]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
Fixed one bug in UefiPxeBc start()/stop(). That would cause stop() failure.
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / Variable.c
... / ...
CommitLineData
1/** @file\r
2 EFI Runtime Variable services.\r
3 \r
4 Copyright (c) 2006 - 2007, Intel Corporation \r
5 All rights reserved. This program and the accompanying materials \r
6 are licensed and made available under the terms and conditions of the BSD License \r
7 which accompanies this distribution. The full text of the license may be found at \r
8 http://opensource.org/licenses/bsd-license.php \r
9\r
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
12\r
13**/\r
14\r
15\r
16#include "Variable.h"\r
17\r
18\r
19VARIABLE_MODULE_GLOBAL mRuntimeData;\r
20VARIABLE_MODULE_GLOBAL *mVariableModuleGlobal = &mRuntimeData;\r
21EFI_EVENT mVirtualAddressChangeEvent = NULL;\r
22EFI_HANDLE mHandle = NULL;\r
23\r
24\r
25//\r
26// This is a temperary function which will be removed\r
27// when EfiAcquireLock in UefiLib can handle the\r
28// the call in UEFI Runtimer driver in RT phase.\r
29//\r
30VOID\r
31AcquireLockOnlyAtBootTime (\r
32 IN EFI_LOCK *Lock\r
33 )\r
34{\r
35 if (!EfiAtRuntime ()) {\r
36 EfiAcquireLock (Lock);\r
37 }\r
38}\r
39\r
40//\r
41// This is a temperary function which will be removed\r
42// when EfiAcquireLock in UefiLib can handle the\r
43// the call in UEFI Runtimer driver in RT phase.\r
44//\r
45VOID\r
46ReleaseLockOnlyAtBootTime (\r
47 IN EFI_LOCK *Lock\r
48 )\r
49{\r
50 if (!EfiAtRuntime ()) {\r
51 EfiReleaseLock (Lock);\r
52 }\r
53}\r
54\r
55\r
56GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;\r
57\r
58\r
59/**\r
60 Routine used to track statistical information about variable usage. \r
61 The data is stored in the EFI system table so it can be accessed later.\r
62 VariableInfo.efi can dump out the table. Only Boot Services variable \r
63 accesses are tracked by this code. The PcdVariableCollectStatistics\r
64 build flag controls if this feature is enabled. \r
65\r
66 A read that hits in the cache will have Read and Cache true for \r
67 the transaction. Data is allocated by this routine, but never\r
68 freed.\r
69\r
70 @param[in] VariableName Name of the Variable to track\r
71 @param[in] VendorGuid Guid of the Variable to track\r
72 @param[in] Volatile TRUE if volatile FALSE if non-volatile\r
73 @param[in] Read TRUE if GetVariable() was called\r
74 @param[in] Write TRUE if SetVariable() was called\r
75 @param[in] Delete TRUE if deleted via SetVariable()\r
76 @param[in] Cache TRUE for a cache hit.\r
77\r
78**/\r
79VOID\r
80UpdateVariableInfo (\r
81 IN CHAR16 *VariableName,\r
82 IN EFI_GUID *VendorGuid,\r
83 IN BOOLEAN Volatile,\r
84 IN BOOLEAN Read,\r
85 IN BOOLEAN Write,\r
86 IN BOOLEAN Delete,\r
87 IN BOOLEAN Cache\r
88 )\r
89{\r
90 VARIABLE_INFO_ENTRY *Entry;\r
91\r
92 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
93\r
94 if (EfiAtRuntime ()) {\r
95 // Don't collect statistics at runtime\r
96 return;\r
97 }\r
98\r
99 if (gVariableInfo == NULL) {\r
100 //\r
101 // on the first call allocate a entry and place a pointer to it in\r
102 // the EFI System Table\r
103 //\r
104 gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
105 ASSERT (gVariableInfo != NULL);\r
106\r
107 CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);\r
108 gVariableInfo->Name = AllocatePool (StrLen (VariableName));\r
109 StrCpy (gVariableInfo->Name, VariableName);\r
110 gVariableInfo->Volatile = Volatile;\r
111\r
112 gBS->InstallConfigurationTable (&gEfiVariableInfoGuid, gVariableInfo);\r
113 }\r
114\r
115 \r
116 for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {\r
117 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
118 if (StrCmp (VariableName, Entry->Name) == 0) {\r
119 if (Read) {\r
120 Entry->ReadCount++;\r
121 }\r
122 if (Write) {\r
123 Entry->WriteCount++;\r
124 }\r
125 if (Delete) {\r
126 Entry->DeleteCount++;\r
127 }\r
128 if (Cache) {\r
129 Entry->CacheCount++;\r
130 }\r
131\r
132 return;\r
133 }\r
134 }\r
135\r
136 if (Entry->Next == NULL) {\r
137 //\r
138 // If the entry is not in the table add it.\r
139 // Next iteration of the loop will fill in the data\r
140 //\r
141 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
142 ASSERT (Entry->Next != NULL);\r
143\r
144 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
145 Entry->Next->Name = AllocatePool (StrLen (VariableName));\r
146 StrCpy (Entry->Next->Name, VariableName);\r
147 Entry->Next->Volatile = Volatile;\r
148 }\r
149\r
150 }\r
151 }\r
152}\r
153\r
154\r
155BOOLEAN\r
156IsValidVariableHeader (\r
157 IN VARIABLE_HEADER *Variable\r
158 )\r
159/*++\r
160\r
161Routine Description:\r
162\r
163 This code checks if variable header is valid or not.\r
164\r
165Arguments:\r
166 Variable Pointer to the Variable Header.\r
167\r
168Returns:\r
169 TRUE Variable header is valid.\r
170 FALSE Variable header is not valid.\r
171\r
172--*/\r
173{\r
174 if (Variable == NULL || Variable->StartId != VARIABLE_DATA) {\r
175 return FALSE;\r
176 }\r
177\r
178 return TRUE;\r
179}\r
180\r
181\r
182EFI_STATUS\r
183UpdateVariableStore (\r
184 IN VARIABLE_GLOBAL *Global,\r
185 IN BOOLEAN Volatile,\r
186 IN BOOLEAN SetByIndex,\r
187 IN UINTN Instance,\r
188 IN UINTN DataPtrIndex,\r
189 IN UINT32 DataSize,\r
190 IN UINT8 *Buffer\r
191 )\r
192/*++\r
193\r
194Routine Description:\r
195\r
196 This function writes data to the FWH at the correct LBA even if the LBAs\r
197 are fragmented.\r
198\r
199Arguments:\r
200\r
201 Global - Pointer to VARAIBLE_GLOBAL structure\r
202 Volatile - If the Variable is Volatile or Non-Volatile\r
203 SetByIndex - TRUE: Target pointer is given as index\r
204 FALSE: Target pointer is absolute\r
205 Instance - Instance of FV Block services\r
206 DataPtrIndex - Pointer to the Data from the end of VARIABLE_STORE_HEADER\r
207 structure\r
208 DataSize - Size of data to be written.\r
209 Buffer - Pointer to the buffer from which data is written\r
210\r
211Returns:\r
212\r
213 EFI_INVALID_PARAMETER - Parameters not valid\r
214 EFI_SUCCESS - Variable store successfully updated\r
215\r
216--*/\r
217{\r
218 EFI_FV_BLOCK_MAP_ENTRY *PtrBlockMapEntry;\r
219 UINTN BlockIndex2;\r
220 UINTN LinearOffset;\r
221 UINTN CurrWriteSize;\r
222 UINTN CurrWritePtr;\r
223 UINT8 *CurrBuffer;\r
224 EFI_LBA LbaNumber;\r
225 UINTN Size;\r
226 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
227 VARIABLE_STORE_HEADER *VolatileBase;\r
228 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
229 EFI_PHYSICAL_ADDRESS DataPtr;\r
230 EFI_STATUS Status;\r
231\r
232 FwVolHeader = NULL;\r
233 DataPtr = DataPtrIndex;\r
234\r
235 //\r
236 // Check if the Data is Volatile\r
237 //\r
238 if (!Volatile) {\r
239 EfiFvbGetPhysicalAddress (Instance, &FvVolHdr);\r
240 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
241 //\r
242 // Data Pointer should point to the actual Address where data is to be\r
243 // written\r
244 //\r
245 if (SetByIndex) {\r
246 DataPtr += mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;\r
