]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmmRuntimeDxe.c
MdeMdeModulePkg/UsbBusDxe: Fixed a possible memory leak bug introduced at r14226
[mirror_edk2.git] / SecurityPkg / VariableAuthenticated / RuntimeDxe / VariableSmmRuntimeDxe.c
CommitLineData
0c18794e 1/** @file\r
2 Implement all four UEFI Runtime Variable services for the nonvolatile\r
3 and volatile storage space and install variable architecture protocol\r
4 based on SMM variable module.\r
5\r
dc204d5a
JY
6 Caution: This module requires additional review when modified.\r
7 This driver will have external input - variable data.\r
8 This external input must be validated carefully to avoid security issue like\r
9 buffer overflow, integer overflow.\r
10\r
11 RuntimeServiceGetVariable() and RuntimeServiceSetVariable() are external API\r
12 to receive data buffer. The size should be checked carefully.\r
13\r
14 InitCommunicateBuffer() is really function to check the variable data size.\r
15\r
aab9212f 16Copyright (c) 2010 - 2013, Intel Corporation. All rights reserved.<BR>\r
0c18794e 17This program and the accompanying materials \r
18are licensed and made available under the terms and conditions of the BSD License \r
19which accompanies this distribution. The full text of the license may be found at \r
20http://opensource.org/licenses/bsd-license.php\r
21\r
22THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
23WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
24\r
25**/\r
26\r
27#include <PiDxe.h>\r
28#include <Protocol/VariableWrite.h>\r
29#include <Protocol/Variable.h>\r
30#include <Protocol/SmmCommunication.h>\r
31#include <Protocol/SmmVariable.h>\r
32\r
33#include <Library/UefiBootServicesTableLib.h>\r
34#include <Library/UefiRuntimeServicesTableLib.h>\r
35#include <Library/MemoryAllocationLib.h>\r
36#include <Library/UefiDriverEntryPoint.h>\r
37#include <Library/UefiRuntimeLib.h>\r
38#include <Library/BaseMemoryLib.h>\r
39#include <Library/DebugLib.h>\r
40#include <Library/PcdLib.h>\r
41#include <Library/UefiLib.h>\r
42#include <Library/BaseLib.h>\r
43\r
44#include <Guid/EventGroup.h>\r
45#include <Guid/AuthenticatedVariableFormat.h>\r
46#include <Guid/SmmVariableCommon.h>\r
47\r
48EFI_HANDLE mHandle = NULL; \r
49EFI_SMM_VARIABLE_PROTOCOL *mSmmVariable = NULL;\r
50EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
51EFI_SMM_COMMUNICATION_PROTOCOL *mSmmCommunication = NULL;\r
52UINT8 *mVariableBuffer = NULL;\r
53UINT8 *mVariableBufferPhysical = NULL;\r
54UINTN mVariableBufferSize;\r
6ed1ec59 55EFI_LOCK mVariableServicesLock;\r
0c18794e 56\r
6ed1ec59
SZ
57/**\r
58 Acquires lock only at boot time. Simply returns at runtime.\r
59\r
60 This is a temperary function that will be removed when\r
61 EfiAcquireLock() in UefiLib can handle the call in UEFI\r
62 Runtimer driver in RT phase.\r
63 It calls EfiAcquireLock() at boot time, and simply returns\r
64 at runtime.\r
65\r
66 @param Lock A pointer to the lock to acquire.\r
67\r
68**/\r
69VOID\r
70AcquireLockOnlyAtBootTime (\r
71 IN EFI_LOCK *Lock\r
72 )\r
73{\r
74 if (!EfiAtRuntime ()) {\r
75 EfiAcquireLock (Lock);\r
76 }\r
77}\r
78\r
79/**\r
80 Releases lock only at boot time. Simply returns at runtime.\r
81\r
82 This is a temperary function which will be removed when\r
83 EfiReleaseLock() in UefiLib can handle the call in UEFI\r
84 Runtimer driver in RT phase.\r
