972 // This case is not allowed to happen.\r
973 //\r
974 ASSERT(FALSE);\r
975 return NULL;\r
976 }\r
977 if (SubIndex == Index) {\r
978 //\r
8a2d4996 979 // According to the index of Lang string in SupportedLang string to get the language.\r
72399dae 980 // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.\r
981 // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.\r
982 //\r
255a3f33 983 mVariableModuleGlobal->PlatformLang[CompareLength] = '\0';\r
72399dae 984 return CopyMem (mVariableModuleGlobal->PlatformLang, Supported - CompareLength, CompareLength);\r
985 }\r
986 SubIndex++;\r
8a2d4996 987\r
5c033766
RN
988 //\r
989 // Skip ';' characters in Supported\r
990 //\r
991 for (; *Supported != '\0' && *Supported == ';'; Supported++);\r
72399dae 992 }\r
8d3a5c82 993 }\r
8d3a5c82 994}\r
995\r
255a3f33
RN
996/**\r
997 Returns a pointer to an allocated buffer that contains the best matching language \r
998 from a set of supported languages. \r
999 \r
1000 This function supports both ISO 639-2 and RFC 4646 language codes, but language \r
1001 code types may not be mixed in a single call to this function. This function\r
1002 supports a variable argument list that allows the caller to pass in a prioritized\r
1003 list of language codes to test against all the language codes in SupportedLanguages.\r
1004\r
1005 If SupportedLanguages is NULL, then ASSERT().\r
1006\r
1007 @param[in] SupportedLanguages A pointer to a Null-terminated ASCII string that\r
1008 contains a set of language codes in the format \r
1009 specified by Iso639Language.\r
1010 @param[in] Iso639Language If TRUE, then all language codes are assumed to be\r
1011 in ISO 639-2 format. If FALSE, then all language\r
1012 codes are assumed to be in RFC 4646 language format\r
1013 @param[in] ... A variable argument list that contains pointers to \r
1014 Null-terminated ASCII strings that contain one or more\r
1015 language codes in the format specified by Iso639Language.\r
1016 The first language code from each of these language\r
1017 code lists is used to determine if it is an exact or\r
1018 close match to any of the language codes in \r
1019 SupportedLanguages. Close matches only apply to RFC 4646\r
1020 language codes, and the matching algorithm from RFC 4647\r
1021 is used to determine if a close match is present. If \r
1022 an exact or close match is found, then the matching\r
1023 language code from SupportedLanguages is returned. If\r
1024 no matches are found, then the next variable argument\r
1025 parameter is evaluated. The variable argument list \r
1026 is terminated by a NULL.\r
1027\r
1028 @retval NULL The best matching language could not be found in SupportedLanguages.\r
1029 @retval NULL There are not enough resources available to return the best matching \r
1030 language.\r
1031 @retval Other A pointer to a Null-terminated ASCII string that is the best matching \r
1032 language in SupportedLanguages.\r
1033\r
1034**/\r
1035CHAR8 *\r
e1adae60 1036EFIAPI\r
255a3f33
RN
1037VariableGetBestLanguage (\r
1038 IN CONST CHAR8 *SupportedLanguages, \r
1039 IN BOOLEAN Iso639Language,\r
1040 ...\r
1041 )\r
1042{\r
1043 VA_LIST Args;\r
1044 CHAR8 *Language;\r
1045 UINTN CompareLength;\r
1046 UINTN LanguageLength;\r
1047 CONST CHAR8 *Supported;\r
1048 CHAR8 *Buffer;\r
1049\r
1050 ASSERT (SupportedLanguages != NULL);\r
1051\r
1052 VA_START (Args, Iso639Language);\r
1053 while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) {\r
1054 //\r
1055 // Default to ISO 639-2 mode\r
1056 //\r
1057 CompareLength = 3;\r
1058 LanguageLength = MIN (3, AsciiStrLen (Language));\r
1059\r
1060 //\r
1061 // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language\r
1062 //\r
1063 if (!Iso639Language) {\r
1064 for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++);\r
1065 }\r
1066\r
1067 //\r
1068 // Trim back the length of Language used until it is empty\r
1069 //\r
1070 while (LanguageLength > 0) {\r
1071 //\r
1072 // Loop through all language codes in SupportedLanguages\r
1073 //\r
1074 for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) {\r
1075 //\r
1076 // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages\r
1077 //\r
1078 if (!Iso639Language) {\r
1079 //\r
1080 // Skip ';' characters in Supported\r
1081 //\r
1082 for (; *Supported != '\0' && *Supported == ';'; Supported++);\r
1083 //\r
1084 // Determine the length of the next language code in Supported\r
1085 //\r
1086 for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++);\r
1087 //\r
1088 // If Language is longer than the Supported, then skip to the next language\r
1089 //\r
1090 if (LanguageLength > CompareLength) {\r
1091 continue;\r
1092 }\r
1093 }\r
1094 //\r
1095 // See if the first LanguageLength characters in Supported match Language\r
1096 //\r
1097 if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) {\r
1098 VA_END (Args);\r
1099\r
1100 Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang;\r
1101 Buffer[CompareLength] = '\0';\r
1102 return CopyMem (Buffer, Supported, CompareLength);\r
1103 }\r
1104 }\r
1105\r
1106 if (Iso639Language) {\r
1107 //\r
1108 // If ISO 639 mode, then each language can only be tested once\r
1109 //\r
1110 LanguageLength = 0;\r
1111 } else {\r
1112 //\r
1113 // If RFC 4646 mode, then trim Language from the right to the next '-' character \r
1114 //\r
1115 for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--);\r
1116 }\r
1117 }\r
1118 }\r
1119 VA_END (Args);\r
1120\r
1121 //\r
1122 // No matches were found \r
1123 //\r
1124 return NULL;\r
1125}\r
1126\r
72399dae 1127/**\r
1128 Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.\r
052ad7e1 1129\r
72399dae 1130 When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.\r
052ad7e1 1131\r
72399dae 1132 According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,\r
1133 and are read-only. Therefore, in variable driver, only store the original value for other use.\r
8d3a5c82 1134\r
8a2d4996 1135 @param[in] VariableName Name of variable.\r
8d3a5c82 1136\r
8a2d4996 1137 @param[in] Data Variable data.\r
8d3a5c82 1138\r
8a2d4996 1139 @param[in] DataSize Size of data. 0 means delete.\r
72399dae 1140\r
7c80e839 1141**/\r
255a3f33 1142VOID\r
72399dae 1143AutoUpdateLangVariable(\r
1144 IN CHAR16 *VariableName,\r
1145 IN VOID *Data,\r
1146 IN UINTN DataSize\r
052ad7e1 1147 )\r
8d3a5c82 1148{\r
255a3f33
RN
1149 EFI_STATUS Status;\r
1150 CHAR8 *BestPlatformLang;\r
1151 CHAR8 *BestLang;\r
1152 UINTN Index;\r
1153 UINT32 Attributes;\r
72399dae 1154 VARIABLE_POINTER_TRACK Variable;\r
255a3f33 1155 BOOLEAN SetLanguageCodes;\r
8d3a5c82 1156\r
72399dae 1157 //\r
255a3f33 1158 // Don't do updates for delete operation\r
72399dae 1159 //\r
255a3f33
RN
1160 if (DataSize == 0) {\r
1161 return;\r
1162 }\r
1163\r
1164 SetLanguageCodes = FALSE;\r
8d3a5c82 1165\r
72399dae 1166 if (StrCmp (VariableName, L"PlatformLangCodes") == 0) {\r
255a3f33
RN
1167 //\r
1168 // PlatformLangCodes is a volatile variable, so it can not be updated at runtime.\r
1169 //\r
8a2d4996 1170 if (AtRuntime ()) {\r
255a3f33
RN
1171 return;\r
1172 }\r
1173\r
1174 SetLanguageCodes = TRUE;\r
1175\r
72399dae 1176 //\r
1177 // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only\r