247 }\r
248\r
249 if ((DataPtr + DataSize) >= ((EFI_PHYSICAL_ADDRESS) (UINTN) ((UINT8 *) FwVolHeader + FwVolHeader->FvLength))) {\r
250 return EFI_INVALID_PARAMETER;\r
251 }\r
252 } else {\r
253 //\r
254 // Data Pointer should point to the actual Address where data is to be\r
255 // written\r
256 //\r
257 VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
258 if (SetByIndex) {\r
259 DataPtr += mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
260 }\r
261\r
262 if ((DataPtr + DataSize) >= ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {\r
263 return EFI_INVALID_PARAMETER;\r
264 }\r
265 \r
266 //\r
267 // If Volatile Variable just do a simple mem copy.\r
268 // \r
269 CopyMem ((UINT8 *)(UINTN)DataPtr, Buffer, DataSize);\r
270 return EFI_SUCCESS;\r
271 }\r
272 \r
273 //\r
274 // If we are here we are dealing with Non-Volatile Variables\r
275 //\r
276 LinearOffset = (UINTN) FwVolHeader;\r
277 CurrWritePtr = (UINTN) DataPtr;\r
278 CurrWriteSize = DataSize;\r
279 CurrBuffer = Buffer;\r
280 LbaNumber = 0;\r
281\r
282 if (CurrWritePtr < LinearOffset) {\r
283 return EFI_INVALID_PARAMETER;\r
284 }\r
285\r
286 for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {\r
287 for (BlockIndex2 = 0; BlockIndex2 < PtrBlockMapEntry->NumBlocks; BlockIndex2++) {\r
288 //\r
289 // Check to see if the Variable Writes are spanning through multiple\r
290 // blocks.\r
291 //\r
292 if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {\r
293 if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {\r
294 Status = EfiFvbWriteBlock (\r
295 Instance,\r
296 LbaNumber,\r
297 (UINTN) (CurrWritePtr - LinearOffset),\r
298 &CurrWriteSize,\r
299 CurrBuffer\r
300 );\r
301 return Status;\r
302 } else {\r
303 Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);\r
304 Status = EfiFvbWriteBlock (\r
305 Instance,\r
306 LbaNumber,\r
307 (UINTN) (CurrWritePtr - LinearOffset),\r
308 &Size,\r
309 CurrBuffer\r
310 );\r
311 if (EFI_ERROR (Status)) {\r
312 return Status;\r
313 }\r
314\r
315 CurrWritePtr = LinearOffset + PtrBlockMapEntry->Length;\r
316 CurrBuffer = CurrBuffer + Size;\r
317 CurrWriteSize = CurrWriteSize - Size;\r
318 }\r
319 }\r
320\r
321 LinearOffset += PtrBlockMapEntry->Length;\r
322 LbaNumber++;\r
323 }\r
324 }\r
325\r
326 return EFI_SUCCESS;\r
327}\r
328\r
329\r
330VARIABLE_STORE_STATUS\r
331GetVariableStoreStatus (\r
332 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
333 )\r
334/*++\r
335\r
336Routine Description:\r
337\r
338 This code gets the current status of Variable Store.\r
339\r
340Arguments:\r
341\r
342 VarStoreHeader Pointer to the Variable Store Header.\r
343\r
344Returns:\r
345\r
346 EfiRaw Variable store status is raw\r
347 EfiValid Variable store status is valid\r
348 EfiInvalid Variable store status is invalid\r
349\r
350--*/\r
351{\r
352 if (VarStoreHeader->Signature == VARIABLE_STORE_SIGNATURE &&\r
353 VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&\r
354 VarStoreHeader->State == VARIABLE_STORE_HEALTHY\r
355 ) {\r
356\r
357 return EfiValid;\r
358 } else if (VarStoreHeader->Signature == 0xffffffff &&\r
359 VarStoreHeader->Size == 0xffffffff &&\r
360 VarStoreHeader->Format == 0xff &&\r
361 VarStoreHeader->State == 0xff\r
362 ) {\r
363\r
364 return EfiRaw;\r
365 } else {\r
366 return EfiInvalid;\r
367 }\r
368}\r
369\r
370UINT8 *\r
371GetVariableDataPtr (\r
372 IN VARIABLE_HEADER *Variable\r
373 )\r
374/*++\r
375\r
376Routine Description:\r
377\r
378 This code gets the pointer to the variable data.\r
379\r
380Arguments:\r
381\r
382 Variable Pointer to the Variable Header.\r
383\r
384Returns:\r
385\r
386 UINT8* Pointer to Variable Data\r
387\r
388--*/\r
389{\r
390 //\r
391 // Be careful about pad size for alignment\r
392 //\r
393 return (UINT8 *) ((UINTN) GET_VARIABLE_NAME_PTR (Variable) + NAMESIZE_OF_VARIABLE (Variable) + GET_PAD_SIZE (NAMESIZE_OF_VARIABLE (Variable)));\r
394}\r
395\r
396\r
397VARIABLE_HEADER *\r
398GetNextVariablePtr (\r
399 IN VARIABLE_HEADER *Variable\r
400 )\r
401/*++\r
402\r
403Routine Description:\r
404\r
405 This code gets the pointer to the next variable header.\r
406\r
407Arguments:\r
408\r
409 Variable Pointer to the Variable Header.\r
410\r
411Returns:\r
412\r
413 VARIABLE_HEADER* Pointer to next variable header.\r
414\r
415--*/\r
416{\r
417 if (!IsValidVariableHeader (Variable)) {\r
418 return NULL;\r
419 }\r
420 //\r
421 // Be careful about pad size for alignment\r
422 //\r
423 return (VARIABLE_HEADER *) HEADER_ALIGN (((UINTN) GetVariableDataPtr (Variable) + DATASIZE_OF_VARIABLE (Variable) + GET_PAD_SIZE (DATASIZE_OF_VARIABLE (Variable))));\r
424}\r
425\r
426VARIABLE_HEADER *\r
427GetStartPointer (\r
428 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
429 )\r
430/*++\r
431\r
432Routine Description:\r
433\r
434 This code gets the pointer to the first variable memory pointer byte\r
435\r
436Arguments:\r
437\r
438 VarStoreHeader Pointer to the Variable Store Header.\r
439\r
440Returns:\r
441\r
442 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
443\r
444--*/\r
445{\r
446 //\r
447 // The end of variable store\r
448 //\r
449 return (VARIABLE_HEADER *) HEADER_ALIGN (VarStoreHeader + 1);\r
450}\r
451\r
452VARIABLE_HEADER *\r
453GetEndPointer (\r
454 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
455 )\r
456/*++\r
457\r
458Routine Description:\r
459\r
460 This code gets the pointer to the last variable memory pointer byte\r
461\r
462Arguments:\r
463\r
464 VarStoreHeader Pointer to the Variable Store Header.\r
465\r
466Returns:\r
467\r
468 VARIABLE_HEADER* Pointer to last unavailable Variable Header\r
469\r
470--*/\r
471{\r
472 //\r
473 // The end of variable store\r
474 //\r
475 return (VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VarStoreHeader + VarStoreHeader->Size);\r
476}\r
477\r
478\r
479EFI_STATUS\r
480Reclaim (\r
481 IN EFI_PHYSICAL_ADDRESS VariableBase,\r
482 OUT UINTN *LastVariableOffset,\r
483 IN BOOLEAN IsVolatile\r
484 )\r
485/*++\r
486\r
487Routine Description:\r
488\r
489 Variable store garbage collection and reclaim operation\r
490\r
491Arguments:\r
492\r
493 VariableBase Base address of variable store\r
494 LastVariableOffset Offset of last variable\r
495 IsVolatile The variable store is volatile or not,\r
496 if it is non-volatile, need FTW\r
497\r
498Returns:\r
499\r
500 EFI STATUS\r
501\r
502--*/\r
503{\r
504 VARIABLE_HEADER *Variable;\r
505 VARIABLE_HEADER *NextVariable;\r
506 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
507 UINT8 *ValidBuffer;\r
508 UINTN ValidBufferSize;\r
509 UINTN VariableSize;\r
510 UINT8 *CurrPtr;\r
511 EFI_STATUS Status;\r
512\r
513 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) VariableBase);\r
514\r
515 //\r
516 // Start Pointers for the variable.\r
517 //\r
518 Variable = GetStartPointer (VariableStoreHeader);\r
519 ValidBufferSize = sizeof (VARIABLE_STORE_HEADER);\r
520\r
521 while (IsValidVariableHeader (Variable)) {\r
522 NextVariable = GetNextVariablePtr (Variable);\r
523 if (Variable->State == VAR_ADDED) {\r