85 It calls EfiReleaseLock() at boot time and simply returns\r
86 at runtime.\r
87\r
88 @param Lock A pointer to the lock to release.\r
89\r
90**/\r
91VOID\r
92ReleaseLockOnlyAtBootTime (\r
93 IN EFI_LOCK *Lock\r
94 )\r
95{\r
96 if (!EfiAtRuntime ()) {\r
97 EfiReleaseLock (Lock);\r
98 }\r
99}\r
0c18794e 100\r
101/**\r
102 Initialize the communicate buffer using DataSize and Function.\r
103\r
104 The communicate size is: SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE +\r
105 DataSize.\r
106\r
dc204d5a
JY
107 Caution: This function may receive untrusted input.\r
108 The data size external input, so this function will validate it carefully to avoid buffer overflow.\r
109\r
0c18794e 110 @param[out] DataPtr Points to the data in the communicate buffer.\r
111 @param[in] DataSize The data size to send to SMM.\r
112 @param[in] Function The function number to initialize the communicate header.\r
113 \r
114 @retval EFI_INVALID_PARAMETER The data size is too big.\r
115 @retval EFI_SUCCESS Find the specified variable.\r
116\r
117**/\r
118EFI_STATUS\r
119InitCommunicateBuffer (\r
120 OUT VOID **DataPtr OPTIONAL,\r
121 IN UINTN DataSize,\r
122 IN UINTN Function\r
123 )\r
124{\r
125 EFI_SMM_COMMUNICATE_HEADER *SmmCommunicateHeader; \r
126 SMM_VARIABLE_COMMUNICATE_HEADER *SmmVariableFunctionHeader; \r
127\r
128 \r
129 if (DataSize + SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE > mVariableBufferSize) {\r
130 return EFI_INVALID_PARAMETER;\r
131 }\r
132\r
133 SmmCommunicateHeader = (EFI_SMM_COMMUNICATE_HEADER *) mVariableBuffer;\r
134 CopyGuid (&SmmCommunicateHeader->HeaderGuid, &gEfiSmmVariableProtocolGuid);\r
135 SmmCommunicateHeader->MessageLength = DataSize + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
136 \r
137 SmmVariableFunctionHeader = (SMM_VARIABLE_COMMUNICATE_HEADER *) SmmCommunicateHeader->Data;\r
138 SmmVariableFunctionHeader->Function = Function;\r
139 if (DataPtr != NULL) {\r
140 *DataPtr = SmmVariableFunctionHeader->Data;\r
141 }\r
142\r
143 return EFI_SUCCESS;\r
144}\r
145\r
146\r
147/**\r
148 Send the data in communicate buffer to SMM.\r
149\r
150 @param[in] DataSize This size of the function header and the data.\r
151\r
152 @retval EFI_SUCCESS Success is returned from the functin in SMM.\r
153 @retval Others Failure is returned from the function in SMM. \r
154 \r
155**/\r
156EFI_STATUS\r
157SendCommunicateBuffer (\r
158 IN UINTN DataSize\r
159 )\r
160{\r
161 EFI_STATUS Status;\r
162 UINTN CommSize;\r
163 EFI_SMM_COMMUNICATE_HEADER *SmmCommunicateHeader; \r
164 SMM_VARIABLE_COMMUNICATE_HEADER *SmmVariableFunctionHeader;\r
165 \r
166 CommSize = DataSize + SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
167 Status = mSmmCommunication->Communicate (mSmmCommunication, mVariableBufferPhysical, &CommSize);\r
168 ASSERT_EFI_ERROR (Status);\r
169\r
170 SmmCommunicateHeader = (EFI_SMM_COMMUNICATE_HEADER *) mVariableBuffer;\r
171 SmmVariableFunctionHeader = (SMM_VARIABLE_COMMUNICATE_HEADER *)SmmCommunicateHeader->Data;\r
172 return SmmVariableFunctionHeader->ReturnStatus;\r
173}\r
174\r
175\r
176/**\r
177 This code finds variable in storage blocks (Volatile or Non-Volatile).\r
178\r
dc204d5a
JY
179 Caution: This function may receive untrusted input.\r
180 The data size is external input, so this function will validate it carefully to avoid buffer overflow.\r
181\r