1178 // Therefore, in variable driver, only store the original value for other use.\r
1179 //\r
255a3f33
RN
1180 if (mVariableModuleGlobal->PlatformLangCodes != NULL) {\r
1181 FreePool (mVariableModuleGlobal->PlatformLangCodes);\r
1182 }\r
1183 mVariableModuleGlobal->PlatformLangCodes = AllocateRuntimeCopyPool (DataSize, Data);\r
1184 ASSERT (mVariableModuleGlobal->PlatformLangCodes != NULL);\r
1185\r
72399dae 1186 //\r
255a3f33
RN
1187 // PlatformLang holds a single language from PlatformLangCodes, \r
1188 // so the size of PlatformLangCodes is enough for the PlatformLang.\r
72399dae 1189 //\r
255a3f33
RN
1190 if (mVariableModuleGlobal->PlatformLang != NULL) {\r
1191 FreePool (mVariableModuleGlobal->PlatformLang);\r
1192 }\r
1193 mVariableModuleGlobal->PlatformLang = AllocateRuntimePool (DataSize);\r
1194 ASSERT (mVariableModuleGlobal->PlatformLang != NULL);\r
fdb7765f 1195\r
255a3f33 1196 } else if (StrCmp (VariableName, L"LangCodes") == 0) {\r
72399dae 1197 //\r
255a3f33 1198 // LangCodes is a volatile variable, so it can not be updated at runtime.\r
72399dae 1199 //\r
8a2d4996 1200 if (AtRuntime ()) {\r
255a3f33
RN
1201 return;\r
1202 }\r
1203\r
1204 SetLanguageCodes = TRUE;\r
8d3a5c82 1205\r
8d3a5c82 1206 //\r
255a3f33
RN
1207 // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only\r
1208 // Therefore, in variable driver, only store the original value for other use.\r
8d3a5c82 1209 //\r
255a3f33
RN
1210 if (mVariableModuleGlobal->LangCodes != NULL) {\r
1211 FreePool (mVariableModuleGlobal->LangCodes);\r
1212 }\r
1213 mVariableModuleGlobal->LangCodes = AllocateRuntimeCopyPool (DataSize, Data);\r
1214 ASSERT (mVariableModuleGlobal->LangCodes != NULL);\r
1215 }\r
8d3a5c82 1216\r
255a3f33
RN
1217 if (SetLanguageCodes \r
1218 && (mVariableModuleGlobal->PlatformLangCodes != NULL)\r
1219 && (mVariableModuleGlobal->LangCodes != NULL)) {\r
8d3a5c82 1220 //\r
255a3f33
RN
1221 // Update Lang if PlatformLang is already set\r
1222 // Update PlatformLang if Lang is already set\r
8d3a5c82 1223 //\r
255a3f33
RN
1224 Status = FindVariable (L"PlatformLang", &gEfiGlobalVariableGuid, &Variable, (VARIABLE_GLOBAL *) mVariableModuleGlobal);\r
1225 if (!EFI_ERROR (Status)) {\r
1226 //\r
1227 // Update Lang\r
1228 //\r
1229 VariableName = L"PlatformLang";\r
1230 Data = GetVariableDataPtr (Variable.CurrPtr);\r
1231 DataSize = Variable.CurrPtr->DataSize;\r
1232 } else {\r
1233 Status = FindVariable (L"Lang", &gEfiGlobalVariableGuid, &Variable, (VARIABLE_GLOBAL *) mVariableModuleGlobal);\r
1234 if (!EFI_ERROR (Status)) {\r
1235 //\r
1236 // Update PlatformLang\r
1237 //\r
1238 VariableName = L"Lang";\r
1239 Data = GetVariableDataPtr (Variable.CurrPtr);\r
1240 DataSize = Variable.CurrPtr->DataSize;\r
1241 } else {\r
1242 //\r
1243 // Neither PlatformLang nor Lang is set, directly return\r
1244 //\r
1245 return;\r
1246 }\r
1247 }\r
1248 }\r
1249 \r
1250 //\r
1251 // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.\r
1252 //\r
1253 Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;\r
8d3a5c82 1254\r
255a3f33 1255 if (StrCmp (VariableName, L"PlatformLang") == 0) {\r
8d3a5c82 1256 //\r
255a3f33 1257 // Update Lang when PlatformLangCodes/LangCodes were set.\r
8d3a5c82 1258 //\r
255a3f33
RN
1259 if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {\r
1260 //\r
1261 // When setting PlatformLang, firstly get most matched language string from supported language codes.\r
1262 //\r
1263 BestPlatformLang = VariableGetBestLanguage (mVariableModuleGlobal->PlatformLangCodes, FALSE, Data, NULL);\r
1264 if (BestPlatformLang != NULL) {\r
1265 //\r
1266 // Get the corresponding index in language codes.\r
1267 //\r
1268 Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, BestPlatformLang, FALSE);\r
fdb7765f 1269\r
255a3f33
RN
1270 //\r
1271 // Get the corresponding ISO639 language tag according to RFC4646 language tag.\r
1272 //\r
1273 BestLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, Index, TRUE);\r
8d3a5c82 1274\r
255a3f33
RN
1275 //\r
1276 // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.\r
1277 //\r
1278 FindVariable (L"Lang", &gEfiGlobalVariableGuid, &Variable, (VARIABLE_GLOBAL *)mVariableModuleGlobal);\r
8d3a5c82 1279\r
8a2d4996 1280 Status = UpdateVariable (L"Lang", &gEfiGlobalVariableGuid, BestLang,\r
1281 ISO_639_2_ENTRY_SIZE + 1, Attributes, &Variable);\r
8d3a5c82 1282\r
255a3f33 1283 DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a\n", BestPlatformLang, BestLang));\r
72399dae 1284\r
255a3f33
RN
1285 ASSERT_EFI_ERROR(Status);\r
1286 }\r
1287 }\r
72399dae 1288\r
255a3f33 1289 } else if (StrCmp (VariableName, L"Lang") == 0) {\r
72399dae 1290 //\r
255a3f33 1291 // Update PlatformLang when PlatformLangCodes/LangCodes were set.\r
72399dae 1292 //\r
255a3f33
RN
1293 if ((mVariableModuleGlobal->PlatformLangCodes != NULL) && (mVariableModuleGlobal->LangCodes != NULL)) {\r
1294 //\r
1295 // When setting Lang, firstly get most matched language string from supported language codes.\r
1296 //\r
1297 BestLang = VariableGetBestLanguage (mVariableModuleGlobal->LangCodes, TRUE, Data, NULL);\r
1298 if (BestLang != NULL) {\r
1299 //\r
1300 // Get the corresponding index in language codes.\r
1301 //\r
1302 Index = GetIndexFromSupportedLangCodes (mVariableModuleGlobal->LangCodes, BestLang, TRUE);\r
72399dae 1303\r
255a3f33
RN
1304 //\r
1305 // Get the corresponding RFC4646 language tag according to ISO639 language tag.\r
1306 //\r
1307 BestPlatformLang = GetLangFromSupportedLangCodes (mVariableModuleGlobal->PlatformLangCodes, Index, FALSE);\r
1308\r
1309 //\r
1310 // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.\r
1311 //\r
1312 FindVariable (L"PlatformLang", &gEfiGlobalVariableGuid, &Variable, (VARIABLE_GLOBAL *)mVariableModuleGlobal);\r
72399dae 1313\r
255a3f33
RN
1314 Status = UpdateVariable (L"PlatformLang", &gEfiGlobalVariableGuid, BestPlatformLang, \r
1315 AsciiStrSize (BestPlatformLang), Attributes, &Variable);\r
72399dae 1316\r
255a3f33
RN
1317 DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a\n", BestLang, BestPlatformLang));\r
1318 ASSERT_EFI_ERROR (Status);\r
1319 }\r
1320 }\r
72399dae 1321 }\r
8d3a5c82 1322}\r
1323\r
7c80e839 1324/**\r
72399dae 1325 Update the variable region with Variable information. These are the same \r
1326 arguments as the EFI Variable services.\r
052ad7e1 1327\r
8a2d4996 1328 @param[in] VariableName Name of variable.\r
1329 @param[in] VendorGuid Guid of variable.\r
1330 @param[in] Data Variable data.\r
1331 @param[in] DataSize Size of data. 0 means delete.\r
1332 @param[in] Attributes Attribues of the variable.\r
1333 @param[in] CacheVariable The variable information which is used to keep track of variable usage.\r
1334 \r
72399dae 1335 @retval EFI_SUCCESS The update operation is success.\r
72399dae 1336 @retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region.\r
8d3a5c82 1337\r
7c80e839 1338**/\r
052ad7e1 1339EFI_STATUS\r
72399dae 1340UpdateVariable (\r
8a2d4996 1341 IN CHAR16 *VariableName,\r
1342 IN EFI_GUID *VendorGuid,\r
1343 IN VOID *Data,\r
1344 IN UINTN DataSize,\r
1345 IN UINT32 Attributes OPTIONAL,\r
1346 IN VARIABLE_POINTER_TRACK *CacheVariable\r
052ad7e1 1347 )\r
8d3a5c82 1348{\r
8a9e0b72 1349 EFI_STATUS Status;\r
