]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmmRuntimeDxe.c
ArmPkg/BdsLib: Added support for FDT alignment through PcdArmLinuxFdtAlignment
[mirror_edk2.git] / SecurityPkg / VariableAuthenticated / RuntimeDxe / VariableSmmRuntimeDxe.c
CommitLineData
0c18794e 1/** @file\r
2 Implement all four UEFI Runtime Variable services for the nonvolatile\r
3 and volatile storage space and install variable architecture protocol\r
4 based on SMM variable module.\r
5\r
dc204d5a
JY
6 Caution: This module requires additional review when modified.\r
7 This driver will have external input - variable data.\r
8 This external input must be validated carefully to avoid security issue like\r
9 buffer overflow, integer overflow.\r
10\r
11 RuntimeServiceGetVariable() and RuntimeServiceSetVariable() are external API\r
12 to receive data buffer. The size should be checked carefully.\r
13\r
14 InitCommunicateBuffer() is really function to check the variable data size.\r
15\r
aab9212f 16Copyright (c) 2010 - 2013, Intel Corporation. All rights reserved.<BR>\r
0c18794e 17This program and the accompanying materials \r
18are licensed and made available under the terms and conditions of the BSD License \r
19which accompanies this distribution. The full text of the license may be found at \r
20http://opensource.org/licenses/bsd-license.php\r
21\r
22THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
23WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
24\r
25**/\r
26\r
27#include <PiDxe.h>\r
28#include <Protocol/VariableWrite.h>\r
29#include <Protocol/Variable.h>\r
30#include <Protocol/SmmCommunication.h>\r
31#include <Protocol/SmmVariable.h>\r
32\r
33#include <Library/UefiBootServicesTableLib.h>\r
34#include <Library/UefiRuntimeServicesTableLib.h>\r
35#include <Library/MemoryAllocationLib.h>\r
36#include <Library/UefiDriverEntryPoint.h>\r
37#include <Library/UefiRuntimeLib.h>\r
38#include <Library/BaseMemoryLib.h>\r
39#include <Library/DebugLib.h>\r
40#include <Library/PcdLib.h>\r
41#include <Library/UefiLib.h>\r
42#include <Library/BaseLib.h>\r
43\r
44#include <Guid/EventGroup.h>\r
45#include <Guid/AuthenticatedVariableFormat.h>\r
46#include <Guid/SmmVariableCommon.h>\r
47\r
48EFI_HANDLE mHandle = NULL; \r
49EFI_SMM_VARIABLE_PROTOCOL *mSmmVariable = NULL;\r
50EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
51EFI_SMM_COMMUNICATION_PROTOCOL *mSmmCommunication = NULL;\r
52UINT8 *mVariableBuffer = NULL;\r
53UINT8 *mVariableBufferPhysical = NULL;\r
54UINTN mVariableBufferSize;\r
6ed1ec59 55EFI_LOCK mVariableServicesLock;\r
0c18794e 56\r
6ed1ec59
SZ
57/**\r
58 Acquires lock only at boot time. Simply returns at runtime.\r
59\r
60 This is a temperary function that will be removed when\r
61 EfiAcquireLock() in UefiLib can handle the call in UEFI\r
62 Runtimer driver in RT phase.\r
63 It calls EfiAcquireLock() at boot time, and simply returns\r
64 at runtime.\r
65\r
66 @param Lock A pointer to the lock to acquire.\r
67\r
68**/\r
69VOID\r
70AcquireLockOnlyAtBootTime (\r
71 IN EFI_LOCK *Lock\r
72 )\r
73{\r
74 if (!EfiAtRuntime ()) {\r
75 EfiAcquireLock (Lock);\r
76 }\r
77}\r
78\r
79/**\r
80 Releases lock only at boot time. Simply returns at runtime.\r
81\r
82 This is a temperary function which will be removed when\r
83 EfiReleaseLock() in UefiLib can handle the call in UEFI\r
84 Runtimer driver in RT phase.\r
85 It calls EfiReleaseLock() at boot time and simply returns\r
86 at runtime.\r
87\r
88 @param Lock A pointer to the lock to release.\r
89\r
90**/\r
91VOID\r
92ReleaseLockOnlyAtBootTime (\r
93 IN EFI_LOCK *Lock\r
94 )\r
95{\r
96 if (!EfiAtRuntime ()) {\r
97 EfiReleaseLock (Lock);\r
98 }\r
99}\r
0c18794e 100\r
101/**\r