0c18794e 182 @param[in] VariableName Name of Variable to be found.\r
183 @param[in] VendorGuid Variable vendor GUID.\r
184 @param[out] Attributes Attribute value of the variable found.\r
185 @param[in, out] DataSize Size of Data found. If size is less than the\r
186 data, this value contains the required size.\r
187 @param[out] Data Data pointer.\r
188 \r
189 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
190 @retval EFI_SUCCESS Find the specified variable.\r
191 @retval EFI_NOT_FOUND Not found.\r
192 @retval EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
193\r
194**/\r
195EFI_STATUS\r
196EFIAPI\r
197RuntimeServiceGetVariable (\r
198 IN CHAR16 *VariableName,\r
199 IN EFI_GUID *VendorGuid,\r
200 OUT UINT32 *Attributes OPTIONAL,\r
201 IN OUT UINTN *DataSize,\r
202 OUT VOID *Data\r
203 )\r
204{\r
205 EFI_STATUS Status;\r
206 UINTN PayloadSize;\r
207 SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;\r
208\r
209 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
210 return EFI_INVALID_PARAMETER;\r
211 }\r
212\r
213 if ((*DataSize != 0) && (Data == NULL)) {\r
214 return EFI_INVALID_PARAMETER;\r
215 }\r
6ed1ec59
SZ
216\r
217 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
218\r
0c18794e 219 //\r
220 // Init the communicate buffer. The buffer data size is:\r
6ed1ec59 221 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
0c18794e 222 //\r
96277f74 223 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + *DataSize;\r
0c18794e 224 Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);\r
225 if (EFI_ERROR (Status)) {\r
6ed1ec59 226 goto Done;\r
0c18794e 227 }\r
228 ASSERT (SmmVariableHeader != NULL);\r
229\r
230 CopyGuid (&SmmVariableHeader->Guid, VendorGuid);\r
231 SmmVariableHeader->DataSize = *DataSize;\r
232 SmmVariableHeader->NameSize = StrSize (VariableName);\r
233 if (Attributes == NULL) {\r
234 SmmVariableHeader->Attributes = 0;\r
235 } else {\r
236 SmmVariableHeader->Attributes = *Attributes;\r
237 }\r
238 CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);\r
239\r
240 //\r
241 // Send data to SMM.\r
242 //\r
243 Status = SendCommunicateBuffer (PayloadSize);\r
244\r
245 //\r
246 // Get data from SMM.\r
247 //\r
248 *DataSize = SmmVariableHeader->DataSize;\r
249 if (Attributes != NULL) {\r
250 *Attributes = SmmVariableHeader->Attributes;\r
251 }\r
252\r
253 if (EFI_ERROR (Status)) {\r
6ed1ec59 254 goto Done;\r
0c18794e 255 }\r
256\r
257 CopyMem (Data, (UINT8 *)SmmVariableHeader->Name + SmmVariableHeader->NameSize, SmmVariableHeader->DataSize);\r
258\r
6ed1ec59
SZ
259Done:\r
260 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 261 return Status;\r
262}\r
263\r
264\r
265/**\r
266 This code Finds the Next available variable.\r
267\r
268 @param[in, out] VariableNameSize Size of the variable name.\r
269 @param[in, out] VariableName Pointer to variable name.\r
270 @param[in, out] VendorGuid Variable Vendor Guid.\r
271\r
272 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
273 @retval EFI_SUCCESS Find the specified variable.\r
274 @retval EFI_NOT_FOUND Not found.\r
275 @retval EFI_BUFFER_TO_SMALL DataSize is too small for the result.\r
276\r
277**/\r
278EFI_STATUS\r
279EFIAPI\r
280RuntimeServiceGetNextVariableName (\r
281 IN OUT UINTN *VariableNameSize,\r
282 IN OUT CHAR16 *VariableName,\r
283 IN OUT EFI_GUID *VendorGuid\r
284 )\r
285{\r
286 EFI_STATUS Status;\r
287 UINTN PayloadSize;\r
