]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - DuetPkg/FSVariable/FSVariable.c
Update the copyright notice format
[mirror_edk2.git] / DuetPkg / FSVariable / FSVariable.c
... / ...
CommitLineData
1/*++\r
2\r
3Copyright (c) 2006 - 2010, Intel Corporation\r
4All rights reserved. This program and the accompanying materials\r
5are licensed and made available under the terms and conditions of the BSD License\r
6which accompanies this distribution. The full text of the license may be found at\r
7http://opensource.org/licenses/bsd-license.php\r
8\r
9THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
10WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
11\r
12Module Name:\r
13\r
14 FSVariable.c\r
15\r
16Abstract:\r
17\r
18 Provide support functions for variable services.\r
19\r
20--*/\r
21\r
22#include "FSVariable.h"\r
23\r
24VARIABLE_STORE_HEADER mStoreHeaderTemplate = {\r
25 VARIABLE_STORE_SIGNATURE,\r
26 VOLATILE_VARIABLE_STORE_SIZE,\r
27 VARIABLE_STORE_FORMATTED,\r
28 VARIABLE_STORE_HEALTHY,\r
29 0,\r
30 0\r
31};\r
32\r
33//\r
34// Don't use module globals after the SetVirtualAddress map is signaled\r
35//\r
36VARIABLE_GLOBAL *mGlobal;\r
37\r
38/**\r
39 Update the variable region with Variable information. These are the same \r
40 arguments as the EFI Variable services.\r
41\r
42 @param[in] VariableName Name of variable\r
43\r
44 @param[in] VendorGuid Guid of variable\r
45\r
46 @param[in] Data Variable data\r
47\r
48 @param[in] DataSize Size of data. 0 means delete\r
49\r
50 @param[in] Attributes Attribues of the variable\r
51\r
52 @param[in] Variable The variable information which is used to keep track of variable usage.\r
53\r
54 @retval EFI_SUCCESS The update operation is success.\r
55\r
56 @retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region.\r
57\r
58**/\r
59EFI_STATUS\r
60EFIAPI\r
61UpdateVariable (\r
62 IN CHAR16 *VariableName,\r
63 IN EFI_GUID *VendorGuid,\r
64 IN VOID *Data,\r
65 IN UINTN DataSize,\r
66 IN UINT32 Attributes OPTIONAL,\r
67 IN VARIABLE_POINTER_TRACK *Variable\r
68 );\r
69\r
70VOID\r
71EFIAPI\r
72OnVirtualAddressChangeFsv (\r
73 IN EFI_EVENT Event,\r
74 IN VOID *Context\r
75 );\r
76\r
77VOID\r
78EFIAPI\r
79OnSimpleFileSystemInstall (\r
80 IN EFI_EVENT Event,\r
81 IN VOID *Context\r
82 );\r
83\r
84BOOLEAN\r
85IsValidVariableHeader (\r
86 IN VARIABLE_HEADER *Variable\r
87 )\r
88/*++\r
89\r
90Routine Description:\r
91\r
92 This code checks if variable header is valid or not.\r
93\r
94Arguments:\r
95 Variable Pointer to the Variable Header.\r
96\r
97Returns:\r
98 TRUE Variable header is valid.\r
99 FALSE Variable header is not valid.\r
100\r
101--*/\r
102{\r
103 if (Variable == NULL || Variable->StartId != VARIABLE_DATA) {\r
104 return FALSE;\r
105 }\r
106\r
107 return TRUE;\r
108}\r
109\r
110VARIABLE_STORE_STATUS\r
111GetVariableStoreStatus (\r
112 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
113 )\r
114/*++\r
115\r
116Routine Description:\r
117\r
118 This code gets the current status of Variable Store.\r
119\r
120Arguments:\r
121\r
122 VarStoreHeader Pointer to the Variable Store Header.\r
123\r
124Returns:\r
125\r
126 EfiRaw Variable store status is raw\r
127 EfiValid Variable store status is valid\r
128 EfiInvalid Variable store status is invalid\r
129\r
130--*/\r
131{\r
132 if (CompareGuid (&VarStoreHeader->Signature, &mStoreHeaderTemplate.Signature) &&\r
133 (VarStoreHeader->Format == mStoreHeaderTemplate.Format) &&\r
134 (VarStoreHeader->State == mStoreHeaderTemplate.State)\r
135 ) {\r
136 return EfiValid;\r
137 } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == VAR_DEFAULT_VALUE_32 &&\r
138 ((UINT32 *)(&VarStoreHeader->Signature))[1] == VAR_DEFAULT_VALUE_32 &&\r
139 ((UINT32 *)(&VarStoreHeader->Signature))[2] == VAR_DEFAULT_VALUE_32 &&\r
140 ((UINT32 *)(&VarStoreHeader->Signature))[3] == VAR_DEFAULT_VALUE_32 &&\r
141 VarStoreHeader->Size == VAR_DEFAULT_VALUE_32 &&\r
142 VarStoreHeader->Format == VAR_DEFAULT_VALUE &&\r
143 VarStoreHeader->State == VAR_DEFAULT_VALUE\r
144 ) {\r
145\r
146 return EfiRaw;\r
147 } else {\r
148 return EfiInvalid;\r
149 }\r
150}\r
151\r
152UINT8 *\r
153GetVariableDataPtr (\r
154 IN VARIABLE_HEADER *Variable\r
155 )\r
156/*++\r
157\r
158Routine Description:\r
159\r
160 This code gets the pointer to the variable data.\r
161\r
162Arguments:\r
163\r
164 Variable Pointer to the Variable Header.\r
165\r
166Returns:\r
167\r
168 UINT8* Pointer to Variable Data\r
169\r
170--*/\r
171{\r
172 //\r
173 // Be careful about pad size for alignment\r
174 //\r
175 return (UINT8 *) ((UINTN) GET_VARIABLE_NAME_PTR (Variable) + Variable->NameSize + GET_PAD_SIZE (Variable->NameSize));\r
176}\r
177\r
178VARIABLE_HEADER *\r
179GetNextVariablePtr (\r
180 IN VARIABLE_HEADER *Variable\r
181 )\r
182/*++\r
183\r
184Routine Description:\r
185\r
186 This code gets the pointer to the next variable header.\r
187\r
188Arguments:\r
189\r
190 Variable Pointer to the Variable Header.\r
191\r
192Returns:\r
193\r
194 VARIABLE_HEADER* Pointer to next variable header.\r
195\r
196--*/\r
197{\r
198 if (!IsValidVariableHeader (Variable)) {\r
199 return NULL;\r
200 }\r
201 //\r
202 // Be careful about pad size for alignment\r
203 //\r
204 return (VARIABLE_HEADER *) ((UINTN) GetVariableDataPtr (Variable) + Variable->DataSize + GET_PAD_SIZE (Variable->DataSize));\r
205}\r
206\r
207VARIABLE_HEADER *\r
208GetEndPointer (\r
209 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
210 )\r
211/*++\r
212\r
213Routine Description:\r
214\r
215 This code gets the pointer to the last variable memory pointer byte\r
216\r
217Arguments:\r
218\r
219 VarStoreHeader Pointer to the Variable Store Header.\r
220\r
221Returns:\r
222\r
223 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
224\r
225--*/\r
226{\r
227 //\r
228 // The end of variable store\r
229 //\r
230 return (VARIABLE_HEADER *) ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
231}\r
232\r
233BOOLEAN\r
234ExistNewerVariable (\r
235 IN VARIABLE_HEADER *Variable\r
236 )\r
237/*++\r
238\r
239Routine Description:\r
240\r
241 Check if exist newer variable when doing reclaim\r
242\r
243Arguments:\r
244\r
245 Variable Pointer to start position\r
246\r
247Returns:\r
248\r
249 TRUE - Exists another variable, which is newer than the current one\r
250 FALSE - Doesn't exist another vairable which is newer than the current one\r
251\r
252--*/\r
253{\r
254 VARIABLE_HEADER *NextVariable;\r
255 CHAR16 *VariableName;\r
256 EFI_GUID *VendorGuid;\r
257 \r
258 VendorGuid = &Variable->VendorGuid;\r
259 VariableName = GET_VARIABLE_NAME_PTR(Variable);\r
260 \r
261 NextVariable = GetNextVariablePtr (Variable);\r
262 while (IsValidVariableHeader (NextVariable)) {\r
