3 This is a simple fault tolerant write driver that is intended to use in the SMM environment.
5 This boot service protocol only provides fault tolerant write capability for
6 block devices. The protocol has internal non-volatile intermediate storage
7 of the data and private information. It should be able to recover
8 automatically from a critical fault, such as power failure.
10 The implementation uses an FTW (Fault Tolerant Write) Work Space.
11 This work space is a memory copy of the work space on the Working Block,
12 the size of the work space is the FTW_WORK_SPACE_SIZE bytes.
14 The work space stores each write record as EFI_FTW_RECORD structure.
15 The spare block stores the write buffer before write to the target block.
17 The write record has three states to specify the different phase of write operation.
18 1) WRITE_ALLOCATED is that the record is allocated in write space.
19 The information of write operation is stored in write record structure.
20 2) SPARE_COMPLETED is that the data from write buffer is writed into the spare block as the backup.
21 3) WRITE_COMPLETED is that the data is copied from the spare block to the target block.
23 This driver operates the data as the whole size of spare block.
24 It first read the SpareAreaLength data from the target block into the spare memory buffer.
25 Then copy the write buffer data into the spare memory buffer.
26 Then write the spare memory buffer into the spare block.
27 Final copy the data from the spare block to the target block.
29 To make this drive work well, the following conditions must be satisfied:
30 1. The write NumBytes data must be fit within Spare area.
31 Offset + NumBytes <= SpareAreaLength
32 2. The whole flash range has the same block size.
33 3. Working block is an area which contains working space in its last block and has the same size as spare block.
34 4. Working Block area must be in the single one Firmware Volume Block range which FVB protocol is produced on.
35 5. Spare area must be in the single one Firmware Volume Block range which FVB protocol is produced on.
36 6. Any write data area (SpareAreaLength Area) which the data will be written into must be
37 in the single one Firmware Volume Block range which FVB protocol is produced on.
38 7. If write data area (such as Variable range) is enlarged, the spare area range must be enlarged.
39 The spare area must be enough large to store the write data before write them into the target range.
40 If one of them is not satisfied, FtwWrite may fail.
41 Usually, Spare area only takes one block. That's SpareAreaLength = BlockSize, NumberOfSpareBlock = 1.
43 Caution: This module requires additional review when modified.
44 This driver need to make sure the CommBuffer is not in the SMRAM range.
46 Copyright (c) 2010 - 2013, Intel Corporation. All rights reserved.<BR>
47 This program and the accompanying materials
48 are licensed and made available under the terms and conditions of the BSD License
49 which accompanies this distribution. The full text of the license may be found at
50 http://opensource.org/licenses/bsd-license.php
52 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
53 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
58 #include <Library/SmmServicesTableLib.h>
59 #include <Protocol/SmmSwapAddressRange.h>
60 #include "FaultTolerantWrite.h"
61 #include "FaultTolerantWriteSmmCommon.h"
62 #include <Protocol/SmmAccess2.h>
63 #include <Protocol/SmmEndOfDxe.h>
65 EFI_EVENT mFvbRegistration
= NULL
;
66 EFI_FTW_DEVICE
*mFtwDevice
= NULL
;
67 EFI_SMRAM_DESCRIPTOR
*mSmramRanges
;
68 UINTN mSmramRangeCount
;
71 /// The flag to indicate whether the platform has left the DXE phase of execution.
73 BOOLEAN mEndOfDxe
= FALSE
;
76 This function check if the address is in SMRAM.
78 @param Buffer the buffer address to be checked.
79 @param Length the buffer length to be checked.
81 @retval TRUE this address is in SMRAM.
82 @retval FALSE this address is NOT in SMRAM.