288 SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;\r
289\r
290 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
291 return EFI_INVALID_PARAMETER;\r
292 }\r
6ed1ec59
SZ
293\r
294 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
295\r
0c18794e 296 //\r
297 // Init the communicate buffer. The buffer data size is:\r
298 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
299 //\r
300 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + *VariableNameSize; \r
301 Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);\r
302 if (EFI_ERROR (Status)) {\r
6ed1ec59 303 goto Done;\r
0c18794e 304 }\r
305 ASSERT (SmmGetNextVariableName != NULL);\r
306\r
307 SmmGetNextVariableName->NameSize = *VariableNameSize;\r
308 CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);\r
309 CopyMem (SmmGetNextVariableName->Name, VariableName, *VariableNameSize);\r
310\r
311 //\r
312 // Send data to SMM\r
313 //\r
314 Status = SendCommunicateBuffer (PayloadSize);\r
315\r
316 //\r
317 // Get data from SMM.\r
318 //\r
319 *VariableNameSize = SmmGetNextVariableName->NameSize; \r
320 if (EFI_ERROR (Status)) {\r
6ed1ec59 321 goto Done;\r
0c18794e 322 }\r
323 \r
324 CopyGuid (VendorGuid, &SmmGetNextVariableName->Guid);\r
325 CopyMem (VariableName, SmmGetNextVariableName->Name, SmmGetNextVariableName->NameSize); \r
326\r
6ed1ec59
SZ
327Done:\r
328 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 329 return Status;\r
330}\r
331\r
332/**\r
333 This code sets variable in storage blocks (Volatile or Non-Volatile).\r
334\r
dc204d5a
JY
335 Caution: This function may receive untrusted input.\r
336 The data size and data are external input, so this function will validate it carefully to avoid buffer overflow.\r
337\r
0c18794e 338 @param[in] VariableName Name of Variable to be found.\r
339 @param[in] VendorGuid Variable vendor GUID.\r
340 @param[in] Attributes Attribute value of the variable found\r
341 @param[in] DataSize Size of Data found. If size is less than the\r
342 data, this value contains the required size.\r
343 @param[in] Data Data pointer.\r
344\r
345 @retval EFI_INVALID_PARAMETER Invalid parameter.\r
346 @retval EFI_SUCCESS Set successfully.\r
347 @retval EFI_OUT_OF_RESOURCES Resource not enough to set variable.\r
348 @retval EFI_NOT_FOUND Not found.\r
349 @retval EFI_WRITE_PROTECTED Variable is read-only.\r
350\r
351**/\r
352EFI_STATUS\r
353EFIAPI\r
354RuntimeServiceSetVariable (\r
355 IN CHAR16 *VariableName,\r
356 IN EFI_GUID *VendorGuid,\r
357 IN UINT32 Attributes,\r
358 IN UINTN DataSize,\r
359 IN VOID *Data\r
360 )\r
361{\r
362 EFI_STATUS Status;\r
363 UINTN PayloadSize; \r
364 SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;\r
365 \r
366 //\r
367 // Check input parameters.\r
368 //\r
369 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
370 return EFI_INVALID_PARAMETER;\r
371 } \r
372\r
373 if (DataSize != 0 && Data == NULL) {\r
374 return EFI_INVALID_PARAMETER;\r
375 }\r
6ed1ec59
SZ
376\r
377 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
378 \r
0c18794e 379 //\r
380 // Init the communicate buffer. The buffer data size is:\r
381 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.\r
382 //\r
383 PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + DataSize;\r
384 Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);\r
385 if (EFI_ERROR (Status)) {\r
6ed1ec59 386 goto Done;\r
