]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
Align the header of variable from 1 to 4, which can avoid the size of variable conten...
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / Variable.c
CommitLineData
052ad7e1
A
1/** @file\r
2 EFI Runtime Variable services.\r
3 \r
4 Copyright (c) 2006 - 2007, Intel Corporation \r
5 All rights reserved. This program and the accompanying materials \r
6 are licensed and made available under the terms and conditions of the BSD License \r
7 which accompanies this distribution. The full text of the license may be found at \r
8 http://opensource.org/licenses/bsd-license.php \r
8d3a5c82 9\r
052ad7e1
A
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
8d3a5c82 12\r
052ad7e1 13**/\r
8d3a5c82 14\r
15\r
16#include "Variable.h"\r
33a5a666
A
17\r
18\r
052ad7e1
A
19VARIABLE_MODULE_GLOBAL mRuntimeData;\r
20VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal = &mRuntimeData;\r
21EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
22EFI_HANDLE mHandle = NULL;\r
8d3a5c82 23\r
33a5a666 24\r
8d3a5c82 25//\r
26// This is a temperary function which will be removed\r
27// when EfiAcquireLock in UefiLib can handle the\r
28// the call in UEFI Runtimer driver in RT phase.\r
29//\r
8d3a5c82 30VOID\r
31AcquireLockOnlyAtBootTime (\r
32 IN EFI_LOCK *Lock\r
33 )\r
34{\r
35 if (!EfiAtRuntime ()) {\r
36 EfiAcquireLock (Lock);\r
37 }\r
38}\r
39\r
40//\r
41// This is a temperary function which will be removed\r
42// when EfiAcquireLock in UefiLib can handle the\r
43// the call in UEFI Runtimer driver in RT phase.\r
44//\r
8d3a5c82 45VOID\r
46ReleaseLockOnlyAtBootTime (\r
47 IN EFI_LOCK *Lock\r
48 )\r
49{\r
50 if (!EfiAtRuntime ()) {\r
51 EfiReleaseLock (Lock);\r
52 }\r
53}\r
54\r
33a5a666
A
55\r
56GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;\r
57\r
58\r
052ad7e1
A
59/**\r
60 Routine used to track statistical information about variable usage. \r
61 The data is stored in the EFI system table so it can be accessed later.\r
62 VariableInfo.efi can dump out the table. Only Boot Services variable \r
63 accesses are tracked by this code. The PcdVariableCollectStatistics\r
64 build flag controls if this feature is enabled. \r
65\r
66 A read that hits in the cache will have Read and Cache true for \r
67 the transaction. Data is allocated by this routine, but never\r
68 freed.\r
69\r
70 @param[in] VariableName Name of the Variable to track\r
71 @param[in] VendorGuid Guid of the Variable to track\r
72 @param[in] Volatile TRUE if volatile FALSE if non-volatile\r
73 @param[in] Read TRUE if GetVariable() was called\r
74 @param[in] Write TRUE if SetVariable() was called\r
75 @param[in] Delete TRUE if deleted via SetVariable()\r
76 @param[in] Cache TRUE for a cache hit.\r
77\r
78**/\r
33a5a666
A
79VOID\r
80UpdateVariableInfo (\r
81 IN CHAR16 *VariableName,\r
82 IN EFI_GUID *VendorGuid,\r
83 IN BOOLEAN Volatile,\r
84 IN BOOLEAN Read,\r
85 IN BOOLEAN Write,\r
86 IN BOOLEAN Delete,\r
87 IN BOOLEAN Cache\r
88 )\r
89{\r
90 VARIABLE_INFO_ENTRY *Entry;\r
91\r
92 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
93\r
94 if (EfiAtRuntime ()) {\r
95 // Don't collect statistics at runtime\r
96 return;\r
97 }\r
98\r
99 if (gVariableInfo == NULL) {\r
052ad7e1
A
100 //\r
101 // on the first call allocate a entry and place a pointer to it in\r
102 // the EFI System Table\r
103 //\r
33a5a666 104 gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1
A
105 ASSERT (gVariableInfo != NULL);\r
106\r
33a5a666
A
107 CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);\r
108 gVariableInfo->Name = AllocatePool (StrLen (VariableName));\r
109 StrCpy (gVariableInfo->Name, VariableName);\r
110 gVariableInfo->Volatile = Volatile;\r
111\r
112 gBS->InstallConfigurationTable (&gEfiVariableInfoGuid, gVariableInfo);\r
113 }\r
114\r
115 \r
116 for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {\r
117 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
118 if (StrCmp (VariableName, Entry->Name) == 0) {\r
119 if (Read) {\r
120 Entry->ReadCount++;\r
121 }\r
122 if (Write) {\r
123 Entry->WriteCount++;\r
124 }\r
125 if (Delete) {\r
126 Entry->DeleteCount++;\r
127 }\r
128 if (Cache) {\r
129 Entry->CacheCount++;\r
130 }\r
131\r
132 return;\r
133 }\r
134 }\r
135\r
136 if (Entry->Next == NULL) {\r
052ad7e1
A
137 //\r
138 // If the entry is not in the table add it.\r
139 // Next iteration of the loop will fill in the data\r
140 //\r
33a5a666 141 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
052ad7e1 142 ASSERT (Entry->Next != NULL);\r
33a5a666
A
143\r
144 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
145 Entry->Next->Name = AllocatePool (StrLen (VariableName));\r
146 StrCpy (Entry->Next->Name, VariableName);\r
147 Entry->Next->Volatile = Volatile;\r
148 }\r
149\r
150 }\r
151 }\r
152}\r
153\r
154\r
8d3a5c82 155BOOLEAN\r
8d3a5c82 156IsValidVariableHeader (\r
157 IN VARIABLE_HEADER *Variable\r
158 )\r
159/*++\r
160\r
161Routine Description:\r
162\r
163 This code checks if variable header is valid or not.\r
164\r
165Arguments:\r
166 Variable Pointer to the Variable Header.\r
167\r
168Returns:\r
169 TRUE Variable header is valid.\r
170 FALSE Variable header is not valid.\r
171\r
172--*/\r
173{\r
fdb7765f 174 if (Variable == NULL || Variable->StartId != VARIABLE_DATA) {\r
8d3a5c82 175 return FALSE;\r
176 }\r
177\r
178 return TRUE;\r
179}\r
180\r
052ad7e1 181\r
8d3a5c82 182EFI_STATUS\r
8d3a5c82 183UpdateVariableStore (\r
184 IN VARIABLE_GLOBAL *Global,\r
185 IN BOOLEAN Volatile,\r
186 IN BOOLEAN SetByIndex,\r
187 IN UINTN Instance,\r
188 IN UINTN DataPtrIndex,\r
189 IN UINT32 DataSize,\r
190 IN UINT8 *Buffer\r
191 )\r
192/*++\r
193\r
194Routine Description:\r
195\r
196 This function writes data to the FWH at the correct LBA even if the LBAs\r
197 are fragmented.\r
198\r
199Arguments:\r
200\r
c6492839 201 Global - Pointer to VARAIBLE_GLOBAL structure\r
202 Volatile - If the Variable is Volatile or Non-Volatile\r
203 SetByIndex - TRUE: Target pointer is given as index\r
204 FALSE: Target pointer is absolute\r
205 Instance - Instance of FV Block services\r
206 DataPtrIndex - Pointer to the Data from the end of VARIABLE_STORE_HEADER\r
207 structure\r
208 DataSize - Size of data to be written.\r
209 Buffer - Pointer to the buffer from which data is written\r
8d3a5c82 210\r
211Returns:\r
212\r
c6492839 213 EFI_INVALID_PARAMETER - Parameters not valid\r
214 EFI_SUCCESS - Variable store successfully updated\r
8d3a5c82 215\r
216--*/\r
217{\r
218 EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;\r
219 UINTN BlockIndex2;\r
220 UINTN LinearOffset;\r
221 UINTN CurrWriteSize;\r
222 UINTN CurrWritePtr;\r
223 UINT8 *CurrBuffer;\r
224 EFI_LBA LbaNumber;\r
225 UINTN Size;\r
226 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
227 VARIABLE_STORE_HEADER *VolatileBase;\r
228 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
229 EFI_PHYSICAL_ADDRESS DataPtr;\r
230 EFI_STATUS Status;\r
231\r
232 FwVolHeader = NULL;\r
233 DataPtr = DataPtrIndex;\r
234\r
235 //\r
236 // Check if the Data is Volatile\r
237 //\r
238 if (!Volatile) {\r
239 EfiFvbGetPhysicalAddress (Instance, &FvVolHdr);\r
240 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
241 //\r
242 // Data Pointer should point to the actual Address where data is to be\r
243 // written\r
244 //\r
245 if (SetByIndex) {\r
052ad7e1 246 DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
8d3a5c82 247 }\r
248\r
249 if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {\r