1350 VARIABLE_HEADER *NextVariable;\r
72399dae 1351 UINTN ScratchSize;\r
1352 UINTN NonVolatileVarableStoreSize;\r
8a9e0b72 1353 UINTN VarNameOffset;\r
1354 UINTN VarDataOffset;\r
72399dae 1355 UINTN VarNameSize;\r
8a9e0b72 1356 UINTN VarSize;\r
72399dae 1357 BOOLEAN Volatile;\r
1358 EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb;\r
8a9e0b72 1359 UINT8 State;\r
1360 BOOLEAN Reclaimed;\r
8a2d4996 1361 VARIABLE_POINTER_TRACK *Variable;\r
1362 VARIABLE_POINTER_TRACK NvVariable;\r
1363 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1364 UINTN CacheOffset;\r
fdb7765f 1365\r
8a2d4996 1366 if (CacheVariable->Volatile) {\r
1367 Variable = CacheVariable;\r
1368 } else {\r
1369 if (mVariableModuleGlobal->FvbInstance == NULL) {\r
1370 //\r
1371 // Trying to update NV variable prior to the installation of EFI_VARIABLE_WRITE_ARCH_PROTOCOL\r
1372 //\r
1373 return EFI_NOT_AVAILABLE_YET;\r
1374 }\r
1375 \r
1376 //\r
1377 // CacheVariable points to the variable in the memory copy of Flash area\r
1378 // Now let Variable points to the same variable in Flash area.\r
1379 //\r
1380 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
1381 Variable = &NvVariable; \r
1382 Variable->StartPtr = GetStartPointer (VariableStoreHeader);\r
1383 Variable->EndPtr = GetEndPointer (VariableStoreHeader);\r
1384 if (CacheVariable->CurrPtr == NULL) {\r
1385 Variable->CurrPtr = NULL;\r
1386 } else {\r
1387 Variable->CurrPtr = (VARIABLE_HEADER *)((UINTN)Variable->StartPtr + ((UINTN)CacheVariable->CurrPtr - (UINTN)CacheVariable->StartPtr));\r
1388 }\r
1389 Variable->Volatile = FALSE;\r
1390 }\r
1391 \r
8a9e0b72 1392 Fvb = mVariableModuleGlobal->FvbInstance;\r
72399dae 1393 Reclaimed = FALSE;\r
fdb7765f 1394\r
72399dae 1395 if (Variable->CurrPtr != NULL) {\r
8d3a5c82 1396 //\r
8a2d4996 1397 // Update/Delete existing variable.\r
8d3a5c82 1398 //\r
8a2d4996 1399 if (AtRuntime ()) { \r
c6492839 1400 //\r
8a2d4996 1401 // If AtRuntime and the variable is Volatile and Runtime Access, \r
c6492839 1402 // the volatile is ReadOnly, and SetVariable should be aborted and \r
1403 // return EFI_WRITE_PROTECTED.\r
1404 //\r
72399dae 1405 if (Variable->Volatile) {\r
c6492839 1406 Status = EFI_WRITE_PROTECTED;\r
1407 goto Done;\r
1408 }\r
1409 //\r
8a2d4996 1410 // Only variable that have NV attributes can be updated/deleted in Runtime.\r
c6492839 1411 //\r
72399dae 1412 if ((Variable->CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
c6492839 1413 Status = EFI_INVALID_PARAMETER;\r
1414 goto Done; \r
1415 }\r
1416 }\r
8a2d4996 1417\r
8d3a5c82 1418 //\r
c6492839 1419 // Setting a data variable with no access, or zero DataSize attributes\r
8a2d4996 1420 // causes it to be deleted.\r
8d3a5c82 1421 //\r
c6492839 1422 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { \r
72399dae 1423 State = Variable->CurrPtr->State;\r
c6492839 1424 State &= VAR_DELETED;\r
1425\r
1426 Status = UpdateVariableStore (\r
052ad7e1 1427 &mVariableModuleGlobal->VariableGlobal,\r
72399dae 1428 Variable->Volatile,\r
c6492839 1429 FALSE,\r
8a9e0b72 1430 Fvb,\r
72399dae 1431 (UINTN) &Variable->CurrPtr->State,\r
c6492839 1432 sizeof (UINT8),\r
1433 &State\r
1434 ); \r
33a5a666 1435 if (!EFI_ERROR (Status)) {\r
8a2d4996 1436 UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, FALSE, TRUE, FALSE);\r
1437 if (!Variable->Volatile) {\r
1438 CacheVariable->CurrPtr->State = State;\r
1439 }\r
33a5a666 1440 }\r
c6492839 1441 goto Done; \r
1442 }\r
8d3a5c82 1443 //\r
8a2d4996 1444 // If the variable is marked valid, and the same data has been passed in,\r
c6492839 1445 // then return to the caller immediately.\r
8d3a5c82 1446 //\r
72399dae 1447 if (DataSizeOfVariable (Variable->CurrPtr) == DataSize &&\r
1448 (CompareMem (Data, GetVariableDataPtr (Variable->CurrPtr), DataSize) == 0)) {\r
33a5a666 1449 \r
8a2d4996 1450 UpdateVariableInfo (VariableName, VendorGuid, Variable->Volatile, FALSE, TRUE, FALSE, FALSE);\r
c6492839 1451 Status = EFI_SUCCESS;\r
1452 goto Done;\r
72399dae 1453 } else if ((Variable->CurrPtr->State == VAR_ADDED) ||\r
1454 (Variable->CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
814bae52 1455\r
c6492839 1456 //\r
8a2d4996 1457 // Mark the old variable as in delete transition.\r
c6492839 1458 //\r
72399dae 1459 State = Variable->CurrPtr->State;\r
c6492839 1460 State &= VAR_IN_DELETED_TRANSITION;\r
1461\r
1462 Status = UpdateVariableStore (\r
052ad7e1 1463 &mVariableModuleGlobal->VariableGlobal,\r
72399dae 1464 Variable->Volatile,\r
c6492839 1465 FALSE,\r
8a9e0b72 1466 Fvb,\r
72399dae 1467 (UINTN) &Variable->CurrPtr->State,\r
c6492839 1468 sizeof (UINT8),\r
1469 &State\r
1470 ); \r
1471 if (EFI_ERROR (Status)) {\r
1472 goto Done; \r
33a5a666 1473 } \r
8a2d4996 1474 if (!Variable->Volatile) {\r
1475 CacheVariable->CurrPtr->State = State;\r
1476 }\r
c6492839 1477 } \r
72399dae 1478 } else {\r
8d3a5c82 1479 //\r
8a2d4996 1480 // Not found existing variable. Create a new variable.\r
c6492839 1481 // \r
1482 \r
8d3a5c82 1483 //\r
c6492839 1484 // Make sure we are trying to create a new variable.\r
8a2d4996 1485 // Setting a data variable with zero DataSize or no access attributes means to delete it. \r
8d3a5c82 1486 //\r
c6492839 1487 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
1488 Status = EFI_NOT_FOUND;\r
1489 goto Done;\r
1490 }\r
1491 \r
8d3a5c82 1492 //\r
8a2d4996 1493 // Only variable have NV|RT attribute can be created in Runtime.\r
c6492839 1494 //\r
8a2d4996 1495 if (AtRuntime () &&\r
45f6c85b 1496 (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) {\r
c6492839 1497 Status = EFI_INVALID_PARAMETER;\r
1498 goto Done;\r
1499 } \r
c6492839 1500 }\r
1501\r
1502 //\r
1503 // Function part - create a new variable and copy the data.\r
1504 // Both update a variable and create a variable will come here.\r
8a2d4996 1505\r
c6492839 1506 //\r
1507 // Tricky part: Use scratch data area at the end of volatile variable store\r
1508 // as a temporary storage.\r
1509 //\r
052ad7e1 1510 NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));\r
188e4e84 1511 ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));\r
c6492839 1512\r
2fcdca1d 1513 SetMem (NextVariable, ScratchSize, 0xff);\r
c6492839 1514\r
1515 NextVariable->StartId = VARIABLE_DATA;\r
1516 NextVariable->Attributes = Attributes;\r
1517 //\r
1518 // NextVariable->State = VAR_ADDED;\r
1519 //\r
8a2d4996 1520 NextVariable->Reserved = 0;\r
1521 VarNameOffset = sizeof (VARIABLE_HEADER);\r
1522 VarNameSize = StrSize (VariableName);\r
c6492839 1523 CopyMem (\r
1524 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
1525 VariableName,\r
1526 VarNameSize\r
1527 );\r
1528 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
1529 CopyMem (\r
1530 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
1531 Data,\r
1532 DataSize\r
1533 );\r
1534 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
1535 //\r
1536 // There will be pad bytes after Data, the NextVariable->NameSize and\r
1537 // NextVariable->DataSize should not include pad size so that variable\r
8a2d4996 1538 // service can get actual size in GetVariable.\r
c6492839 1539 //\r
1540 NextVariable->NameSize = (UINT32)VarNameSize;\r
1541 NextVariable->DataSize = (UINT32)DataSize;\r