263 if ((NextVariable->State == VAR_ADDED) || (NextVariable->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
264 //\r
265 // If match Guid and Name\r
266 //\r
267 if (CompareGuid (VendorGuid, &NextVariable->VendorGuid)) {\r
268 if (CompareMem (VariableName, GET_VARIABLE_NAME_PTR (NextVariable), StrSize (VariableName)) == 0) {\r
269 return TRUE;\r
270 }\r
271 }\r
272 }\r
273 NextVariable = GetNextVariablePtr (NextVariable);\r
274 }\r
275 return FALSE;\r
276}\r
277\r
278EFI_STATUS\r
279Reclaim (\r
280 IN VARIABLE_STORAGE_TYPE StorageType,\r
281 IN VARIABLE_HEADER *CurrentVariable OPTIONAL\r
282 )\r
283/*++\r
284\r
285Routine Description:\r
286\r
287 Variable store garbage collection and reclaim operation\r
288\r
289Arguments:\r
290\r
291 IsVolatile The variable store is volatile or not,\r
292 if it is non-volatile, need FTW\r
293 CurrentVairable If it is not NULL, it means not to process\r
294 current variable for Reclaim.\r
295\r
296Returns:\r
297\r
298 EFI STATUS\r
299\r
300--*/\r
301{\r
302 VARIABLE_HEADER *Variable;\r
303 VARIABLE_HEADER *NextVariable;\r
304 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
305 UINT8 *ValidBuffer;\r
306 UINTN ValidBufferSize;\r
307 UINTN VariableSize;\r
308 UINT8 *CurrPtr;\r
309 EFI_STATUS Status;\r
310\r
311 VariableStoreHeader = (VARIABLE_STORE_HEADER *) mGlobal->VariableBase[StorageType];\r
312\r
313 //\r
314 // Start Pointers for the variable.\r
315 //\r
316 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
317\r
318 //\r
319 // recaluate the total size of Common/HwErr type variables in non-volatile area.\r
320 //\r
321 if (!StorageType) {\r
322 mGlobal->CommonVariableTotalSize = 0;\r
323 mGlobal->HwErrVariableTotalSize = 0;\r
324 }\r
325 //\r
326 // To make the reclaim, here we just allocate a memory that equal to the original memory\r
327 //\r
328 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER) + VariableStoreHeader->Size;\r
329\r
330 Status = gBS->AllocatePool (\r
331 EfiBootServicesData,\r
332 ValidBufferSize,\r
333 (VOID**) &ValidBuffer\r
334 );\r
335 if (EFI_ERROR (Status)) {\r
336 return Status;\r
337 }\r
338\r
339 CurrPtr = ValidBuffer;\r
340\r
341 //\r
342 // Copy variable store header\r
343 //\r
344 CopyMem (CurrPtr, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
345 CurrPtr += sizeof (VARIABLE_STORE_HEADER);\r
346\r
347 //\r
348 // Start Pointers for the variable.\r
349 //\r
350 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
351\r
352 \r
353 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
354 while (IsValidVariableHeader (Variable)) {\r
355 NextVariable = GetNextVariablePtr (Variable);\r
356 //\r
357 // State VAR_ADDED or VAR_IN_DELETED_TRANSITION are to kept,\r
358 // The CurrentVariable, is also saved, as SetVariable may fail due to lack of space\r
359 //\r
360 if (Variable->State == VAR_ADDED) {\r
361 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
362 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
363 ValidBufferSize += VariableSize;\r
364 CurrPtr += VariableSize;\r
365 if ((!StorageType) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
366 mGlobal->HwErrVariableTotalSize += VariableSize;\r
367 } else if ((!StorageType) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
368 mGlobal->CommonVariableTotalSize += VariableSize;\r
369 }\r
370 } else if (Variable->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION)) {\r
371 //\r
372 // As variables that with the same guid and name may exist in NV due to power failure during SetVariable,\r
373 // we will only save the latest valid one\r
374 //\r
375 if (!ExistNewerVariable(Variable)) {\r
376 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
377 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
378 //\r
379 // If CurrentVariable == Variable, mark as VAR_IN_DELETED_TRANSITION\r
380 //\r
381 if (Variable != CurrentVariable){\r
382 ((VARIABLE_HEADER *)CurrPtr)->State = VAR_ADDED;\r
383 }\r
384 CurrPtr += VariableSize;\r
385 ValidBufferSize += VariableSize;\r
386 if ((!StorageType) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
387 mGlobal->HwErrVariableTotalSize += VariableSize;\r
388 } else if ((!StorageType) && ((Variable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
389 mGlobal->CommonVariableTotalSize += VariableSize;\r
390 }\r
391 }\r
392 }\r
393 Variable = NextVariable;\r
394 }\r
395\r
396 mGlobal->LastVariableOffset[StorageType] = ValidBufferSize;\r
397\r
398 //\r
399 // TODO: cannot restore to original state, basic FTW needed\r
400 //\r
401 Status = mGlobal->VariableStore[StorageType]->Erase (\r
402 mGlobal->VariableStore[StorageType]\r
403 );\r
404 Status = mGlobal->VariableStore[StorageType]->Write (\r
405 mGlobal->VariableStore[StorageType],\r
406 0,\r
407 ValidBufferSize,\r
408 ValidBuffer\r
409 );\r
410\r
411 if (EFI_ERROR (Status)) {\r
412 //\r
413 // If error, then reset the last variable offset to zero.\r
414 //\r
415 mGlobal->LastVariableOffset[StorageType] = 0;\r
416 };\r
417\r
418 gBS->FreePool (ValidBuffer);\r
419\r
420 return Status;\r
421}\r
422\r
423EFI_STATUS\r
424FindVariable (\r
425 IN CHAR16 *VariableName,\r
426 IN EFI_GUID *VendorGuid,\r
427 OUT VARIABLE_POINTER_TRACK *PtrTrack\r
428 )\r
429/*++\r
430\r
431Routine Description:\r
432\r
433 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
434\r
435Arguments:\r
436\r
437 VariableName Name of the variable to be found\r
438 VendorGuid Vendor GUID to be found.\r
439 PtrTrack Variable Track Pointer structure that contains\r
440 Variable Information.\r
441 Contains the pointer of Variable header.\r
442\r
443Returns:\r
444\r
445 EFI_INVALID_PARAMETER - Invalid parameter\r
446 EFI_SUCCESS - Find the specified variable\r
447 EFI_NOT_FOUND - Not found\r
448\r
449--*/\r
450{\r
451 VARIABLE_HEADER *Variable;\r
452 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
453 UINTN Index;\r
454 VARIABLE_HEADER *InDeleteVariable;\r
455 UINTN InDeleteIndex;\r
456 VARIABLE_HEADER *InDeleteStartPtr;\r
457 VARIABLE_HEADER *InDeleteEndPtr;\r
458\r
459 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
460 return EFI_INVALID_PARAMETER;\r
461 }\r
462\r
463 InDeleteVariable = NULL;\r
464 InDeleteIndex = (UINTN)-1;\r
465 InDeleteStartPtr = NULL;\r
466 InDeleteEndPtr = NULL;\r
467\r
468 for (Index = 0; Index < MaxType; Index ++) {\r
469 //\r
470 // 0: Non-Volatile, 1: Volatile\r
471 //\r
472 VariableStoreHeader = (VARIABLE_STORE_HEADER *) mGlobal->VariableBase[Index];\r
473\r
474 //\r
475 // Start Pointers for the variable.\r
476 // Actual Data Pointer where data can be written.\r
477 //\r
478 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
479\r
480 //\r