250 return EFI_INVALID_PARAMETER;\r
251 }\r
252 } else {\r
253 //\r
254 // Data Pointer should point to the actual Address where data is to be\r
255 // written\r
256 //\r
052ad7e1 257 VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 258 if (SetByIndex) {\r
052ad7e1 259 DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
8d3a5c82 260 }\r
261\r
262 if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {\r
263 return EFI_INVALID_PARAMETER;\r
264 }\r
c6492839 265 \r
266 //\r
267 // If Volatile Variable just do a simple mem copy.\r
268 // \r
269 CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);\r
8d3a5c82 270 return EFI_SUCCESS;\r
271 }\r
c6492839 272 \r
8d3a5c82 273 //\r
274 // If we are here we are dealing with Non-Volatile Variables\r
275 //\r
276 LinearOffset = (UINTN) FwVolHeader;\r
277 CurrWritePtr = (UINTN) DataPtr;\r
278 CurrWriteSize = DataSize;\r
279 CurrBuffer = Buffer;\r
280 LbaNumber = 0;\r
281\r
282 if (CurrWritePtr < LinearOffset) {\r
283 return EFI_INVALID_PARAMETER;\r
284 }\r
285\r
286 for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {\r
287 for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {\r
288 //\r
289 // Check to see if the Variable Writes are spanning through multiple\r
290 // blocks.\r
291 //\r
292 if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {\r
293 if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {\r
294 Status = EfiFvbWriteBlock (\r
295 Instance,\r
296 LbaNumber,\r
297 (UINTN) (CurrWritePtr - LinearOffset),\r
298 &CurrWriteSize,\r
299 CurrBuffer\r
300 );\r
8d3a5c82 301 return Status;\r
8d3a5c82 302 } else {\r
303 Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);\r
304 Status = EfiFvbWriteBlock (\r
305 Instance,\r
306 LbaNumber,\r
307 (UINTN) (CurrWritePtr - LinearOffset),\r
308 &Size,\r
309 CurrBuffer\r
310 );\r
311 if (EFI_ERROR (Status)) {\r
312 return Status;\r
313 }\r
314\r
315 CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;\r
316 CurrBuffer = CurrBuffer + Size;\r
317 CurrWriteSize = CurrWriteSize - Size;\r
318 }\r
319 }\r
320\r
321 LinearOffset += PtrBlockMapEntry->Length;\r
322 LbaNumber++;\r
323 }\r
324 }\r
325\r
326 return EFI_SUCCESS;\r
327}\r
328\r
052ad7e1 329\r
8d3a5c82 330VARIABLE_STORE_STATUS\r
8d3a5c82 331GetVariableStoreStatus (\r
332 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
333 )\r
334/*++\r
335\r
336Routine Description:\r
337\r
338 This code gets the current status of Variable Store.\r
339\r
340Arguments:\r
341\r
342 VarStoreHeader Pointer to the Variable Store Header.\r
343\r
344Returns:\r
345\r
346 EfiRaw Variable store status is raw\r
347 EfiValid Variable store status is valid\r
348 EfiInvalid Variable store status is invalid\r
349\r
350--*/\r
351{\r
352 if (VarStoreHeader->Signature == VARIABLE_STORE_SIGNATURE &&\r
353 VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&\r
354 VarStoreHeader->State == VARIABLE_STORE_HEALTHY\r
355 ) {\r
356\r
357 return EfiValid;\r
358 } else if (VarStoreHeader->Signature == 0xffffffff &&\r
359 VarStoreHeader->Size == 0xffffffff &&\r
360 VarStoreHeader->Format == 0xff &&\r
361 VarStoreHeader->State == 0xff\r
362 ) {\r
363\r
364 return EfiRaw;\r
365 } else {\r
366 return EfiInvalid;\r
367 }\r
368}\r
369\r
052ad7e1 370\r
fdb7765f 371UINT32\r
372NameSizeOfVariable (\r
373 IN VARIABLE_HEADER *Variable\r
374 )\r
375{\r
376 //\r
377 // Check whether the header is valid fully;\r
378 // Tricky: The unprogramed data in FLASH equals 0xff.\r
379 // \r
380 if (Variable->DataSize == (UINT32) -1 || \r
381 Variable->Attributes == (UINT32) -1 || \r
382 Variable->NameSize == (UINT32) -1) {\r
383 return 0;\r
384 }\r
385 return Variable->NameSize;\r
386}\r
387\r
388UINT32\r
389DataSizeOfVariable (\r
390 IN VARIABLE_HEADER *Variable\r
391 )\r
392{\r
393 //\r
394 // Check whether the header is valid fully;\r
395 // Tricky: The unprogramed data in FLASH equals 0xff.\r
396 // \r
397 if (Variable->DataSize == (UINT32) -1 || \r
398 Variable->Attributes == (UINT32) -1 || \r
399 Variable->NameSize == (UINT32) -1) {\r
400 return 0;\r
401 }\r
402 return Variable->DataSize;\r
403}\r
404\r
405UINT32\r
406AttributesOfVariable (\r
407 IN VARIABLE_HEADER *Variable\r
408 )\r
409{\r
410\r
411 //\r
412 // Check whether the header is valid fully;\r
413 // Tricky: The unprogramed data in FLASH equals 0xff.\r
414 // \r
415 if (Variable->DataSize == (UINT32) -1 || \r
416 Variable->Attributes == (UINT32) -1 || \r
417 Variable->NameSize == (UINT32) -1) {\r
418 return 0;\r
419 }\r
420 return Variable->Attributes;\r
421}\r
422\r
423\r
8d3a5c82 424UINT8 *\r
8d3a5c82 425GetVariableDataPtr (\r
426 IN VARIABLE_HEADER *Variable\r
427 )\r
428/*++\r
429\r
430Routine Description:\r
431\r
432 This code gets the pointer to the variable data.\r
433\r
434Arguments:\r
435\r
436 Variable Pointer to the Variable Header.\r
437\r
438Returns:\r
439\r
440 UINT8* Pointer to Variable Data\r
441\r
442--*/\r
443{\r
444 //\r
445 // Be careful about pad size for alignment\r
446 //\r
fdb7765f 447 return (UINT8 *) ((UINTN) GET_VARIABLE_NAME_PTR (Variable) + NameSizeOfVariable (Variable) + GET_PAD_SIZE (NameSizeOfVariable (Variable)));\r
8d3a5c82 448}\r
449\r
052ad7e1 450\r
8d3a5c82 451VARIABLE_HEADER *\r
8d3a5c82 452GetNextVariablePtr (\r
453 IN VARIABLE_HEADER *Variable\r
454 )\r
455/*++\r
456\r
457Routine Description:\r
458\r
459 This code gets the pointer to the next variable header.\r
460\r
461Arguments:\r
462\r
463 Variable Pointer to the Variable Header.\r
464\r
465Returns:\r
466\r
467 VARIABLE_HEADER* Pointer to next variable header.\r
468\r
469--*/\r
470{\r
471 if (!IsValidVariableHeader (Variable)) {\r
472 return NULL;\r
473 }\r
474 //\r
475 // Be careful about pad size for alignment\r
476 //\r
9cad030b 477 return (VARIABLE_HEADER *) HEADER_ALIGN (((UINTN) GetVariableDataPtr (Variable) + DataSizeOfVariable (Variable) + GET_PAD_SIZE (DataSizeOfVariable (Variable))));\r
8d3a5c82 478}\r
479\r
9cad030b 480VARIABLE_HEADER *\r
481GetStartPointer (\r
482 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
483 )\r
484/*++\r
485\r
486Routine Description:\r
487\r
488 This code gets the pointer to the first variable memory pointer byte\r
489\r
490Arguments:\r
491\r
492 VarStoreHeader Pointer to the Variable Store Header.\r
493\r
494Returns:\r
495\r
496 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
497\r
498--*/\r
499{\r
500 //\r
501 // The end of variable store\r
502 //\r
503 return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);\r
504}\r
052ad7e1 505\r
8d3a5c82 506VARIABLE_HEADER *\r
8d3a5c82 507GetEndPointer (\r
508 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
509 )\r
510/*++\r
511\r
512Routine Description:\r
513\r
514 This code gets the pointer to the last variable memory pointer byte\r
515\r
516Arguments:\r
517\r
518 VarStoreHeader Pointer to the Variable Store Header.\r
519\r
520Returns:\r
521\r
522 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
523\r
524--*/\r
525{\r
526 //\r
527 // The end of variable store\r
528 //\r
9cad030b 529 return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
8d3a5c82 530}\r
531\r
052ad7e1 532\r
8d3a5c82 533EFI_STATUS\r
8d3a5c82 534Reclaim (\r
535 IN EFI_PHYSICAL_ADDRESS VariableBase,\r
536 OUT UINTN *LastVariableOffset,\r
537 IN BOOLEAN IsVolatile\r
538 )\r
539/*++\r
540\r
541Routine Description:\r
542\r
543 Variable store garbage collection and reclaim operation\r
544\r
545Arguments:\r
546\r
547 VariableBase Base address of variable store\r