85 InternalIsAddressInSmram (
86 IN EFI_PHYSICAL_ADDRESS Buffer
,
92 for (Index
= 0; Index
< mSmramRangeCount
; Index
++) {
93 if (((Buffer
>= mSmramRanges
[Index
].CpuStart
) && (Buffer
< mSmramRanges
[Index
].CpuStart
+ mSmramRanges
[Index
].PhysicalSize
)) ||
94 ((mSmramRanges
[Index
].CpuStart
>= Buffer
) && (mSmramRanges
[Index
].CpuStart
< Buffer
+ Length
))) {
103 This function check if the address refered by Buffer and Length is valid.
105 @param Buffer the buffer address to be checked.
106 @param Length the buffer length to be checked.
108 @retval TRUE this address is valid.
109 @retval FALSE this address is NOT valid.
112 InternalIsAddressValid (
117 if (Buffer
> (MAX_ADDRESS
- Length
)) {
123 if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS
)Buffer
, (UINT64
)Length
)) {
130 Retrive the SMM FVB protocol interface by HANDLE.
132 @param[in] FvBlockHandle The handle of SMM FVB protocol that provides services for
133 reading, writing, and erasing the target block.
134 @param[out] FvBlock The interface of SMM FVB protocol
136 @retval EFI_SUCCESS The interface information for the specified protocol was returned.
137 @retval EFI_UNSUPPORTED The device does not support the SMM FVB protocol.
138 @retval EFI_INVALID_PARAMETER FvBlockHandle is not a valid EFI_HANDLE or FvBlock is NULL.
143 IN EFI_HANDLE FvBlockHandle
,
144 OUT EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL
**FvBlock
148 // To get the SMM FVB protocol interface on the handle
150 return gSmst
->SmmHandleProtocol (
152 &gEfiSmmFirmwareVolumeBlockProtocolGuid
,
158 Retrive the SMM Swap Address Range protocol interface.
160 @param[out] SarProtocol The interface of SMM SAR protocol
162 @retval EFI_SUCCESS The SMM SAR protocol instance was found and returned in SarProtocol.
163 @retval EFI_NOT_FOUND The SMM SAR protocol instance was not found.
164 @retval EFI_INVALID_PARAMETER SarProtocol is NULL.
169 OUT VOID
**SarProtocol
175 // Locate Smm Swap Address Range protocol
177 Status
= gSmst
->SmmLocateProtocol (
178 &gEfiSmmSwapAddressRangeProtocolGuid
,
186 Function returns an array of handles that support the SMM FVB protocol
187 in a buffer allocated from pool.
189 @param[out] NumberHandles The number of handles returned in Buffer.
190 @param[out] Buffer A pointer to the buffer to return the requested
191 array of handles that support SMM FVB protocol.
193 @retval EFI_SUCCESS The array of handles was returned in Buffer, and the number of
194 handles in Buffer was returned in NumberHandles.
195 @retval EFI_NOT_FOUND No SMM FVB handle was found.
196 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the matching results.
197 @retval EFI_INVALID_PARAMETER NumberHandles is NULL or Buffer is NULL.
201 GetFvbCountAndBuffer (
202 OUT UINTN
*NumberHandles
,
203 OUT EFI_HANDLE
**Buffer
209 if ((NumberHandles
== NULL
) || (Buffer
== NULL
)) {
210 return EFI_INVALID_PARAMETER
;
216 Status
= gSmst
->SmmLocateHandle (
218 &gEfiSmmFirmwareVolumeBlockProtocolGuid
,
223 if (EFI_ERROR(Status
) && Status
!= EFI_BUFFER_TOO_SMALL
) {
224 return EFI_NOT_FOUND
;
227 *Buffer
= AllocatePool (BufferSize
);
228 if (*Buffer
== NULL
) {
229 return EFI_OUT_OF_RESOURCES
;
232 Status
= gSmst
->SmmLocateHandle (
234 &gEfiSmmFirmwareVolumeBlockProtocolGuid
,
240 *NumberHandles
= BufferSize
/ sizeof(EFI_HANDLE
);
241 if (EFI_ERROR(Status
)) {
252 Get the handle of the SMM FVB protocol by the FVB base address and attributes.
254 @param[in] Address The base address of SMM FVB protocol.