481 // Find the variable by walk through non-volatile and volatile variable store\r
482 //\r
483 PtrTrack->StartPtr = Variable;\r
484 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader);\r
485\r
486 while ((Variable < PtrTrack->EndPtr) && IsValidVariableHeader (Variable)) {\r
487 if (Variable->State == VAR_ADDED) {\r
488 if (!EfiAtRuntime () || (Variable->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
489 if (VariableName[0] == 0) {\r
490 PtrTrack->CurrPtr = Variable;\r
491 PtrTrack->Type = (VARIABLE_STORAGE_TYPE) Index;\r
492 return EFI_SUCCESS;\r
493 } else {\r
494 if (CompareGuid (VendorGuid, &Variable->VendorGuid)) {\r
495 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable), StrSize (VariableName))) {\r
496 PtrTrack->CurrPtr = Variable;\r
497 PtrTrack->Type = (VARIABLE_STORAGE_TYPE) Index;\r
498 return EFI_SUCCESS;\r
499 }\r
500 }\r
501 }\r
502 }\r
503 } else if (Variable->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION)) {\r
504 //\r
505 // VAR_IN_DELETED_TRANSITION should also be checked.\r
506 //\r
507 if (!EfiAtRuntime () || (Variable->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
508 if (VariableName[0] == 0) {\r
509 InDeleteVariable = Variable;\r
510 InDeleteIndex = Index;\r
511 InDeleteStartPtr = PtrTrack->StartPtr;\r
512 InDeleteEndPtr = PtrTrack->EndPtr;\r
513 } else {\r
514 if (CompareGuid (VendorGuid, &Variable->VendorGuid)) {\r
515 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable), StrSize (VariableName))) {\r
516 InDeleteVariable = Variable;\r
517 InDeleteIndex = Index;\r
518 InDeleteStartPtr = PtrTrack->StartPtr;\r
519 InDeleteEndPtr = PtrTrack->EndPtr;\r
520 }\r
521 }\r
522 }\r
523 }\r
524 }\r
525\r
526 Variable = GetNextVariablePtr (Variable);\r
527 }\r
528 //\r
529 // While (...)\r
530 //\r
531 }\r
532 //\r
533 // for (...)\r
534 //\r
535\r
536 //\r
537 // if VAR_IN_DELETED_TRANSITION found, and VAR_ADDED not found,\r
538 // we return it.\r
539 //\r
540 if (InDeleteVariable != NULL) {\r
541 PtrTrack->CurrPtr = InDeleteVariable;\r
542 PtrTrack->Type = (VARIABLE_STORAGE_TYPE) InDeleteIndex;\r
543 PtrTrack->StartPtr = InDeleteStartPtr;\r
544 PtrTrack->EndPtr = InDeleteEndPtr;\r
545 return EFI_SUCCESS;\r
546 }\r
547\r
548 PtrTrack->CurrPtr = NULL;\r
549 return EFI_NOT_FOUND;\r
550}\r
551\r
552/**\r
553 Get index from supported language codes according to language string.\r
554\r
555 This code is used to get corresponding index in supported language codes. It can handle\r
556 RFC4646 and ISO639 language tags.\r
557 In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.\r
558 In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.\r
559\r
560 For example:\r
561 SupportedLang = "engfraengfra"\r
562 Lang = "eng"\r
563 Iso639Language = TRUE\r
564 The return value is "0".\r
565 Another example:\r
566 SupportedLang = "en;fr;en-US;fr-FR"\r
567 Lang = "fr-FR"\r
568 Iso639Language = FALSE\r
569 The return value is "3".\r
570\r
571 @param SupportedLang Platform supported language codes.\r
572 @param Lang Configured language.\r
573 @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.\r
574\r
575 @retval the index of language in the language codes.\r
576\r
577**/\r
578UINTN\r
579EFIAPI\r
580GetIndexFromSupportedLangCodes(\r
581 IN CHAR8 *SupportedLang,\r
582 IN CHAR8 *Lang,\r
583 IN BOOLEAN Iso639Language\r
584 ) \r
585{\r
586 UINTN Index;\r
587 UINT32 CompareLength;\r
588 CHAR8 *Supported;\r
589\r
590 Index = 0;\r
591 Supported = SupportedLang;\r
592 if (Iso639Language) {\r
593 CompareLength = 3;\r
594 for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {\r
595 if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {\r
596 //\r
597 // Successfully find the index of Lang string in SupportedLang string.\r
598 //\r
599 Index = Index / CompareLength;\r
600 return Index;\r
601 }\r
602 }\r
603 ASSERT (FALSE);\r
604 return 0;\r
605 } else {\r
606 //\r
607 // Compare RFC4646 language code\r
608 //\r
609 while (*Supported != '\0') {\r
610 //\r
611 // take semicolon as delimitation, sequentially traverse supported language codes.\r
612 //\r
613 for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {\r
614 Supported++;\r
615 }\r
616 if (AsciiStrnCmp (Lang, Supported - CompareLength, CompareLength) == 0) {\r
617 //\r
618 // Successfully find the index of Lang string in SupportedLang string.\r
619 //\r
620 return Index;\r
621 }\r
622 Index++;\r
623 }\r
624 ASSERT (FALSE);\r
625 return 0;\r
626 }\r
627}\r
628\r
629/**\r
630 Get language string from supported language codes according to index.\r
631\r
632 This code is used to get corresponding language string in supported language codes. It can handle\r
633 RFC4646 and ISO639 language tags.\r
634 In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.\r
635 In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.\r
636\r
637 For example:\r
638 SupportedLang = "engfraengfra"\r
639 Index = "1"\r
640 Iso639Language = TRUE\r
641 The return value is "fra".\r
642 Another example:\r
643 SupportedLang = "en;fr;en-US;fr-FR"\r
644 Index = "1"\r
645 Iso639Language = FALSE\r
646 The return value is "fr".\r
647\r
648 @param SupportedLang Platform supported language codes.\r
649 @param Index the index in supported language codes.\r
650 @param Iso639Language A bool value to signify if the handler is operated on ISO639 or RFC4646.\r
651\r
652 @retval the language string in the language codes.\r
653\r
654**/\r
655CHAR8 *\r
656EFIAPI\r
657GetLangFromSupportedLangCodes (\r
658 IN CHAR8 *SupportedLang,\r
659 IN UINTN Index,\r
660 IN BOOLEAN Iso639Language\r
661)\r
662{\r
663 UINTN SubIndex;\r
664 UINT32 CompareLength;\r
665 CHAR8 *Supported;\r
666\r
667 SubIndex = 0;\r
668 Supported = SupportedLang;\r
669 if (Iso639Language) {\r
670 //\r
671 // according to the index of Lang string in SupportedLang string to get the language.\r
672 // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.\r
673 // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.\r
674 //\r
675 CompareLength = 3;\r
676 SetMem (mGlobal->Lang, sizeof(mGlobal->Lang), 0);\r
677 return CopyMem (mGlobal->Lang, SupportedLang + Index * CompareLength, CompareLength);\r
678 \r
679 } else {\r
680 while (TRUE) {\r
681 //\r
682 // take semicolon as delimitation, sequentially traverse supported language codes.\r
683 //\r
684 for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {\r
685 Supported++;\r
686 }\r
687 if ((*Supported == '\0') && (SubIndex != Index)) {\r
688 //\r
689 // Have completed the traverse, but not find corrsponding string.\r
690 // This case is not allowed to happen.\r
691 //\r
692 ASSERT(FALSE);\r
693 return NULL;\r
694 }\r
695 if (SubIndex == Index) {\r
696 //\r