548 LastVariableOffset Offset of last variable\r
549 IsVolatile The variable store is volatile or not,\r
550 if it is non-volatile, need FTW\r
551\r
552Returns:\r
553\r
554 EFI STATUS\r
555\r
556--*/\r
557{\r
558 VARIABLE_HEADER *Variable;\r
559 VARIABLE_HEADER *NextVariable;\r
560 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
561 UINT8 *ValidBuffer;\r
562 UINTN ValidBufferSize;\r
563 UINTN VariableSize;\r
564 UINT8 *CurrPtr;\r
565 EFI_STATUS Status;\r
566\r
567 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);\r
568\r
569 //\r
570 // Start Pointers for the variable.\r
571 //\r
9cad030b 572 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 573 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
574\r
575 while (IsValidVariableHeader (Variable)) {\r
576 NextVariable = GetNextVariablePtr (Variable);\r
577 if (Variable->State == VAR_ADDED) {\r
578 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
579 ValidBufferSize += VariableSize;\r
580 }\r
581\r
582 Variable = NextVariable;\r
583 }\r
584\r
585 ValidBuffer = AllocatePool (ValidBufferSize);\r
586 if (ValidBuffer == NULL) {\r
587 return EFI_OUT_OF_RESOURCES;\r
588 }\r
589\r
590 SetMem (ValidBuffer, ValidBufferSize, 0xff);\r
591\r
592 CurrPtr = ValidBuffer;\r
593\r
594 //\r
595 // Copy variable store header\r
596 //\r
597 CopyMem (CurrPtr, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
9cad030b 598 CurrPtr = (UINT8 *) GetStartPointer (VariableStoreHeader);\r
8d3a5c82 599\r
600 //\r
601 // Start Pointers for the variable.\r
602 //\r
9cad030b 603 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 604\r
605 while (IsValidVariableHeader (Variable)) {\r
606 NextVariable = GetNextVariablePtr (Variable);\r
607 if (Variable->State == VAR_ADDED) {\r
608 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
609 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
610 CurrPtr += VariableSize;\r
611 }\r
612\r
613 Variable = NextVariable;\r
614 }\r
615\r
616 if (IsVolatile) {\r
617 //\r
618 // If volatile variable store, just copy valid buffer\r
619 //\r
620 SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);\r
621 CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, ValidBufferSize);\r
622 *LastVariableOffset = ValidBufferSize;\r
623 Status = EFI_SUCCESS;\r
624 } else {\r
625 //\r
626 // If non-volatile variable store, perform FTW here.\r
627 //\r
628 Status = FtwVariableSpace (\r
629 VariableBase,\r
630 ValidBuffer,\r
631 ValidBufferSize\r
632 );\r
633 if (!EFI_ERROR (Status)) {\r
634 *LastVariableOffset = ValidBufferSize;\r
635 }\r
636 }\r
637\r
638 FreePool (ValidBuffer);\r
639\r
640 if (EFI_ERROR (Status)) {\r
641 *LastVariableOffset = 0;\r
642 }\r
643\r
644 return Status;\r
645}\r
646\r
33a5a666
A
647\r
648//\r
649// The current Hii implementation accesses this variable a larg # of times on every boot.\r
650// Other common variables are only accessed a single time. This is why this cache algorithm\r
651// only targets a single variable. Probably to get an performance improvement out of\r
652// a Cache you would need a cache that improves the search performance for a variable.\r
653//\r
654VARIABLE_CACHE_ENTRY mVariableCache[] = {\r
655 {\r
656 &gEfiGlobalVariableGuid,\r
657 L"Lang",\r
658 0x00000000,\r
659 0x00,\r
660 NULL\r
661 }\r
662};\r
663\r
052ad7e1
A
664\r
665/**\r
666 Update the Cache with Variable information. These are the same \r
667 arguments as the EFI Variable services.\r
668\r
669 @param[in] VariableName Name of variable\r
670 @param[in] VendorGuid Guid of variable\r
671 @param[in] Attribute Attribue of the variable\r
672 @param[in] DataSize Size of data. 0 means delete\r
673 @param[in] Data Variable data\r
674\r
675**/\r
33a5a666
A
676VOID\r
677UpdateVariableCache (\r
678 IN CHAR16 *VariableName,\r
679 IN EFI_GUID *VendorGuid,\r
052ad7e1
A
680 IN UINT32 Attributes,\r
681 IN UINTN DataSize,\r
682 IN VOID *Data\r
33a5a666
A
683 )\r
684{\r
685 VARIABLE_CACHE_ENTRY *Entry;\r
686 UINTN Index;\r
687\r
688 if (EfiAtRuntime ()) {\r
689 // Don't use the cache at runtime\r
690 return;\r
691 }\r
692\r
693 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
694 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
695 if (StrCmp (VariableName, Entry->Name) == 0) { \r
696 Entry->Attributes = Attributes;\r
697 if (DataSize == 0) {\r
698 // Delete Case\r
699 if (Entry->DataSize != 0) {\r
700 FreePool (Entry->Data);\r
701 }\r
702 Entry->DataSize = DataSize;\r
703 } else if (DataSize == Entry->DataSize) {\r
704 CopyMem (Entry->Data, Data, DataSize);\r
705 } else {\r
706 Entry->Data = AllocatePool (DataSize);\r
707 Entry->DataSize = DataSize;\r
708 CopyMem (Entry->Data, Data, DataSize);\r
709 }\r
710 }\r
711 }\r
712 }\r
713}\r
714\r
715\r
052ad7e1
A
716/**\r
717 Search the cache to see if the variable is in the cache.\r
718\r
719 @param[in] VariableName Name of variable\r
720 @param[in] VendorGuid Guid of variable\r
721 @param[in] Attribute Attribue returned \r
722 @param[in] DataSize Size of data returned\r
723 @param[in] Data Variable data returned\r
724\r
725 @retval EFI_SUCCESS VariableGuid & VariableName data was returned.\r
726 @retval other Not found.\r
727\r
728**/\r
33a5a666
A
729EFI_STATUS\r
730FindVariableInCache (\r
731 IN CHAR16 *VariableName,\r
732 IN EFI_GUID *VendorGuid,\r
733 OUT UINT32 *Attributes OPTIONAL,\r
734 IN OUT UINTN *DataSize,\r
735 OUT VOID *Data\r
736 )\r
737{\r
738 VARIABLE_CACHE_ENTRY *Entry;\r
739 UINTN Index;\r
740\r
741 if (EfiAtRuntime ()) {\r
742 // Don't use the cache at runtime\r
743 return EFI_NOT_FOUND;\r
744 }\r
745\r
746 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
747 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
748 if (StrCmp (VariableName, Entry->Name) == 0) {\r
749 if (Entry->DataSize == 0) {\r
052ad7e1 750 // Variable was deleted so return not found\r
33a5a666 751 return EFI_NOT_FOUND;\r
aa09397b 752 } else if (Entry->DataSize > *DataSize) {\r
052ad7e1 753 // If the buffer is too small return correct size\r
33a5a666
A
754 *DataSize = Entry->DataSize;\r
755 return EFI_BUFFER_TOO_SMALL;\r
756 } else {\r
aa09397b 757 *DataSize = Entry->DataSize;\r
052ad7e1 758 // Return the data\r
33a5a666
A
759 CopyMem (Data, Entry->Data, Entry->DataSize);\r
760 if (Attributes != NULL) {\r
761 *Attributes = Entry->Attributes;\r
762 }\r
763 return EFI_SUCCESS;\r
764 }\r
765 }\r
766 }\r
767 }\r
768 \r
769 return EFI_NOT_FOUND;\r
770}\r
771\r
772\r
8d3a5c82 773EFI_STATUS\r
8d3a5c82 774FindVariable (\r
775 IN CHAR16 *VariableName,\r
776 IN EFI_GUID *VendorGuid,\r
777 OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
778 IN VARIABLE_GLOBAL *Global\r
779 )\r
780/*++\r
781\r
782Routine Description:\r
783\r
784 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
785\r
786Arguments:\r
787\r
788 VariableName Name of the variable to be found\r
789 VendorGuid Vendor GUID to be found.\r
790 PtrTrack Variable Track Pointer structure that contains\r
791 Variable Information.\r
792 Contains the pointer of Variable header.\r
793 Global VARIABLE_GLOBAL pointer\r
794\r
795Returns:\r
796\r
797 EFI STATUS\r
798\r
799--*/\r
800{\r
801 VARIABLE_HEADER *Variable[2];\r
802 VARIABLE_STORE_HEADER *VariableStoreHeader[2];\r
803 UINTN Index;\r
804\r
8d3a5c82 805 //\r
33a5a666 806 // 0: Volatile, 1: Non-Volatile\r
36873a61 807 // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName\r
808 // make use of this mapping to implement search algorithme.\r
8d3a5c82 809 //\r
052ad7e1
A