524 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
525 ValidBufferSize += VariableSize;\r
526 }\r
527\r
528 Variable = NextVariable;\r
529 }\r
530\r
531 ValidBuffer = AllocatePool (ValidBufferSize);\r
532 if (ValidBuffer == NULL) {\r
533 return EFI_OUT_OF_RESOURCES;\r
534 }\r
535\r
536 SetMem (ValidBuffer, ValidBufferSize, 0xff);\r
537\r
538 CurrPtr = ValidBuffer;\r
539\r
540 //\r
541 // Copy variable store header\r
542 //\r
543 CopyMem (CurrPtr, VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));\r
544 CurrPtr = (UINT8 *) GetStartPointer (VariableStoreHeader);\r
545\r
546 //\r
547 // Start Pointers for the variable.\r
548 //\r
549 Variable = GetStartPointer (VariableStoreHeader);\r
550\r
551 while (IsValidVariableHeader (Variable)) {\r
552 NextVariable = GetNextVariablePtr (Variable);\r
553 if (Variable->State == VAR_ADDED) {\r
554 VariableSize = (UINTN) NextVariable - (UINTN) Variable;\r
555 CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);\r
556 CurrPtr += VariableSize;\r
557 }\r
558\r
559 Variable = NextVariable;\r
560 }\r
561\r
562 if (IsVolatile) {\r
563 //\r
564 // If volatile variable store, just copy valid buffer\r
565 //\r
566 SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader->Size, 0xff);\r
567 CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, ValidBufferSize);\r
568 *LastVariableOffset = ValidBufferSize;\r
569 Status = EFI_SUCCESS;\r
570 } else {\r
571 //\r
572 // If non-volatile variable store, perform FTW here.\r
573 //\r
574 Status = FtwVariableSpace (\r
575 VariableBase,\r
576 ValidBuffer,\r
577 ValidBufferSize\r
578 );\r
579 if (!EFI_ERROR (Status)) {\r
580 *LastVariableOffset = ValidBufferSize;\r
581 }\r
582 }\r
583\r
584 FreePool (ValidBuffer);\r
585\r
586 if (EFI_ERROR (Status)) {\r
587 *LastVariableOffset = 0;\r
588 }\r
589\r
590 return Status;\r
591}\r
592\r
593\r
594//\r
595// The current Hii implementation accesses this variable a larg # of times on every boot.\r
596// Other common variables are only accessed a single time. This is why this cache algorithm\r
597// only targets a single variable. Probably to get an performance improvement out of\r
598// a Cache you would need a cache that improves the search performance for a variable.\r
599//\r
600VARIABLE_CACHE_ENTRY mVariableCache[] = {\r
601 {\r
602 &gEfiGlobalVariableGuid,\r
603 L"Lang",\r
604 0x00000000,\r
605 0x00,\r
606 NULL\r
607 }\r
608};\r
609\r
610\r
611/**\r
612 Update the Cache with Variable information. These are the same \r
613 arguments as the EFI Variable services.\r
614\r
615 @param[in] VariableName Name of variable\r
616 @param[in] VendorGuid Guid of variable\r
617 @param[in] Attribute Attribue of the variable\r
618 @param[in] DataSize Size of data. 0 means delete\r
619 @param[in] Data Variable data\r
620\r
621**/\r
622VOID\r
623UpdateVariableCache (\r
624 IN CHAR16 *VariableName,\r
625 IN EFI_GUID *VendorGuid,\r
626 IN UINT32 Attributes,\r
627 IN UINTN DataSize,\r
628 IN VOID *Data\r
629 )\r
630{\r
631 VARIABLE_CACHE_ENTRY *Entry;\r
632 UINTN Index;\r
633\r
634 if (EfiAtRuntime ()) {\r
635 // Don't use the cache at runtime\r
636 return;\r
637 }\r
638\r
639 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
640 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
641 if (StrCmp (VariableName, Entry->Name) == 0) { \r
642 Entry->Attributes = Attributes;\r
643 if (DataSize == 0) {\r
644 // Delete Case\r
645 if (Entry->DataSize != 0) {\r
646 FreePool (Entry->Data);\r
647 }\r
648 Entry->DataSize = DataSize;\r
649 } else if (DataSize == Entry->DataSize) {\r
650 CopyMem (Entry->Data, Data, DataSize);\r
651 } else {\r
652 Entry->Data = AllocatePool (DataSize);\r
653 Entry->DataSize = DataSize;\r
654 CopyMem (Entry->Data, Data, DataSize);\r
655 }\r
656 }\r
657 }\r
658 }\r
659}\r
660\r
661\r
662/**\r
663 Search the cache to see if the variable is in the cache.\r
664\r
665 @param[in] VariableName Name of variable\r
666 @param[in] VendorGuid Guid of variable\r
667 @param[in] Attribute Attribue returned \r
668 @param[in] DataSize Size of data returned\r
669 @param[in] Data Variable data returned\r
670\r
671 @retval EFI_SUCCESS VariableGuid & VariableName data was returned.\r
672 @retval other Not found.\r
673\r
674**/\r
675EFI_STATUS\r
676FindVariableInCache (\r
677 IN CHAR16 *VariableName,\r
678 IN EFI_GUID *VendorGuid,\r
679 OUT UINT32 *Attributes OPTIONAL,\r
680 IN OUT UINTN *DataSize,\r
681 OUT VOID *Data\r
682 )\r
683{\r
684 VARIABLE_CACHE_ENTRY *Entry;\r
685 UINTN Index;\r
686\r
687 if (EfiAtRuntime ()) {\r
688 // Don't use the cache at runtime\r
689 return EFI_NOT_FOUND;\r
690 }\r
691\r
692 for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {\r
693 if (CompareGuid (VendorGuid, Entry->Guid)) {\r
694 if (StrCmp (VariableName, Entry->Name) == 0) {\r
695 if (Entry->DataSize == 0) {\r
696 // Variable was deleted so return not found\r
697 return EFI_NOT_FOUND;\r
698 } else if (Entry->DataSize > *DataSize) {\r
699 // If the buffer is too small return correct size\r
700 *DataSize = Entry->DataSize;\r
701 return EFI_BUFFER_TOO_SMALL;\r
702 } else {\r
703 *DataSize = Entry->DataSize;\r
704 // Return the data\r
705 CopyMem (Data, Entry->Data, Entry->DataSize);\r
706 if (Attributes != NULL) {\r
707 *Attributes = Entry->Attributes;\r
708 }\r
709 return EFI_SUCCESS;\r
710 }\r
711 }\r
712 }\r
713 }\r
714 \r
715 return EFI_NOT_FOUND;\r
716}\r
717\r
718\r
719EFI_STATUS\r
720FindVariable (\r
721 IN CHAR16 *VariableName,\r
722 IN EFI_GUID *VendorGuid,\r
723 OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
724 IN VARIABLE_GLOBAL *Global\r
725 )\r
726/*++\r
727\r
728Routine Description:\r
729\r
730 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
731\r
732Arguments:\r
733\r
734 VariableName Name of the variable to be found\r
735 VendorGuid Vendor GUID to be found.\r
736 PtrTrack Variable Track Pointer structure that contains\r
737 Variable Information.\r
738 Contains the pointer of Variable header.\r
739 Global VARIABLE_GLOBAL pointer\r
740\r
741Returns:\r
742\r
743 EFI STATUS\r
744\r
745--*/\r
746{\r
747 VARIABLE_HEADER *Variable[2];\r
748 VARIABLE_STORE_HEADER *VariableStoreHeader[2];\r
749 UINTN Index;\r
750\r
751 //\r
752 // 0: Volatile, 1: Non-Volatile\r
753 // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName\r
754 // make use of this mapping to implement search algorithme.\r
755 //\r
756 VariableStoreHeader[0] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
757 VariableStoreHeader[1] = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
758\r
759 //\r
760 // Start Pointers for the variable.\r
761 // Actual Data Pointer where data can be written.\r
762 //\r
763 Variable[0] = GetStartPointer (VariableStoreHeader[0]);\r
764 Variable[1] = GetStartPointer (VariableStoreHeader[1]);\r
765\r
766 if (VariableName[0] != 0 && VendorGuid == NULL) {\r
767 return EFI_INVALID_PARAMETER;\r
768 }\r
769 //\r
770 // Find the variable by walk through volatile and then non-volatile variable store\r
771 //\r
772 for (Index = 0; Index < 2; Index++) {\r