0c18794e 387 }\r
388 ASSERT (SmmVariableHeader != NULL);\r
389\r
390 CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);\r
391 SmmVariableHeader->DataSize = DataSize;\r
392 SmmVariableHeader->NameSize = StrSize (VariableName);\r
393 SmmVariableHeader->Attributes = Attributes;\r
394 CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);\r
395 CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);\r
396\r
397 //\r
398 // Send data to SMM.\r
399 //\r
400 Status = SendCommunicateBuffer (PayloadSize);\r
6ed1ec59
SZ
401\r
402Done:\r
403 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
0c18794e 404 return Status;\r
405}\r
406\r
407\r
408/**\r
409 This code returns information about the EFI variables.\r
410\r
411 @param[in] Attributes Attributes bitmask to specify the type of variables\r
412 on which to return information.\r
413 @param[out] MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
414 for the EFI variables associated with the attributes specified.\r
415 @param[out] RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
416 for EFI variables associated with the attributes specified.\r
417 @param[out] MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
418 associated with the attributes specified.\r
419\r
420 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.\r
421 @retval EFI_SUCCESS Query successfully.\r
422 @retval EFI_UNSUPPORTED The attribute is not supported on this platform.\r
423\r
424**/\r
425EFI_STATUS\r
426EFIAPI\r
427RuntimeServiceQueryVariableInfo (\r
428 IN UINT32 Attributes,\r
429 OUT UINT64 *MaximumVariableStorageSize,\r
430 OUT UINT64 *RemainingVariableStorageSize,\r
431 OUT UINT64 *MaximumVariableSize\r
432 )\r
433{\r
434 EFI_STATUS Status;\r
435 UINTN PayloadSize;\r
436 SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *SmmQueryVariableInfo;\r
437\r
438 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
439 return EFI_INVALID_PARAMETER;\r
440 }\r
6ed1ec59
SZ
441\r
442 AcquireLockOnlyAtBootTime(&mVariableServicesLock);\r
443\r
0c18794e 444 //\r
445 // Init the communicate buffer. The buffer data size is:\r
446 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize;\r
447 //\r
448 PayloadSize = sizeof (SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO);\r
449 Status = InitCommunicateBuffer ((VOID **)&SmmQueryVariableInfo, PayloadSize, SMM_VARIABLE_FUNCTION_QUERY_VARIABLE_INFO);\r
450 if (EFI_ERROR (Status)) {\r
6ed1ec59 451 goto Done;\r
0c18794e 452 }\r
453 ASSERT (SmmQueryVariableInfo != NULL);\r
454\r
455 SmmQueryVariableInfo->Attributes = Attributes;\r
456\r
457 //\r
458 // Send data to SMM.\r
459 //\r
460 Status = SendCommunicateBuffer (PayloadSize);\r
461 if (EFI_ERROR (Status)) {\r
6ed1ec59 462 goto Done;\r
0c18794e 463 }\r
464\r
465 //\r
466 // Get data from SMM.\r
467 //\r
468 *MaximumVariableSize = SmmQueryVariableInfo->MaximumVariableSize;\r
469 *MaximumVariableStorageSize = SmmQueryVariableInfo->MaximumVariableStorageSize;\r
470 *RemainingVariableStorageSize = SmmQueryVariableInfo->RemainingVariableStorageSize; \r
6ed1ec59
SZ
471\r
472Done:\r
473 ReleaseLockOnlyAtBootTime (&mVariableServicesLock);\r
aab9212f 474 return Status;\r
0c18794e 475}\r
476\r
477\r
478/**\r
479 Exit Boot Services Event notification handler.\r
480\r
481 Notify SMM variable driver about the event.\r
482\r
483 @param[in] Event Event whose notification function is being invoked.\r