810 VariableStoreHeader[0] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
811 VariableStoreHeader[1] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 812\r
813 //\r
814 // Start Pointers for the variable.\r
815 // Actual Data Pointer where data can be written.\r
816 //\r
9cad030b 817 Variable[0] = GetStartPointer (VariableStoreHeader[0]);\r
818 Variable[1] = GetStartPointer (VariableStoreHeader[1]);\r
8d3a5c82 819\r
820 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
821 return EFI_INVALID_PARAMETER;\r
822 }\r
823 //\r
33a5a666 824 // Find the variable by walk through volatile and then non-volatile variable store\r
8d3a5c82 825 //\r
826 for (Index = 0; Index < 2; Index++) {\r
9cad030b 827 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]);\r
8d3a5c82 828 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
829\r
830 while (IsValidVariableHeader (Variable[Index]) && (Variable[Index] <= GetEndPointer (VariableStoreHeader[Index]))) {\r
831 if (Variable[Index]->State == VAR_ADDED) {\r
c6492839 832 if (!EfiAtRuntime () || (Variable[Index]->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
8d3a5c82 833 if (VariableName[0] == 0) {\r
834 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 835 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 836 return EFI_SUCCESS;\r
837 } else {\r
838 if (CompareGuid (VendorGuid, &Variable[Index]->VendorGuid)) {\r
fdb7765f 839 ASSERT (NameSizeOfVariable (Variable[Index]) != 0);\r
840 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable[Index]), NameSizeOfVariable (Variable[Index]))) {\r
8d3a5c82 841 PtrTrack->CurrPtr = Variable[Index];\r
33a5a666 842 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
8d3a5c82 843 return EFI_SUCCESS;\r
844 }\r
845 }\r
846 }\r
847 }\r
848 }\r
849\r
850 Variable[Index] = GetNextVariablePtr (Variable[Index]);\r
851 }\r
8d3a5c82 852 }\r
8d3a5c82 853 PtrTrack->CurrPtr = NULL;\r
854 return EFI_NOT_FOUND;\r
855}\r
856\r
33a5a666 857\r
052ad7e1 858\r
8d3a5c82 859/*++\r
860\r
861Routine Description:\r
862\r
863 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
864\r
865Arguments:\r
866\r
c6492839 867 VariableName Name of Variable to be found\r
868 VendorGuid Variable vendor GUID\r
869 Attributes OPTIONAL Attribute value of the variable found\r
870 DataSize Size of Data found. If size is less than the\r
871 data, this value contains the required size.\r
872 Data Data pointer\r
873 Global Pointer to VARIABLE_GLOBAL structure\r
874 Instance Instance of the Firmware Volume.\r
8d3a5c82 875\r
876Returns:\r
877\r
c6492839 878 EFI_INVALID_PARAMETER - Invalid parameter\r
879 EFI_SUCCESS - Find the specified variable\r
880 EFI_NOT_FOUND - Not found\r
881 EFI_BUFFER_TO_SMALL - DataSize is too small for the result\r
882\r
8d3a5c82 883\r
884--*/\r
052ad7e1
A
885EFI_STATUS\r
886EFIAPI\r
887RuntimeServiceGetVariable (\r
888 IN CHAR16 *VariableName,\r
889 IN EFI_GUID *VendorGuid,\r
890 OUT UINT32 *Attributes OPTIONAL,\r
891 IN OUT UINTN *DataSize,\r
892 OUT VOID *Data\r
893 )\r
8d3a5c82 894{\r
052ad7e1 895 EFI_STATUS Status;\r
8d3a5c82 896 VARIABLE_POINTER_TRACK Variable;\r
897 UINTN VarDataSize;\r
8d3a5c82 898\r
899 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
900 return EFI_INVALID_PARAMETER;\r
901 }\r
33a5a666 902\r
fdb7765f 903 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
904\r
8d3a5c82 905 //\r
906 // Find existing variable\r
907 //\r
33a5a666
A
908 Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
909 if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){\r
910 // Hit in the Cache\r
911 UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);\r
fdb7765f 912 goto Done;\r
33a5a666
A
913 }\r
914 \r
052ad7e1 915 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 916 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
917 goto Done;\r
918 }\r
33a5a666 919\r
8d3a5c82 920 //\r
921 // Get data size\r
922 //\r
fdb7765f 923 VarDataSize = DataSizeOfVariable (Variable.CurrPtr);\r
924 ASSERT (VarDataSize != 0);\r
925\r
8d3a5c82 926 if (*DataSize >= VarDataSize) {\r
927 if (Data == NULL) {\r
928 Status = EFI_INVALID_PARAMETER;\r
929 goto Done;\r
930 }\r
931\r
932 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
933 if (Attributes != NULL) {\r
934 *Attributes = Variable.CurrPtr->Attributes;\r
935 }\r
936\r
937 *DataSize = VarDataSize;\r
33a5a666
A
938 UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);\r
939 UpdateVariableCache (VariableName, VendorGuid, Variable.CurrPtr->Attributes, VarDataSize, Data);\r
940 \r
8d3a5c82 941 Status = EFI_SUCCESS;\r
942 goto Done;\r
943 } else {\r
944 *DataSize = VarDataSize;\r
945 Status = EFI_BUFFER_TOO_SMALL;\r
946 goto Done;\r
947 }\r
948\r
949Done:\r
052ad7e1 950 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 951 return Status;\r
952}\r
953\r
052ad7e1
A
954\r
955\r
8d3a5c82 956/*++\r
957\r
958Routine Description:\r
959\r
960 This code Finds the Next available variable\r
961\r
962Arguments:\r
963\r
964 VariableNameSize Size of the variable\r
965 VariableName Pointer to variable name\r
966 VendorGuid Variable Vendor Guid\r
967 Global VARIABLE_GLOBAL structure pointer.\r
968 Instance FV instance\r
969\r
970Returns:\r
971\r
972 EFI STATUS\r
973\r
974--*/\r
052ad7e1
A
975EFI_STATUS\r
976EFIAPI\r
977RuntimeServiceGetNextVariableName (\r
978 IN OUT UINTN *VariableNameSize,\r
979 IN OUT CHAR16 *VariableName,\r
980 IN OUT EFI_GUID *VendorGuid\r
981 )\r
8d3a5c82 982{\r
983 VARIABLE_POINTER_TRACK Variable;\r
984 UINTN VarNameSize;\r
985 EFI_STATUS Status;\r
986\r
987 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
988 return EFI_INVALID_PARAMETER;\r
989 }\r
990\r
fdb7765f 991 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
992\r
052ad7e1 993 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
8d3a5c82 994 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
995 goto Done;\r
996 }\r
997\r
998 if (VariableName[0] != 0) {\r
999 //\r
1000 // If variable name is not NULL, get next variable\r
1001 //\r
1002 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1003 }\r
1004\r
1005 while (TRUE) {\r
1006 //\r
1007 // If both volatile and non-volatile variable store are parsed,\r
1008 // return not found\r
1009 //\r
1010 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
1011 Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));\r
36873a61 1012 if (!Variable.Volatile) {\r
9cad030b 1013 Variable.StartPtr = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
1014 Variable.EndPtr = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase));\r
8d3a5c82 1015 } else {\r
1016 Status = EFI_NOT_FOUND;\r
1017 goto Done;\r
1018 }\r
1019\r
1020 Variable.CurrPtr = Variable.StartPtr;\r
1021 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
1022 continue;\r
1023 }\r
1024 }\r
1025 //\r
1026 // Variable is found\r
1027 //\r
1028 if (IsValidVariableHeader (Variable.CurrPtr) && Variable.CurrPtr->State == VAR_ADDED) {\r
1029 if (!(EfiAtRuntime () && !(Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS))) {\r
fdb7765f 1030 VarNameSize = NameSizeOfVariable (Variable.CurrPtr);\r
1031 ASSERT (VarNameSize != 0);\r
1032\r
8d3a5c82 1033 if (VarNameSize <= *VariableNameSize) {\r
1034 CopyMem (\r
1035 VariableName,\r
1036 GET_VARIABLE_NAME_PTR (Variable.CurrPtr),\r
1037 VarNameSize\r
1038 );\r
1039 CopyMem (\r
1040 VendorGuid,\r
1041 &Variable.CurrPtr->VendorGuid,\r
1042 sizeof (EFI_GUID)\r
1043 );\r
1044 Status = EFI_SUCCESS;\r
1045 } else {\r
1046 Status = EFI_BUFFER_TOO_SMALL;\r
1047 }\r
1048\r
