]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdeModulePkg/Universal/Variable/RuntimeDxe/VariableParsing.c
MdeModulePkg: Apply uncrustify changes
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / VariableParsing.c
... / ...
CommitLineData
1/** @file\r
2 Functions in this module are associated with variable parsing operations and\r
3 are intended to be usable across variable driver source files.\r
4\r
5Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>\r
6SPDX-License-Identifier: BSD-2-Clause-Patent\r
7\r
8**/\r
9\r
10#include "VariableParsing.h"\r
11\r
12/**\r
13\r
14 This code checks if variable header is valid or not.\r
15\r
16 @param[in] Variable Pointer to the Variable Header.\r
17 @param[in] VariableStoreEnd Pointer to the Variable Store End.\r
18\r
19 @retval TRUE Variable header is valid.\r
20 @retval FALSE Variable header is not valid.\r
21\r
22**/\r
23BOOLEAN\r
24IsValidVariableHeader (\r
25 IN VARIABLE_HEADER *Variable,\r
26 IN VARIABLE_HEADER *VariableStoreEnd\r
27 )\r
28{\r
29 if ((Variable == NULL) || (Variable >= VariableStoreEnd) || (Variable->StartId != VARIABLE_DATA)) {\r
30 //\r
31 // Variable is NULL or has reached the end of variable store,\r
32 // or the StartId is not correct.\r
33 //\r
34 return FALSE;\r
35 }\r
36\r
37 return TRUE;\r
38}\r
39\r
40/**\r
41\r
42 This code gets the current status of Variable Store.\r
43\r
44 @param[in] VarStoreHeader Pointer to the Variable Store Header.\r
45\r
46 @retval EfiRaw Variable store status is raw.\r
47 @retval EfiValid Variable store status is valid.\r
48 @retval EfiInvalid Variable store status is invalid.\r
49\r
50**/\r
51VARIABLE_STORE_STATUS\r
52GetVariableStoreStatus (\r
53 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
54 )\r
55{\r
56 if ((CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) ||\r
57 CompareGuid (&VarStoreHeader->Signature, &gEfiVariableGuid)) &&\r
58 (VarStoreHeader->Format == VARIABLE_STORE_FORMATTED) &&\r
59 (VarStoreHeader->State == VARIABLE_STORE_HEALTHY)\r
60 )\r
61 {\r
62 return EfiValid;\r
63 } else if ((((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff) &&\r
64 (((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff) &&\r
65 (((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff) &&\r
66 (((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff) &&\r
67 (VarStoreHeader->Size == 0xffffffff) &&\r
68 (VarStoreHeader->Format == 0xff) &&\r
69 (VarStoreHeader->State == 0xff)\r
70 )\r
71 {\r
72 return EfiRaw;\r
73 } else {\r
74 return EfiInvalid;\r
75 }\r
76}\r
77\r
78/**\r
79 This code gets the size of variable header.\r
80\r
81 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
82 FALSE indicates authenticated variables are not used.\r
83\r
84 @return Size of variable header in bytes in type UINTN.\r
85\r
86**/\r
87UINTN\r
88GetVariableHeaderSize (\r
89 IN BOOLEAN AuthFormat\r
90 )\r
91{\r
92 UINTN Value;\r
93\r
94 if (AuthFormat) {\r
95 Value = sizeof (AUTHENTICATED_VARIABLE_HEADER);\r
96 } else {\r
97 Value = sizeof (VARIABLE_HEADER);\r
98 }\r
99\r
100 return Value;\r
101}\r
102\r
103/**\r
104\r
105 This code gets the size of name of variable.\r
106\r