484 @param[in] Context Pointer to the notification function's context.\r
485\r
486**/\r
487VOID\r
488EFIAPI\r
489OnExitBootServices (\r
490 IN EFI_EVENT Event,\r
491 IN VOID *Context\r
492 )\r
493{\r
494 //\r
495 // Init the communicate buffer. The buffer data size is:\r
496 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE.\r
497 //\r
498 InitCommunicateBuffer (NULL, 0, SMM_VARIABLE_FUNCTION_EXIT_BOOT_SERVICE); \r
499\r
500 //\r
501 // Send data to SMM.\r
502 //\r
503 SendCommunicateBuffer (0);\r
504}\r
505\r
506\r
507/**\r
508 On Ready To Boot Services Event notification handler.\r
509\r
510 Notify SMM variable driver about the event.\r
511\r
512 @param[in] Event Event whose notification function is being invoked\r
513 @param[in] Context Pointer to the notification function's context\r
514\r
515**/\r
516VOID\r
517EFIAPI\r
518OnReadyToBoot (\r
519 IN EFI_EVENT Event,\r
520 IN VOID *Context\r
521 )\r
522{\r
523 //\r
524 // Init the communicate buffer. The buffer data size is:\r
525 // SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE.\r
526 //\r
527 InitCommunicateBuffer (NULL, 0, SMM_VARIABLE_FUNCTION_READY_TO_BOOT);\r
528 \r
529 //\r
530 // Send data to SMM.\r
531 //\r
532 SendCommunicateBuffer (0);\r
533}\r
534\r
535\r
536/**\r
537 Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.\r
538\r
539 This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
540 It convers pointer to new virtual address.\r
541\r
542 @param[in] Event Event whose notification function is being invoked.\r
543 @param[in] Context Pointer to the notification function's context.\r
544\r
545**/\r
546VOID\r
547EFIAPI\r
548VariableAddressChangeEvent (\r
549 IN EFI_EVENT Event,\r
550 IN VOID *Context\r
551 )\r
552{\r
553 EfiConvertPointer (0x0, (VOID **) &mVariableBuffer);\r
554 EfiConvertPointer (0x0, (VOID **) &mSmmCommunication);\r
555}\r
556\r
557\r
558/**\r
559 Initialize variable service and install Variable Architectural protocol.\r
560\r
561 @param[in] Event Event whose notification function is being invoked.\r
562 @param[in] Context Pointer to the notification function's context.\r
563 \r
564**/\r
565VOID\r
566EFIAPI\r
567SmmVariableReady (\r
568 IN EFI_EVENT Event,\r
569 IN VOID *Context\r
570 )\r
571{\r
572 EFI_STATUS Status;\r
573\r
574 Status = gBS->LocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, (VOID **)&mSmmVariable);\r
575 if (EFI_ERROR (Status)) {\r
576 return;\r
577 }\r
578 \r
579 Status = gBS->LocateProtocol (&gEfiSmmCommunicationProtocolGuid, NULL, (VOID **) &mSmmCommunication);\r
580 ASSERT_EFI_ERROR (Status);\r
581 \r
582 //\r
583 // Allocate memory for variable store.\r
584 //\r
585 mVariableBufferSize = SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
586 mVariableBufferSize += MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));\r
587 mVariableBuffer = AllocateRuntimePool (mVariableBufferSize);\r
588 ASSERT (mVariableBuffer != NULL);\r
589\r
590 //\r
591 // Save the buffer physical address used for SMM conmunication.\r
592 //\r
593 mVariableBufferPhysical = mVariableBuffer;\r
594\r
595 gRT->GetVariable = RuntimeServiceGetVariable;\r
596 gRT->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
597 gRT->SetVariable = RuntimeServiceSetVariable;\r
598 gRT->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
599 \r
600 //\r
601 // Install the Variable Architectural Protocol on a new handle.\r