1049 *VariableNameSize = VarNameSize;\r
1050 goto Done;\r
1051 }\r
1052 }\r
1053\r
1054 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1055 }\r
1056\r
1057Done:\r
052ad7e1 1058 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1059 return Status;\r
1060}\r
1061\r
052ad7e1 1062\r
8d3a5c82 1063/*++\r
1064\r
1065Routine Description:\r
1066\r
1067 This code sets variable in storage blocks (Volatile or Non-Volatile)\r
1068\r
1069Arguments:\r
1070\r
1071 VariableName Name of Variable to be found\r
1072 VendorGuid Variable vendor GUID\r
1073 Attributes Attribute value of the variable found\r
1074 DataSize Size of Data found. If size is less than the\r
1075 data, this value contains the required size.\r
1076 Data Data pointer\r
1077 Global Pointer to VARIABLE_GLOBAL structure\r
1078 VolatileOffset The offset of last volatile variable\r
1079 NonVolatileOffset The offset of last non-volatile variable\r
1080 Instance Instance of the Firmware Volume.\r
1081\r
1082Returns:\r
1083\r
8d3a5c82 1084 EFI_INVALID_PARAMETER - Invalid parameter\r
1085 EFI_SUCCESS - Set successfully\r
1086 EFI_OUT_OF_RESOURCES - Resource not enough to set variable\r
1087 EFI_NOT_FOUND - Not found\r
c6492839 1088 EFI_DEVICE_ERROR - Variable can not be saved due to hardware failure\r
1089 EFI_WRITE_PROTECTED - Variable is read-only\r
8d3a5c82 1090\r
1091--*/\r
052ad7e1
A
1092EFI_STATUS\r
1093EFIAPI\r
1094RuntimeServiceSetVariable (\r
1095 IN CHAR16 *VariableName,\r
1096 IN EFI_GUID *VendorGuid,\r
1097 IN UINT32 Attributes,\r
1098 IN UINTN DataSize,\r
1099 IN VOID *Data\r
1100 )\r
8d3a5c82 1101{\r
1102 VARIABLE_POINTER_TRACK Variable;\r
1103 EFI_STATUS Status;\r
1104 VARIABLE_HEADER *NextVariable;\r
1105 UINTN VarNameSize;\r
1106 UINTN VarNameOffset;\r
1107 UINTN VarDataOffset;\r
1108 UINTN VarSize;\r
1109 UINT8 State;\r
1110 BOOLEAN Reclaimed;\r
052ad7e1
A
1111 UINTN *VolatileOffset;\r
1112 UINTN *NonVolatileOffset;\r
1113 UINT32 Instance;\r
fd51bf70 1114 BOOLEAN Volatile;\r
fdb7765f 1115 EFI_PHYSICAL_ADDRESS Point;\r
8d3a5c82 1116\r
c6492839 1117 //\r
1118 // Check input parameters\r
1119 //\r
8d3a5c82 1120 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1121 return EFI_INVALID_PARAMETER;\r
c6492839 1122 } \r
1123 //\r
1124 // Make sure if runtime bit is set, boot service bit is set also\r
1125 //\r
1126 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1127 return EFI_INVALID_PARAMETER;\r
8d3a5c82 1128 }\r
fdb7765f 1129\r
c6492839 1130 //\r
1131 // The size of the VariableName, including the Unicode Null in bytes plus\r
1132 // the DataSize is limited to maximum size of MAX_HARDWARE_ERROR_VARIABLE_SIZE (32K)\r
1133 // bytes for HwErrRec, and MAX_VARIABLE_SIZE (1024) bytes for the others.\r
1134 //\r
1135 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1136 if ((DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE) || \r
1137 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE)) {\r
1138 return EFI_INVALID_PARAMETER;\r
1139 } \r
1140 } else {\r
1141 //\r
1142 // The size of the VariableName, including the Unicode Null in bytes plus\r
1143 // the DataSize is limited to maximum size of MAX_VARIABLE_SIZE (1024) bytes.\r
1144 //\r
1145 if ((DataSize > MAX_VARIABLE_SIZE) ||\r
1146 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_VARIABLE_SIZE)) {\r
1147 return EFI_INVALID_PARAMETER;\r
1148 } \r
1149 } \r
fdb7765f 1150\r
1151 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1152\r
1153 Reclaimed = FALSE;\r
1154 Instance = mVariableModuleGlobal->FvbInstance;\r
1155 VolatileOffset = &mVariableModuleGlobal->VolatileLastVariableOffset;\r
1156\r
1157 //\r
1158 // Consider reentrant in MCA/INIT/NMI. It needs be reupdated;\r
1159 //\r
1160 if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {\r
fdb7765f 1161 Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;;\r
1162 //\r
1163 // Parse non-volatile variable data and get last variable offset\r
1164 //\r
9cad030b 1165 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);\r
fdb7765f 1166 while (IsValidVariableHeader (NextVariable)) {\r
1167 NextVariable = GetNextVariablePtr (NextVariable);\r
1168 }\r
1169 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;\r
1170 }\r
1171\r
1172 NonVolatileOffset = &mVariableModuleGlobal->NonVolatileLastVariableOffset;\r
1173 \r
1174\r
c6492839 1175 //\r
1176 // Check whether the input variable is already existed\r
1177 //\r
1178 \r
052ad7e1 1179 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
c6492839 1180 if (Status == EFI_SUCCESS && Variable.CurrPtr != NULL) {\r
8d3a5c82 1181 //\r
c6492839 1182 // Update/Delete existing variable\r
8d3a5c82 1183 //\r
fd51bf70 1184 Volatile = Variable.Volatile;\r
c6492839 1185 \r
1186 if (EfiAtRuntime ()) { \r
1187 //\r
1188 // If EfiAtRuntime and the variable is Volatile and Runtime Access, \r
1189 // the volatile is ReadOnly, and SetVariable should be aborted and \r
1190 // return EFI_WRITE_PROTECTED.\r
1191 //\r
1192 if (Variable.Volatile) {\r
1193 Status = EFI_WRITE_PROTECTED;\r
1194 goto Done;\r
1195 }\r
1196 //\r
1197 // Only variable have NV attribute can be updated/deleted in Runtime\r
1198 //\r
1199 if (!(Variable.CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE)) {\r
1200 Status = EFI_INVALID_PARAMETER;\r
1201 goto Done; \r
1202 }\r
1203 }\r
8d3a5c82 1204 //\r
c6492839 1205 // Setting a data variable with no access, or zero DataSize attributes\r
1206 // specified causes it to be deleted.\r
8d3a5c82 1207 //\r
c6492839 1208 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { \r
1209 State = Variable.CurrPtr->State;\r
1210 State &= VAR_DELETED;\r
1211\r
1212 Status = UpdateVariableStore (\r
052ad7e1 1213 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1214 Variable.Volatile,\r
1215 FALSE,\r
1216 Instance,\r
1217 (UINTN) &Variable.CurrPtr->State,\r
1218 sizeof (UINT8),\r
1219 &State\r
1220 ); \r
33a5a666 1221 if (!EFI_ERROR (Status)) {\r
fd51bf70 1222 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);\r
33a5a666
A
1223 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1224 }\r
c6492839 1225 goto Done; \r
1226 }\r
8d3a5c82 1227 //\r
c6492839 1228 // If the variable is marked valid and the same data has been passed in\r
1229 // then return to the caller immediately.\r
8d3a5c82 1230 //\r
fdb7765f 1231 if (DataSizeOfVariable (Variable.CurrPtr) == DataSize &&\r
c6492839 1232 (CompareMem (Data, GetVariableDataPtr (Variable.CurrPtr), DataSize) == 0)) {\r
33a5a666 1233 \r
fd51bf70 1234 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
c6492839 1235 Status = EFI_SUCCESS;\r
1236 goto Done;\r
1237 } else if ((Variable.CurrPtr->State == VAR_ADDED) ||\r
1238 (Variable.CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
1239 //\r
1240 // Mark the old variable as in delete transition\r
1241 //\r
1242 State = Variable.CurrPtr->State;\r
1243 State &= VAR_IN_DELETED_TRANSITION;\r
1244\r
1245 Status = UpdateVariableStore (\r
052ad7e1 1246 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1247 Variable.Volatile,\r
1248 FALSE,\r
1249 Instance,\r
1250 (UINTN) &Variable.CurrPtr->State,\r
1251 sizeof (UINT8),\r
1252 &State\r
1253 ); \r
1254 if (EFI_ERROR (Status)) {\r
1255 goto Done; \r
33a5a666 1256 } \r
c6492839 1257 } \r
1258 } else if (Status == EFI_NOT_FOUND) {\r
8d3a5c82 1259 //\r
c6492839 1260 // Create a new variable\r
1261 // \r
1262 \r
8d3a5c82 1263 //\r
c6492839 1264 // Make sure we are trying to create a new variable.\r
1265 // Setting a data variable with no access, or zero DataSize attributes means to delete it. \r