773 PtrTrack->StartPtr = GetStartPointer (VariableStoreHeader[Index]);\r
774 PtrTrack->EndPtr = GetEndPointer (VariableStoreHeader[Index]);\r
775\r
776 while (IsValidVariableHeader (Variable[Index]) && (Variable[Index] <= GetEndPointer (VariableStoreHeader[Index]))) {\r
777 if (Variable[Index]->State == VAR_ADDED) {\r
778 if (!EfiAtRuntime () || (Variable[Index]->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
779 if (VariableName[0] == 0) {\r
780 PtrTrack->CurrPtr = Variable[Index];\r
781 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
782 return EFI_SUCCESS;\r
783 } else {\r
784 if (CompareGuid (VendorGuid, &Variable[Index]->VendorGuid)) {\r
785 ASSERT (NAMESIZE_OF_VARIABLE (Variable[Index]) != 0);\r
786 if (!CompareMem (VariableName, GET_VARIABLE_NAME_PTR (Variable[Index]), NAMESIZE_OF_VARIABLE (Variable[Index]))) {\r
787 PtrTrack->CurrPtr = Variable[Index];\r
788 PtrTrack->Volatile = (BOOLEAN)(Index == 0);\r
789 return EFI_SUCCESS;\r
790 }\r
791 }\r
792 }\r
793 }\r
794 }\r
795\r
796 Variable[Index] = GetNextVariablePtr (Variable[Index]);\r
797 }\r
798 }\r
799 PtrTrack->CurrPtr = NULL;\r
800 return EFI_NOT_FOUND;\r
801}\r
802\r
803\r
804\r
805/*++\r
806\r
807Routine Description:\r
808\r
809 This code finds variable in storage blocks (Volatile or Non-Volatile)\r
810\r
811Arguments:\r
812\r
813 VariableName Name of Variable to be found\r
814 VendorGuid Variable vendor GUID\r
815 Attributes OPTIONAL Attribute value of the variable found\r
816 DataSize Size of Data found. If size is less than the\r
817 data, this value contains the required size.\r
818 Data Data pointer\r
819 Global Pointer to VARIABLE_GLOBAL structure\r
820 Instance Instance of the Firmware Volume.\r
821\r
822Returns:\r
823\r
824 EFI_INVALID_PARAMETER - Invalid parameter\r
825 EFI_SUCCESS - Find the specified variable\r
826 EFI_NOT_FOUND - Not found\r
827 EFI_BUFFER_TO_SMALL - DataSize is too small for the result\r
828\r
829\r
830--*/\r
831EFI_STATUS\r
832EFIAPI\r
833RuntimeServiceGetVariable (\r
834 IN CHAR16 *VariableName,\r
835 IN EFI_GUID *VendorGuid,\r
836 OUT UINT32 *Attributes OPTIONAL,\r
837 IN OUT UINTN *DataSize,\r
838 OUT VOID *Data\r
839 )\r
840{\r
841 EFI_STATUS Status;\r
842 VARIABLE_POINTER_TRACK Variable;\r
843 UINTN VarDataSize;\r
844\r
845 if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {\r
846 return EFI_INVALID_PARAMETER;\r
847 }\r
848\r
849 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
850\r
851 //\r
852 // Find existing variable\r
853 //\r
854 Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
855 if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){\r
856 // Hit in the Cache\r
857 UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);\r
858 goto Done;\r
859 }\r
860 \r
861 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
862 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
863 goto Done;\r
864 }\r
865\r
866 //\r
867 // Get data size\r
868 //\r
869 VarDataSize = DATASIZE_OF_VARIABLE (Variable.CurrPtr);\r
870 ASSERT (VarDataSize != 0);\r
871\r
872 if (*DataSize >= VarDataSize) {\r
873 if (Data == NULL) {\r
874 Status = EFI_INVALID_PARAMETER;\r
875 goto Done;\r
876 }\r
877\r
878 CopyMem (Data, GetVariableDataPtr (Variable.CurrPtr), VarDataSize);\r
879 if (Attributes != NULL) {\r
880 *Attributes = Variable.CurrPtr->Attributes;\r
881 }\r
882\r
883 *DataSize = VarDataSize;\r
884 UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);\r
885 UpdateVariableCache (VariableName, VendorGuid, Variable.CurrPtr->Attributes, VarDataSize, Data);\r
886 \r
887 Status = EFI_SUCCESS;\r
888 goto Done;\r
889 } else {\r
890 *DataSize = VarDataSize;\r
891 Status = EFI_BUFFER_TOO_SMALL;\r
892 goto Done;\r
893 }\r
894\r
895Done:\r
896 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
897 return Status;\r
898}\r
899\r
900\r
901\r
902/*++\r
903\r
904Routine Description:\r
905\r
906 This code Finds the Next available variable\r
907\r
908Arguments:\r
909\r
910 VariableNameSize Size of the variable\r
911 VariableName Pointer to variable name\r
912 VendorGuid Variable Vendor Guid\r
913 Global VARIABLE_GLOBAL structure pointer.\r
914 Instance FV instance\r
915\r
916Returns:\r
917\r
918 EFI STATUS\r
919\r
920--*/\r
921EFI_STATUS\r
922EFIAPI\r
923RuntimeServiceGetNextVariableName (\r
924 IN OUT UINTN *VariableNameSize,\r
925 IN OUT CHAR16 *VariableName,\r
926 IN OUT EFI_GUID *VendorGuid\r
927 )\r
928{\r
929 VARIABLE_POINTER_TRACK Variable;\r
930 UINTN VarNameSize;\r
931 EFI_STATUS Status;\r
932\r
933 if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {\r
934 return EFI_INVALID_PARAMETER;\r
935 }\r
936\r
937 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
938\r
939 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
940 if (Variable.CurrPtr == NULL || EFI_ERROR (Status)) {\r
941 goto Done;\r
942 }\r
943\r
944 if (VariableName[0] != 0) {\r
945 //\r
946 // If variable name is not NULL, get next variable\r
947 //\r
948 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
949 }\r
950\r
951 while (TRUE) {\r
952 //\r
953 // If both volatile and non-volatile variable store are parsed,\r
954 // return not found\r
955 //\r
956 if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == NULL) {\r
957 Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));\r
958 if (!Variable.Volatile) {\r
959 Variable.StartPtr = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
960 Variable.EndPtr = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase));\r
961 } else {\r
962 Status = EFI_NOT_FOUND;\r
963 goto Done;\r
964 }\r
965\r
966 Variable.CurrPtr = Variable.StartPtr;\r
967 if (!IsValidVariableHeader (Variable.CurrPtr)) {\r
968 continue;\r
969 }\r
970 }\r
971 //\r
972 // Variable is found\r
973 //\r
974 if (IsValidVariableHeader (Variable.CurrPtr) && Variable.CurrPtr->State == VAR_ADDED) {\r
975 if (!(EfiAtRuntime () && !(Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS))) {\r
976 VarNameSize = NAMESIZE_OF_VARIABLE (Variable.CurrPtr);\r
977 ASSERT (VarNameSize != 0);\r
978\r
979 if (VarNameSize <= *VariableNameSize) {\r
980 CopyMem (\r
981 VariableName,\r
982 GET_VARIABLE_NAME_PTR (Variable.CurrPtr),\r
983 VarNameSize\r
984 );\r
985 CopyMem (\r
986 VendorGuid,\r
987 &Variable.CurrPtr->VendorGuid,\r
988 sizeof (EFI_GUID)\r
989 );\r
990 Status = EFI_SUCCESS;\r
991 } else {\r
992 Status = EFI_BUFFER_TOO_SMALL;\r
993 }\r
994\r
995 *VariableNameSize = VarNameSize;\r
996 goto Done;\r
997 }\r
998 }\r
999\r
1000 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr);\r
1001 }\r
1002\r
1003Done:\r
1004 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1005 return Status;\r
1006}\r
1007\r
1008\r
1009/*++\r
1010\r
1011Routine Description:\r
1012\r
1013 This code sets variable in storage blocks (Volatile or Non-Volatile)\r
1014\r
1015Arguments:\r
1016\r
1017 VariableName Name of Variable to be found\r
1018 VendorGuid Variable vendor GUID\r
1019 Attributes Attribute value of the variable found\r
1020 DataSize Size of Data found. If size is less than the\r
1021 data, this value contains the required size.\r