102 Initialize the communicate buffer using DataSize and Function.\r
103\r
104 The communicate size is: SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE +\r
105 DataSize.\r
106\r
dc204d5a
JY
107 Caution: This function may receive untrusted input.\r
108 The data size external input, so this function will validate it carefully to avoid buffer overflow.\r
109\r
0c18794e 110 @param[out] DataPtr Points to the data in the communicate buffer.\r
111 @param[in] DataSize The data size to send to SMM.\r
112 @param[in] Function The function number to initialize the communicate header.\r
113 \r
114 @retval EFI_INVALID_PARAMETER The data size is too big.\r
115 @retval EFI_SUCCESS Find the specified variable.\r
116\r
117**/\r
118EFI_STATUS\r
119InitCommunicateBuffer (\r
120 OUT VOID **DataPtr OPTIONAL,\r
121 IN UINTN DataSize,\r
122 IN UINTN Function\r
123 )\r
124{\r
125 EFI_SMM_COMMUNICATE_HEADER *SmmCommunicateHeader; \r
126 SMM_VARIABLE_COMMUNICATE_HEADER *SmmVariableFunctionHeader; \r
127\r
128 \r
129 if (DataSize + SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE > mVariableBufferSize) {\r
130 return EFI_INVALID_PARAMETER;\r
131 }\r
132\r
133 SmmCommunicateHeader = (EFI_SMM_COMMUNICATE_HEADER *) mVariableBuffer;\r
134 CopyGuid (&SmmCommunicateHeader->HeaderGuid, &gEfiSmmVariableProtocolGuid);\r
135 SmmCommunicateHeader->MessageLength = DataSize + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
136 \r
137 SmmVariableFunctionHeader = (SMM_VARIABLE_COMMUNICATE_HEADER *) SmmCommunicateHeader->Data;\r
138 SmmVariableFunctionHeader->Function = Function;\r
139 if (DataPtr != NULL) {\r
140 *DataPtr = SmmVariableFunctionHeader->Data;\r
141 }\r
142\r
143 return EFI_SUCCESS;\r
144}\r
145\r
146\r
147/**\r
148 Send the data in communicate buffer to SMM.\r
149\r
150 @param[in] DataSize This size of the function header and the data.\r
151\r
152 @retval EFI_SUCCESS Success is returned from the functin in SMM.\r
153 @retval Others Failure is returned from the function in SMM. \r
154 \r
155**/\r
156EFI_STATUS\r
157SendCommunicateBuffer (\r
158 IN UINTN DataSize\r
159 )\r
160{\r
161 EFI_STATUS Status;\r
162 UINTN CommSize;\r
163 EFI_SMM_COMMUNICATE_HEADER *SmmCommunicateHeader; \r
164 SMM_VARIABLE_COMMUNICATE_HEADER *SmmVariableFunctionHeader;\r
165 \r
166 CommSize = DataSize + SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
167 Status = mSmmCommunication->Communicate (mSmmCommunication, mVariableBufferPhysical, &CommSize);\r
168 ASSERT_EFI_ERROR (Status);\r
169\r
170 SmmCommunicateHeader = (EFI_SMM_COMMUNICATE_HEADER *) mVariableBuffer;\r
171 SmmVariableFunctionHeader = (SMM_VARIABLE_COMMUNICATE_HEADER *)SmmCommunicateHeader->Data;\r
172 return SmmVariableFunctionHeader->ReturnStatus;\r
173}\r
174\r
175\r
176/**\r
177 This code finds variable in storage blocks (Volatile or Non-Volatile).\r
178\r
dc204d5a
JY
179 Caution: This function may receive untrusted input.\r
180 The data size is external input, so this function will validate it carefully to avoid buffer overflow.\r
181\r
0c18794e 182 @param[in] VariableName Name of Variable to be found.\r
183 @param[in] VendorGuid Variable vendor GUID.\r
184 @param[out] Attributes Attribute value of the variable found.\r
185 @param[in, out] DataSize Size of Data found. If size is less than the\r
186 data, this value contains the required size.\r
187 @param[out] Data Data pointer.\r
188 \r
189 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
190 @retval EFI_SUCCESS Find the specified variable.\r
191 @retval EFI_NOT_FOUND Not found.\r
192 @retval EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
193\r
194**/\r
195EFI_STATUS\r
196EFIAPI\r