255 @param[in] Attributes The attributes of the SMM FVB protocol.
256 @param[out] SmmFvbHandle The handle of the SMM FVB protocol.
258 @retval EFI_SUCCESS The FVB handle is found.
259 @retval EFI_ABORTED The FVB protocol is not found.
263 GetFvbByAddressAndAttribute (
264 IN EFI_PHYSICAL_ADDRESS Address
,
265 IN EFI_FVB_ATTRIBUTES_2 Attributes
,
266 OUT EFI_HANDLE
*SmmFvbHandle
270 EFI_HANDLE
*HandleBuffer
;
273 EFI_PHYSICAL_ADDRESS FvbBaseAddress
;
274 EFI_FVB_ATTRIBUTES_2 FvbAttributes
;
275 EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL
*Fvb
;
278 // Locate all handles of SMM Fvb protocol.
280 Status
= GetFvbCountAndBuffer (&HandleCount
, &HandleBuffer
);
281 if (EFI_ERROR (Status
)) {
286 // Find the proper SMM Fvb handle by the address and attributes.
288 for (Index
= 0; Index
< HandleCount
; Index
++) {
289 Status
= FtwGetFvbByHandle (HandleBuffer
[Index
], &Fvb
);
290 if (EFI_ERROR (Status
)) {
294 // Compare the address.
296 Status
= Fvb
->GetPhysicalAddress (Fvb
, &FvbBaseAddress
);
297 if (EFI_ERROR (Status
)) {
300 if (Address
!= FvbBaseAddress
) {
305 // Compare the attribute.
307 Status
= Fvb
->GetAttributes (Fvb
, &FvbAttributes
);
308 if (EFI_ERROR (Status
)) {
311 if (Attributes
!= FvbAttributes
) {
316 // Found the proper FVB handle.
318 *SmmFvbHandle
= HandleBuffer
[Index
];
319 FreePool (HandleBuffer
);
323 FreePool (HandleBuffer
);
328 Communication service SMI Handler entry.
330 This SMI handler provides services for the fault tolerant write wrapper driver.
332 Caution: This function requires additional review when modified.
333 This driver need to make sure the CommBuffer is not in the SMRAM range.
334 Also in FTW_FUNCTION_GET_LAST_WRITE case, check SmmFtwGetLastWriteHeader->Data +
335 SmmFtwGetLastWriteHeader->PrivateDataSize within communication buffer.
337 @param[in] DispatchHandle The unique handle assigned to this handler by SmiHandlerRegister().
338 @param[in] RegisterContext Points to an optional handler context which was specified when the
339 handler was registered.
340 @param[in, out] CommBuffer A pointer to a collection of data in memory that will be conveyed
341 from a non-SMM environment into an SMM environment.
342 @param[in, out] CommBufferSize The size of the CommBuffer.
344 @retval EFI_SUCCESS The interrupt was handled and quiesced. No other handlers
345 should still be called.
346 @retval EFI_WARN_INTERRUPT_SOURCE_QUIESCED The interrupt has been quiesced but other handlers should
348 @retval EFI_WARN_INTERRUPT_SOURCE_PENDING The interrupt is still pending and other handlers should still
350 @retval EFI_INTERRUPT_PENDING The interrupt could not be quiesced.