1542\r
1543 //\r
1544 // The actual size of the variable that stores in storage should\r
1545 // include pad size.\r
1546 //\r
1547 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
45f6c85b 1548 if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {\r
8d3a5c82 1549 //\r
8a2d4996 1550 // Create a nonvolatile variable.\r
8d3a5c82 1551 //\r
fd51bf70 1552 Volatile = FALSE;\r
2fcdca1d 1553 NonVolatileVarableStoreSize = ((VARIABLE_STORE_HEADER *)(UINTN)(mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase))->Size;\r
1554 if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) \r
188e4e84 1555 && ((VarSize + mVariableModuleGlobal->HwErrVariableTotalSize) > PcdGet32 (PcdHwErrStorageSize)))\r
2fcdca1d 1556 || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) \r
188e4e84 1557 && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > NonVolatileVarableStoreSize - sizeof (VARIABLE_STORE_HEADER) - PcdGet32 (PcdHwErrStorageSize)))) {\r
8a2d4996 1558 if (AtRuntime ()) {\r
c6492839 1559 Status = EFI_OUT_OF_RESOURCES;\r
1560 goto Done;\r
1561 }\r
1562 //\r
8a2d4996 1563 // Perform garbage collection & reclaim operation.\r
c6492839 1564 //\r
72399dae 1565 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, \r
1566 &mVariableModuleGlobal->NonVolatileLastVariableOffset, FALSE, Variable->CurrPtr);\r
8d3a5c82 1567 if (EFI_ERROR (Status)) {\r
1568 goto Done;\r
1569 }\r
8d3a5c82 1570 //\r
8a2d4996 1571 // If still no enough space, return out of resources.\r
8d3a5c82 1572 //\r
2fcdca1d 1573 if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) \r
188e4e84 1574 && ((VarSize + mVariableModuleGlobal->HwErrVariableTotalSize) > PcdGet32 (PcdHwErrStorageSize)))\r
2fcdca1d 1575 || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) \r
188e4e84 1576 && ((VarSize + mVariableModuleGlobal->CommonVariableTotalSize) > NonVolatileVarableStoreSize - sizeof (VARIABLE_STORE_HEADER) - PcdGet32 (PcdHwErrStorageSize)))) {\r
c6492839 1577 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1578 goto Done;\r
8d3a5c82 1579 }\r
c6492839 1580 Reclaimed = TRUE;\r
8d3a5c82 1581 }\r
1582 //\r
8a2d4996 1583 // Four steps\r
c6492839 1584 // 1. Write variable header\r
130e2569 1585 // 2. Set variable state to header valid \r
1586 // 3. Write variable data\r
1587 // 4. Set variable state to valid\r
8d3a5c82 1588 //\r
8d3a5c82 1589 //\r
c6492839 1590 // Step 1:\r
8d3a5c82 1591 //\r
8a2d4996 1592 CacheOffset = mVariableModuleGlobal->NonVolatileLastVariableOffset;\r
c6492839 1593 Status = UpdateVariableStore (\r
052ad7e1 1594 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1595 FALSE,\r
1596 TRUE,\r
8a9e0b72 1597 Fvb,\r
72399dae 1598 mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
c6492839 1599 sizeof (VARIABLE_HEADER),\r
1600 (UINT8 *) NextVariable\r
1601 );\r
1602\r
1603 if (EFI_ERROR (Status)) {\r
1604 goto Done;\r
1605 }\r
130e2569 1606\r
8d3a5c82 1607 //\r
c6492839 1608 // Step 2:\r
8d3a5c82 1609 //\r
130e2569 1610 NextVariable->State = VAR_HEADER_VALID_ONLY;\r
1611 Status = UpdateVariableStore (\r
1612 &mVariableModuleGlobal->VariableGlobal,\r
1613 FALSE,\r
1614 TRUE,\r
8a9e0b72 1615 Fvb,\r
8a2d4996 1616 mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),\r
1617 sizeof (UINT8),\r
1618 &NextVariable->State\r
130e2569 1619 );\r
1620\r
1621 if (EFI_ERROR (Status)) {\r
1622 goto Done;\r
1623 }\r
1624 //\r
1625 // Step 3:\r
1626 //\r
c6492839 1627 Status = UpdateVariableStore (\r
052ad7e1 1628 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1629 FALSE,\r
1630 TRUE,\r
8a9e0b72 1631 Fvb,\r
72399dae 1632 mVariableModuleGlobal->NonVolatileLastVariableOffset + sizeof (VARIABLE_HEADER),\r
c6492839 1633 (UINT32) VarSize - sizeof (VARIABLE_HEADER),\r
1634 (UINT8 *) NextVariable + sizeof (VARIABLE_HEADER)\r
1635 );\r
1636\r
1637 if (EFI_ERROR (Status)) {\r
1638 goto Done;\r
1639 }\r
8d3a5c82 1640 //\r
130e2569 1641 // Step 4:\r
8d3a5c82 1642 //\r
c6492839 1643 NextVariable->State = VAR_ADDED;\r
1644 Status = UpdateVariableStore (\r
052ad7e1 1645 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1646 FALSE,\r
1647 TRUE,\r
8a9e0b72 1648 Fvb,\r
8a2d4996 1649 mVariableModuleGlobal->NonVolatileLastVariableOffset + OFFSET_OF (VARIABLE_HEADER, State),\r
1650 sizeof (UINT8),\r
1651 &NextVariable->State\r
c6492839 1652 );\r
1653\r
1654 if (EFI_ERROR (Status)) {\r
1655 goto Done;\r
1656 }\r
8d3a5c82 1657\r
72399dae 1658 mVariableModuleGlobal->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize);\r
8d3a5c82 1659\r
2fcdca1d 1660 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {\r
1661 mVariableModuleGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VarSize);\r
1662 } else {\r
1663 mVariableModuleGlobal->CommonVariableTotalSize += HEADER_ALIGN (VarSize);\r
1664 }\r
8a2d4996 1665 //\r
1666 // update the memory copy of Flash region.\r
1667 //\r
1668 CopyMem ((UINT8 *)mNvVariableCache + CacheOffset, (UINT8 *)NextVariable, VarSize);\r
c6492839 1669 } else {\r
1670 //\r
8a2d4996 1671 // Create a volatile variable.\r
c6492839 1672 // \r
fd51bf70 1673 Volatile = TRUE;\r
c6492839 1674\r
72399dae 1675 if ((UINT32) (VarSize + mVariableModuleGlobal->VolatileLastVariableOffset) >\r
052ad7e1 1676 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {\r
8d3a5c82 1677 //\r
8a2d4996 1678 // Perform garbage collection & reclaim operation.\r
8d3a5c82 1679 //\r
72399dae 1680 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, \r
1681 &mVariableModuleGlobal->VolatileLastVariableOffset, TRUE, Variable->CurrPtr);\r
8d3a5c82 1682 if (EFI_ERROR (Status)) {\r
1683 goto Done;\r
1684 }\r
1685 //\r
8a2d4996 1686 // If still no enough space, return out of resources.\r
8d3a5c82 1687 //\r
72399dae 1688 if ((UINT32) (VarSize + mVariableModuleGlobal->VolatileLastVariableOffset) >\r
052ad7e1 1689 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size\r
8d3a5c82 1690 ) {\r
c6492839 1691 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1692 goto Done;\r
1693 }\r
c6492839 1694 Reclaimed = TRUE;\r
8d3a5c82 1695 }\r
8d3a5c82 1696\r
c6492839 1697 NextVariable->State = VAR_ADDED;\r
1698 Status = UpdateVariableStore (\r
052ad7e1 1699 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1700 TRUE,\r
1701 TRUE,\r
8a9e0b72 1702 Fvb,\r
72399dae 1703 mVariableModuleGlobal->VolatileLastVariableOffset,\r
c6492839 1704 (UINT32) VarSize,\r
1705 (UINT8 *) NextVariable\r
1706 );\r
1707\r
1708 if (EFI_ERROR (Status)) {\r
1709 goto Done;\r
8d3a5c82 1710 }\r
c6492839 1711\r
72399dae 1712 mVariableModuleGlobal->VolatileLastVariableOffset += HEADER_ALIGN (VarSize);\r
c6492839 1713 }\r
72399dae 1714\r
c6492839 1715 //\r
8a2d4996 1716 // Mark the old variable as deleted.\r
c6492839 1717 //\r
72399dae 1718 if (!Reclaimed && !EFI_ERROR (Status) && Variable->CurrPtr != NULL) {\r
1719 State = Variable->CurrPtr->State;\r
c6492839 1720 State &= VAR_DELETED;\r
1721\r
1722 Status = UpdateVariableStore (\r
72399dae 1723 &mVariableModuleGlobal->VariableGlobal,\r
1724 Variable->Volatile,\r
1725 FALSE,\r
1726 Fvb,\r
1727 (UINTN) &Variable->CurrPtr->State,\r
1728 sizeof (UINT8),\r
1729 &State\r
1730 );\r
8a2d4996 1731 if (!EFI_ERROR (Status) && !Variable->Volatile) { \r
1732 CacheVariable->CurrPtr->State = State;\r
1733 }\r
72399dae 1734 }\r