107 @param[in] Variable Pointer to the variable header.\r
108 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
109 FALSE indicates authenticated variables are not used.\r
110\r
111 @return UINTN Size of variable in bytes.\r
112\r
113**/\r
114UINTN\r
115NameSizeOfVariable (\r
116 IN VARIABLE_HEADER *Variable,\r
117 IN BOOLEAN AuthFormat\r
118 )\r
119{\r
120 AUTHENTICATED_VARIABLE_HEADER *AuthVariable;\r
121\r
122 AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *)Variable;\r
123 if (AuthFormat) {\r
124 if ((AuthVariable->State == (UINT8)(-1)) ||\r
125 (AuthVariable->DataSize == (UINT32)(-1)) ||\r
126 (AuthVariable->NameSize == (UINT32)(-1)) ||\r
127 (AuthVariable->Attributes == (UINT32)(-1)))\r
128 {\r
129 return 0;\r
130 }\r
131\r
132 return (UINTN)AuthVariable->NameSize;\r
133 } else {\r
134 if ((Variable->State == (UINT8)(-1)) ||\r
135 (Variable->DataSize == (UINT32)(-1)) ||\r
136 (Variable->NameSize == (UINT32)(-1)) ||\r
137 (Variable->Attributes == (UINT32)(-1)))\r
138 {\r
139 return 0;\r
140 }\r
141\r
142 return (UINTN)Variable->NameSize;\r
143 }\r
144}\r
145\r
146/**\r
147 This code sets the size of name of variable.\r
148\r
149 @param[in] Variable Pointer to the Variable Header.\r
150 @param[in] NameSize Name size to set.\r
151 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
152 FALSE indicates authenticated variables are not used.\r
153\r
154**/\r
155VOID\r
156SetNameSizeOfVariable (\r
157 IN VARIABLE_HEADER *Variable,\r
158 IN UINTN NameSize,\r
159 IN BOOLEAN AuthFormat\r
160 )\r
161{\r
162 AUTHENTICATED_VARIABLE_HEADER *AuthVariable;\r
163\r
164 AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *)Variable;\r
165 if (AuthFormat) {\r
166 AuthVariable->NameSize = (UINT32)NameSize;\r
167 } else {\r
168 Variable->NameSize = (UINT32)NameSize;\r
169 }\r
170}\r
171\r
172/**\r
173\r
174 This code gets the size of variable data.\r
175\r
176 @param[in] Variable Pointer to the Variable Header.\r
177 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
178 FALSE indicates authenticated variables are not used.\r
179\r
180 @return Size of variable in bytes.\r
181\r
182**/\r
183UINTN\r
184DataSizeOfVariable (\r
185 IN VARIABLE_HEADER *Variable,\r
186 IN BOOLEAN AuthFormat\r
187 )\r
188{\r
189 AUTHENTICATED_VARIABLE_HEADER *AuthVariable;\r
190\r
191 AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *)Variable;\r
192 if (AuthFormat) {\r
193 if ((AuthVariable->State == (UINT8)(-1)) ||\r
194 (AuthVariable->DataSize == (UINT32)(-1)) ||\r
195 (AuthVariable->NameSize == (UINT32)(-1)) ||\r
196 (AuthVariable->Attributes == (UINT32)(-1)))\r
197 {\r
198 return 0;\r
199 }\r
200\r
201 return (UINTN)AuthVariable->DataSize;\r
202 } else {\r
203 if ((Variable->State == (UINT8)(-1)) ||\r
204 (Variable->DataSize == (UINT32)(-1)) ||\r
205 (Variable->NameSize == (UINT32)(-1)) ||\r
206 (Variable->Attributes == (UINT32)(-1)))\r
207 {\r
208 return 0;\r
209 }\r
210\r
211 return (UINTN)Variable->DataSize;\r
212 }\r
213}\r
214\r
215/**\r
216 This code sets the size of variable data.\r
217\r
218 @param[in] Variable Pointer to the Variable Header.\r
219 @param[in] DataSize Data size to set.\r