355 SmmFaultTolerantWriteHandler (
356 IN EFI_HANDLE DispatchHandle
,
357 IN CONST VOID
*RegisterContext
,
358 IN OUT VOID
*CommBuffer
,
359 IN OUT UINTN
*CommBufferSize
363 SMM_FTW_COMMUNICATE_FUNCTION_HEADER
*SmmFtwFunctionHeader
;
364 SMM_FTW_GET_MAX_BLOCK_SIZE_HEADER
*SmmGetMaxBlockSizeHeader
;
365 SMM_FTW_ALLOCATE_HEADER
*SmmFtwAllocateHeader
;
366 SMM_FTW_WRITE_HEADER
*SmmFtwWriteHeader
;
367 SMM_FTW_RESTART_HEADER
*SmmFtwRestartHeader
;
368 SMM_FTW_GET_LAST_WRITE_HEADER
*SmmFtwGetLastWriteHeader
;
370 EFI_HANDLE SmmFvbHandle
;
372 UINTN CommBufferPayloadSize
;
373 UINTN PrivateDataSize
;
375 UINTN TempCommBufferSize
;
378 // If input is invalid, stop processing this SMI
380 if (CommBuffer
== NULL
|| CommBufferSize
== NULL
) {
384 TempCommBufferSize
= *CommBufferSize
;
386 if (TempCommBufferSize
< SMM_FTW_COMMUNICATE_HEADER_SIZE
) {
387 DEBUG ((EFI_D_ERROR
, "SmmFtwHandler: SMM communication buffer size invalid!\n"));
390 CommBufferPayloadSize
= TempCommBufferSize
- SMM_FTW_COMMUNICATE_HEADER_SIZE
;
392 if (!InternalIsAddressValid ((UINTN
)CommBuffer
, TempCommBufferSize
)) {
393 DEBUG ((EFI_D_ERROR
, "SmmFtwHandler: SMM communication buffer in SMRAM or overflow!\n"));
397 SmmFtwFunctionHeader
= (SMM_FTW_COMMUNICATE_FUNCTION_HEADER
*)CommBuffer
;
401 // It will be not safe to expose the operations after End Of Dxe.
403 DEBUG ((EFI_D_ERROR
, "SmmFtwHandler: Not safe to do the operation: %x after End Of Dxe, so access denied!\n", SmmFtwFunctionHeader
->Function
));
404 SmmFtwFunctionHeader
->ReturnStatus
= EFI_ACCESS_DENIED
;
408 switch (SmmFtwFunctionHeader
->Function
) {
409 case FTW_FUNCTION_GET_MAX_BLOCK_SIZE
:
410 if (CommBufferPayloadSize
< sizeof (SMM_FTW_GET_MAX_BLOCK_SIZE_HEADER
)) {
411 DEBUG ((EFI_D_ERROR
, "GetMaxBlockSize: SMM communication buffer size invalid!\n"));
414 SmmGetMaxBlockSizeHeader
= (SMM_FTW_GET_MAX_BLOCK_SIZE_HEADER
*) SmmFtwFunctionHeader
->Data
;
416 Status
= FtwGetMaxBlockSize (
417 &mFtwDevice
->FtwInstance
,
418 &SmmGetMaxBlockSizeHeader
->BlockSize
422 case FTW_FUNCTION_ALLOCATE
:
423 if (CommBufferPayloadSize
< sizeof (SMM_FTW_ALLOCATE_HEADER
)) {
424 DEBUG ((EFI_D_ERROR
, "Allocate: SMM communication buffer size invalid!\n"));
427 SmmFtwAllocateHeader
= (SMM_FTW_ALLOCATE_HEADER
*) SmmFtwFunctionHeader
->Data
;
428 Status
= FtwAllocate (
429 &mFtwDevice
->FtwInstance
,
430 &SmmFtwAllocateHeader
->CallerId
,
431 SmmFtwAllocateHeader
->PrivateDataSize
,
432 SmmFtwAllocateHeader
->NumberOfWrites
436 case FTW_FUNCTION_WRITE
:
437 if (CommBufferPayloadSize
< OFFSET_OF (SMM_FTW_WRITE_HEADER
, Data
)) {
438 DEBUG ((EFI_D_ERROR
, "Write: SMM communication buffer size invalid!\n"));
441 SmmFtwWriteHeader
= (SMM_FTW_WRITE_HEADER
*) SmmFtwFunctionHeader
->Data
;
442 Length
= SmmFtwWriteHeader
->Length
;
443 PrivateDataSize