697 // according to the index of Lang string in SupportedLang string to get the language.\r
698 // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.\r
699 // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.\r
700 //\r
701 SetMem (mGlobal->PlatformLang, sizeof (mGlobal->PlatformLang), 0);\r
702 return CopyMem (mGlobal->PlatformLang, Supported - CompareLength, CompareLength);\r
703 }\r
704 SubIndex++;\r
705 }\r
706 }\r
707}\r
708\r
709/**\r
710 Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.\r
711\r
712 When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.\r
713\r
714 According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,\r
715 and are read-only. Therefore, in variable driver, only store the original value for other use.\r
716\r
717 @param[in] VariableName Name of variable\r
718\r
719 @param[in] Data Variable data\r
720\r
721 @param[in] DataSize Size of data. 0 means delete\r
722\r
723 @retval EFI_SUCCESS auto update operation is successful.\r
724\r
725**/\r
726EFI_STATUS\r
727EFIAPI\r
728AutoUpdateLangVariable(\r
729 IN CHAR16 *VariableName,\r
730 IN VOID *Data,\r
731 IN UINTN DataSize\r
732 )\r
733{\r
734 EFI_STATUS Status;\r
735 CHAR8 *BestPlatformLang;\r
736 CHAR8 *BestLang;\r
737 UINTN Index;\r
738 UINT32 Attributes;\r
739 VARIABLE_POINTER_TRACK Variable;\r
740\r
741 //\r
742 // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.\r
743 //\r
744 Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;\r
745\r
746 if (StrCmp (VariableName, L"PlatformLangCodes") == 0) {\r
747 //\r
748 // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only\r
749 // Therefore, in variable driver, only store the original value for other use.\r
750 //\r
751 AsciiStrnCpy (mGlobal->PlatformLangCodes, Data, DataSize);\r
752 } else if (StrCmp (VariableName, L"LangCodes") == 0) {\r
753 //\r
754 // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only\r
755 // Therefore, in variable driver, only store the original value for other use.\r
756 //\r
757 AsciiStrnCpy (mGlobal->LangCodes, Data, DataSize);\r
758 } else if ((StrCmp (VariableName, L"PlatformLang") == 0) && (DataSize != 0)) {\r
759 ASSERT (AsciiStrLen (mGlobal->PlatformLangCodes) != 0);\r
760\r
761 //\r
762 // When setting PlatformLang, firstly get most matched language string from supported language codes.\r
763 //\r
764 BestPlatformLang = GetBestLanguage(mGlobal->PlatformLangCodes, FALSE, Data, NULL);\r
765\r
766 //\r
767 // Get the corresponding index in language codes.\r
768 //\r
769 Index = GetIndexFromSupportedLangCodes(mGlobal->PlatformLangCodes, BestPlatformLang, FALSE);\r
770\r
771 //\r
772 // Get the corresponding ISO639 language tag according to RFC4646 language tag.\r
773 //\r
774 BestLang = GetLangFromSupportedLangCodes(mGlobal->LangCodes, Index, TRUE);\r
775\r
776 //\r
777 // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.\r
778 //\r
779 FindVariable(L"Lang", &gEfiGlobalVariableGuid, &Variable);\r
780\r
781 Status = UpdateVariable(L"Lang", &gEfiGlobalVariableGuid, \r
782 BestLang, ISO_639_2_ENTRY_SIZE + 1, Attributes, &Variable);\r
783\r
784 DEBUG((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a\n", BestPlatformLang, BestLang));\r
785\r
786 ASSERT_EFI_ERROR(Status);\r
787 \r
788 } else if ((StrCmp (VariableName, L"Lang") == 0) && (DataSize != 0)) {\r
789 ASSERT (AsciiStrLen (mGlobal->LangCodes) != 0);\r
790\r
791 //\r
792 // When setting Lang, firstly get most matched language string from supported language codes.\r
793 //\r
794 BestLang = GetBestLanguage(mGlobal->LangCodes, TRUE, Data, NULL);\r
795\r
796 //\r
797 // Get the corresponding index in language codes.\r
798 //\r
799 Index = GetIndexFromSupportedLangCodes(mGlobal->LangCodes, BestLang, TRUE);\r
800\r
801 //\r
802 // Get the corresponding RFC4646 language tag according to ISO639 language tag.\r
803 //\r
804 BestPlatformLang = GetLangFromSupportedLangCodes(mGlobal->PlatformLangCodes, Index, FALSE);\r
805\r
806 //\r
807 // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.\r
808 //\r
809 FindVariable(L"PlatformLang", &gEfiGlobalVariableGuid, &Variable);\r
810\r
811 Status = UpdateVariable(L"PlatformLang", &gEfiGlobalVariableGuid, \r
812 BestPlatformLang, AsciiStrSize (BestPlatformLang), Attributes, &Variable);\r
813\r
814 DEBUG((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a\n", BestLang, BestPlatformLang));\r
815 ASSERT_EFI_ERROR(Status);\r
816 }\r
817 return EFI_SUCCESS;\r
818}\r
819\r
820/**\r
821 Update the variable region with Variable information. These are the same \r
822 arguments as the EFI Variable services.\r
823\r
824 @param[in] VariableName Name of variable\r
825\r
826 @param[in] VendorGuid Guid of variable\r
827\r
828 @param[in] Data Variable data\r
829\r
830 @param[in] DataSize Size of data. 0 means delete\r
831\r
832 @param[in] Attributes Attribues of the variable\r
833\r
834 @param[in] Variable The variable information which is used to keep track of variable usage.\r
835\r
836 @retval EFI_SUCCESS The update operation is success.\r
837\r
838 @retval EFI_OUT_OF_RESOURCES Variable region is full, can not write other data into this region.\r
839\r
840**/\r
841EFI_STATUS\r
842EFIAPI\r
843UpdateVariable (\r
844 IN CHAR16 *VariableName,\r
845 IN EFI_GUID *VendorGuid,\r
846 IN VOID *Data,\r
847 IN UINTN DataSize,\r
848 IN UINT32 Attributes OPTIONAL,\r
849 IN VARIABLE_POINTER_TRACK *Variable\r
850 )\r
851{\r
852 EFI_STATUS Status;\r
853 VARIABLE_HEADER *NextVariable;\r
854 UINTN VarNameOffset;\r
855 UINTN VarDataOffset;\r
856 UINTN VarNameSize;\r
857 UINTN VarSize;\r
858 UINT8 State;\r
859 BOOLEAN Reclaimed;\r
860 VARIABLE_STORAGE_TYPE StorageType;\r
861\r
862 Reclaimed = FALSE;\r
863\r
864 if (Variable->CurrPtr != NULL) { \r
865 //\r
866 // Update/Delete existing variable\r
867 //\r
868 \r
869 if (EfiAtRuntime ()) { \r
870 //\r
871 // If EfiAtRuntime and the variable is Volatile and Runtime Access, \r
872 // the volatile is ReadOnly, and SetVariable should be aborted and \r
873 // return EFI_WRITE_PROTECTED.\r
874 //\r
875 if (Variable->Type == Volatile) {\r
876 return EFI_WRITE_PROTECTED;\r
877 }\r
878 //\r
879 // Only variable have NV attribute can be updated/deleted in Runtime\r
880 //\r
881 if (!(Variable->CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE)) {\r
882 return EFI_INVALID_PARAMETER; \r
883 }\r
884 }\r
885 \r
886 //\r
887 // Setting a data variable with no access, or zero DataSize attributes\r
888 // specified causes it to be deleted.\r
889 //\r
890 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
891 //\r
892 // Found this variable in storage\r
893 //\r
894 State = Variable->CurrPtr->State;\r
895 State &= VAR_DELETED;\r
896\r