220 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
221 FALSE indicates authenticated variables are not used.\r
222\r
223**/\r
224VOID\r
225SetDataSizeOfVariable (\r
226 IN VARIABLE_HEADER *Variable,\r
227 IN UINTN DataSize,\r
228 IN BOOLEAN AuthFormat\r
229 )\r
230{\r
231 AUTHENTICATED_VARIABLE_HEADER *AuthVariable;\r
232\r
233 AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *)Variable;\r
234 if (AuthFormat) {\r
235 AuthVariable->DataSize = (UINT32)DataSize;\r
236 } else {\r
237 Variable->DataSize = (UINT32)DataSize;\r
238 }\r
239}\r
240\r
241/**\r
242\r
243 This code gets the pointer to the variable name.\r
244\r
245 @param[in] Variable Pointer to the Variable Header.\r
246 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
247 FALSE indicates authenticated variables are not used.\r
248\r
249 @return Pointer to Variable Name which is Unicode encoding.\r
250\r
251**/\r
252CHAR16 *\r
253GetVariableNamePtr (\r
254 IN VARIABLE_HEADER *Variable,\r
255 IN BOOLEAN AuthFormat\r
256 )\r
257{\r
258 return (CHAR16 *)((UINTN)Variable + GetVariableHeaderSize (AuthFormat));\r
259}\r
260\r
261/**\r
262 This code gets the pointer to the variable guid.\r
263\r
264 @param[in] Variable Pointer to the Variable Header.\r
265 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
266 FALSE indicates authenticated variables are not used.\r
267\r
268 @return A EFI_GUID* pointer to Vendor Guid.\r
269\r
270**/\r
271EFI_GUID *\r
272GetVendorGuidPtr (\r
273 IN VARIABLE_HEADER *Variable,\r
274 IN BOOLEAN AuthFormat\r
275 )\r
276{\r
277 AUTHENTICATED_VARIABLE_HEADER *AuthVariable;\r
278\r
279 AuthVariable = (AUTHENTICATED_VARIABLE_HEADER *)Variable;\r
280 if (AuthFormat) {\r
281 return &AuthVariable->VendorGuid;\r
282 } else {\r
283 return &Variable->VendorGuid;\r
284 }\r
285}\r
286\r
287/**\r
288\r
289 This code gets the pointer to the variable data.\r
290\r
291 @param[in] Variable Pointer to the Variable Header.\r
292 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
293 FALSE indicates authenticated variables are not used.\r
294\r
295 @return Pointer to Variable Data.\r
296\r
297**/\r
298UINT8 *\r
299GetVariableDataPtr (\r
300 IN VARIABLE_HEADER *Variable,\r
301 IN BOOLEAN AuthFormat\r
302 )\r
303{\r
304 UINTN Value;\r
305\r
306 //\r
307 // Be careful about pad size for alignment.\r
308 //\r
309 Value = (UINTN)GetVariableNamePtr (Variable, AuthFormat);\r
310 Value += NameSizeOfVariable (Variable, AuthFormat);\r
311 Value += GET_PAD_SIZE (NameSizeOfVariable (Variable, AuthFormat));\r
312\r
313 return (UINT8 *)Value;\r
314}\r
315\r
316/**\r
317 This code gets the variable data offset related to variable header.\r
318\r
319 @param[in] Variable Pointer to the Variable Header.\r
320 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
321 FALSE indicates authenticated variables are not used.\r
322\r
323 @return Variable Data offset.\r
324\r
325**/\r
326UINTN\r
327GetVariableDataOffset (\r
328 IN VARIABLE_HEADER *Variable,\r
329 IN BOOLEAN AuthFormat\r
330 )\r
331{\r
332 UINTN Value;\r
333\r
334 //\r
335 // Be careful about pad size for alignment\r
336 //\r
337 Value = GetVariableHeaderSize (AuthFormat);\r