1022 Data Data pointer\r
1023 Global Pointer to VARIABLE_GLOBAL structure\r
1024 VolatileOffset The offset of last volatile variable\r
1025 NonVolatileOffset The offset of last non-volatile variable\r
1026 Instance Instance of the Firmware Volume.\r
1027\r
1028Returns:\r
1029\r
1030 EFI_INVALID_PARAMETER - Invalid parameter\r
1031 EFI_SUCCESS - Set successfully\r
1032 EFI_OUT_OF_RESOURCES - Resource not enough to set variable\r
1033 EFI_NOT_FOUND - Not found\r
1034 EFI_DEVICE_ERROR - Variable can not be saved due to hardware failure\r
1035 EFI_WRITE_PROTECTED - Variable is read-only\r
1036\r
1037--*/\r
1038EFI_STATUS\r
1039EFIAPI\r
1040RuntimeServiceSetVariable (\r
1041 IN CHAR16 *VariableName,\r
1042 IN EFI_GUID *VendorGuid,\r
1043 IN UINT32 Attributes,\r
1044 IN UINTN DataSize,\r
1045 IN VOID *Data\r
1046 )\r
1047{\r
1048 VARIABLE_POINTER_TRACK Variable;\r
1049 EFI_STATUS Status;\r
1050 VARIABLE_HEADER *NextVariable;\r
1051 UINTN VarNameSize;\r
1052 UINTN VarNameOffset;\r
1053 UINTN VarDataOffset;\r
1054 UINTN VarSize;\r
1055 UINT8 State;\r
1056 BOOLEAN Reclaimed;\r
1057 UINTN *VolatileOffset;\r
1058 UINTN *NonVolatileOffset;\r
1059 UINT32 Instance;\r
1060 BOOLEAN Volatile;\r
1061 EFI_PHYSICAL_ADDRESS Point;\r
1062\r
1063 //\r
1064 // Check input parameters\r
1065 //\r
1066 if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {\r
1067 return EFI_INVALID_PARAMETER;\r
1068 } \r
1069 //\r
1070 // Make sure if runtime bit is set, boot service bit is set also\r
1071 //\r
1072 if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1073 return EFI_INVALID_PARAMETER;\r
1074 }\r
1075\r
1076 //\r
1077 // The size of the VariableName, including the Unicode Null in bytes plus\r
1078 // the DataSize is limited to maximum size of MAX_HARDWARE_ERROR_VARIABLE_SIZE (32K)\r
1079 // bytes for HwErrRec, and MAX_VARIABLE_SIZE (1024) bytes for the others.\r
1080 //\r
1081 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1082 if ((DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE) || \r
1083 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_HARDWARE_ERROR_VARIABLE_SIZE)) {\r
1084 return EFI_INVALID_PARAMETER;\r
1085 } \r
1086 } else {\r
1087 //\r
1088 // The size of the VariableName, including the Unicode Null in bytes plus\r
1089 // the DataSize is limited to maximum size of MAX_VARIABLE_SIZE (1024) bytes.\r
1090 //\r
1091 if ((DataSize > MAX_VARIABLE_SIZE) ||\r
1092 (sizeof (VARIABLE_HEADER) + StrSize (VariableName) + DataSize > MAX_VARIABLE_SIZE)) {\r
1093 return EFI_INVALID_PARAMETER;\r
1094 } \r
1095 } \r
1096\r
1097 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1098\r
1099 Reclaimed = FALSE;\r
1100 Instance = mVariableModuleGlobal->FvbInstance;\r
1101 VolatileOffset = &mVariableModuleGlobal->VolatileLastVariableOffset;\r
1102\r
1103 //\r
1104 // Consider reentrant in MCA/INIT/NMI. It needs be reupdated;\r
1105 //\r
1106 if (1 < InterlockedIncrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState)) {\r
1107 Point = mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase;;\r
1108 //\r
1109 // Parse non-volatile variable data and get last variable offset\r
1110 //\r
1111 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) (UINTN) Point);\r
1112 while (IsValidVariableHeader (NextVariable)) {\r
1113 NextVariable = GetNextVariablePtr (NextVariable);\r
1114 }\r
1115 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) Point;\r
1116 }\r
1117\r
1118 NonVolatileOffset = &mVariableModuleGlobal->NonVolatileLastVariableOffset;\r
1119 \r
1120\r
1121 //\r
1122 // Check whether the input variable is already existed\r
1123 //\r
1124 \r
1125 Status = FindVariable (VariableName, VendorGuid, &Variable, &mVariableModuleGlobal->VariableGlobal);\r
1126 if (Status == EFI_SUCCESS && Variable.CurrPtr != NULL) {\r
1127 //\r
1128 // Update/Delete existing variable\r
1129 //\r
1130 Volatile = Variable.Volatile;\r
1131 \r
1132 if (EfiAtRuntime ()) { \r
1133 //\r
1134 // If EfiAtRuntime and the variable is Volatile and Runtime Access, \r
1135 // the volatile is ReadOnly, and SetVariable should be aborted and \r
1136 // return EFI_WRITE_PROTECTED.\r
1137 //\r
1138 if (Variable.Volatile) {\r
1139 Status = EFI_WRITE_PROTECTED;\r
1140 goto Done;\r
1141 }\r
1142 //\r
1143 // Only variable have NV attribute can be updated/deleted in Runtime\r
1144 //\r
1145 if (!(Variable.CurrPtr->Attributes & EFI_VARIABLE_NON_VOLATILE)) {\r
1146 Status = EFI_INVALID_PARAMETER;\r
1147 goto Done; \r
1148 }\r
1149 }\r
1150 //\r
1151 // Setting a data variable with no access, or zero DataSize attributes\r
1152 // specified causes it to be deleted.\r
1153 //\r
1154 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) { \r
1155 State = Variable.CurrPtr->State;\r
1156 State &= VAR_DELETED;\r
1157\r
1158 Status = UpdateVariableStore (\r
1159 &mVariableModuleGlobal->VariableGlobal,\r
1160 Variable.Volatile,\r
1161 FALSE,\r
1162 Instance,\r
1163 (UINTN) &Variable.CurrPtr->State,\r
1164 sizeof (UINT8),\r
1165 &State\r
1166 ); \r
1167 if (!EFI_ERROR (Status)) {\r
1168 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);\r
1169 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1170 }\r
1171 goto Done; \r
1172 }\r
1173 //\r
1174 // If the variable is marked valid and the same data has been passed in\r
1175 // then return to the caller immediately.\r
1176 //\r
1177 if (DATASIZE_OF_VARIABLE (Variable.CurrPtr) == DataSize &&\r
1178 (CompareMem (Data, GetVariableDataPtr (Variable.CurrPtr), DataSize) == 0)) {\r
1179 \r
1180 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
1181 Status = EFI_SUCCESS;\r
1182 goto Done;\r
1183 } else if ((Variable.CurrPtr->State == VAR_ADDED) ||\r
1184 (Variable.CurrPtr->State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {\r
1185 //\r
1186 // Mark the old variable as in delete transition\r
1187 //\r
1188 State = Variable.CurrPtr->State;\r
1189 State &= VAR_IN_DELETED_TRANSITION;\r
1190\r
1191 Status = UpdateVariableStore (\r
1192 &mVariableModuleGlobal->VariableGlobal,\r
1193 Variable.Volatile,\r
1194 FALSE,\r
1195 Instance,\r
1196 (UINTN) &Variable.CurrPtr->State,\r
1197 sizeof (UINT8),\r
1198 &State\r
1199 ); \r
1200 if (EFI_ERROR (Status)) {\r
1201 goto Done; \r
1202 } \r
1203 } \r
1204 } else if (Status == EFI_NOT_FOUND) {\r
1205 //\r
1206 // Create a new variable\r
1207 // \r
1208 \r
1209 //\r
1210 // Make sure we are trying to create a new variable.\r
1211 // Setting a data variable with no access, or zero DataSize attributes means to delete it. \r
1212 //\r
1213 if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {\r
1214 Status = EFI_NOT_FOUND;\r
1215 goto Done;\r
1216 }\r
1217 \r
1218 //\r
1219 // Only variable have NV|RT attribute can be created in Runtime\r
1220 //\r
1221 if (EfiAtRuntime () &&\r
1222 (!(Attributes & EFI_VARIABLE_RUNTIME_ACCESS) || !(Attributes & EFI_VARIABLE_NON_VOLATILE))) {\r
1223 Status = EFI_INVALID_PARAMETER;\r
1224 goto Done;\r
1225 } \r
1226 } else {\r
1227 //\r
1228 // Status should be EFI_INVALID_PARAMETER here according to return status of FindVariable().\r