197RuntimeServiceGetVariable (\r
198 IN CHAR16 *VariableName,\r
199 IN EFI_GUID *VendorGuid,\r
200 OUT UINT32 *Attributes OPTIONAL,\r
201 IN OUT UINTN *DataSize,\r
202 OUT VOID *Data\r
203 )\r
204{\r
205 EFI_STATUS Status;\r
206 UINTN PayloadSize;\r
207 SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;\r
208\r
209 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
210 return EFI_INVALID_PARAMETER;\r
211 }\r
212\r
213 if ((*DataSize != 0) && (Data == NULL)) {\r
214 return EFI_INVALID_PARAMETER;\r
215 }\r
6ed1ec59 216\r
3588bb35
SZ
217 if (*DataSize >= mVariableBufferSize) {\r
218 //\r
219 // DataSize may be near MAX_ADDRESS incorrectly, this can cause the computed PayLoadSize to\r
220 // overflow to a small value and pass the check in InitCommunicateBuffer().\r
221 // To protect against this vulnerability, return EFI_INVALID_PARAMETER if DataSize is >= mVariableBufferSize.\r
222 // And there will be further check to ensure the total size is also not > mVariableBufferSize.\r
223 //\r
224 return EFI_INVALID_PARAMETER;\r
225 }\r
226\r
6ed1ec59
SZ
227 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
228\r
0c18794e 229 //\r
230 // Init the communicate buffer. The buffer data size is:\r
6ed1ec59 231 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
0c18794e 232 //\r
96277f74 233 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + *DataSize;\r
0c18794e 234 Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);\r
235 if (EFI_ERROR (Status)) {\r
6ed1ec59 236 goto Done;\r
0c18794e 237 }\r
238 ASSERT (SmmVariableHeader != NULL);\r
239\r
240 CopyGuid (&SmmVariableHeader->Guid, VendorGuid);\r
241 SmmVariableHeader->DataSize = *DataSize;\r
242 SmmVariableHeader->NameSize = StrSize (VariableName);\r
243 if (Attributes == NULL) {\r
244 SmmVariableHeader->Attributes = 0;\r
245 } else {\r
246 SmmVariableHeader->Attributes = *Attributes;\r
247 }\r
248 CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);\r
249\r
250 //\r
251 // Send data to SMM.\r
252 //\r
253 Status = SendCommunicateBuffer (PayloadSize);\r
254\r
255 //\r
256 // Get data from SMM.\r
257 //\r
258 *DataSize = SmmVariableHeader->DataSize;\r
259 if (Attributes != NULL) {\r
260 *Attributes = SmmVariableHeader->Attributes;\r
261 }\r
262\r
263 if (EFI_ERROR (Status)) {\r
6ed1ec59 264 goto Done;\r
0c18794e 265 }\r
266\r
267 CopyMem (Data, (UINT8 *)SmmVariableHeader->Name + SmmVariableHeader->NameSize, SmmVariableHeader->DataSize);\r
268\r
6ed1ec59
SZ
269Done:\r
270 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 271 return Status;\r
272}\r
273\r
274\r
275/**\r
276 This code Finds the Next available variable.\r
277\r
278 @param[in, out] VariableNameSize Size of the variable name.\r
279 @param[in, out] VariableName Pointer to variable name.\r
280 @param[in, out] VendorGuid Variable Vendor Guid.\r
281\r
282 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
283 @retval EFI_SUCCESS Find the specified variable.\r
284 @retval EFI_NOT_FOUND Not found.\r
285 @retval EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
286\r
287**/\r
288EFI_STATUS\r
289EFIAPI\r
290RuntimeServiceGetNextVariableName (\r
291 IN OUT UINTN *VariableNameSize,\r
292 IN OUT CHAR16 *VariableName,\r
293 IN OUT EFI_GUID *VendorGuid\r
294 )\r
295{\r
296 EFI_STATUS Status;\r
297 UINTN PayloadSize;\r
298 SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;\r
0c55190f 299 UINTN SmmCommBufPayloadSize;\r
0c18794e 300\r
301 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
302 return EFI_INVALID_PARAMETER;\r
303 }\r
6ed1ec59 304\r
0c55190f 305 //\r
306 // SMM Communication Buffer max payload size\r
307 //\r
308 SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);\r