338 Value += NameSizeOfVariable (Variable, AuthFormat);\r
339 Value += GET_PAD_SIZE (NameSizeOfVariable (Variable, AuthFormat));\r
340\r
341 return Value;\r
342}\r
343\r
344/**\r
345\r
346 This code gets the pointer to the next variable header.\r
347\r
348 @param[in] Variable Pointer to the Variable Header.\r
349 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
350 FALSE indicates authenticated variables are not used.\r
351\r
352 @return Pointer to next variable header.\r
353\r
354**/\r
355VARIABLE_HEADER *\r
356GetNextVariablePtr (\r
357 IN VARIABLE_HEADER *Variable,\r
358 IN BOOLEAN AuthFormat\r
359 )\r
360{\r
361 UINTN Value;\r
362\r
363 Value = (UINTN)GetVariableDataPtr (Variable, AuthFormat);\r
364 Value += DataSizeOfVariable (Variable, AuthFormat);\r
365 Value += GET_PAD_SIZE (DataSizeOfVariable (Variable, AuthFormat));\r
366\r
367 //\r
368 // Be careful about pad size for alignment.\r
369 //\r
370 return (VARIABLE_HEADER *)HEADER_ALIGN (Value);\r
371}\r
372\r
373/**\r
374\r
375 Gets the pointer to the first variable header in given variable store area.\r
376\r
377 @param[in] VarStoreHeader Pointer to the Variable Store Header.\r
378\r
379 @return Pointer to the first variable header.\r
380\r
381**/\r
382VARIABLE_HEADER *\r
383GetStartPointer (\r
384 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
385 )\r
386{\r
387 //\r
388 // The start of variable store.\r
389 //\r
390 return (VARIABLE_HEADER *)HEADER_ALIGN (VarStoreHeader + 1);\r
391}\r
392\r
393/**\r
394\r
395 Gets the pointer to the end of the variable storage area.\r
396\r
397 This function gets pointer to the end of the variable storage\r
398 area, according to the input variable store header.\r
399\r
400 @param[in] VarStoreHeader Pointer to the Variable Store Header.\r
401\r
402 @return Pointer to the end of the variable storage area.\r
403\r
404**/\r
405VARIABLE_HEADER *\r
406GetEndPointer (\r
407 IN VARIABLE_STORE_HEADER *VarStoreHeader\r
408 )\r
409{\r
410 //\r
411 // The end of variable store\r
412 //\r
413 return (VARIABLE_HEADER *)HEADER_ALIGN ((UINTN)VarStoreHeader + VarStoreHeader->Size);\r
414}\r
415\r
416/**\r
417 Compare two EFI_TIME data.\r
418\r
419\r
420 @param[in] FirstTime A pointer to the first EFI_TIME data.\r
421 @param[in] SecondTime A pointer to the second EFI_TIME data.\r
422\r
423 @retval TRUE The FirstTime is not later than the SecondTime.\r
424 @retval FALSE The FirstTime is later than the SecondTime.\r
425\r
426**/\r
427BOOLEAN\r
428VariableCompareTimeStampInternal (\r
429 IN EFI_TIME *FirstTime,\r
430 IN EFI_TIME *SecondTime\r
431 )\r
432{\r
433 if (FirstTime->Year != SecondTime->Year) {\r
434 return (BOOLEAN)(FirstTime->Year < SecondTime->Year);\r
435 } else if (FirstTime->Month != SecondTime->Month) {\r
436 return (BOOLEAN)(FirstTime->Month < SecondTime->Month);\r
437 } else if (FirstTime->Day != SecondTime->Day) {\r
438 return (BOOLEAN)(FirstTime->Day < SecondTime->Day);\r
439 } else if (FirstTime->Hour != SecondTime->Hour) {\r
440 return (BOOLEAN)(FirstTime->Hour < SecondTime->Hour);\r
441 } else if (FirstTime->Minute != SecondTime->Minute) {\r