1229 //\r
1230 ASSERT (Status == EFI_INVALID_PARAMETER);\r
1231 goto Done;\r
1232 }\r
1233\r
1234 //\r
1235 // Function part - create a new variable and copy the data.\r
1236 // Both update a variable and create a variable will come here.\r
1237 //\r
1238 // Tricky part: Use scratch data area at the end of volatile variable store\r
1239 // as a temporary storage.\r
1240 //\r
1241 NextVariable = GetEndPointer ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase));\r
1242\r
1243 SetMem (NextVariable, SCRATCH_SIZE, 0xff);\r
1244\r
1245 NextVariable->StartId = VARIABLE_DATA;\r
1246 NextVariable->Attributes = Attributes;\r
1247 //\r
1248 // NextVariable->State = VAR_ADDED;\r
1249 //\r
1250 NextVariable->Reserved = 0;\r
1251 VarNameOffset = sizeof (VARIABLE_HEADER);\r
1252 VarNameSize = StrSize (VariableName);\r
1253 CopyMem (\r
1254 (UINT8 *) ((UINTN) NextVariable + VarNameOffset),\r
1255 VariableName,\r
1256 VarNameSize\r
1257 );\r
1258 VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);\r
1259 CopyMem (\r
1260 (UINT8 *) ((UINTN) NextVariable + VarDataOffset),\r
1261 Data,\r
1262 DataSize\r
1263 );\r
1264 CopyMem (&NextVariable->VendorGuid, VendorGuid, sizeof (EFI_GUID));\r
1265 //\r
1266 // There will be pad bytes after Data, the NextVariable->NameSize and\r
1267 // NextVariable->DataSize should not include pad size so that variable\r
1268 // service can get actual size in GetVariable\r
1269 //\r
1270 NextVariable->NameSize = (UINT32)VarNameSize;\r
1271 NextVariable->DataSize = (UINT32)DataSize;\r
1272\r
1273 //\r
1274 // The actual size of the variable that stores in storage should\r
1275 // include pad size.\r
1276 //\r
1277 VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);\r
1278 if (Attributes & EFI_VARIABLE_NON_VOLATILE) {\r
1279 //\r
1280 // Create a nonvolatile variable\r
1281 //\r
1282 Volatile = FALSE;\r
1283 \r
1284 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
1285 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
1286 ) {\r
1287 if (EfiAtRuntime ()) {\r
1288 Status = EFI_OUT_OF_RESOURCES;\r
1289 goto Done;\r
1290 }\r
1291 //\r
1292 // Perform garbage collection & reclaim operation\r
1293 //\r
1294 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase, NonVolatileOffset, FALSE);\r
1295 if (EFI_ERROR (Status)) {\r
1296 goto Done;\r
1297 }\r
1298 //\r
1299 // If still no enough space, return out of resources\r
1300 //\r
1301 if ((UINT32) (VarSize +*NonVolatileOffset) >\r
1302 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)))->Size\r
1303 ) {\r
1304 Status = EFI_OUT_OF_RESOURCES;\r
1305 goto Done;\r
1306 }\r
1307 \r
1308 Reclaimed = TRUE;\r
1309 }\r
1310 //\r
1311 // Three steps\r
1312 // 1. Write variable header\r
1313 // 2. Write variable data\r
1314 // 3. Set variable state to valid\r
1315 //\r
1316 //\r
1317 // Step 1:\r
1318 //\r
1319 Status = UpdateVariableStore (\r
1320 &mVariableModuleGlobal->VariableGlobal,\r
1321 FALSE,\r
1322 TRUE,\r
1323 Instance,\r
1324 *NonVolatileOffset,\r
1325 sizeof (VARIABLE_HEADER),\r
1326 (UINT8 *) NextVariable\r
1327 );\r
1328\r
1329 if (EFI_ERROR (Status)) {\r
1330 goto Done;\r
1331 }\r
1332 //\r
1333 // Step 2:\r
1334 //\r
1335 Status = UpdateVariableStore (\r
1336 &mVariableModuleGlobal->VariableGlobal,\r
1337 FALSE,\r
1338 TRUE,\r
1339 Instance,\r
1340 *NonVolatileOffset + sizeof (VARIABLE_HEADER),\r
1341 (UINT32) VarSize - sizeof (VARIABLE_HEADER),\r
1342 (UINT8 *) NextVariable + sizeof (VARIABLE_HEADER)\r
1343 );\r
1344\r
1345 if (EFI_ERROR (Status)) {\r
1346 goto Done;\r
1347 }\r
1348 //\r
1349 // Step 3:\r
1350 //\r
1351 NextVariable->State = VAR_ADDED;\r
1352 Status = UpdateVariableStore (\r
1353 &mVariableModuleGlobal->VariableGlobal,\r
1354 FALSE,\r
1355 TRUE,\r
1356 Instance,\r
1357 *NonVolatileOffset,\r
1358 sizeof (VARIABLE_HEADER),\r
1359 (UINT8 *) NextVariable\r
1360 );\r
1361\r
1362 if (EFI_ERROR (Status)) {\r
1363 goto Done;\r
1364 }\r
1365\r
1366 *NonVolatileOffset = HEADER_ALIGN (*NonVolatileOffset + VarSize);\r
1367\r
1368 } else {\r
1369 //\r
1370 // Create a volatile variable\r
1371 // \r
1372 Volatile = TRUE;\r
1373\r
1374 if ((UINT32) (VarSize +*VolatileOffset) >\r
1375 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size) {\r
1376 //\r
1377 // Perform garbage collection & reclaim operation\r
1378 //\r
1379 Status = Reclaim (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase, VolatileOffset, TRUE);\r
1380 if (EFI_ERROR (Status)) {\r
1381 goto Done;\r
1382 }\r
1383 //\r
1384 // If still no enough space, return out of resources\r
1385 //\r
1386 if ((UINT32) (VarSize +*VolatileOffset) >\r
1387 ((VARIABLE_STORE_HEADER *) ((UINTN) (mVariableModuleGlobal->VariableGlobal.VolatileVariableBase)))->Size\r
1388 ) {\r
1389 Status = EFI_OUT_OF_RESOURCES;\r
1390 goto Done;\r
1391 }\r
1392 \r
1393 Reclaimed = TRUE;\r
1394 }\r
1395\r
1396 NextVariable->State = VAR_ADDED;\r
1397 Status = UpdateVariableStore (\r
1398 &mVariableModuleGlobal->VariableGlobal,\r
1399 TRUE,\r
1400 TRUE,\r
1401 Instance,\r
1402 *VolatileOffset,\r
1403 (UINT32) VarSize,\r
1404 (UINT8 *) NextVariable\r
1405 );\r
1406\r
1407 if (EFI_ERROR (Status)) {\r
1408 goto Done;\r
1409 }\r
1410\r
1411 *VolatileOffset = HEADER_ALIGN (*VolatileOffset + VarSize);\r
1412 }\r
1413 //\r
1414 // Mark the old variable as deleted\r
1415 //\r
1416 if (!Reclaimed && !EFI_ERROR (Status) && Variable.CurrPtr != NULL) {\r
1417 State = Variable.CurrPtr->State;\r
1418 State &= VAR_DELETED;\r
1419\r
1420 Status = UpdateVariableStore (\r
1421 &mVariableModuleGlobal->VariableGlobal,\r
1422 Variable.Volatile,\r
1423 FALSE,\r
1424 Instance,\r
1425 (UINTN) &Variable.CurrPtr->State,\r
1426 sizeof (UINT8),\r
1427 &State\r
1428 );\r
1429 \r
1430 if (!EFI_ERROR (Status)) {\r
1431 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
1432 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1433 }\r
1434 goto Done; \r
1435 }\r
1436\r
1437 Status = EFI_SUCCESS;\r
1438 UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);\r
1439 UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);\r
1440\r
1441Done:\r
1442 InterlockedDecrement (&mVariableModuleGlobal->VariableGlobal.ReentrantState);\r
1443 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1444\r
1445 return Status;\r
1446}\r
1447\r
1448\r
1449/*++\r
1450\r
1451Routine Description:\r
1452\r
1453 This code returns information about the EFI variables.\r
1454\r
1455Arguments:\r
1456\r
1457 Attributes Attributes bitmask to specify the type of variables\r
1458 on which to return information.\r
1459 MaximumVariableStorageSize Pointer to the maximum size of the storage space available\r
1460 for the EFI variables associated with the attributes specified.\r
1461 RemainingVariableStorageSize Pointer to the remaining size of the storage space available\r
1462 for EFI variables associated with the attributes specified.\r
1463 MaximumVariableSize Pointer to the maximum size of an individual EFI variables\r
1464 associated with the attributes specified.\r
1465 Global Pointer to VARIABLE_GLOBAL structure.\r