309\r
310 //\r
311 // If input string exceeds SMM payload limit. Return failure\r
312 //\r
313 if (StrSize (VariableName) > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
3588bb35
SZ
314 return EFI_INVALID_PARAMETER;\r
315 }\r
316\r
6ed1ec59
SZ
317 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
318\r
0c18794e 319 //\r
320 // Init the communicate buffer. The buffer data size is:\r
321 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
322 //\r
0c55190f 323 if (*VariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
324 //\r
325 // If output buffer exceed SMM payload limit. Trim output buffer to SMM payload size\r
326 //\r
327 *VariableNameSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);\r
328 }\r
329 //\r
330 // Payload should be Guid + NameSize + MAX of Input & Output buffer\r
331 //\r
332 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + MAX (*VariableNameSize, StrSize (VariableName));\r
333\r
0c18794e 334 Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);\r
335 if (EFI_ERROR (Status)) {\r
6ed1ec59 336 goto Done;\r
0c18794e 337 }\r
338 ASSERT (SmmGetNextVariableName != NULL);\r
339\r
0c55190f 340 //\r
341 // SMM comm buffer->NameSize is buffer size for return string\r
342 //\r
0c18794e 343 SmmGetNextVariableName->NameSize = *VariableNameSize;\r
0c55190f 344\r
0c18794e 345 CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);\r
0c55190f 346 //\r
347 // Copy whole string\r
348 //\r
349 CopyMem (SmmGetNextVariableName->Name, VariableName, StrSize (VariableName));\r
0c18794e 350\r
351 //\r
352 // Send data to SMM\r
353 //\r
354 Status = SendCommunicateBuffer (PayloadSize);\r
355\r
356 //\r
357 // Get data from SMM.\r
358 //\r
359 *VariableNameSize = SmmGetNextVariableName->NameSize; \r
360 if (EFI_ERROR (Status)) {\r
6ed1ec59 361 goto Done;\r
0c18794e 362 }\r
363 \r
364 CopyGuid (VendorGuid, &SmmGetNextVariableName->Guid);\r
365 CopyMem (VariableName, SmmGetNextVariableName->Name, SmmGetNextVariableName->NameSize); \r
366\r
6ed1ec59
SZ
367Done:\r
368 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 369 return Status;\r
370}\r
371\r
372/**\r
373 This code sets variable in storage blocks (Volatile or Non-Volatile).\r
374\r
dc204d5a
JY
375 Caution: This function may receive untrusted input.\r
376 The data size and data are external input, so this function will validate it carefully to avoid buffer overflow.\r
377\r
0c18794e 378 @param[in] VariableName Name of Variable to be found.\r
379 @param[in] VendorGuid Variable vendor GUID.\r
380 @param[in] Attributes Attribute value of the variable found\r
381 @param[in] DataSize Size of Data found. If size is less than the\r
382 data, this value contains the required size.\r
383 @param[in] Data Data pointer.\r
384\r
385 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
386 @retval EFI_SUCCESS Set successfully.\r
387 @retval EFI_OUT_OF_RESOURCES Resource not enough to set variable.\r
388 @retval EFI_NOT_FOUND Not found.\r
389 @retval EFI_WRITE_PROTECTED Variable is read-only.\r
390\r
391**/\r
392EFI_STATUS\r
393EFIAPI\r
394RuntimeServiceSetVariable (\r
395 IN CHAR16 *VariableName,\r
396 IN EFI_GUID *VendorGuid,\r
397 IN UINT32 Attributes,\r
398 IN UINTN DataSize,\r
399 IN VOID *Data\r
400 )\r
401{\r
402 EFI_STATUS Status;\r
403 UINTN PayloadSize; \r
404 SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;\r
405 \r
406 //\r
407 // Check input parameters.\r
408 //\r
409 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
410 return EFI_INVALID_PARAMETER;\r
411 } \r
412\r
413 if (DataSize != 0 && Data == NULL) {\r
414 return EFI_INVALID_PARAMETER;\r
415 }\r
6ed1ec59 416\r
3588bb35
SZ
417 if (DataSize >= mVariableBufferSize) {\r