442 return (BOOLEAN)(FirstTime->Minute < SecondTime->Minute);\r
443 }\r
444\r
445 return (BOOLEAN)(FirstTime->Second <= SecondTime->Second);\r
446}\r
447\r
448/**\r
449 Find the variable in the specified variable store.\r
450\r
451 @param[in] VariableName Name of the variable to be found\r
452 @param[in] VendorGuid Vendor GUID to be found.\r
453 @param[in] IgnoreRtCheck Ignore EFI_VARIABLE_RUNTIME_ACCESS attribute\r
454 check at runtime when searching variable.\r
455 @param[in, out] PtrTrack Variable Track Pointer structure that contains Variable Information.\r
456 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
457 FALSE indicates authenticated variables are not used.\r
458\r
459 @retval EFI_SUCCESS Variable found successfully\r
460 @retval EFI_NOT_FOUND Variable not found\r
461**/\r
462EFI_STATUS\r
463FindVariableEx (\r
464 IN CHAR16 *VariableName,\r
465 IN EFI_GUID *VendorGuid,\r
466 IN BOOLEAN IgnoreRtCheck,\r
467 IN OUT VARIABLE_POINTER_TRACK *PtrTrack,\r
468 IN BOOLEAN AuthFormat\r
469 )\r
470{\r
471 VARIABLE_HEADER *InDeletedVariable;\r
472 VOID *Point;\r
473\r
474 PtrTrack->InDeletedTransitionPtr = NULL;\r
475\r
476 //\r
477 // Find the variable by walk through HOB, volatile and non-volatile variable store.\r
478 //\r
479 InDeletedVariable = NULL;\r
480\r
481 for ( PtrTrack->CurrPtr = PtrTrack->StartPtr\r
482 ; IsValidVariableHeader (PtrTrack->CurrPtr, PtrTrack->EndPtr)\r
483 ; PtrTrack->CurrPtr = GetNextVariablePtr (PtrTrack->CurrPtr, AuthFormat)\r
484 )\r
485 {\r
486 if ((PtrTrack->CurrPtr->State == VAR_ADDED) ||\r
487 (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED))\r
488 )\r
489 {\r
490 if (IgnoreRtCheck || !AtRuntime () || ((PtrTrack->CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {\r
491 if (VariableName[0] == 0) {\r
492 if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
493 InDeletedVariable = PtrTrack->CurrPtr;\r
494 } else {\r
495 PtrTrack->InDeletedTransitionPtr = InDeletedVariable;\r
496 return EFI_SUCCESS;\r
497 }\r
498 } else {\r
499 if (CompareGuid (VendorGuid, GetVendorGuidPtr (PtrTrack->CurrPtr, AuthFormat))) {\r
500 Point = (VOID *)GetVariableNamePtr (PtrTrack->CurrPtr, AuthFormat);\r
501\r
502 ASSERT (NameSizeOfVariable (PtrTrack->CurrPtr, AuthFormat) != 0);\r
503 if (CompareMem (VariableName, Point, NameSizeOfVariable (PtrTrack->CurrPtr, AuthFormat)) == 0) {\r
504 if (PtrTrack->CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
505 InDeletedVariable = PtrTrack->CurrPtr;\r
506 } else {\r
507 PtrTrack->InDeletedTransitionPtr = InDeletedVariable;\r
508 return EFI_SUCCESS;\r
509 }\r
510 }\r
511 }\r
512 }\r
513 }\r
514 }\r
515 }\r
516\r
517 PtrTrack->CurrPtr = InDeletedVariable;\r
518 return (PtrTrack->CurrPtr == NULL) ? EFI_NOT_FOUND : EFI_SUCCESS;\r
519}\r
520\r
521/**\r
522 This code finds the next available variable.\r
523\r
524 Caution: This function may receive untrusted input.\r
525 This function may be invoked in SMM mode. This function will do basic validation, before parse the data.\r
526\r
527 @param[in] VariableName Pointer to variable name.\r
528 @param[in] VendorGuid Variable Vendor Guid.\r
529 @param[in] VariableStoreList A list of variable stores that should be used to get the next variable.\r