= SmmFtwWriteHeader
->PrivateDataSize
;
444 if (((UINTN
)(~0) - Length
< OFFSET_OF (SMM_FTW_WRITE_HEADER
, Data
)) ||
445 ((UINTN
)(~0) - PrivateDataSize
< OFFSET_OF (SMM_FTW_WRITE_HEADER
, Data
) + Length
)) {
447 // Prevent InfoSize overflow
449 Status
= EFI_ACCESS_DENIED
;
452 InfoSize
= OFFSET_OF (SMM_FTW_WRITE_HEADER
, Data
) + Length
+ PrivateDataSize
;
455 // SMRAM range check already covered before
457 if (InfoSize
> CommBufferPayloadSize
) {
458 DEBUG ((EFI_D_ERROR
, "Write: Data size exceed communication buffer size limit!\n"));
459 Status
= EFI_ACCESS_DENIED
;
463 if (PrivateDataSize
== 0) {
466 PrivateData
= (VOID
*)&SmmFtwWriteHeader
->Data
[Length
];
468 Status
= GetFvbByAddressAndAttribute (
469 SmmFtwWriteHeader
->FvbBaseAddress
,
470 SmmFtwWriteHeader
->FvbAttributes
,
473 if (!EFI_ERROR (Status
)) {
475 &mFtwDevice
->FtwInstance
,
476 SmmFtwWriteHeader
->Lba
,
477 SmmFtwWriteHeader
->Offset
,
481 SmmFtwWriteHeader
->Data
486 case FTW_FUNCTION_RESTART
:
487 if (CommBufferPayloadSize
< sizeof (SMM_FTW_RESTART_HEADER
)) {
488 DEBUG ((EFI_D_ERROR
, "Restart: SMM communication buffer size invalid!\n"));
491 SmmFtwRestartHeader
= (SMM_FTW_RESTART_HEADER
*) SmmFtwFunctionHeader
->Data
;
492 Status
= GetFvbByAddressAndAttribute (
493 SmmFtwRestartHeader
->FvbBaseAddress
,
494 SmmFtwRestartHeader
->FvbAttributes
,
497 if (!EFI_ERROR (Status
)) {
498 Status
= FtwRestart (&mFtwDevice
->FtwInstance
, SmmFvbHandle
);
502 case FTW_FUNCTION_ABORT
:
503 Status
= FtwAbort (&mFtwDevice
->FtwInstance
);
506 case FTW_FUNCTION_GET_LAST_WRITE
:
507 if (CommBufferPayloadSize
< OFFSET_OF (SMM_FTW_GET_LAST_WRITE_HEADER
, Data
)) {
508 DEBUG ((EFI_D_ERROR
, "GetLastWrite: SMM communication buffer size invalid!\n"));
511 SmmFtwGetLastWriteHeader
= (SMM_FTW_GET_LAST_WRITE_HEADER
*) SmmFtwFunctionHeader
->Data
;
512 PrivateDataSize
= SmmFtwGetLastWriteHeader
->PrivateDataSize
;
513 if ((UINTN
)(~0) - PrivateDataSize
< OFFSET_OF (SMM_FTW_GET_LAST_WRITE_HEADER
, Data
)){
515 // Prevent InfoSize overflow
517 Status
= EFI_ACCESS_DENIED
;
520 InfoSize
= OFFSET_OF (SMM_FTW_GET_LAST_WRITE_HEADER
, Data
) + PrivateDataSize
;
523 // SMRAM range check already covered before
525 if (InfoSize
> CommBufferPayloadSize
) {
526 DEBUG ((EFI_D_ERROR
, "Data size exceed communication buffer size limit!\n"));
527 Status
= EFI_ACCESS_DENIED
;
531 Status
= FtwGetLastWrite (
532 &mFtwDevice
->FtwInstance
,
533 &SmmFtwGetLastWriteHeader
->CallerId
,
534 &SmmFtwGetLastWriteHeader
->Lba
,
535 &SmmFtwGetLastWriteHeader
->Offset
,
536 &SmmFtwGetLastWriteHeader
->Length
,
538 (VOID
*)SmmFtwGetLastWriteHeader
->Data
,
539 &SmmFtwGetLastWriteHeader
->Complete
541 SmmFtwGetLastWriteHeader
->PrivateDataSize
= PrivateDataSize
;
545 Status
= EFI_UNSUPPORTED
;
548 SmmFtwFunctionHeader
->ReturnStatus
= Status
;