418 //\r
419 // DataSize may be near MAX_ADDRESS incorrectly, this can cause the computed PayLoadSize to\r
420 // overflow to a small value and pass the check in InitCommunicateBuffer().\r
421 // To protect against this vulnerability, return EFI_INVALID_PARAMETER if DataSize is >= mVariableBufferSize.\r
422 // And there will be further check to ensure the total size is also not > mVariableBufferSize.\r
423 //\r
424 return EFI_INVALID_PARAMETER;\r
425 }\r
426\r
6ed1ec59
SZ
427 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
428 \r
0c18794e 429 //\r
430 // Init the communicate buffer. The buffer data size is:\r
431 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
432 //\r
433 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + DataSize;\r
434 Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);\r
435 if (EFI_ERROR (Status)) {\r
6ed1ec59 436 goto Done;\r
0c18794e 437 }\r
438 ASSERT (SmmVariableHeader != NULL);\r
439\r
440 CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);\r
441 SmmVariableHeader->DataSize = DataSize;\r
442 SmmVariableHeader->NameSize = StrSize (VariableName);\r
443 SmmVariableHeader->Attributes = Attributes;\r
444 CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);\r
445 CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);\r
446\r
447 //\r
448 // Send data to SMM.\r
449 //\r
450 Status = SendCommunicateBuffer (PayloadSize);\r
6ed1ec59
SZ
451\r
452Done:\r
453 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 454 return Status;\r
455}\r
456\r
457\r
458/**\r
459 This code returns information about the EFI variables.\r
460\r
461 @param[in] Attributes Attributes bitmask to specify the type of variables\r
462 on which to return information.\r
463 @param[out] MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
464 for the EFI variables associated with the attributes specified.\r
465 @param[out] RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
466 for EFI variables associated with the attributes specified.\r
467 @param[out] MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
468 associated with the attributes specified.\r
469\r
470 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.\r
471 @retval EFI_SUCCESS Query successfully.\r
472 @retval EFI_UNSUPPORTED The attribute is not supported on this platform.\r
473\r
474**/\r
475EFI_STATUS\r
476EFIAPI\r
477RuntimeServiceQueryVariableInfo (\r
478 IN UINT32 Attributes,\r
479 OUT UINT64 *MaximumVariableStorageSize,\r
480 OUT UINT64 *RemainingVariableStorageSize,\r
481 OUT UINT64 *MaximumVariableSize\r
482 )\r
483{\r
484 EFI_STATUS Status;\r
485 UINTN PayloadSize;\r
486 SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *SmmQueryVariableInfo;\r
487\r
488 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
489 return EFI_INVALID_PARAMETER;\r
490 }\r
6ed1ec59
SZ
491\r
492 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
493\r
0c18794e 494 //\r
495 // Init the communicate buffer. The buffer data size is:\r
496 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize;\r
497 //\r
498 PayloadSize = sizeof (SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO);\r
499 Status = InitCommunicateBuffer ((VOID **)&SmmQueryVariableInfo, PayloadSize, SMM_VARIABLE_FUNCTION_QUERY_VARIABLE_INFO);\r
500 if (EFI_ERROR (Status)) {\r
6ed1ec59 501 goto Done;\r
0c18794e 502 }\r
503 ASSERT (SmmQueryVariableInfo != NULL);\r
504\r
505 SmmQueryVariableInfo->Attributes = Attributes;\r
506\r
507 //\r
508 // Send data to SMM.\r
509 //\r
510 Status = SendCommunicateBuffer (PayloadSize);\r
511 if (EFI_ERROR (Status)) {\r
6ed1ec59 512 goto Done;\r
0c18794e 513 }\r
514\r
515 //\r
516 // Get data from SMM.\r