530 The maximum number of entries is the max value of VARIABLE_STORE_TYPE.\r
531 @param[out] VariablePtr Pointer to variable header address.\r
532 @param[in] AuthFormat TRUE indicates authenticated variables are used.\r
533 FALSE indicates authenticated variables are not used.\r
534\r
535 @retval EFI_SUCCESS The function completed successfully.\r
536 @retval EFI_NOT_FOUND The next variable was not found.\r
537 @retval EFI_INVALID_PARAMETER If VariableName is not an empty string, while VendorGuid is NULL.\r
538 @retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and\r
539 GUID of an existing variable.\r
540\r
541**/\r
542EFI_STATUS\r
543EFIAPI\r
544VariableServiceGetNextVariableInternal (\r
545 IN CHAR16 *VariableName,\r
546 IN EFI_GUID *VendorGuid,\r
547 IN VARIABLE_STORE_HEADER **VariableStoreList,\r
548 OUT VARIABLE_HEADER **VariablePtr,\r
549 IN BOOLEAN AuthFormat\r
550 )\r
551{\r
552 EFI_STATUS Status;\r
553 VARIABLE_STORE_TYPE StoreType;\r
554 VARIABLE_POINTER_TRACK Variable;\r
555 VARIABLE_POINTER_TRACK VariableInHob;\r
556 VARIABLE_POINTER_TRACK VariablePtrTrack;\r
557\r
558 Status = EFI_NOT_FOUND;\r
559\r
560 if (VariableStoreList == NULL) {\r
561 return EFI_INVALID_PARAMETER;\r
562 }\r
563\r
564 ZeroMem (&Variable, sizeof (Variable));\r
565\r
566 // Check if the variable exists in the given variable store list\r
567 for (StoreType = (VARIABLE_STORE_TYPE)0; StoreType < VariableStoreTypeMax; StoreType++) {\r
568 if (VariableStoreList[StoreType] == NULL) {\r
569 continue;\r
570 }\r
571\r
572 Variable.StartPtr = GetStartPointer (VariableStoreList[StoreType]);\r
573 Variable.EndPtr = GetEndPointer (VariableStoreList[StoreType]);\r
574 Variable.Volatile = (BOOLEAN)(StoreType == VariableStoreTypeVolatile);\r
575\r
576 Status = FindVariableEx (VariableName, VendorGuid, FALSE, &Variable, AuthFormat);\r
577 if (!EFI_ERROR (Status)) {\r
578 break;\r
579 }\r
580 }\r
581\r
582 if ((Variable.CurrPtr == NULL) || EFI_ERROR (Status)) {\r
583 //\r
584 // For VariableName is an empty string, FindVariableEx() will try to find and return\r
585 // the first qualified variable, and if FindVariableEx() returns error (EFI_NOT_FOUND)\r
586 // as no any variable is found, still go to return the error (EFI_NOT_FOUND).\r
587 //\r
588 if (VariableName[0] != 0) {\r
589 //\r
590 // For VariableName is not an empty string, and FindVariableEx() returns error as\r
591 // VariableName and VendorGuid are not a name and GUID of an existing variable,\r
592 // there is no way to get next variable, follow spec to return EFI_INVALID_PARAMETER.\r
593 //\r
594 Status = EFI_INVALID_PARAMETER;\r
595 }\r
596\r
597 goto Done;\r
598 }\r
599\r
600 if (VariableName[0] != 0) {\r
601 //\r
602 // If variable name is not empty, get next variable.\r
603 //\r
604 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr, AuthFormat);\r
605 }\r
606\r
607 while (TRUE) {\r
608 //\r
609 // Switch to the next variable store if needed\r
610 //\r
611 while (!IsValidVariableHeader (Variable.CurrPtr, Variable.EndPtr)) {\r
612 //\r
613 // Find current storage index\r
614 //\r