8d3a5c82 1266 //\r
c6492839 1267 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
1268 Status = EFI_NOT_FOUND;\r
1269 goto Done;\r
1270 }\r
1271 \r
8d3a5c82 1272 //\r
c6492839 1273 // Only variable have NV|RT attribute can be created in Runtime\r
1274 //\r
1275 if (EfiAtRuntime () &&\r
1276 (!(Attributes & EFI_VARIABLE_RUNTIME_ACCESS) || !(Attributes & EFI_VARIABLE_NON_VOLATILE))) {\r
1277 Status = EFI_INVALID_PARAMETER;\r
1278 goto Done;\r
1279 } \r
1280 } else {\r
8d3a5c82 1281 //\r
c6492839 1282 // Status should be EFI_INVALID_PARAMETER here according to return status of FindVariable().\r
8d3a5c82 1283 //\r
c6492839 1284 ASSERT (Status == EFI_INVALID_PARAMETER);\r
8d3a5c82 1285 goto Done;\r
c6492839 1286 }\r
1287\r
1288 //\r
1289 // Function part - create a new variable and copy the data.\r
1290 // Both update a variable and create a variable will come here.\r
1291 //\r
1292 // Tricky part: Use scratch data area at the end of volatile variable store\r
1293 // as a temporary storage.\r
1294 //\r
052ad7e1 1295 NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));\r
c6492839 1296\r
1297 SetMem (NextVariable, SCRATCH_SIZE, 0xff);\r
1298\r
1299 NextVariable->StartId = VARIABLE_DATA;\r
1300 NextVariable->Attributes = Attributes;\r
1301 //\r
1302 // NextVariable->State = VAR_ADDED;\r
1303 //\r
1304 NextVariable->Reserved = 0;\r
1305 VarNameOffset = sizeof (VARIABLE_HEADER);\r
1306 VarNameSize = StrSize (VariableName);\r
1307 CopyMem (\r
1308 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
1309 VariableName,\r
1310 VarNameSize\r
1311 );\r
1312 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
1313 CopyMem (\r
1314 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
1315 Data,\r
1316 DataSize\r
1317 );\r
1318 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
1319 //\r
1320 // There will be pad bytes after Data, the NextVariable->NameSize and\r
1321 // NextVariable->DataSize should not include pad size so that variable\r
1322 // service can get actual size in GetVariable\r
1323 //\r
1324 NextVariable->NameSize = (UINT32)VarNameSize;\r
1325 NextVariable->DataSize = (UINT32)DataSize;\r
1326\r
1327 //\r
1328 // The actual size of the variable that stores in storage should\r
1329 // include pad size.\r
1330 //\r
1331 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
1332 if (Attributes & EFI_VARIABLE_NON_VOLATILE) {\r
8d3a5c82 1333 //\r
c6492839 1334 // Create a nonvolatile variable\r
8d3a5c82 1335 //\r
fd51bf70 1336 Volatile = FALSE;\r
c6492839 1337 \r
1338 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1339 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
c6492839 1340 ) {\r
1341 if (EfiAtRuntime ()) {\r
1342 Status = EFI_OUT_OF_RESOURCES;\r
1343 goto Done;\r
1344 }\r
1345 //\r
1346 // Perform garbage collection & reclaim operation\r
1347 //\r
052ad7e1 1348 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, NonVolatileOffset, FALSE);\r
8d3a5c82 1349 if (EFI_ERROR (Status)) {\r
1350 goto Done;\r
1351 }\r
8d3a5c82 1352 //\r
c6492839 1353 // If still no enough space, return out of resources\r
8d3a5c82 1354 //\r
c6492839 1355 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
052ad7e1 1356 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
8d3a5c82 1357 ) {\r
c6492839 1358 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1359 goto Done;\r
8d3a5c82 1360 }\r
c6492839 1361 \r
1362 Reclaimed = TRUE;\r
8d3a5c82 1363 }\r
1364 //\r
c6492839 1365 // Three steps\r
1366 // 1. Write variable header\r
1367 // 2. Write variable data\r
1368 // 3. Set variable state to valid\r
8d3a5c82 1369 //\r
8d3a5c82 1370 //\r
c6492839 1371 // Step 1:\r
8d3a5c82 1372 //\r
c6492839 1373 Status = UpdateVariableStore (\r
052ad7e1 1374 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1375 FALSE,\r
1376 TRUE,\r
1377 Instance,\r
1378 *NonVolatileOffset,\r
1379 sizeof (VARIABLE_HEADER),\r
1380 (UINT8 *) NextVariable\r
1381 );\r
1382\r
1383 if (EFI_ERROR (Status)) {\r
1384 goto Done;\r
1385 }\r
8d3a5c82 1386 //\r
c6492839 1387 // Step 2:\r
8d3a5c82 1388 //\r
c6492839 1389 Status = UpdateVariableStore (\r
052ad7e1 1390 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1391 FALSE,\r
1392 TRUE,\r
1393 Instance,\r
1394 *NonVolatileOffset + sizeof (VARIABLE_HEADER),\r
1395 (UINT32) VarSize - sizeof (VARIABLE_HEADER),\r
1396 (UINT8 *) NextVariable + sizeof (VARIABLE_HEADER)\r
1397 );\r
1398\r
1399 if (EFI_ERROR (Status)) {\r
1400 goto Done;\r
1401 }\r
8d3a5c82 1402 //\r
c6492839 1403 // Step 3:\r
8d3a5c82 1404 //\r
c6492839 1405 NextVariable->State = VAR_ADDED;\r
1406 Status = UpdateVariableStore (\r
052ad7e1 1407 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1408 FALSE,\r
1409 TRUE,\r
1410 Instance,\r
1411 *NonVolatileOffset,\r
1412 sizeof (VARIABLE_HEADER),\r
1413 (UINT8 *) NextVariable\r
1414 );\r
1415\r
1416 if (EFI_ERROR (Status)) {\r
1417 goto Done;\r
1418 }\r
8d3a5c82 1419\r
9cad030b 1420 *NonVolatileOffset = HEADER_ALIGN (*NonVolatileOffset + VarSize);\r
8d3a5c82 1421\r
c6492839 1422 } else {\r
1423 //\r
1424 // Create a volatile variable\r
1425 // \r
fd51bf70 1426 Volatile = TRUE;\r
c6492839 1427\r
1428 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1429 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {\r
8d3a5c82 1430 //\r
c6492839 1431 // Perform garbage collection & reclaim operation\r
8d3a5c82 1432 //\r
052ad7e1 1433 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, VolatileOffset, TRUE);\r
8d3a5c82 1434 if (EFI_ERROR (Status)) {\r
1435 goto Done;\r
1436 }\r
1437 //\r
c6492839 1438 // If still no enough space, return out of resources\r
8d3a5c82 1439 //\r
8d3a5c82 1440 if ((UINT32) (VarSize +*VolatileOffset) >\r
052ad7e1 1441 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size\r
8d3a5c82 1442 ) {\r
c6492839 1443 Status = EFI_OUT_OF_RESOURCES;\r
8d3a5c82 1444 goto Done;\r
1445 }\r
c6492839 1446 \r
1447 Reclaimed = TRUE;\r
8d3a5c82 1448 }\r
8d3a5c82 1449\r
c6492839 1450 NextVariable->State = VAR_ADDED;\r
1451 Status = UpdateVariableStore (\r
052ad7e1 1452 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1453 TRUE,\r
1454 TRUE,\r
1455 Instance,\r
1456 *VolatileOffset,\r
1457 (UINT32) VarSize,\r
1458 (UINT8 *) NextVariable\r
1459 );\r
1460\r
1461 if (EFI_ERROR (Status)) {\r
1462 goto Done;\r
8d3a5c82 1463 }\r
c6492839 1464\r
9cad030b 1465 *VolatileOffset = HEADER_ALIGN (*VolatileOffset + VarSize);\r
c6492839 1466 }\r
1467 //\r
1468 // Mark the old variable as deleted\r
1469 //\r
1470 if (!Reclaimed && !EFI_ERROR (Status) && Variable.CurrPtr != NULL) {\r
1471 State = Variable.CurrPtr->State;\r
1472 State &= VAR_DELETED;\r
1473\r
1474 Status = UpdateVariableStore (\r
052ad7e1 1475 &mVariableModuleGlobal->VariableGlobal,\r
c6492839 1476 Variable.Volatile,\r
1477 FALSE,\r
1478 Instance,\r
1479 (UINTN) &Variable.CurrPtr->State,\r
1480 sizeof (UINT8),\r
1481 &State\r
1482 );\r
33a5a666
A
1483 \r
1484 if (!EFI_ERROR (Status)) {\r
fd51bf70 1485 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1486 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1487 }\r
c6492839 1488 goto Done; \r
8d3a5c82 1489 }\r
1490\r
1491 Status = EFI_SUCCESS;\r
fd51bf70 1492 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
33a5a666
A
1493 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1494\r
8d3a5c82 1495Done:\r
fdb7765f 1496 InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);\r
052ad7e1 1497 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