517 //\r
518 *MaximumVariableSize = SmmQueryVariableInfo->MaximumVariableSize;\r
519 *MaximumVariableStorageSize = SmmQueryVariableInfo->MaximumVariableStorageSize;\r
520 *RemainingVariableStorageSize = SmmQueryVariableInfo->RemainingVariableStorageSize; \r
6ed1ec59
SZ
521\r
522Done:\r
523 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
aab9212f 524 return Status;\r
0c18794e 525}\r
526\r
527\r
528/**\r
529 Exit Boot Services Event notification handler.\r
530\r
531 Notify SMM variable driver about the event.\r
532\r
533 @param[in] Event Event whose notification function is being invoked.\r
534 @param[in] Context Pointer to the notification function's context.\r
535\r
536**/\r
537VOID\r
538EFIAPI\r
539OnExitBootServices (\r
540 IN EFI_EVENT Event,\r
541 IN VOID *Context\r
542 )\r
543{\r
544 //\r
545 // Init the communicate buffer. The buffer data size is:\r
546 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE.\r
547 //\r
548 InitCommunicateBuffer (NULL, 0, SMM_VARIABLE_FUNCTION_EXIT_BOOT_SERVICE); \r
549\r
550 //\r
551 // Send data to SMM.\r
552 //\r
553 SendCommunicateBuffer (0);\r
554}\r
555\r
556\r
557/**\r
558 On Ready To Boot Services Event notification handler.\r
559\r
560 Notify SMM variable driver about the event.\r
561\r
562 @param[in] Event Event whose notification function is being invoked\r
563 @param[in] Context Pointer to the notification function's context\r
564\r
565**/\r
566VOID\r
567EFIAPI\r
568OnReadyToBoot (\r
569 IN EFI_EVENT Event,\r
570 IN VOID *Context\r
571 )\r
572{\r
573 //\r
574 // Init the communicate buffer. The buffer data size is:\r
575 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE.\r
576 //\r
577 InitCommunicateBuffer (NULL, 0, SMM_VARIABLE_FUNCTION_READY_TO_BOOT);\r
578 \r
579 //\r
580 // Send data to SMM.\r
581 //\r
582 SendCommunicateBuffer (0);\r
583}\r
584\r
585\r
586/**\r
587 Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.\r
588\r
589 This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
590 It convers pointer to new virtual address.\r
591\r
592 @param[in] Event Event whose notification function is being invoked.\r
593 @param[in] Context Pointer to the notification function's context.\r
594\r
595**/\r
596VOID\r
597EFIAPI\r
598VariableAddressChangeEvent (\r
599 IN EFI_EVENT Event,\r
600 IN VOID *Context\r
601 )\r
602{\r
603 EfiConvertPointer (0x0, (VOID **) &mVariableBuffer);\r
604 EfiConvertPointer (0x0, (VOID **) &mSmmCommunication);\r
605}\r
606\r
607\r
608/**\r
609 Initialize variable service and install Variable Architectural protocol.\r
610\r
611 @param[in] Event Event whose notification function is being invoked.\r
612 @param[in] Context Pointer to the notification function's context.\r
613 \r
614**/\r
615VOID\r
616EFIAPI\r
617SmmVariableReady (\r
618 IN EFI_EVENT Event,\r
619 IN VOID *Context\r
620 )\r
621{\r
622 EFI_STATUS Status;\r
623\r
624 Status = gBS->LocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, (VOID **)&mSmmVariable);\r
625 if (EFI_ERROR (Status)) {\r
626 return;\r
627 }\r
628 \r
629 Status = gBS->LocateProtocol (&gEfiSmmCommunicationProtocolGuid, NULL, (VOID **) &mSmmCommunication);\r
630 ASSERT_EFI_ERROR (Status);\r
631 \r
632 //\r
633 // Allocate memory for variable store.\r
634 //\r
635 mVariableBufferSize = SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
636 mVariableBufferSize += MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));\r
637 mVariableBuffer = AllocateRuntimePool (mVariableBufferSize);\r
638 ASSERT (mVariableBuffer != NULL);\r
639\r
640 //\r
641 // Save the buffer physical address used for SMM conmunication.\r
642 //\r
643 mVariableBufferPhysical = mVariableBuffer;\r