1466 Instance Instance of the Firmware Volume.\r
1467\r
1468Returns:\r
1469\r
1470 EFI STATUS\r
1471 EFI_INVALID_PARAMETER - An invalid combination of attribute bits was supplied.\r
1472 EFI_SUCCESS - Query successfully.\r
1473 EFI_UNSUPPORTED - The attribute is not supported on this platform.\r
1474\r
1475--*/\r
1476EFI_STATUS\r
1477EFIAPI\r
1478RuntimeServiceQueryVariableInfo (\r
1479 IN UINT32 Attributes,\r
1480 OUT UINT64 *MaximumVariableStorageSize,\r
1481 OUT UINT64 *RemainingVariableStorageSize,\r
1482 OUT UINT64 *MaximumVariableSize\r
1483 )\r
1484{\r
1485 VARIABLE_HEADER *Variable;\r
1486 VARIABLE_HEADER *NextVariable;\r
1487 UINT64 VariableSize;\r
1488 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1489\r
1490 if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {\r
1491 return EFI_INVALID_PARAMETER;\r
1492 }\r
1493 \r
1494 if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {\r
1495 //\r
1496 // Make sure the Attributes combination is supported by the platform.\r
1497 //\r
1498 return EFI_UNSUPPORTED; \r
1499 } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {\r
1500 //\r
1501 // Make sure if runtime bit is set, boot service bit is set also.\r
1502 //\r
1503 return EFI_INVALID_PARAMETER;\r
1504 } else if (EfiAtRuntime () && !(Attributes & EFI_VARIABLE_RUNTIME_ACCESS)) {\r
1505 //\r
1506 // Make sure RT Attribute is set if we are in Runtime phase.\r
1507 //\r
1508 return EFI_INVALID_PARAMETER;\r
1509 }\r
1510\r
1511 AcquireLockOnlyAtBootTime(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1512\r
1513 if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {\r
1514 //\r
1515 // Query is Volatile related.\r
1516 //\r
1517 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase);\r
1518 } else {\r
1519 //\r
1520 // Query is Non-Volatile related.\r
1521 //\r
1522 VariableStoreHeader = (VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
1523 }\r
1524\r
1525 //\r
1526 // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize\r
1527 // with the storage size (excluding the storage header size).\r
1528 //\r
1529 *MaximumVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1530 *RemainingVariableStorageSize = VariableStoreHeader->Size - sizeof (VARIABLE_STORE_HEADER);\r
1531\r
1532 //\r
1533 // Let *MaximumVariableSize be MAX_VARIABLE_SIZE with the exception of the variable header size.\r
1534 //\r
1535 *MaximumVariableSize = MAX_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1536\r
1537 //\r
1538 // Harware error record variable needs larger size.\r
1539 //\r
1540 if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {\r
1541 *MaximumVariableSize = MAX_HARDWARE_ERROR_VARIABLE_SIZE - sizeof (VARIABLE_HEADER);\r
1542 }\r
1543\r
1544 //\r
1545 // Point to the starting address of the variables.\r
1546 //\r
1547 Variable = GetStartPointer (VariableStoreHeader);\r
1548\r
1549 //\r
1550 // Now walk through the related variable store.\r
1551 //\r
1552 while (IsValidVariableHeader (Variable) && (Variable < GetEndPointer (VariableStoreHeader))) {\r
1553 NextVariable = GetNextVariablePtr (Variable);\r
1554 VariableSize = (UINT64) (UINTN) NextVariable - (UINT64) (UINTN) Variable;\r
1555\r
1556 if (EfiAtRuntime ()) {\r
1557 //\r
1558 // we don't take the state of the variables in mind\r
1559 // when calculating RemainingVariableStorageSize,\r
1560 // since the space occupied by variables not marked with\r
1561 // VAR_ADDED is not allowed to be reclaimed in Runtime.\r
1562 //\r
1563 *RemainingVariableStorageSize -= VariableSize;\r
1564 } else {\r
1565 //\r
1566 // Only care about Variables with State VAR_ADDED,because\r
1567 // the space not marked as VAR_ADDED is reclaimable now.\r
1568 //\r
1569 if (Variable->State == VAR_ADDED) {\r
1570 *RemainingVariableStorageSize -= VariableSize;\r
1571 }\r
1572 }\r
1573\r
1574 //\r
1575 // Go to the next one\r
1576 //\r
1577 Variable = NextVariable;\r
1578 }\r
1579\r
1580 if (*RemainingVariableStorageSize < sizeof (VARIABLE_HEADER)) {\r
1581 *MaximumVariableSize = 0;\r
1582 } else if ((*RemainingVariableStorageSize - sizeof (VARIABLE_HEADER)) < *MaximumVariableSize) {\r
1583 *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (VARIABLE_HEADER);\r
1584 }\r
1585\r
1586 ReleaseLockOnlyAtBootTime (&mVariableModuleGlobal->VariableGlobal.VariableServicesLock);\r
1587 return EFI_SUCCESS;\r
1588}\r
1589\r
1590EFI_STATUS\r
1591VariableCommonInitialize (\r
1592 IN EFI_HANDLE ImageHandle,\r
1593 IN EFI_SYSTEM_TABLE *SystemTable\r
1594 )\r
1595/*++\r
1596\r
1597Routine Description:\r
1598 This function does common initialization for variable services\r
1599\r
1600Arguments:\r
1601\r
1602 ImageHandle - The firmware allocated handle for the EFI image.\r
1603 SystemTable - A pointer to the EFI System Table.\r
1604\r
1605Returns:\r
1606\r
1607 Status code.\r
1608\r
1609 EFI_NOT_FOUND - Variable store area not found.\r
1610 EFI_UNSUPPORTED - Currently only one non-volatile variable store is supported.\r
1611 EFI_SUCCESS - Variable services successfully initialized.\r
1612\r
1613--*/\r
1614{\r
1615 EFI_STATUS Status;\r
1616 EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
1617 CHAR8 *CurrPtr;\r
1618 VARIABLE_STORE_HEADER *VolatileVariableStore;\r
1619 VARIABLE_STORE_HEADER *VariableStoreHeader;\r
1620 VARIABLE_HEADER *NextVariable;\r
1621 UINT32 Instance;\r
1622 EFI_PHYSICAL_ADDRESS FvVolHdr;\r
1623 UINT64 TempVariableStoreHeader;\r
1624 EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;\r
1625 UINT64 BaseAddress;\r
1626 UINT64 Length;\r
1627 UINTN Index;\r
1628 UINT8 Data;\r
1629 UINT64 VariableStoreBase;\r
1630 UINT64 VariableStoreLength;\r
1631\r
1632\r
1633 EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal.VariableServicesLock, TPL_NOTIFY);\r
1634 mVariableModuleGlobal->VariableGlobal.ReentrantState = 0;\r
1635\r
1636 //\r
1637 // Allocate memory for volatile variable store\r
1638 //\r
1639 VolatileVariableStore = AllocateRuntimePool (VARIABLE_STORE_SIZE + SCRATCH_SIZE);\r
1640 if (VolatileVariableStore == NULL) {\r
1641 FreePool (mVariableModuleGlobal);\r
1642 return EFI_OUT_OF_RESOURCES;\r
1643 }\r
1644\r
1645 SetMem (VolatileVariableStore, VARIABLE_STORE_SIZE + SCRATCH_SIZE, 0xff);\r
1646\r
1647 //\r
1648 // Variable Specific Data\r
1649 //\r
1650 mVariableModuleGlobal->VariableGlobal.VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;\r
1651 mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer (VolatileVariableStore) - (UINTN) VolatileVariableStore;\r
1652\r
1653 VolatileVariableStore->Signature = VARIABLE_STORE_SIGNATURE;\r
1654 VolatileVariableStore->Size = VARIABLE_STORE_SIZE;\r
1655 VolatileVariableStore->Format = VARIABLE_STORE_FORMATTED;\r
1656 VolatileVariableStore->State = VARIABLE_STORE_HEALTHY;\r
1657 VolatileVariableStore->Reserved = 0;\r
1658 VolatileVariableStore->Reserved1 = 0;\r
1659\r
1660 //\r
1661 // Get non volatile varaible store\r
1662 //\r
1663\r
1664 TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);\r
1665 VariableStoreBase = TempVariableStoreHeader + \\r