897 Status = mGlobal->VariableStore[Variable->Type]->Write (\r
898 mGlobal->VariableStore[Variable->Type],\r
899 VARIABLE_MEMBER_OFFSET (State, (UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr),\r
900 sizeof (Variable->CurrPtr->State),\r
901 &State\r
902 );\r
903 //\r
904 // NOTE: Write operation at least can write data to memory cache\r
905 // Discard file writing failure here.\r
906 //\r
907 return EFI_SUCCESS;\r
908 }\r
909 \r
910 //\r
911 // Found this variable in storage\r
912 // If the variable is marked valid and the same data has been passed in\r
913 // then return to the caller immediately.\r
914 //\r
915 if ((Variable->CurrPtr->DataSize == DataSize) &&\r
916 (CompareMem (Data, GetVariableDataPtr (Variable->CurrPtr), DataSize) == 0)\r
917 ) {\r
918 return EFI_SUCCESS;\r
919 } else if ((Variable->CurrPtr->State == VAR_ADDED) ||\r
920 (Variable->CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
921 //\r
922 // Mark the old variable as in delete transition\r
923 //\r
924 State = Variable->CurrPtr->State;\r
925 State &= VAR_IN_DELETED_TRANSITION;\r
926\r
927 Status = mGlobal->VariableStore[Variable->Type]->Write (\r
928 mGlobal->VariableStore[Variable->Type],\r
929 VARIABLE_MEMBER_OFFSET (State, (UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr),\r
930 sizeof (Variable->CurrPtr->State),\r
931 &State\r
932 );\r
933 //\r
934 // NOTE: Write operation at least can write data to memory cache\r
935 // Discard file writing failure here.\r
936 //\r
937 }\r
938 } else {\r
939 //\r
940 // Create a new variable\r
941 // \r
942 \r
943 //\r
944 // Make sure we are trying to create a new variable.\r
945 // Setting a data variable with no access, or zero DataSize attributes means to delete it. \r
946 //\r
947 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
948 return EFI_NOT_FOUND;\r
949 } \r
950 //\r
951 // Only variable have NV|RT attribute can be created in Runtime\r
952 //\r
953 if (EfiAtRuntime () &&\r
954 (!(Attributes & EFI_VARIABLE_RUNTIME_ACCESS) || !(Attributes & EFI_VARIABLE_NON_VOLATILE))) {\r
955 return EFI_INVALID_PARAMETER;\r
956 } \r
957 \r
958 } \r
959\r
960 //\r
961 // Function part - create a new variable and copy the data.\r
962 // Both update a variable and create a variable will come here. \r
963 // We can firstly write all the data in memory, then write them to file\r
964 // This can reduce the times of write operation\r
965 //\r
966 \r
967 NextVariable = (VARIABLE_HEADER *) mGlobal->Scratch;\r
968\r
969 NextVariable->StartId = VARIABLE_DATA;\r
970 NextVariable->Attributes = Attributes;\r
971 NextVariable->State = VAR_ADDED;\r
972 NextVariable->Reserved = 0;\r
973 VarNameOffset = sizeof (VARIABLE_HEADER);\r
974 VarNameSize = StrSize (VariableName);\r
975 CopyMem (\r
976 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
977 VariableName,\r
978 VarNameSize\r
979 );\r
980 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
981 CopyMem (\r
982 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
983 Data,\r
984 DataSize\r
985 );\r
986 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
987 //\r
988 // There will be pad bytes after Data, the NextVariable->NameSize and\r
989 // NextVariable->DataSize should not include pad size so that variable\r
990 // service can get actual size in GetVariable\r
991 //\r
992 NextVariable->NameSize = (UINT32)VarNameSize;\r
993 NextVariable->DataSize = (UINT32)DataSize;\r
994\r
995 //\r
996 // The actual size of the variable that stores in storage should\r
997 // include pad size.\r
998 // VarDataOffset: offset from begin of current variable header\r
999 //\r
1000 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
1001\r
1002 StorageType = (Attributes & EFI_VARIABLE_NON_VOLATILE) ? NonVolatile : Volatile;\r
1003\r
1004 if ((UINT32) (VarSize + mGlobal->LastVariableOffset[StorageType]) >\r
1005 ((VARIABLE_STORE_HEADER *) mGlobal->VariableBase[StorageType])->Size\r
1006 ) {\r
1007 if ((StorageType == NonVolatile) && EfiAtRuntime ()) {\r
1008 return EFI_OUT_OF_RESOURCES;\r
1009 }\r
1010 //\r
1011 // Perform garbage collection & reclaim operation\r
1012 //\r
1013 Status = Reclaim (StorageType, Variable->CurrPtr);\r
1014 if (EFI_ERROR (Status)) {\r
1015 //\r
1016 // Reclaim error\r
1017 // we cannot restore to original state, fetal error, report to user\r
1018 //\r
1019 DEBUG ((EFI_D_ERROR, "FSVariable: Recalim error (fetal error) - %r\n", Status));\r
1020 return Status;\r
1021 }\r
1022 //\r
1023 // If still no enough space, return out of resources\r
1024 //\r
1025 if ((UINT32) (VarSize + mGlobal->LastVariableOffset[StorageType]) >\r
1026 ((VARIABLE_STORE_HEADER *) mGlobal->VariableBase[StorageType])->Size\r
1027 ) {\r
1028 return EFI_OUT_OF_RESOURCES;\r
1029 }\r
1030\r
1031 Reclaimed = TRUE;\r
1032 }\r
1033 Status = mGlobal->VariableStore[StorageType]->Write (\r
1034 mGlobal->VariableStore[StorageType],\r
1035 mGlobal->LastVariableOffset[StorageType],\r
1036 VarSize,\r
1037 NextVariable\r
1038 );\r
1039 //\r
1040 // NOTE: Write operation at least can write data to memory cache\r
1041 // Discard file writing failure here.\r
1042 //\r
1043 mGlobal->LastVariableOffset[StorageType] += VarSize;\r
1044\r
1045 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {\r
1046 mGlobal->HwErrVariableTotalSize += VarSize;\r
1047 } else {\r
1048 mGlobal->CommonVariableTotalSize += VarSize;\r
1049 }\r
1050\r
1051 //\r
1052 // Mark the old variable as deleted\r
1053 //\r
1054 if (!Reclaimed && !EFI_ERROR (Status) && Variable->CurrPtr != NULL) {\r
1055 State = Variable->CurrPtr->State;\r
1056 State &= VAR_DELETED;\r
1057\r
1058 Status = mGlobal->VariableStore[StorageType]->Write (\r
1059 mGlobal->VariableStore[StorageType],\r
1060 VARIABLE_MEMBER_OFFSET (State, (UINTN) Variable->CurrPtr - (UINTN) Variable->StartPtr),\r
1061 sizeof (Variable->CurrPtr->State),\r
1062 &State\r
1063 );\r
1064 //\r
1065 // NOTE: Write operation at least can write data to memory cache\r
1066 // Discard file writing failure here.\r
1067 //\r
1068 }\r
1069 return EFI_SUCCESS;\r
1070}\r
1071\r
1072EFI_STATUS\r
1073EFIAPI\r
1074DuetGetVariable (\r
1075 IN CHAR16 *VariableName,\r
1076 IN EFI_GUID *VendorGuid,\r
1077 OUT UINT32 *Attributes OPTIONAL,\r
1078 IN OUT UINTN *DataSize,\r
1079 OUT VOID *Data\r
1080 )\r
1081/*++\r
1082\r
1083Routine Description:\r
1084\r
1085 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
1086\r
1087Arguments:\r
1088\r
1089 VariableName Name of Variable to be found\r
1090 VendorGuid Variable vendor GUID\r
1091 Attributes OPTIONAL Attribute value of the variable found\r
1092 DataSize Size of Data found. If size is less than the\r
1093 data, this value contains the required size.\r