644\r
645 gRT->GetVariable = RuntimeServiceGetVariable;\r
646 gRT->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
647 gRT->SetVariable = RuntimeServiceSetVariable;\r
648 gRT->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
649 \r
650 //\r
651 // Install the Variable Architectural Protocol on a new handle.\r
652 //\r
653 Status = gBS->InstallProtocolInterface (\r
654 &mHandle,\r
655 &gEfiVariableArchProtocolGuid, \r
656 EFI_NATIVE_INTERFACE,\r
657 NULL\r
658 );\r
659 ASSERT_EFI_ERROR (Status);\r
660}\r
661\r
662\r
663/**\r
664 SMM Non-Volatile variable write service is ready notify event handler.\r
665\r
666 @param[in] Event Event whose notification function is being invoked.\r
667 @param[in] Context Pointer to the notification function's context.\r
668 \r
669**/\r
670VOID\r
671EFIAPI\r
672SmmVariableWriteReady (\r
673 IN EFI_EVENT Event,\r
674 IN VOID *Context\r
675 )\r
676{\r
677 EFI_STATUS Status;\r
678 VOID *ProtocolOps;\r
679\r
680 //\r
681 // Check whether the protocol is installed or not.\r
682 //\r
683 Status = gBS->LocateProtocol (&gSmmVariableWriteGuid, NULL, (VOID **) &ProtocolOps);\r
684 if (EFI_ERROR (Status)) {\r
685 return;\r
686 }\r
687 \r
688 Status = gBS->InstallProtocolInterface (\r
689 &mHandle,\r
690 &gEfiVariableWriteArchProtocolGuid, \r
691 EFI_NATIVE_INTERFACE,\r
692 NULL\r
693 );\r
694 ASSERT_EFI_ERROR (Status); \r
695}\r
696\r
697\r
698/**\r
699 Variable Driver main entry point. The Variable driver places the 4 EFI\r
700 runtime services in the EFI System Table and installs arch protocols \r
701 for variable read and write services being available. It also registers\r
702 a notification function for an EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
703\r
704 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
705 @param[in] SystemTable A pointer to the EFI System Table.\r
706 \r
707 @retval EFI_SUCCESS Variable service successfully initialized.\r
708\r
709**/\r
710EFI_STATUS\r
711EFIAPI\r
712VariableSmmRuntimeInitialize (\r
713 IN EFI_HANDLE ImageHandle,\r
714 IN EFI_SYSTEM_TABLE *SystemTable\r
715 )\r
716{\r
717 VOID *SmmVariableRegistration;\r
718 VOID *SmmVariableWriteRegistration;\r
719 EFI_EVENT OnReadyToBootEvent;\r
720 EFI_EVENT ExitBootServiceEvent;\r
6ed1ec59
SZ
721\r
722 EfiInitializeLock (&mVariableServicesLock, TPL_NOTIFY);\r
723\r
0c18794e 724 //\r
725 // Smm variable service is ready\r
726 //\r
727 EfiCreateProtocolNotifyEvent (\r
728 &gEfiSmmVariableProtocolGuid, \r
729 TPL_CALLBACK, \r
730 SmmVariableReady, \r
731 NULL, \r
732 &SmmVariableRegistration\r
733 );\r
734\r
735 //\r
736 // Smm Non-Volatile variable write service is ready\r
737 //\r
738 EfiCreateProtocolNotifyEvent (\r
739 &gSmmVariableWriteGuid, \r
740 TPL_CALLBACK, \r
741 SmmVariableWriteReady, \r
742 NULL, \r
743 &SmmVariableWriteRegistration\r
744 );\r
745\r
746 //\r
747 // Register the event to reclaim variable for OS usage.\r
748 //\r
749 EfiCreateEventReadyToBootEx (\r
750 TPL_NOTIFY, \r
751 OnReadyToBoot, \r
752 NULL, \r
753 &OnReadyToBootEvent\r
754 ); \r
755\r
756 //\r
757 // Register the event to inform SMM variable that it is at runtime.\r
758 //\r
759 gBS->CreateEventEx (\r
760 EVT_NOTIFY_SIGNAL,\r
761 TPL_NOTIFY,\r
762 OnExitBootServices,\r
763 NULL,\r
764 &gEfiEventExitBootServicesGuid,\r
765 &ExitBootServiceEvent\r
766 ); \r
767\r
768 //\r
769 // Register the event to convert the pointer for runtime.\r
770 //\r
771 gBS->CreateEventEx (\r
772 EVT_NOTIFY_SIGNAL,\r
773 TPL_NOTIFY,\r
774 VariableAddressChangeEvent,\r
775 NULL,\r
776 &gEfiEventVirtualAddressChangeGuid,\r
777 &mVirtualAddressChangeEvent\r
778 );\r
779 \r
780 return EFI_SUCCESS;\r
781}\r
782\r