fdb7765f 1498\r
8d3a5c82 1499 return Status;\r
1500}\r
1501\r
052ad7e1 1502\r
8d3a5c82 1503/*++\r
1504\r
1505Routine Description:\r
1506\r
1507 This code returns information about the EFI variables.\r
1508\r
1509Arguments:\r
1510\r
1511 Attributes Attributes bitmask to specify the type of variables\r
1512 on which to return information.\r
1513 MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
1514 for the EFI variables associated with the attributes specified.\r
1515 RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
c6492839 1516 for EFI variables associated with the attributes specified.\r
1517 MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
8d3a5c82 1518 associated with the attributes specified.\r
1519 Global Pointer to VARIABLE_GLOBAL structure.\r
1520 Instance Instance of the Firmware Volume.\r
1521\r
1522Returns:\r
1523\r
1524 EFI STATUS\r
1525 EFI_INVALID_PARAMETER - An invalid combination of attribute bits was supplied.\r
1526 EFI_SUCCESS - Query successfully.\r
1527 EFI_UNSUPPORTED - The attribute is not supported on this platform.\r
1528\r
1529--*/\r
052ad7e1
A
1530EFI_STATUS\r
1531EFIAPI\r
1532RuntimeServiceQueryVariableInfo (\r
1533 IN UINT32 Attributes,\r
1534 OUT UINT64 *MaximumVariableStorageSize,\r
1535 OUT UINT64 *RemainingVariableStorageSize,\r
1536 OUT UINT64 *MaximumVariableSize\r
1537 )\r
8d3a5c82 1538{\r
1539 VARIABLE_HEADER *Variable;\r
1540 VARIABLE_HEADER *NextVariable;\r
1541 UINT64 VariableSize;\r
1542 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1543\r
c6492839 1544 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
8d3a5c82 1545 return EFI_INVALID_PARAMETER;\r
1546 }\r
c6492839 1547 \r
1548 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
8d3a5c82 1549 //\r
1550 // Make sure the Attributes combination is supported by the platform.\r
1551 //\r
c6492839 1552 return EFI_UNSUPPORTED; \r
8d3a5c82 1553 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1554 //\r
1555 // Make sure if runtime bit is set, boot service bit is set also.\r
1556 //\r
1557 return EFI_INVALID_PARAMETER;\r
1558 } else if (EfiAtRuntime () && !(Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1559 //\r
1560 // Make sure RT Attribute is set if we are in Runtime phase.\r
1561 //\r
1562 return EFI_INVALID_PARAMETER;\r
1563 }\r
1564\r
052ad7e1 1565 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1566\r
1567 if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
1568 //\r
1569 // Query is Volatile related.\r
1570 //\r
052ad7e1 1571 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
8d3a5c82 1572 } else {\r
1573 //\r
1574 // Query is Non-Volatile related.\r
1575 //\r
052ad7e1 1576 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1577 }\r
1578\r
1579 //\r
1580 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
1581 // with the storage size (excluding the storage header size).\r
1582 //\r
1583 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1584 *RemainingVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1585\r
1586 //\r
c6492839 1587 // Let *MaximumVariableSize be MAX_VARIABLE_SIZE with the exception of the variable header size.\r
8d3a5c82 1588 //\r
c6492839 1589 *MaximumVariableSize = MAX_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1590\r
1591 //\r
1592 // Harware error record variable needs larger size.\r
1593 //\r
1594 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1595 *MaximumVariableSize = MAX_HARDWARE_ERROR_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1596 }\r
8d3a5c82 1597\r
1598 //\r
1599 // Point to the starting address of the variables.\r
1600 //\r
9cad030b 1601 Variable = GetStartPointer (VariableStoreHeader);\r
8d3a5c82 1602\r
1603 //\r
1604 // Now walk through the related variable store.\r
1605 //\r
1606 while (IsValidVariableHeader (Variable) && (Variable < GetEndPointer (VariableStoreHeader))) {\r
1607 NextVariable = GetNextVariablePtr (Variable);\r
1608 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
1609\r
1610 if (EfiAtRuntime ()) {\r
1611 //\r
1612 // we don't take the state of the variables in mind\r
1613 // when calculating RemainingVariableStorageSize,\r
1614 // since the space occupied by variables not marked with\r
1615 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
1616 //\r
1617 *RemainingVariableStorageSize -= VariableSize;\r
1618 } else {\r
1619 //\r
1620 // Only care about Variables with State VAR_ADDED,because\r
1621 // the space not marked as VAR_ADDED is reclaimable now.\r
1622 //\r
1623 if (Variable->State == VAR_ADDED) {\r
1624 *RemainingVariableStorageSize -= VariableSize;\r
1625 }\r
1626 }\r
1627\r
1628 //\r
1629 // Go to the next one\r
1630 //\r
1631 Variable = NextVariable;\r
1632 }\r
1633\r
c6492839 1634 if (*RemainingVariableStorageSize < sizeof (VARIABLE_HEADER)) {\r
1635 *MaximumVariableSize = 0;\r
1636 } else if ((*RemainingVariableStorageSize - sizeof (VARIABLE_HEADER)) < *MaximumVariableSize) {\r
1637 *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (VARIABLE_HEADER);\r
1638 }\r
1639\r
052ad7e1 1640 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
8d3a5c82 1641 return EFI_SUCCESS;\r
1642}\r
1643\r
1644EFI_STATUS\r
8d3a5c82 1645VariableCommonInitialize (\r
1646 IN EFI_HANDLE ImageHandle,\r
1647 IN EFI_SYSTEM_TABLE *SystemTable\r
1648 )\r
1649/*++\r
1650\r
1651Routine Description:\r
1652 This function does common initialization for variable services\r
1653\r
1654Arguments:\r
1655\r
1656 ImageHandle - The firmware allocated handle for the EFI image.\r
1657 SystemTable - A pointer to the EFI System Table.\r
1658\r
1659Returns:\r
1660\r
1661 Status code.\r
1662\r
1663 EFI_NOT_FOUND - Variable store area not found.\r
1664 EFI_UNSUPPORTED - Currently only one non-volatile variable store is supported.\r
1665 EFI_SUCCESS - Variable services successfully initialized.\r
1666\r
1667--*/\r
1668{\r
1669 EFI_STATUS Status;\r
1670 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
1671 CHAR8 *CurrPtr;\r
1672 VARIABLE_STORE_HEADER *VolatileVariableStore;\r
1673 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1674 VARIABLE_HEADER *NextVariable;\r
1675 UINT32 Instance;\r
1676 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
8d3a5c82 1677 UINT64 TempVariableStoreHeader;\r
8d3a5c82 1678 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
8d3a5c82 1679 UINT64 BaseAddress;\r
1680 UINT64 Length;\r
1681 UINTN Index;\r
1682 UINT8 Data;\r
052ad7e1
A
1683 UINT64 VariableStoreBase;\r
1684 UINT64 VariableStoreLength;\r
8d3a5c82 1685\r
8d3a5c82 1686\r
052ad7e1 1687 EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);\r
fdb7765f 1688 mVariableModuleGlobal->VariableGlobal.ReentrantState = 0;\r
8d3a5c82 1689\r
1690 //\r
1691 // Allocate memory for volatile variable store\r
1692 //\r
1693 VolatileVariableStore = AllocateRuntimePool (VARIABLE_STORE_SIZE + SCRATCH_SIZE);\r
1694 if (VolatileVariableStore == NULL) {\r
1695 FreePool (mVariableModuleGlobal);\r
1696 return EFI_OUT_OF_RESOURCES;\r
1697 }\r
1698\r
1699 SetMem (VolatileVariableStore, VARIABLE_STORE_SIZE + SCRATCH_SIZE, 0xff);\r
1700\r
1701 //\r
1702 // Variable Specific Data\r
1703 //\r
052ad7e1 1704 mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;\r
9cad030b 1705 mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;\r
8d3a5c82 1706\r
1707 VolatileVariableStore->Signature = VARIABLE_STORE_SIGNATURE;\r
1708 VolatileVariableStore->Size = VARIABLE_STORE_SIZE;\r
1709 VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;\r