1735\r
1736 if (!EFI_ERROR (Status)) {\r
1737 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
72399dae 1738 }\r
1739\r
1740Done:\r
1741 return Status;\r
1742}\r
1743\r
1744/**\r
1745\r
1746 This code finds variable in storage blocks (Volatile or Non-Volatile).\r
1747\r
1748 @param VariableName Name of Variable to be found.\r
1749 @param VendorGuid Variable vendor GUID.\r
1750 @param Attributes Attribute value of the variable found.\r
1751 @param DataSize Size of Data found. If size is less than the\r
1752 data, this value contains the required size.\r
1753 @param Data Data pointer.\r
1754 \r
8a2d4996 1755 @return EFI_INVALID_PARAMETER Invalid parameter.\r
1756 @return EFI_SUCCESS Find the specified variable.\r
1757 @return EFI_NOT_FOUND Not found.\r
1758 @return EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
72399dae 1759\r
1760**/\r
1761EFI_STATUS\r
1762EFIAPI\r
8a2d4996 1763VariableServiceGetVariable (\r
72399dae 1764 IN CHAR16 *VariableName,\r
1765 IN EFI_GUID *VendorGuid,\r
1766 OUT UINT32 *Attributes OPTIONAL,\r
1767 IN OUT UINTN *DataSize,\r
1768 OUT VOID *Data\r
1769 )\r
1770{\r
1771 EFI_STATUS Status;\r
1772 VARIABLE_POINTER_TRACK Variable;\r
1773 UINTN VarDataSize;\r
1774\r
1775 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
1776 return EFI_INVALID_PARAMETER;\r
1777 }\r
1778\r
1779 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
72399dae 1780 \r
1781 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
1782 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
1783 goto Done;\r
1784 }\r
1785\r
1786 //\r
1787 // Get data size\r
1788 //\r
1789 VarDataSize = DataSizeOfVariable (Variable.CurrPtr);\r
1790 ASSERT (VarDataSize != 0);\r
1791\r
1792 if (*DataSize >= VarDataSize) {\r
1793 if (Data == NULL) {\r
1794 Status = EFI_INVALID_PARAMETER;\r
1795 goto Done;\r
33a5a666 1796 }\r
72399dae 1797\r
1798 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
1799 if (Attributes != NULL) {\r
1800 *Attributes = Variable.CurrPtr->Attributes;\r
1801 }\r
1802\r
1803 *DataSize = VarDataSize;\r
1804 UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);\r
72399dae 1805 \r
1806 Status = EFI_SUCCESS;\r
1807 goto Done;\r
1808 } else {\r
1809 *DataSize = VarDataSize;\r
1810 Status = EFI_BUFFER_TOO_SMALL;\r
1811 goto Done;\r
8d3a5c82 1812 }\r
1813\r
72399dae 1814Done:\r
1815 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1816 return Status;\r
1817}\r
1818\r
1819\r
1820\r
1821/**\r
1822\r
1823 This code Finds the Next available variable.\r
1824\r
8a2d4996 1825 @param VariableNameSize Size of the variable name.\r
1826 @param VariableName Pointer to variable name.\r
1827 @param VendorGuid Variable Vendor Guid.\r
72399dae 1828\r
8a2d4996 1829 @return EFI_INVALID_PARAMETER Invalid parameter.\r
1830 @return EFI_SUCCESS Find the specified variable.\r
1831 @return EFI_NOT_FOUND Not found.\r
1832 @return EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
72399dae 1833\r
1834**/\r
1835EFI_STATUS\r
1836EFIAPI\r
8a2d4996 1837VariableServiceGetNextVariableName (\r
72399dae 1838 IN OUT UINTN *VariableNameSize,\r
1839 IN OUT CHAR16 *VariableName,\r
1840 IN OUT EFI_GUID *VendorGuid\r
1841 )\r
1842{\r
1843 VARIABLE_POINTER_TRACK Variable;\r
1844 UINTN VarNameSize;\r
1845 EFI_STATUS Status;\r
1846\r
1847 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
1848 return EFI_INVALID_PARAMETER;\r
1849 }\r
1850\r
1851 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1852\r
1853 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
1854 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
1855 goto Done;\r
1856 }\r
1857\r
1858 if (VariableName[0] != 0) {\r
1859 //\r
8a2d4996 1860 // If variable name is not NULL, get next variable.\r
72399dae 1861 //\r
1862 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1863 }\r
1864\r
1865 while (TRUE) {\r
1866 //\r
1867 // If both volatile and non-volatile variable store are parsed,\r
8a2d4996 1868 // return not found.\r
72399dae 1869 //\r
1870 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
1871 Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));\r
1872 if (!Variable.Volatile) {\r
1873 Variable.StartPtr = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
1874 Variable.EndPtr = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase));\r
1875 } else {\r
1876 Status = EFI_NOT_FOUND;\r
1877 goto Done;\r
1878 }\r
1879\r
1880 Variable.CurrPtr = Variable.StartPtr;\r
1881 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
1882 continue;\r
1883 }\r
1884 }\r
1885 //\r
1886 // Variable is found\r
1887 //\r
1888 if (IsValidVariableHeader (Variable.CurrPtr) && Variable.CurrPtr->State == VAR_ADDED) {\r
8a2d4996 1889 if ((AtRuntime () && ((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) == 0) {\r
72399dae 1890 VarNameSize = NameSizeOfVariable (Variable.CurrPtr);\r
1891 ASSERT (VarNameSize != 0);\r
1892\r
1893 if (VarNameSize <= *VariableNameSize) {\r
1894 CopyMem (\r
1895 VariableName,\r
1896 GetVariableNamePtr (Variable.CurrPtr),\r
1897 VarNameSize\r
1898 );\r
1899 CopyMem (\r
1900 VendorGuid,\r
1901 &Variable.CurrPtr->VendorGuid,\r
1902 sizeof (EFI_GUID)\r
1903 );\r
1904 Status = EFI_SUCCESS;\r
1905 } else {\r
1906 Status = EFI_BUFFER_TOO_SMALL;\r
1907 }\r
1908\r
1909 *VariableNameSize = VarNameSize;\r
1910 goto Done;\r
1911 }\r
1912 }\r
1913\r
1914 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1915 }\r
33a5a666 1916\r
8d3a5c82 1917Done:\r
72399dae 1918 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1919 return Status;\r
1920}\r
1921\r
1922/**\r
1923\r
1924 This code sets variable in storage blocks (Volatile or Non-Volatile).\r
1925\r
8a2d4996 1926 @param VariableName Name of Variable to be found.\r
1927 @param VendorGuid Variable vendor GUID.\r
72399dae 1928 @param Attributes Attribute value of the variable found\r
1929 @param DataSize Size of Data found. If size is less than the\r
1930 data, this value contains the required size.\r
8a2d4996 1931 @param Data Data pointer.\r
72399dae 1932\r
8a2d4996 1933 @return EFI_INVALID_PARAMETER Invalid parameter.\r
1934 @return EFI_SUCCESS Set successfully.\r
1935 @return EFI_OUT_OF_RESOURCES Resource not enough to set variable.\r
1936 @return EFI_NOT_FOUND Not found.\r
1937 @return EFI_WRITE_PROTECTED Variable is read-only.\r
72399dae 1938\r
1939**/\r
1940EFI_STATUS\r
1941EFIAPI\r
8a2d4996 1942VariableServiceSetVariable (\r
72399dae 1943 IN CHAR16 *VariableName,\r
1944 IN EFI_GUID *VendorGuid,\r
1945 IN UINT32 Attributes,\r
1946 IN UINTN DataSize,\r
1947 IN VOID *Data\r
1948 )\r
1949{\r
1950 VARIABLE_POINTER_TRACK Variable;\r
1951 EFI_STATUS Status;\r
1952 VARIABLE_HEADER *NextVariable;\r
1953 EFI_PHYSICAL_ADDRESS Point;\r
1954\r
1955 //\r
8a2d4996 1956 // Check input parameters.\r
72399dae 1957 //\r
1958 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1959 return EFI_INVALID_PARAMETER;\r
8a2d4996 1960 } \r
48a0e6bf 1961\r
1962 if (DataSize != 0 && Data == NULL) {\r
1963 return EFI_INVALID_PARAMETER;\r
1964 }\r
1965\r
8e38f18e 1966 //\r
1967 // Not support authenticated variable write yet.\r
1968 //\r
1969 if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
1970 return EFI_INVALID_PARAMETER;\r
1971 }\r
1972\r
72399dae 1973 //\r