602 //\r
603 Status = gBS->InstallProtocolInterface (\r
604 &mHandle,\r
605 &gEfiVariableArchProtocolGuid, \r
606 EFI_NATIVE_INTERFACE,\r
607 NULL\r
608 );\r
609 ASSERT_EFI_ERROR (Status);\r
610}\r
611\r
612\r
613/**\r
614 SMM Non-Volatile variable write service is ready notify event handler.\r
615\r
616 @param[in] Event Event whose notification function is being invoked.\r
617 @param[in] Context Pointer to the notification function's context.\r
618 \r
619**/\r
620VOID\r
621EFIAPI\r
622SmmVariableWriteReady (\r
623 IN EFI_EVENT Event,\r
624 IN VOID *Context\r
625 )\r
626{\r
627 EFI_STATUS Status;\r
628 VOID *ProtocolOps;\r
629\r
630 //\r
631 // Check whether the protocol is installed or not.\r
632 //\r
633 Status = gBS->LocateProtocol (&gSmmVariableWriteGuid, NULL, (VOID **) &ProtocolOps);\r
634 if (EFI_ERROR (Status)) {\r
635 return;\r
636 }\r
637 \r
638 Status = gBS->InstallProtocolInterface (\r
639 &mHandle,\r
640 &gEfiVariableWriteArchProtocolGuid, \r
641 EFI_NATIVE_INTERFACE,\r
642 NULL\r
643 );\r
644 ASSERT_EFI_ERROR (Status); \r
645}\r
646\r
647\r
648/**\r
649 Variable Driver main entry point. The Variable driver places the 4 EFI\r
650 runtime services in the EFI System Table and installs arch protocols \r
651 for variable read and write services being available. It also registers\r
652 a notification function for an EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
653\r
654 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
655 @param[in] SystemTable A pointer to the EFI System Table.\r
656 \r
657 @retval EFI_SUCCESS Variable service successfully initialized.\r
658\r
659**/\r
660EFI_STATUS\r
661EFIAPI\r
662VariableSmmRuntimeInitialize (\r
663 IN EFI_HANDLE ImageHandle,\r
664 IN EFI_SYSTEM_TABLE *SystemTable\r
665 )\r
666{\r
667 VOID *SmmVariableRegistration;\r
668 VOID *SmmVariableWriteRegistration;\r
669 EFI_EVENT OnReadyToBootEvent;\r
670 EFI_EVENT ExitBootServiceEvent;\r
6ed1ec59
SZ
671\r
672 EfiInitializeLock (&mVariableServicesLock, TPL_NOTIFY);\r
673\r
0c18794e 674 //\r
675 // Smm variable service is ready\r
676 //\r
677 EfiCreateProtocolNotifyEvent (\r
678 &gEfiSmmVariableProtocolGuid, \r
679 TPL_CALLBACK, \r
680 SmmVariableReady, \r
681 NULL, \r
682 &SmmVariableRegistration\r
683 );\r
684\r
685 //\r
686 // Smm Non-Volatile variable write service is ready\r
687 //\r
688 EfiCreateProtocolNotifyEvent (\r
689 &gSmmVariableWriteGuid, \r
690 TPL_CALLBACK, \r
691 SmmVariableWriteReady, \r
692 NULL, \r
693 &SmmVariableWriteRegistration\r
694 );\r
695\r
696 //\r
697 // Register the event to reclaim variable for OS usage.\r
698 //\r
699 EfiCreateEventReadyToBootEx (\r
700 TPL_NOTIFY, \r
701 OnReadyToBoot, \r
702 NULL, \r
703 &OnReadyToBootEvent\r
704 ); \r
705\r
706 //\r
707 // Register the event to inform SMM variable that it is at runtime.\r
708 //\r
709 gBS->CreateEventEx (\r
710 EVT_NOTIFY_SIGNAL,\r
711 TPL_NOTIFY,\r
712 OnExitBootServices,\r
713 NULL,\r
714 &gEfiEventExitBootServicesGuid,\r
715 &ExitBootServiceEvent\r
716 ); \r
717\r
718 //\r
719 // Register the event to convert the pointer for runtime.\r
720 //\r
721 gBS->CreateEventEx (\r
722 EVT_NOTIFY_SIGNAL,\r
723 TPL_NOTIFY,\r
724 VariableAddressChangeEvent,\r
725 NULL,\r
726 &gEfiEventVirtualAddressChangeGuid,\r
727 &mVirtualAddressChangeEvent\r
728 );\r
729 \r
730 return EFI_SUCCESS;\r
731}\r
732\r