1710 VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;\r
1711 VolatileVariableStore->Reserved = 0;\r
1712 VolatileVariableStore->Reserved1 = 0;\r
1713\r
1714 //\r
1715 // Get non volatile varaible store\r
1716 //\r
1717\r
1718 TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);\r
052ad7e1 1719 VariableStoreBase = TempVariableStoreHeader + \\r
8d3a5c82 1720 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
052ad7e1 1721 VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \\r
8d3a5c82 1722 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
1723 //\r
1724 // Mark the variable storage region of the FLASH as RUNTIME\r
1725 //\r
052ad7e1
A
1726 BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);\r
1727 Length = VariableStoreLength + (VariableStoreBase - BaseAddress);\r
8d3a5c82 1728 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
1729\r
1730 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
1731 if (EFI_ERROR (Status)) {\r
1732 FreePool (mVariableModuleGlobal);\r
1733 FreePool (VolatileVariableStore);\r
1734 return EFI_UNSUPPORTED;\r
1735 }\r
1736\r
1737 Status = gDS->SetMemorySpaceAttributes (\r
1738 BaseAddress,\r
1739 Length,\r
1740 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
1741 );\r
1742 if (EFI_ERROR (Status)) {\r
1743 FreePool (mVariableModuleGlobal);\r
1744 FreePool (VolatileVariableStore);\r
1745 return EFI_UNSUPPORTED;\r
1746 }\r
1747 //\r
1748 // Get address of non volatile variable store base\r
1749 //\r
052ad7e1 1750 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;\r
8d3a5c82 1751\r
1752 //\r
1753 // Check Integrity\r
1754 //\r
1755 //\r
1756 // Find the Correct Instance of the FV Block Service.\r
1757 //\r
1758 Instance = 0;\r
052ad7e1 1759 CurrPtr = (CHAR8 *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
8d3a5c82 1760 while (EfiFvbGetPhysicalAddress (Instance, &FvVolHdr) == EFI_SUCCESS) {\r
1761 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
1762 if (CurrPtr >= (CHAR8 *) FwVolHeader && CurrPtr < (((CHAR8 *) FwVolHeader) + FwVolHeader->FvLength)) {\r
1763 mVariableModuleGlobal->FvbInstance = Instance;\r
1764 break;\r
1765 }\r
1766\r
1767 Instance++;\r
1768 }\r
1769\r
1770 VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;\r
1771 if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {\r
1772 if (~VariableStoreHeader->Size == 0) {\r
1773 Status = UpdateVariableStore (\r
052ad7e1 1774 &mVariableModuleGlobal->VariableGlobal,\r
8d3a5c82 1775 FALSE,\r
1776 FALSE,\r
1777 mVariableModuleGlobal->FvbInstance,\r
1778 (UINTN) &VariableStoreHeader->Size,\r
1779 sizeof (UINT32),\r
052ad7e1 1780 (UINT8 *) &VariableStoreLength\r
8d3a5c82 1781 );\r
1782 //\r
1783 // As Variables are stored in NV storage, which are slow devices,such as flash.\r
1784 // Variable operation may skip checking variable program result to improve performance,\r
1785 // We can assume Variable program is OK through some check point.\r
1786 // Variable Store Size Setting should be the first Variable write operation,\r
1787 // We can assume all Read/Write is OK if we can set Variable store size successfully.\r
1788 // If write fail, we will assert here\r
1789 //\r
052ad7e1 1790 ASSERT(VariableStoreHeader->Size == VariableStoreLength);\r
8d3a5c82 1791\r
1792 if (EFI_ERROR (Status)) {\r
1793 return Status;\r
1794 }\r
1795 }\r
1796\r
052ad7e1 1797 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);\r
8d3a5c82 1798 //\r
1799 // Parse non-volatile variable data and get last variable offset\r
1800 //\r
9cad030b 1801 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) CurrPtr);\r
8d3a5c82 1802 Status = EFI_SUCCESS;\r
1803\r
1804 while (IsValidVariableHeader (NextVariable)) {\r
1805 NextVariable = GetNextVariablePtr (NextVariable);\r
1806 }\r
1807\r
1808 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) CurrPtr;\r
1809\r
1810 //\r
1811 // Check if the free area is blow a threshold\r
1812 //\r
1813 if ((((VARIABLE_STORE_HEADER *)((UINTN) CurrPtr))->Size - mVariableModuleGlobal->NonVolatileLastVariableOffset) < VARIABLE_RECLAIM_THRESHOLD) {\r
1814 Status = Reclaim (\r
052ad7e1 1815 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1816 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1817 FALSE\r
1818 );\r
1819 }\r
1820\r
1821 if (EFI_ERROR (Status)) {\r
1822 FreePool (mVariableModuleGlobal);\r
1823 FreePool (VolatileVariableStore);\r
1824 return Status;\r
1825 }\r
1826\r
1827 //\r
1828 // Check if the free area is really free.\r
1829 //\r
1830 for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {\r
052ad7e1 1831 Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)[Index];\r
8d3a5c82 1832 if (Data != 0xff) {\r
1833 //\r
1834 // There must be something wrong in variable store, do reclaim operation.\r
1835 //\r
1836 Status = Reclaim (\r
052ad7e1 1837 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
8d3a5c82 1838 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1839 FALSE\r
1840 );\r
1841 break;\r
1842 }\r
1843 }\r
1844 }\r
1845\r
1846 if (EFI_ERROR (Status)) {\r
1847 FreePool (mVariableModuleGlobal);\r
1848 FreePool (VolatileVariableStore);\r
1849 }\r
1850\r
1851 return Status;\r
1852}\r
052ad7e1
A
1853\r
1854\r
1855\r
1856\r
1857VOID\r
1858EFIAPI\r
1859VariableClassAddressChangeEvent (\r
1860 IN EFI_EVENT Event,\r
1861 IN VOID *Context\r
1862 )\r
1863{\r
1864 EfiConvertPointer (\r
1865 0x0,\r
1866 (VOID **) &mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase\r
1867 );\r
1868 EfiConvertPointer (\r
1869 0x0,\r
1870 (VOID **) &mVariableModuleGlobal->VariableGlobal.VolatileVariableBase\r
1871 );\r
1872 EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal);\r
1873}\r
1874\r
1875\r
1876/**\r
1877 Variable Driver main entry point. The Variable driver places the 4 EFI\r
1878 runtime services in the EFI System Table and installs arch protocols \r
1879 for variable read and write services being availible. \r
1880\r
1881 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
1882 @param[in] SystemTable A pointer to the EFI System Table.\r
1883 \r
1884 @retval EFI_SUCCESS The entry point is executed successfully.\r
1885 @retval other Some error occurs when executing this entry point.\r
1886\r
1887**/\r
1888EFI_STATUS\r
1889EFIAPI\r
1890VariableServiceInitialize (\r
1891 IN EFI_HANDLE ImageHandle,\r
1892 IN EFI_SYSTEM_TABLE *SystemTable\r
1893 )\r
1894{\r
1895 EFI_STATUS Status;\r
1896\r
1897 Status = VariableCommonInitialize (ImageHandle, SystemTable);\r
1898 ASSERT_EFI_ERROR (Status);\r
1899\r
1900 SystemTable->RuntimeServices->GetVariable = RuntimeServiceGetVariable;\r
1901 SystemTable->RuntimeServices->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
1902 SystemTable->RuntimeServices->SetVariable = RuntimeServiceSetVariable;\r
1903 SystemTable->RuntimeServices->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
1904\r
1905 //\r
1906 // Now install the Variable Runtime Architectural Protocol on a new handle\r
1907 //\r
1908 Status = gBS->InstallMultipleProtocolInterfaces (\r
1909 &mHandle,\r
1910 &gEfiVariableArchProtocolGuid, NULL,\r
1911 &gEfiVariableWriteArchProtocolGuid, NULL,\r
1912 NULL\r
1913 );\r
1914 ASSERT_EFI_ERROR (Status);\r
1915\r
1916 Status = gBS->CreateEvent (\r
1917 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE,\r
1918 TPL_NOTIFY,\r
1919 VariableClassAddressChangeEvent,\r
1920 NULL,\r
1921 &mVirtualAddressChangeEvent\r
1922 );\r
1923 ASSERT_EFI_ERROR (Status);\r
1924\r
1925 return EFI_SUCCESS;\r
1926}\r
1927\r