8a2d4996 1974 // Make sure if runtime bit is set, boot service bit is set also.\r
72399dae 1975 //\r
1976 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1977 return EFI_INVALID_PARAMETER;\r
1978 }\r
1979\r
1980 //\r
1981 // The size of the VariableName, including the Unicode Null in bytes plus\r
188e4e84 1982 // the DataSize is limited to maximum size of PcdGet32 (PcdMaxHardwareErrorVariableSize)\r
1983 // bytes for HwErrRec, and PcdGet32 (PcdMaxVariableSize) bytes for the others.\r
72399dae 1984 //\r
1985 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
188e4e84 1986 if ((DataSize > PcdGet32 (PcdMaxHardwareErrorVariableSize)) ||\r
1987 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > PcdGet32 (PcdMaxHardwareErrorVariableSize))) {\r
72399dae 1988 return EFI_INVALID_PARAMETER;\r
1989 }\r
1990 //\r
8a2d4996 1991 // According to UEFI spec, HARDWARE_ERROR_RECORD variable name convention should be L"HwErrRecXXXX".\r
72399dae 1992 //\r
1993 if (StrnCmp(VariableName, L"HwErrRec", StrLen(L"HwErrRec")) != 0) {\r
1994 return EFI_INVALID_PARAMETER;\r
1995 }\r
1996 } else {\r
1997 //\r
1998 // The size of the VariableName, including the Unicode Null in bytes plus\r
188e4e84 1999 // the DataSize is limited to maximum size of PcdGet32 (PcdMaxVariableSize) bytes.\r
72399dae 2000 //\r
188e4e84 2001 if ((DataSize > PcdGet32 (PcdMaxVariableSize)) ||\r
2002 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > PcdGet32 (PcdMaxVariableSize))) {\r
72399dae 2003 return EFI_INVALID_PARAMETER;\r
2004 } \r
2005 } \r
2006\r
2007 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
2008\r
2009 //\r
8a2d4996 2010 // Consider reentrant in MCA/INIT/NMI. It needs be reupdated.\r
72399dae 2011 //\r
2012 if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {\r
8a2d4996 2013 Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
72399dae 2014 //\r
8a2d4996 2015 // Parse non-volatile variable data and get last variable offset.\r
72399dae 2016 //\r
2017 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);\r
2018 while ((NextVariable < GetEndPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point)) \r
2019 && IsValidVariableHeader (NextVariable)) {\r
2020 NextVariable = GetNextVariablePtr (NextVariable);\r
2021 }\r
2022 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;\r
2023 }\r
2024\r
2025 //\r
8a2d4996 2026 // Check whether the input variable is already existed.\r
72399dae 2027 //\r
2028 FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
2029\r
2030 //\r
8a2d4996 2031 // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang.\r
72399dae 2032 //\r
2033 AutoUpdateLangVariable (VariableName, Data, DataSize);\r
2034\r
2035 Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, &Variable);\r
2036\r
fdb7765f 2037 InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);\r
052ad7e1 2038 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
fdb7765f 2039\r
8d3a5c82 2040 return Status;\r
2041}\r
2042\r
7c80e839 2043/**\r
8d3a5c82 2044\r
2045 This code returns information about the EFI variables.\r
2046\r
7c80e839 2047 @param Attributes Attributes bitmask to specify the type of variables\r
2048 on which to return information.\r
2049 @param MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
2050 for the EFI variables associated with the attributes specified.\r
2051 @param RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
2052 for EFI variables associated with the attributes specified.\r
2053 @param MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
2054 associated with the attributes specified.\r
8d3a5c82 2055\r
7c80e839 2056 @return EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.\r
2057 @return EFI_SUCCESS Query successfully.\r
2058 @return EFI_UNSUPPORTED The attribute is not supported on this platform.\r
8d3a5c82 2059\r
7c80e839 2060**/\r
052ad7e1
A
2061EFI_STATUS\r
2062EFIAPI\r
8a2d4996 2063VariableServiceQueryVariableInfo (\r
052ad7e1
A
2064 IN UINT32 Attributes,\r
2065 OUT UINT64 *MaximumVariableStorageSize,\r
2066 OUT UINT64 *RemainingVariableStorageSize,\r
2067 OUT UINT64 *MaximumVariableSize\r
2068 )\r
8d3a5c82 2069{\r
2070 VARIABLE_HEADER *Variable;\r
2071 VARIABLE_HEADER *NextVariable;\r
2072 UINT64 VariableSize;\r
2073 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
2fcdca1d 2074 UINT64 CommonVariableTotalSize;\r
2075 UINT64 HwErrVariableTotalSize;\r
2076\r
2077 CommonVariableTotalSize = 0;\r
2078 HwErrVariableTotalSize = 0;\r
8d3a5c82 2079\r
c6492839 2080 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
8d3a5c82 2081 return EFI_INVALID_PARAMETER;\r
2082 }\r
2fcdca1d 2083\r
c6492839 2084 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
8d3a5c82 2085 //\r
2086 // Make sure the Attributes combination is supported by the platform.\r
2087 //\r
c6492839 2088 return EFI_UNSUPPORTED; \r
8d3a5c82 2089 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
2090 //\r
2091 // Make sure if runtime bit is set, boot service bit is set also.\r
2092 //\r
2093 return EFI_INVALID_PARAMETER;\r
8a2d4996 2094 } else if (AtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) {\r
8d3a5c82 2095 //\r
2096 // Make sure RT Attribute is set if we are in Runtime phase.\r
2097 //\r
2098 return EFI_INVALID_PARAMETER;\r
2fcdca1d 2099 } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
2100 //\r
2101 // Make sure Hw Attribute is set with NV.\r
2102 //\r
2103 return EFI_INVALID_PARAMETER;\r
8e38f18e 2104 } else if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
2105 //\r
2106 // Not support authentiated variable write yet.\r
2107 //\r
2108 return EFI_UNSUPPORTED;\r
8d3a5c82 2109 }\r
2110\r
052ad7e1 2111 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 2112\r
2113 if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
2114 //\r
2115 // Query is Volatile related.\r
2116 //\r
052ad7e1 2117 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 2118 } else {\r
2119 //\r
2120 // Query is Non-Volatile related.\r
2121 //\r
8a2d4996 2122 VariableStoreHeader = mNvVariableCache;\r
8d3a5c82 2123 }\r
2124\r
2125 //\r
2126 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
2127 // with the storage size (excluding the storage header size).\r
2128 //\r
2129 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
c6492839 2130\r
2131 //\r
2132 // Harware error record variable needs larger size.\r
2133 //\r
2fcdca1d 2134 if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
188e4e84 2135 *MaximumVariableStorageSize = PcdGet32 (PcdHwErrStorageSize);\r
2136 *MaximumVariableSize = PcdGet32 (PcdMaxHardwareErrorVariableSize) - sizeof (VARIABLE_HEADER);\r
2fcdca1d 2137 } else {\r
2138 if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {\r
188e4e84 2139 ASSERT (PcdGet32 (PcdHwErrStorageSize) < VariableStoreHeader->Size);\r
2140 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32 (PcdHwErrStorageSize);\r
2fcdca1d 2141 }\r
2142\r
2143 //\r
188e4e84 2144 // Let *MaximumVariableSize be PcdGet32 (PcdMaxVariableSize) with the exception of the variable header size.\r
2fcdca1d 2145 //\r
188e4e84 2146 *MaximumVariableSize = PcdGet32 (PcdMaxVariableSize) - sizeof (VARIABLE_HEADER);\r
c6492839 2147 }\r
8d3a5c82 2148\r
2149 //\r
2150 // Point to the starting address of the variables.\r