1094 Data Data pointer\r
1095\r
1096Returns:\r
1097\r
1098 EFI STATUS\r
1099\r
1100--*/\r
1101{\r
1102 VARIABLE_POINTER_TRACK Variable;\r
1103 UINTN VarDataSize;\r
1104 EFI_STATUS Status;\r
1105\r
1106 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
1107 return EFI_INVALID_PARAMETER;\r
1108 }\r
1109\r
1110 //\r
1111 // Find existing variable\r
1112 //\r
1113 Status = FindVariable (VariableName, VendorGuid, &Variable);\r
1114\r
1115 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
1116 return Status;\r
1117 }\r
1118 //\r
1119 // Get data size\r
1120 //\r
1121 VarDataSize = Variable.CurrPtr->DataSize;\r
1122 if (*DataSize >= VarDataSize) {\r
1123 if (Data == NULL) {\r
1124 return EFI_INVALID_PARAMETER;\r
1125 }\r
1126 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
1127\r
1128 if (Attributes != NULL) {\r
1129 *Attributes = Variable.CurrPtr->Attributes;\r
1130 }\r
1131\r
1132 *DataSize = VarDataSize;\r
1133\r
1134 return EFI_SUCCESS;\r
1135 } else {\r
1136 *DataSize = VarDataSize;\r
1137 return EFI_BUFFER_TOO_SMALL;\r
1138 }\r
1139}\r
1140\r
1141EFI_STATUS\r
1142EFIAPI\r
1143GetNextVariableName (\r
1144 IN OUT UINTN *VariableNameSize,\r
1145 IN OUT CHAR16 *VariableName,\r
1146 IN OUT EFI_GUID *VendorGuid\r
1147 )\r
1148/*++\r
1149\r
1150Routine Description:\r
1151\r
1152 This code Finds the Next available variable\r
1153\r
1154Arguments:\r
1155\r
1156 VariableNameSize Size of the variable\r
1157 VariableName Pointer to variable name\r
1158 VendorGuid Variable Vendor Guid\r
1159\r
1160Returns:\r
1161\r
1162 EFI STATUS\r
1163\r
1164--*/\r
1165{\r
1166 VARIABLE_POINTER_TRACK Variable;\r
1167 UINTN VarNameSize;\r
1168 EFI_STATUS Status;\r
1169\r
1170 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
1171 return EFI_INVALID_PARAMETER;\r
1172 }\r
1173\r
1174 Status = FindVariable (VariableName, VendorGuid, &Variable);\r
1175\r
1176 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
1177 return Status;\r
1178 }\r
1179\r
1180 if (VariableName[0] != 0) {\r
1181 //\r
1182 // If variable name is not NULL, get next variable\r
1183 //\r
1184 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1185 }\r
1186\r
1187 while (TRUE) {\r
1188 //\r
1189 // The order we find variable is: 1). NonVolatile; 2). Volatile\r
1190 // If both volatile and non-volatile variable store are parsed,\r
1191 // return not found\r
1192 //\r
1193 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
1194 if (Variable.Type == Volatile) {\r
1195 //\r
1196 // Since we met the end of Volatile storage, we have parsed all the stores.\r
1197 //\r
1198 return EFI_NOT_FOUND;\r
1199 }\r
1200\r
1201 //\r
1202 // End of NonVolatile, continue to parse Volatile\r
1203 //\r
1204 Variable.Type = Volatile;\r
1205 Variable.StartPtr = (VARIABLE_HEADER *) ((VARIABLE_STORE_HEADER *) mGlobal->VariableBase[Volatile] + 1);\r
1206 Variable.EndPtr = (VARIABLE_HEADER *) GetEndPointer ((VARIABLE_STORE_HEADER *) mGlobal->VariableBase[Volatile]);\r
1207\r
1208 Variable.CurrPtr = Variable.StartPtr;\r
1209 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
1210 continue;\r
1211 }\r
1212 }\r
1213 //\r
1214 // Variable is found\r
1215 //\r
1216 if (IsValidVariableHeader (Variable.CurrPtr) &&\r
1217 ((Variable.CurrPtr->State == VAR_ADDED) ||\r
1218 (Variable.CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION)))) {\r
1219 if (!EfiAtRuntime () || (Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1220 VarNameSize = Variable.CurrPtr->NameSize;\r
1221 if (VarNameSize <= *VariableNameSize) {\r
1222 CopyMem (\r
1223 VariableName,\r
1224 GET_VARIABLE_NAME_PTR (Variable.CurrPtr),\r
1225 VarNameSize\r
1226 );\r
1227 CopyMem (\r
1228 VendorGuid,\r
1229 &Variable.CurrPtr->VendorGuid,\r
1230 sizeof (EFI_GUID)\r
1231 );\r
1232 Status = EFI_SUCCESS;\r
1233 } else {\r
1234 Status = EFI_BUFFER_TOO_SMALL;\r
1235 }\r
1236\r
1237 *VariableNameSize = VarNameSize;\r
1238 return Status;\r
1239 }\r
1240 }\r
1241\r
1242 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1243 }\r
1244}\r
1245\r
1246EFI_STATUS\r
1247EFIAPI\r
1248SetVariable (\r
1249 IN CHAR16 *VariableName,\r
1250 IN EFI_GUID *VendorGuid,\r
1251 IN UINT32 Attributes,\r
1252 IN UINTN DataSize,\r
1253 IN VOID *Data\r
1254 )\r
1255/*++\r
1256\r
1257Routine Description:\r
1258\r
1259 This code sets variable in storage blocks (Volatile or Non-Volatile)\r
1260\r
1261Arguments:\r
1262\r
1263 VariableName Name of Variable to be found\r
1264 VendorGuid Variable vendor GUID\r
1265 Attributes Attribute value of the variable found\r
1266 DataSize Size of Data found. If size is less than the\r
1267 data, this value contains the required size.\r
1268 Data Data pointer\r
1269\r
1270Returns:\r
1271 \r
1272 EFI_INVALID_PARAMETER - Invalid parameter\r
1273 EFI_SUCCESS - Set successfully\r
1274 EFI_OUT_OF_RESOURCES - Resource not enough to set variable\r
1275 EFI_NOT_FOUND - Not found\r
1276 EFI_DEVICE_ERROR - Variable can not be saved due to hardware failure\r
1277 EFI_WRITE_PROTECTED - Variable is read-only\r
1278\r
1279--*/\r
1280{\r
1281 VARIABLE_POINTER_TRACK Variable;\r
1282 EFI_STATUS Status;\r
1283\r
1284 //\r
1285 // Check input parameters\r
1286 // \r
1287 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1288 return EFI_INVALID_PARAMETER;\r
1289 }\r
1290 \r
1291 if (DataSize != 0 && Data == NULL) {\r
1292 return EFI_INVALID_PARAMETER;\r
1293 }\r
1294\r
1295 //\r
1296 // Not support authenticated variable write yet.\r
1297 //\r
1298 if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
1299 return EFI_INVALID_PARAMETER;\r
1300 }\r
1301\r
1302 //\r
1303 // Make sure if runtime bit is set, boot service bit is set also\r
1304 //\r
1305 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1306 return EFI_INVALID_PARAMETER;\r
1307 }\r
1308 \r
1309 //\r
1310 // The size of the VariableName, including the Unicode Null in bytes plus\r
1311 // the DataSize is limited to maximum size of PcdGet32 (PcdMaxHardwareErrorVariableSize)\r
1312 // bytes for HwErrRec, and PcdGet32 (PcdMaxVariableSize) bytes for the others.\r
1313 //\r
1314 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1315 if ((DataSize > PcdGet32(PcdMaxHardwareErrorVariableSize)) || \r
1316 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > PcdGet32(PcdMaxHardwareErrorVariableSize))) {\r
1317 return EFI_INVALID_PARAMETER;\r
1318 }\r
1319 //\r
1320 // According to UEFI spec, HARDWARE_ERROR_RECORD variable name convention should be L"HwErrRecXXXX"\r
1321 //\r
1322 if (StrnCmp(VariableName, L"HwErrRec", StrLen(L"HwErrRec")) != 0) {\r
1323 return EFI_INVALID_PARAMETER;\r
1324 }\r
1325 } else {\r
1326 if ((DataSize > PcdGet32(PcdMaxVariableSize)) ||\r