615 for (StoreType = (VARIABLE_STORE_TYPE)0; StoreType < VariableStoreTypeMax; StoreType++) {\r
616 if ((VariableStoreList[StoreType] != NULL) && (Variable.StartPtr == GetStartPointer (VariableStoreList[StoreType]))) {\r
617 break;\r
618 }\r
619 }\r
620\r
621 ASSERT (StoreType < VariableStoreTypeMax);\r
622 //\r
623 // Switch to next storage\r
624 //\r
625 for (StoreType++; StoreType < VariableStoreTypeMax; StoreType++) {\r
626 if (VariableStoreList[StoreType] != NULL) {\r
627 break;\r
628 }\r
629 }\r
630\r
631 //\r
632 // Capture the case that\r
633 // 1. current storage is the last one, or\r
634 // 2. no further storage\r
635 //\r
636 if (StoreType == VariableStoreTypeMax) {\r
637 Status = EFI_NOT_FOUND;\r
638 goto Done;\r
639 }\r
640\r
641 Variable.StartPtr = GetStartPointer (VariableStoreList[StoreType]);\r
642 Variable.EndPtr = GetEndPointer (VariableStoreList[StoreType]);\r
643 Variable.CurrPtr = Variable.StartPtr;\r
644 }\r
645\r
646 //\r
647 // Variable is found\r
648 //\r
649 if ((Variable.CurrPtr->State == VAR_ADDED) || (Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED))) {\r
650 if (!AtRuntime () || ((Variable.CurrPtr->Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {\r
651 if (Variable.CurrPtr->State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {\r
652 //\r
653 // If it is a IN_DELETED_TRANSITION variable,\r
654 // and there is also a same ADDED one at the same time,\r
655 // don't return it.\r
656 //\r
657 VariablePtrTrack.StartPtr = Variable.StartPtr;\r
658 VariablePtrTrack.EndPtr = Variable.EndPtr;\r
659 Status = FindVariableEx (\r
660 GetVariableNamePtr (Variable.CurrPtr, AuthFormat),\r
661 GetVendorGuidPtr (Variable.CurrPtr, AuthFormat),\r
662 FALSE,\r
663 &VariablePtrTrack,\r
664 AuthFormat\r
665 );\r
666 if (!EFI_ERROR (Status) && (VariablePtrTrack.CurrPtr->State == VAR_ADDED)) {\r
667 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr, AuthFormat);\r
668 continue;\r
669 }\r
670 }\r
671\r
672 //\r
673 // Don't return NV variable when HOB overrides it\r
674 //\r
675 if ((VariableStoreList[VariableStoreTypeHob] != NULL) && (VariableStoreList[VariableStoreTypeNv] != NULL) &&\r
676 (Variable.StartPtr == GetStartPointer (VariableStoreList[VariableStoreTypeNv]))\r
677 )\r
678 {\r
679 VariableInHob.StartPtr = GetStartPointer (VariableStoreList[VariableStoreTypeHob]);\r
680 VariableInHob.EndPtr = GetEndPointer (VariableStoreList[VariableStoreTypeHob]);\r
681 Status = FindVariableEx (\r
682 GetVariableNamePtr (Variable.CurrPtr, AuthFormat),\r
683 GetVendorGuidPtr (Variable.CurrPtr, AuthFormat),\r
684 FALSE,\r
685 &VariableInHob,\r
686 AuthFormat\r
687 );\r
688 if (!EFI_ERROR (Status)) {\r
689 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr, AuthFormat);\r
690 continue;\r
691 }\r
692 }\r
693\r
694 *VariablePtr = Variable.CurrPtr;\r
695 Status = EFI_SUCCESS;\r
696 goto Done;\r
697 }\r
698 }\r
699\r
700 Variable.CurrPtr = GetNextVariablePtr (Variable.CurrPtr, AuthFormat);\r
701 }\r
702\r
703Done:\r
704 return Status;\r
705}\r
706\r
707/**\r
708 Routine used to track statistical information about variable usage.\r
709 The data is stored in the EFI system table so it can be accessed later.\r