2151 //\r
9cad030b 2152 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 2153\r
2154 //\r
2155 // Now walk through the related variable store.\r
2156 //\r
6f90dfbc 2157 while ((Variable < GetEndPointer (VariableStoreHeader)) && IsValidVariableHeader (Variable)) {\r
8d3a5c82 2158 NextVariable = GetNextVariablePtr (Variable);\r
2159 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
2160\r
8a2d4996 2161 if (AtRuntime ()) {\r
8d3a5c82 2162 //\r
8a2d4996 2163 // We don't take the state of the variables in mind\r
8d3a5c82 2164 // when calculating RemainingVariableStorageSize,\r
2165 // since the space occupied by variables not marked with\r
2166 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
2167 //\r
2fcdca1d 2168 if ((NextVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
2169 HwErrVariableTotalSize += VariableSize;\r
2170 } else {\r
2171 CommonVariableTotalSize += VariableSize;\r
2172 }\r
8d3a5c82 2173 } else {\r
2174 //\r
8a2d4996 2175 // Only care about Variables with State VAR_ADDED, because\r
8d3a5c82 2176 // the space not marked as VAR_ADDED is reclaimable now.\r
2177 //\r
2178 if (Variable->State == VAR_ADDED) {\r
2fcdca1d 2179 if ((NextVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
2180 HwErrVariableTotalSize += VariableSize;\r
2181 } else {\r
2182 CommonVariableTotalSize += VariableSize;\r
2183 }\r
8d3a5c82 2184 }\r
2185 }\r
2186\r
2187 //\r
8a2d4996 2188 // Go to the next one.\r
8d3a5c82 2189 //\r
2190 Variable = NextVariable;\r
2191 }\r
2192\r
2fcdca1d 2193 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){\r
2194 *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;\r
2195 }else {\r
2196 *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;\r
2197 }\r
2198\r
c6492839 2199 if (*RemainingVariableStorageSize < sizeof (VARIABLE_HEADER)) {\r
2200 *MaximumVariableSize = 0;\r
2201 } else if ((*RemainingVariableStorageSize - sizeof (VARIABLE_HEADER)) < *MaximumVariableSize) {\r
2202 *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (VARIABLE_HEADER);\r
2203 }\r
2204\r
052ad7e1 2205 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 2206 return EFI_SUCCESS;\r
2207}\r
2208\r
7c80e839 2209\r
2210/**\r
8a2d4996 2211 This function reclaims variable storage if free size is below the threshold.\r
2212 \r
7c80e839 2213**/\r
7800593d 2214VOID\r
7800593d 2215ReclaimForOS(\r
8a2d4996 2216 VOID\r
7800593d
LG
2217 )\r
2218{\r
9948c0b0 2219 EFI_STATUS Status;\r
2fcdca1d 2220 UINTN CommonVariableSpace;\r
2221 UINTN RemainingCommonVariableSpace;\r
2222 UINTN RemainingHwErrVariableSpace;\r
7800593d 2223\r
7800593d
LG
2224 Status = EFI_SUCCESS; \r
2225\r
2fcdca1d 2226 CommonVariableSpace = ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize); //Allowable max size of common variable storage space\r
2227\r
2228 RemainingCommonVariableSpace = CommonVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize;\r
2229\r
2230 RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize;\r
7800593d 2231 //\r
9948c0b0 2232 // Check if the free area is blow a threshold.\r
7800593d 2233 //\r
2fcdca1d 2234 if ((RemainingCommonVariableSpace < PcdGet32 (PcdMaxVariableSize))\r
9948c0b0 2235 || ((PcdGet32 (PcdHwErrStorageSize) != 0) && \r
2236 (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){\r
7800593d 2237 Status = Reclaim (\r
2fcdca1d 2238 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
2239 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
2240 FALSE,\r
2241 NULL\r
2242 );\r
7800593d
LG
2243 ASSERT_EFI_ERROR (Status);\r
2244 }\r
2245}\r
2246\r
8a2d4996 2247\r
7c80e839 2248/**\r
8a2d4996 2249 Initializes variable write service after FVB was ready.\r
7c80e839 2250\r
8a2d4996 2251 @retval EFI_SUCCESS Function successfully executed.\r
2252 @retval Others Fail to initialize the variable service.\r
2253\r
2254**/\r
2255EFI_STATUS\r
2256VariableWriteServiceInitialize (\r
2257 VOID\r
2258 )\r
2259{\r
2260 EFI_STATUS Status;\r
2261 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
2262 UINTN Index;\r
2263 UINT8 Data;\r
2264 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
2265 EFI_PHYSICAL_ADDRESS BaseAddress;\r
2266 UINT64 Length;\r
2267 EFI_PHYSICAL_ADDRESS VariableStoreBase;\r
2268 UINT64 VariableStoreLength;\r
2269\r
2270 VariableStoreBase = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
2271 VariableStoreHeader = (VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase;\r
2272 VariableStoreLength = VariableStoreHeader->Size;\r
2273 \r
2274 //\r
2275 // Check if the free area is really free.\r
2276 //\r
2277 for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreLength; Index++) {\r
2278 Data = ((UINT8 *) mNvVariableCache)[Index];\r
2279 if (Data != 0xff) {\r
2280 //\r
2281 // There must be something wrong in variable store, do reclaim operation.\r
2282 //\r
2283 Status = Reclaim (\r
2284 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
2285 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
2286 FALSE,\r
2287 NULL\r
2288 );\r
2289 if (EFI_ERROR (Status)) {\r
2290 return Status;\r
2291 }\r
2292 break;\r
2293 }\r
2294 }\r
2295\r
2296 //\r
2297 // Mark the variable storage region of the FLASH as RUNTIME.\r
2298 //\r
2299 BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);\r
2300 Length = VariableStoreLength + (VariableStoreBase - BaseAddress);\r
2301 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
2302\r
2303 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
2304 if (EFI_ERROR (Status)) {\r
2305 DEBUG ((DEBUG_WARN, "Variable driver failed to add EFI_MEMORY_RUNTIME attribute to Flash.\n"));\r
2306 } else {\r
2307 Status = gDS->SetMemorySpaceAttributes (\r
2308 BaseAddress,\r
2309 Length,\r
2310 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
2311 );\r
2312 if (EFI_ERROR (Status)) {\r
2313 DEBUG ((DEBUG_WARN, "Variable driver failed to add EFI_MEMORY_RUNTIME attribute to Flash.\n"));\r
2314 }\r
2315 }\r
2316 return EFI_SUCCESS;\r
2317}\r
2318\r
2319\r
2320/**\r
2321 Initializes variable store area for non-volatile and volatile variable.\r
7c80e839 2322\r
2323 @retval EFI_SUCCESS Function successfully executed.\r
2324 @retval EFI_OUT_OF_RESOURCES Fail to allocate enough memory resource.\r
2325\r
2326**/\r
8d3a5c82 2327EFI_STATUS\r
8d3a5c82 2328VariableCommonInitialize (\r
8a2d4996 2329 VOID\r
8d3a5c82 2330 )\r
8d3a5c82 2331{\r
2332 EFI_STATUS Status;\r
8d3a5c82 2333 VARIABLE_STORE_HEADER *VolatileVariableStore;\r
2334 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
2335 VARIABLE_HEADER *NextVariable;\r
8a9e0b72 2336 EFI_PHYSICAL_ADDRESS TempVariableStoreHeader;\r
8a9e0b72 2337 EFI_PHYSICAL_ADDRESS VariableStoreBase;\r
052ad7e1 2338 UINT64 VariableStoreLength;\r
2fcdca1d 2339 UINTN ScratchSize;\r
aa75dfec 2340 UINTN VariableSize;\r
8d3a5c82 2341\r
7800593d
LG
2342 //\r
2343 // Allocate runtime memory for variable driver global structure.\r
2344 //\r
72399dae 2345 mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (VARIABLE_MODULE_GLOBAL));\r
7800593d
LG
2346 if (mVariableModuleGlobal == NULL) {\r
2347 return EFI_OUT_OF_RESOURCES;\r
2348 }\r
8d3a5c82 2349\r
8a2d4996 2350 InitializeLock (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);\r
8d3a5c82 2351\r