1327 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > PcdGet32(PcdMaxVariableSize))) {\r
1328 return EFI_INVALID_PARAMETER;\r
1329 } \r
1330 } \r
1331\r
1332 //\r
1333 // Check whether the input variable is already existed\r
1334 //\r
1335 Status = FindVariable (VariableName, VendorGuid, &Variable);\r
1336\r
1337 //\r
1338 // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang\r
1339 //\r
1340 AutoUpdateLangVariable (VariableName, Data, DataSize);\r
1341\r
1342 Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, &Variable);\r
1343\r
1344 return Status;\r
1345}\r
1346\r
1347EFI_STATUS\r
1348EFIAPI\r
1349QueryVariableInfo (\r
1350 IN UINT32 Attributes,\r
1351 OUT UINT64 *MaximumVariableStorageSize,\r
1352 OUT UINT64 *RemainingVariableStorageSize,\r
1353 OUT UINT64 *MaximumVariableSize\r
1354 )\r
1355/*++\r
1356\r
1357Routine Description:\r
1358\r
1359 This code returns information about the EFI variables.\r
1360\r
1361Arguments:\r
1362\r
1363 Attributes Attributes bitmask to specify the type of variables\r
1364 on which to return information.\r
1365 MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
1366 for the EFI variables associated with the attributes specified.\r
1367 RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
1368 for the EFI variables associated with the attributes specified.\r
1369 MaximumVariableSize Pointer to the maximum size of the individual EFI variables\r
1370 associated with the attributes specified.\r
1371\r
1372Returns:\r
1373\r
1374 EFI STATUS\r
1375 EFI_INVALID_PARAMETER - An invalid combination of attribute bits was supplied.\r
1376 EFI_SUCCESS - Query successfully.\r
1377 EFI_UNSUPPORTED - The attribute is not supported on this platform.\r
1378\r
1379--*/\r
1380{\r
1381 VARIABLE_HEADER *Variable;\r
1382 VARIABLE_HEADER *NextVariable;\r
1383 UINT64 VariableSize;\r
1384 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1385 UINT64 CommonVariableTotalSize;\r
1386 UINT64 HwErrVariableTotalSize;\r
1387\r
1388 CommonVariableTotalSize = 0;\r
1389 HwErrVariableTotalSize = 0;\r
1390\r
1391 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
1392 return EFI_INVALID_PARAMETER;\r
1393 }\r
1394 \r
1395 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
1396 //\r
1397 // Make sure the Attributes combination is supported by the platform.\r
1398 //\r
1399 return EFI_UNSUPPORTED; \r
1400 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1401 //\r
1402 // Make sure if runtime bit is set, boot service bit is set also.\r
1403 //\r
1404 return EFI_INVALID_PARAMETER;\r
1405 } else if (EfiAtRuntime () && !(Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1406 //\r
1407 // Make sure RT Attribute is set if we are in Runtime phase.\r
1408 //\r
1409 return EFI_INVALID_PARAMETER;\r
1410 } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1411 //\r
1412 // Make sure Hw Attribute is set with NV.\r
1413 //\r
1414 return EFI_INVALID_PARAMETER;\r
1415 } else if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {\r
1416 //\r
1417 // Not support authentiated variable write yet.\r
1418 //\r
1419 return EFI_UNSUPPORTED;\r
1420 }\r
1421 \r
1422 VariableStoreHeader = (VARIABLE_STORE_HEADER *) mGlobal->VariableBase[\r
1423 (Attributes & EFI_VARIABLE_NON_VOLATILE) ? NonVolatile : Volatile\r
1424 ];\r
1425 //\r
1426 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
1427 // with the storage size (excluding the storage header size).\r
1428 //\r
1429 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1430\r
1431 //\r
1432 // Harware error record variable needs larger size.\r
1433 //\r
1434 if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
1435 *MaximumVariableStorageSize = PcdGet32(PcdHwErrStorageSize);\r
1436 *MaximumVariableSize = PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (VARIABLE_HEADER);\r
1437 } else {\r
1438 if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {\r
1439 ASSERT (PcdGet32(PcdHwErrStorageSize) < VariableStoreHeader->Size);\r
1440 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize);\r
1441 }\r
1442\r
1443 //\r
1444 // Let *MaximumVariableSize be PcdGet32(PcdMaxVariableSize) with the exception of the variable header size.\r
1445 //\r
1446 *MaximumVariableSize = PcdGet32(PcdMaxVariableSize) - sizeof (VARIABLE_HEADER);\r
1447 }\r
1448 \r
1449 //\r
1450 // Point to the starting address of the variables.\r
1451 //\r
1452 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
1453\r
1454 //\r
1455 // Now walk through the related variable store.\r
1456 //\r
1457 while ((Variable < GetEndPointer (VariableStoreHeader)) && IsValidVariableHeader (Variable)) {\r
1458 NextVariable = GetNextVariablePtr (Variable);\r
1459 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
1460\r
1461 if (EfiAtRuntime ()) {\r
1462 //\r
1463 // we don't take the state of the variables in mind\r
1464 // when calculating RemainingVariableStorageSize,\r
1465 // since the space occupied by variables not marked with\r
1466 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
1467 //\r
1468 if ((NextVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1469 HwErrVariableTotalSize += VariableSize;\r
1470 } else {\r
1471 CommonVariableTotalSize += VariableSize;\r
1472 }\r
1473 } else {\r
1474 //\r
1475 // Only care about Variables with State VAR_ADDED,because\r
1476 // the space not marked as VAR_ADDED is reclaimable now.\r
1477 //\r
1478 if ((Variable->State == VAR_ADDED) || (Variable->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
1479 if ((NextVariable->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1480 HwErrVariableTotalSize += VariableSize;\r
1481 } else {\r
1482 CommonVariableTotalSize += VariableSize;\r
1483 }\r
1484 }\r
1485 }\r
1486\r
1487 //\r
1488 // Go to the next one\r
1489 //\r
1490 Variable = NextVariable;\r
1491 }\r
1492 \r
1493 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){\r
1494 *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;\r
1495 } else {\r
1496 *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;\r
1497 }\r
1498\r
1499 return EFI_SUCCESS;\r
1500}\r
1501\r
1502EFI_STATUS\r
1503EFIAPI\r
1504VariableServiceInitialize (\r
1505 IN EFI_HANDLE ImageHandle,\r
1506 IN EFI_SYSTEM_TABLE *SystemTable\r
1507 )\r
1508/*++\r
1509\r
1510Routine Description:\r
1511 This function does initialization for variable services\r
1512\r
1513Arguments:\r
1514\r
1515 ImageHandle - The firmware allocated handle for the EFI image.\r
1516 SystemTable - A pointer to the EFI System Table.\r
1517\r
1518Returns:\r
1519\r
1520 Status code.\r
1521\r
1522 EFI_NOT_FOUND - Variable store area not found.\r
1523 EFI_SUCCESS - Variable services successfully initialized.\r