710 VariableInfo.efi can dump out the table. Only Boot Services variable\r
711 accesses are tracked by this code. The PcdVariableCollectStatistics\r
712 build flag controls if this feature is enabled.\r
713\r
714 A read that hits in the cache will have Read and Cache true for\r
715 the transaction. Data is allocated by this routine, but never\r
716 freed.\r
717\r
718 @param[in] VariableName Name of the Variable to track.\r
719 @param[in] VendorGuid Guid of the Variable to track.\r
720 @param[in] Volatile TRUE if volatile FALSE if non-volatile.\r
721 @param[in] Read TRUE if GetVariable() was called.\r
722 @param[in] Write TRUE if SetVariable() was called.\r
723 @param[in] Delete TRUE if deleted via SetVariable().\r
724 @param[in] Cache TRUE for a cache hit.\r
725 @param[in,out] VariableInfo Pointer to a pointer of VARIABLE_INFO_ENTRY structures.\r
726\r
727**/\r
728VOID\r
729UpdateVariableInfo (\r
730 IN CHAR16 *VariableName,\r
731 IN EFI_GUID *VendorGuid,\r
732 IN BOOLEAN Volatile,\r
733 IN BOOLEAN Read,\r
734 IN BOOLEAN Write,\r
735 IN BOOLEAN Delete,\r
736 IN BOOLEAN Cache,\r
737 IN OUT VARIABLE_INFO_ENTRY **VariableInfo\r
738 )\r
739{\r
740 VARIABLE_INFO_ENTRY *Entry;\r
741\r
742 if (FeaturePcdGet (PcdVariableCollectStatistics)) {\r
743 if ((VariableName == NULL) || (VendorGuid == NULL) || (VariableInfo == NULL)) {\r
744 return;\r
745 }\r
746\r
747 if (AtRuntime ()) {\r
748 // Don't collect statistics at runtime.\r
749 return;\r
750 }\r
751\r
752 if (*VariableInfo == NULL) {\r
753 //\r
754 // On the first call allocate a entry and place a pointer to it in\r
755 // the EFI System Table.\r
756 //\r
757 *VariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
758 ASSERT (*VariableInfo != NULL);\r
759\r
760 CopyGuid (&(*VariableInfo)->VendorGuid, VendorGuid);\r
761 (*VariableInfo)->Name = AllocateZeroPool (StrSize (VariableName));\r
762 ASSERT ((*VariableInfo)->Name != NULL);\r
763 StrCpyS ((*VariableInfo)->Name, StrSize (VariableName)/sizeof (CHAR16), VariableName);\r
764 (*VariableInfo)->Volatile = Volatile;\r
765 }\r
766\r
767 for (Entry = (*VariableInfo); Entry != NULL; Entry = Entry->Next) {\r
768 if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {\r
769 if (StrCmp (VariableName, Entry->Name) == 0) {\r
770 if (Read) {\r
771 Entry->ReadCount++;\r
772 }\r
773\r
774 if (Write) {\r
775 Entry->WriteCount++;\r
776 }\r
777\r
778 if (Delete) {\r
779 Entry->DeleteCount++;\r
780 }\r
781\r
782 if (Cache) {\r
783 Entry->CacheCount++;\r
784 }\r
785\r
786 return;\r
787 }\r
788 }\r
789\r
790 if (Entry->Next == NULL) {\r
791 //\r
792 // If the entry is not in the table add it.\r
793 // Next iteration of the loop will fill in the data.\r
794 //\r
795 Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));\r
796 ASSERT (Entry->Next != NULL);\r
797\r
798 CopyGuid (&Entry->Next->VendorGuid, VendorGuid);\r
799 Entry->Next->Name = AllocateZeroPool (StrSize (VariableName));\r
800 ASSERT (Entry->Next->Name != NULL);\r
801 StrCpyS (Entry->Next->Name, StrSize (VariableName)/sizeof (CHAR16), VariableName);\r
802 Entry->Next->Volatile = Volatile;\r
803 }\r
804 }\r
805 }\r
806}\r