48cd992a 2352 //\r
2353 // Note that in EdkII variable driver implementation, Hardware Error Record type variable\r
2354 // is stored with common variable in the same NV region. So the platform integrator should\r
2355 // ensure that the value of PcdHwErrStorageSize is less than or equal to the value of \r
2356 // PcdFlashNvStorageVariableSize.\r
2357 //\r
188e4e84 2358 ASSERT (PcdGet32 (PcdHwErrStorageSize) <= PcdGet32 (PcdFlashNvStorageVariableSize));\r
48cd992a 2359\r
8d3a5c82 2360 //\r
2fcdca1d 2361 // Allocate memory for volatile variable store, note that there is a scratch space to store scratch data.\r
8d3a5c82 2362 //\r
188e4e84 2363 ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));\r
2364 VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize);\r
8d3a5c82 2365 if (VolatileVariableStore == NULL) {\r
2366 FreePool (mVariableModuleGlobal);\r
2367 return EFI_OUT_OF_RESOURCES;\r
2368 }\r
2369\r
188e4e84 2370 SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff);\r
8d3a5c82 2371\r
2372 //\r
8a2d4996 2373 // Initialize Variable Specific Data.\r
8d3a5c82 2374 //\r
052ad7e1 2375 mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;\r
9cad030b 2376 mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;\r
8a2d4996 2377 mVariableModuleGlobal->FvbInstance = NULL;\r
8d3a5c82 2378\r
3709c4cd 2379 CopyGuid (&VolatileVariableStore->Signature, &gEfiVariableGuid);\r
8a2d4996 2380 VolatileVariableStore->Size = PcdGet32 (PcdVariableStoreSize);\r
2381 VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;\r
2382 VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;\r
2383 VolatileVariableStore->Reserved = 0;\r
2384 VolatileVariableStore->Reserved1 = 0;\r
8d3a5c82 2385\r
2386 //\r
8a2d4996 2387 // Get non-volatile varaible store.\r
8d3a5c82 2388 //\r
2389\r
92a4f6f3 2390 TempVariableStoreHeader = (EFI_PHYSICAL_ADDRESS) PcdGet64 (PcdFlashNvStorageVariableBase64);\r
2391 if (TempVariableStoreHeader == 0) {\r
2392 TempVariableStoreHeader = (EFI_PHYSICAL_ADDRESS) PcdGet32 (PcdFlashNvStorageVariableBase);\r
2393 }\r
8a2d4996 2394 VariableStoreBase = TempVariableStoreHeader + \\r
2395 (((EFI_FIRMWARE_VOLUME_HEADER *)(UINTN)(TempVariableStoreHeader)) -> HeaderLength);\r
2396 VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \\r
8a9e0b72 2397 (((EFI_FIRMWARE_VOLUME_HEADER *)(UINTN)(TempVariableStoreHeader)) -> HeaderLength);\r
8d3a5c82 2398\r
8a2d4996 2399 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;\r
2400 VariableStoreHeader = (VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase;\r
2401 if (GetVariableStoreStatus (VariableStoreHeader) != EfiValid) {\r
2402 Status = EFI_VOLUME_CORRUPTED;\r
2403 DEBUG((EFI_D_INFO, "Variable Store header is corrupted\n"));\r
7800593d 2404 goto Done;\r
8a2d4996 2405 } \r
2406 ASSERT(VariableStoreHeader->Size == VariableStoreLength);\r
2407 \r
8d3a5c82 2408 //\r
8a2d4996 2409 // Parse non-volatile variable data and get last variable offset.\r
8d3a5c82 2410 //\r
8a2d4996 2411 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *)(UINTN)VariableStoreBase);\r
2412 while (IsValidVariableHeader (NextVariable)) {\r
2413 VariableSize = NextVariable->NameSize + NextVariable->DataSize + sizeof (VARIABLE_HEADER);\r
2414 if ((NextVariable->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
2415 mVariableModuleGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VariableSize);\r
2416 } else {\r
2417 mVariableModuleGlobal->CommonVariableTotalSize += HEADER_ALIGN (VariableSize);\r
8d3a5c82 2418 }\r
2419\r
8a2d4996 2420 NextVariable = GetNextVariablePtr (NextVariable);\r
2421 }\r
7800593d 2422\r
8a2d4996 2423 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) VariableStoreBase;\r
2424 \r
2425 //\r
2426 // Allocate runtime memory used for a memory copy of the FLASH region.\r
2427 // Keep the memory and the FLASH in sync as updates occur\r
2428 //\r
2429 mNvVariableCache = AllocateRuntimeZeroPool ((UINTN)VariableStoreLength);\r
2430 if (mNvVariableCache == NULL) {\r
2431 Status = EFI_OUT_OF_RESOURCES;\r
2432 goto Done;\r
8d3a5c82 2433 }\r
8a2d4996 2434 CopyMem (mNvVariableCache, (CHAR8 *)(UINTN)VariableStoreBase, (UINTN)VariableStoreLength);\r
2435 Status = EFI_SUCCESS;\r
8d3a5c82 2436\r
7800593d 2437Done:\r
8d3a5c82 2438 if (EFI_ERROR (Status)) {\r
2439 FreePool (mVariableModuleGlobal);\r
2440 FreePool (VolatileVariableStore);\r
2441 }\r
2442\r
2443 return Status;\r
2444}\r
052ad7e1 2445\r
052ad7e1 2446\r
aa75dfec 2447/**\r
8a2d4996 2448 Get the proper fvb handle and/or fvb protocol by the given Flash address.\r
aa75dfec 2449\r
8a2d4996 2450 @param[in] Address The Flash address.\r
2451 @param[out] FvbHandle In output, if it is not NULL, it points to the proper FVB handle.\r
2452 @param[out] FvbProtocol In output, if it is not NULL, it points to the proper FVB protocol.\r
aa75dfec 2453\r
aa75dfec 2454**/\r
8a2d4996 2455EFI_STATUS\r
2456GetFvbInfoByAddress (\r
2457 IN EFI_PHYSICAL_ADDRESS Address,\r
2458 OUT EFI_HANDLE *FvbHandle OPTIONAL,\r
2459 OUT EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL **FvbProtocol OPTIONAL\r
8a9e0b72 2460 )\r
2461{\r
8a2d4996 2462 EFI_STATUS Status;\r
2463 EFI_HANDLE *HandleBuffer;\r
2464 UINTN HandleCount;\r
2465 UINTN Index;\r
2466 EFI_PHYSICAL_ADDRESS FvbBaseAddress;\r
2467 EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *Fvb;\r
2468 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
2469 EFI_FVB_ATTRIBUTES_2 Attributes;\r
2470 \r
8a9e0b72 2471 //\r
8a2d4996 2472 // Get all FVB handles.\r
8a9e0b72 2473 //\r
8a2d4996 2474 Status = GetFvbCountAndBuffer (&HandleCount, &HandleBuffer);\r
8a9e0b72 2475 if (EFI_ERROR (Status)) {\r
8a2d4996 2476 return EFI_NOT_FOUND;\r
8a9e0b72 2477 }\r
8a2d4996 2478\r
8a9e0b72 2479 //\r
8a2d4996 2480 // Get the FVB to access variable store.\r
8a9e0b72 2481 //\r
8a2d4996 2482 Fvb = NULL;\r
f0480ecf 2483 for (Index = 0; Index < HandleCount; Index += 1, Status = EFI_NOT_FOUND, Fvb = NULL) {\r
8a2d4996 2484 Status = GetFvbByHandle (HandleBuffer[Index], &Fvb);\r
8a9e0b72 2485 if (EFI_ERROR (Status)) {\r
2486 Status = EFI_NOT_FOUND;\r
2487 break;\r
2488 }\r
2489\r
2490 //\r
2491 // Ensure this FVB protocol supported Write operation.\r
2492 //\r
2493 Status = Fvb->GetAttributes (Fvb, &Attributes);\r
2494 if (EFI_ERROR (Status) || ((Attributes & EFI_FVB2_WRITE_STATUS) == 0)) {\r
2495 continue; \r
2496 }\r
8a2d4996 2497 \r
8a9e0b72 2498 //\r
8a2d4996 2499 // Compare the address and select the right one.\r
8a9e0b72 2500 //\r
2501 Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress);\r
2502 if (EFI_ERROR (Status)) {\r
2503 continue;\r
2504 }\r
2505\r
2506 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvbBaseAddress);\r
8a2d4996 2507 if ((Address >= FvbBaseAddress) && (Address < (FvbBaseAddress + FwVolHeader->FvLength))) {\r
2508 if (FvbHandle != NULL) {\r
2509 *FvbHandle = HandleBuffer[Index];\r
2510 }\r
2511 if (FvbProtocol != NULL) {\r
2512 *FvbProtocol = Fvb;\r
2513 }\r
2514 Status = EFI_SUCCESS;\r
8a9e0b72 2515 break;\r
2516 }\r
2517 }\r
8a9e0b72 2518 FreePool (HandleBuffer);\r
533020ef 2519\r
8a2d4996 2520 if (Fvb == NULL) {\r
2521 Status = EFI_NOT_FOUND;\r
8a9e0b72 2522 }\r
052ad7e1 2523 \r
8a2d4996 2524 return Status; \r
052ad7e1
A
2525}\r
2526\r