1524\r
1525--*/\r
1526{\r
1527 EFI_STATUS Status;\r
1528 EFI_HANDLE NewHandle;\r
1529 VS_DEV *Dev;\r
1530 EFI_PEI_HOB_POINTERS GuidHob;\r
1531 VARIABLE_HEADER *Variable;\r
1532 VARIABLE_HEADER *NextVariable;\r
1533 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1534 EFI_FLASH_MAP_FS_ENTRY_DATA *FlashMapEntryData;\r
1535 EFI_FLASH_SUBAREA_ENTRY VariableStoreEntry;\r
1536 UINT64 BaseAddress;\r
1537 UINT64 Length;\r
1538 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
1539\r
1540 Status = gBS->AllocatePool (\r
1541 EfiRuntimeServicesData,\r
1542 (UINTN) sizeof (VARIABLE_GLOBAL),\r
1543 (VOID**) &mGlobal\r
1544 );\r
1545 if (EFI_ERROR (Status)) {\r
1546 return Status;\r
1547 }\r
1548\r
1549 ZeroMem (mGlobal, (UINTN) sizeof (VARIABLE_GLOBAL));\r
1550\r
1551 GuidHob.Raw = GetHobList ();\r
1552 FlashMapEntryData = NULL;\r
1553 while ((GuidHob.Raw = GetNextGuidHob (&gEfiFlashMapHobGuid, GuidHob.Raw)) != NULL) {\r
1554 FlashMapEntryData = (EFI_FLASH_MAP_FS_ENTRY_DATA *) GET_GUID_HOB_DATA (GuidHob.Guid);\r
1555 if (FlashMapEntryData->AreaType == EFI_FLASH_AREA_EFI_VARIABLES) {\r
1556 break;\r
1557 }\r
1558 GuidHob.Raw = GET_NEXT_HOB (GuidHob); \r
1559 }\r
1560\r
1561 if (FlashMapEntryData == NULL) {\r
1562 DEBUG ((EFI_D_ERROR, "FSVariable: Could not find flash area for variable!\n"));\r
1563 Status = EFI_NOT_FOUND;\r
1564 return Status;\r
1565 }\r
1566 \r
1567 CopyMem(\r
1568 (VOID*)&VariableStoreEntry,\r
1569 (VOID*)&FlashMapEntryData->Entries[0],\r
1570 sizeof(EFI_FLASH_SUBAREA_ENTRY)\r
1571 );\r
1572\r
1573 //\r
1574 // Mark the variable storage region of the FLASH as RUNTIME\r
1575 //\r
1576 BaseAddress = VariableStoreEntry.Base & (~EFI_PAGE_MASK);\r
1577 Length = VariableStoreEntry.Length + (VariableStoreEntry.Base - BaseAddress);\r
1578 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
1579 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
1580 if (EFI_ERROR (Status)) {\r
1581 Status = EFI_UNSUPPORTED;\r
1582 return Status;\r
1583 }\r
1584 Status = gDS->SetMemorySpaceAttributes (\r
1585 BaseAddress,\r
1586 Length,\r
1587 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
1588 );\r
1589 if (EFI_ERROR (Status)) {\r
1590 Status = EFI_UNSUPPORTED;\r
1591 return Status;\r
1592 }\r
1593\r
1594 Status = FileStorageConstructor (\r
1595 &mGlobal->VariableStore[NonVolatile], \r
1596 &mGlobal->GoVirtualChildEvent[NonVolatile],\r
1597 VariableStoreEntry.Base,\r
1598 (UINT32) VariableStoreEntry.Length,\r
1599 FlashMapEntryData->VolumeId,\r
1600 FlashMapEntryData->FilePath\r
1601 );\r
1602 ASSERT_EFI_ERROR (Status);\r
1603\r
1604 //\r
1605 // Volatile Storage\r
1606 //\r
1607 Status = MemStorageConstructor (\r
1608 &mGlobal->VariableStore[Volatile],\r
1609 &mGlobal->GoVirtualChildEvent[Volatile],\r
1610 VOLATILE_VARIABLE_STORE_SIZE\r
1611 );\r
1612 ASSERT_EFI_ERROR (Status);\r
1613\r
1614 //\r
1615 // Scratch\r
1616 //\r
1617 Status = gBS->AllocatePool (\r
1618 EfiRuntimeServicesData,\r
1619 VARIABLE_SCRATCH_SIZE,\r
1620 &mGlobal->Scratch\r
1621 );\r
1622 ASSERT_EFI_ERROR (Status);\r
1623\r
1624 //\r
1625 // 1. NV Storage\r
1626 //\r
1627 Dev = DEV_FROM_THIS (mGlobal->VariableStore[NonVolatile]);\r
1628 VariableStoreHeader = (VARIABLE_STORE_HEADER *) VAR_DATA_PTR (Dev);\r
1629 if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {\r
1630 if (~VariableStoreHeader->Size == 0) {\r
1631 VariableStoreHeader->Size = (UINT32) VariableStoreEntry.Length;\r
1632 }\r
1633 }\r
1634 //\r
1635 // Calculate LastVariableOffset\r
1636 //\r
1637 Variable = (VARIABLE_HEADER *) (VariableStoreHeader + 1);\r
1638 while (IsValidVariableHeader (Variable)) {\r
1639 UINTN VariableSize = 0;\r
1640 NextVariable = GetNextVariablePtr (Variable);\r
1641 VariableSize = NextVariable - Variable;\r
1642 if ((NextVariable->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {\r
1643 mGlobal->HwErrVariableTotalSize += HEADER_ALIGN (VariableSize);\r
1644 } else {\r
1645 mGlobal->CommonVariableTotalSize += HEADER_ALIGN (VariableSize);\r
1646 }\r
1647 Variable = NextVariable;\r
1648 }\r
1649\r
1650 mGlobal->LastVariableOffset[NonVolatile] = (UINTN) Variable - (UINTN) VariableStoreHeader;\r
1651 mGlobal->VariableBase[NonVolatile] = VariableStoreHeader;\r
1652\r
1653 //\r
1654 // Reclaim if remaining space is too small\r
1655 //\r
1656 if ((VariableStoreHeader->Size - mGlobal->LastVariableOffset[NonVolatile]) < VARIABLE_RECLAIM_THRESHOLD) {\r
1657 Status = Reclaim (NonVolatile, NULL);\r
1658 if (EFI_ERROR (Status)) {\r
1659 //\r
1660 // Reclaim error\r
1661 // we cannot restore to original state\r
1662 //\r
1663 DEBUG ((EFI_D_ERROR, "FSVariable: Reclaim error (fatal error) - %r\n", Status));\r
1664 ASSERT_EFI_ERROR (Status);\r
1665 }\r
1666 }\r
1667 \r
1668 //\r
1669 // 2. Volatile Storage\r
1670 //\r
1671 Dev = DEV_FROM_THIS (mGlobal->VariableStore[Volatile]);\r
1672 VariableStoreHeader = (VARIABLE_STORE_HEADER *) VAR_DATA_PTR (Dev);\r
1673 mGlobal->VariableBase[Volatile] = VAR_DATA_PTR (Dev); \r
1674 mGlobal->LastVariableOffset[Volatile] = sizeof (VARIABLE_STORE_HEADER);\r
1675 //\r
1676 // init store_header & body in memory.\r
1677 //\r
1678 mGlobal->VariableStore[Volatile]->Erase (mGlobal->VariableStore[Volatile]);\r
1679 mGlobal->VariableStore[Volatile]->Write (\r
1680 mGlobal->VariableStore[Volatile],\r
1681 0,\r
1682 sizeof (VARIABLE_STORE_HEADER),\r
1683 &mStoreHeaderTemplate\r
1684 );\r
1685\r
1686\r
1687 SystemTable->RuntimeServices->GetVariable = DuetGetVariable;\r
1688 SystemTable->RuntimeServices->GetNextVariableName = GetNextVariableName;\r
1689 SystemTable->RuntimeServices->SetVariable = SetVariable;\r
1690\r
1691 SystemTable->RuntimeServices->QueryVariableInfo = QueryVariableInfo;\r
1692\r
1693 //\r
1694 // Now install the Variable Runtime Architectural Protocol on a new handle\r
1695 //\r
1696 NewHandle = NULL;\r
1697 Status = gBS->InstallMultipleProtocolInterfaces (\r
1698 &NewHandle,\r
1699 &gEfiVariableArchProtocolGuid,\r
1700 NULL,\r
1701 &gEfiVariableWriteArchProtocolGuid,\r
1702 NULL,\r
1703 NULL\r
1704 );\r
1705 ASSERT_EFI_ERROR (Status);\r
1706\r
1707 return Status;\r
1708}\r
1709\r
1710\r
1711\r
1712VOID\r
1713EFIAPI\r
1714OnVirtualAddressChangeFsv (\r
1715 IN EFI_EVENT Event,\r
1716 IN VOID *Context\r
1717 )\r
1718{\r
1719 UINTN Index;\r
1720\r
1721 for (Index = 0; Index < MaxType; Index++) {\r
1722 mGlobal->GoVirtualChildEvent[Index] (Event, mGlobal->VariableStore[Index]);\r
1723 EfiConvertPointer (0, (VOID**) &mGlobal->VariableStore[Index]);\r
1724 EfiConvertPointer (0, &mGlobal->VariableBase[Index]);\r
1725 }\r
1726 EfiConvertPointer (0, &mGlobal->Scratch);\r
1727 EfiConvertPointer (0, (VOID**) &mGlobal);\r
1728}\r