1666 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
1667 VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \\r
1668 (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);\r
1669 //\r
1670 // Mark the variable storage region of the FLASH as RUNTIME\r
1671 //\r
1672 BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);\r
1673 Length = VariableStoreLength + (VariableStoreBase - BaseAddress);\r
1674 Length = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);\r
1675\r
1676 Status = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);\r
1677 if (EFI_ERROR (Status)) {\r
1678 FreePool (mVariableModuleGlobal);\r
1679 FreePool (VolatileVariableStore);\r
1680 return EFI_UNSUPPORTED;\r
1681 }\r
1682\r
1683 Status = gDS->SetMemorySpaceAttributes (\r
1684 BaseAddress,\r
1685 Length,\r
1686 GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME\r
1687 );\r
1688 if (EFI_ERROR (Status)) {\r
1689 FreePool (mVariableModuleGlobal);\r
1690 FreePool (VolatileVariableStore);\r
1691 return EFI_UNSUPPORTED;\r
1692 }\r
1693 //\r
1694 // Get address of non volatile variable store base\r
1695 //\r
1696 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = VariableStoreBase;\r
1697\r
1698 //\r
1699 // Check Integrity\r
1700 //\r
1701 //\r
1702 // Find the Correct Instance of the FV Block Service.\r
1703 //\r
1704 Instance = 0;\r
1705 CurrPtr = (CHAR8 *) ((UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase);\r
1706 while (EfiFvbGetPhysicalAddress (Instance, &FvVolHdr) == EFI_SUCCESS) {\r
1707 FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);\r
1708 if (CurrPtr >= (CHAR8 *) FwVolHeader && CurrPtr < (((CHAR8 *) FwVolHeader) + FwVolHeader->FvLength)) {\r
1709 mVariableModuleGlobal->FvbInstance = Instance;\r
1710 break;\r
1711 }\r
1712\r
1713 Instance++;\r
1714 }\r
1715\r
1716 VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;\r
1717 if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {\r
1718 if (~VariableStoreHeader->Size == 0) {\r
1719 Status = UpdateVariableStore (\r
1720 &mVariableModuleGlobal->VariableGlobal,\r
1721 FALSE,\r
1722 FALSE,\r
1723 mVariableModuleGlobal->FvbInstance,\r
1724 (UINTN) &VariableStoreHeader->Size,\r
1725 sizeof (UINT32),\r
1726 (UINT8 *) &VariableStoreLength\r
1727 );\r
1728 //\r
1729 // As Variables are stored in NV storage, which are slow devices,such as flash.\r
1730 // Variable operation may skip checking variable program result to improve performance,\r
1731 // We can assume Variable program is OK through some check point.\r
1732 // Variable Store Size Setting should be the first Variable write operation,\r
1733 // We can assume all Read/Write is OK if we can set Variable store size successfully.\r
1734 // If write fail, we will assert here\r
1735 //\r
1736 ASSERT(VariableStoreHeader->Size == VariableStoreLength);\r
1737\r
1738 if (EFI_ERROR (Status)) {\r
1739 return Status;\r
1740 }\r
1741 }\r
1742\r
1743 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);\r
1744 //\r
1745 // Parse non-volatile variable data and get last variable offset\r
1746 //\r
1747 NextVariable = GetStartPointer ((VARIABLE_STORE_HEADER *) CurrPtr);\r
1748 Status = EFI_SUCCESS;\r
1749\r
1750 while (IsValidVariableHeader (NextVariable)) {\r
1751 NextVariable = GetNextVariablePtr (NextVariable);\r
1752 }\r
1753\r
1754 mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) NextVariable - (UINTN) CurrPtr;\r
1755\r
1756 //\r
1757 // Check if the free area is blow a threshold\r
1758 //\r
1759 if ((((VARIABLE_STORE_HEADER *)((UINTN) CurrPtr))->Size - mVariableModuleGlobal->NonVolatileLastVariableOffset) < VARIABLE_RECLAIM_THRESHOLD) {\r
1760 Status = Reclaim (\r
1761 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
1762 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1763 FALSE\r
1764 );\r
1765 }\r
1766\r
1767 if (EFI_ERROR (Status)) {\r
1768 FreePool (mVariableModuleGlobal);\r
1769 FreePool (VolatileVariableStore);\r
1770 return Status;\r
1771 }\r
1772\r
1773 //\r
1774 // Check if the free area is really free.\r
1775 //\r
1776 for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {\r
1777 Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase)[Index];\r
1778 if (Data != 0xff) {\r
1779 //\r
1780 // There must be something wrong in variable store, do reclaim operation.\r
1781 //\r
1782 Status = Reclaim (\r
1783 mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase,\r
1784 &mVariableModuleGlobal->NonVolatileLastVariableOffset,\r
1785 FALSE\r
1786 );\r
1787 break;\r
1788 }\r
1789 }\r
1790 }\r
1791\r
1792 if (EFI_ERROR (Status)) {\r
1793 FreePool (mVariableModuleGlobal);\r
1794 FreePool (VolatileVariableStore);\r
1795 }\r
1796\r
1797 return Status;\r
1798}\r
1799\r
1800\r
1801\r
1802\r
1803VOID\r
1804EFIAPI\r
1805VariableClassAddressChangeEvent (\r
1806 IN EFI_EVENT Event,\r
1807 IN VOID *Context\r
1808 )\r
1809{\r
1810 EfiConvertPointer (\r
1811 0x0,\r
1812 (VOID **) &mVariableModuleGlobal->VariableGlobal.NonVolatileVariableBase\r
1813 );\r
1814 EfiConvertPointer (\r
1815 0x0,\r
1816 (VOID **) &mVariableModuleGlobal->VariableGlobal.VolatileVariableBase\r
1817 );\r
1818 EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal);\r
1819}\r
1820\r
1821\r
1822/**\r
1823 Variable Driver main entry point. The Variable driver places the 4 EFI\r
1824 runtime services in the EFI System Table and installs arch protocols \r
1825 for variable read and write services being availible. \r
1826\r
1827 @param[in] ImageHandle The firmware allocated handle for the EFI image. \r
1828 @param[in] SystemTable A pointer to the EFI System Table.\r
1829 \r
1830 @retval EFI_SUCCESS The entry point is executed successfully.\r
1831 @retval other Some error occurs when executing this entry point.\r
1832\r
1833**/\r
1834EFI_STATUS\r
1835EFIAPI\r
1836VariableServiceInitialize (\r
1837 IN EFI_HANDLE ImageHandle,\r
1838 IN EFI_SYSTEM_TABLE *SystemTable\r
1839 )\r
1840{\r
1841 EFI_STATUS Status;\r
1842\r
1843 Status = VariableCommonInitialize (ImageHandle, SystemTable);\r
1844 ASSERT_EFI_ERROR (Status);\r
1845\r
1846 SystemTable->RuntimeServices->GetVariable = RuntimeServiceGetVariable;\r
1847 SystemTable->RuntimeServices->GetNextVariableName = RuntimeServiceGetNextVariableName;\r
1848 SystemTable->RuntimeServices->SetVariable = RuntimeServiceSetVariable;\r
1849 SystemTable->RuntimeServices->QueryVariableInfo = RuntimeServiceQueryVariableInfo;\r
1850\r
1851 //\r
1852 // Now install the Variable Runtime Architectural Protocol on a new handle\r
1853 //\r
1854 Status = gBS->InstallMultipleProtocolInterfaces (\r
1855 &mHandle,\r
1856 &gEfiVariableArchProtocolGuid, NULL,\r
1857 &gEfiVariableWriteArchProtocolGuid, NULL,\r
1858 NULL\r
1859 );\r
1860 ASSERT_EFI_ERROR (Status);\r
1861\r
1862 Status = gBS->CreateEvent (\r
1863 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE,\r
1864 TPL_NOTIFY,\r
1865 VariableClassAddressChangeEvent,\r
1866 NULL,\r
1867 &mVirtualAddressChangeEvent\r
1868 );\r
1869 ASSERT_EFI_ERROR (Status);\r
1870\r
1871 return EFI_SUCCESS;\r
1872}\r
1873\r