555 SMM Firmware Volume Block Protocol notification event handler.
557 @param[in] Protocol Points to the protocol's unique identifier
558 @param[in] Interface Points to the interface instance
559 @param[in] Handle The handle on which the interface was installed
561 @retval EFI_SUCCESS SmmEventCallback runs successfully
566 FvbNotificationEvent (
567 IN CONST EFI_GUID
*Protocol
,
573 EFI_SMM_FAULT_TOLERANT_WRITE_PROTOCOL
*FtwProtocol
;
574 EFI_HANDLE SmmFtwHandle
;
575 EFI_HANDLE FtwHandle
;
578 // Just return to avoid install SMM FaultTolerantWriteProtocol again
579 // if SMM Fault Tolerant Write protocol had been installed.
581 Status
= gSmst
->SmmLocateProtocol (
582 &gEfiSmmFaultTolerantWriteProtocolGuid
,
584 (VOID
**) &FtwProtocol
586 if (!EFI_ERROR (Status
)) {
591 // Found proper FVB protocol and initialize FtwDevice for protocol installation
593 Status
= InitFtwProtocol (mFtwDevice
);
594 if (EFI_ERROR(Status
)) {
599 // Install protocol interface
601 Status
= gSmst
->SmmInstallProtocolInterface (
603 &gEfiSmmFaultTolerantWriteProtocolGuid
,
604 EFI_NATIVE_INTERFACE
,
605 &mFtwDevice
->FtwInstance
607 ASSERT_EFI_ERROR (Status
);
610 /// Register SMM FTW SMI handler
612 Status
= gSmst
->SmiHandlerRegister (SmmFaultTolerantWriteHandler
, &gEfiSmmFaultTolerantWriteProtocolGuid
, &SmmFtwHandle
);
613 ASSERT_EFI_ERROR (Status
);
616 // Notify the Ftw wrapper driver SMM Ftw is ready
619 Status
= gBS
->InstallProtocolInterface (
621 &gEfiSmmFaultTolerantWriteProtocolGuid
,
622 EFI_NATIVE_INTERFACE
,
625 ASSERT_EFI_ERROR (Status
);
631 SMM END_OF_DXE protocol notification event handler.
633 @param Protocol Points to the protocol's unique identifier
634 @param Interface Points to the interface instance
635 @param Handle The handle on which the interface was installed
637 @retval EFI_SUCCESS SmmEndOfDxeCallback runs successfully
642 SmmEndOfDxeCallback (
643 IN CONST EFI_GUID
*Protocol
,
653 This function is the entry point of the Fault Tolerant Write driver.
655 @param[in] ImageHandle A handle for the image that is initializing this driver
656 @param[in] SystemTable A pointer to the EFI system table
658 @retval EFI_SUCCESS The initialization finished successfully.
659 @retval EFI_OUT_OF_RESOURCES Allocate memory error
660 @retval EFI_INVALID_PARAMETER Workspace or Spare block does not exist
665 SmmFaultTolerantWriteInitialize (
666 IN EFI_HANDLE ImageHandle
,
667 IN EFI_SYSTEM_TABLE
*SystemTable
671 EFI_SMM_ACCESS2_PROTOCOL
*SmmAccess
;
673 VOID
*SmmEndOfDxeRegistration
;
676 // Allocate private data structure for SMM FTW protocol and do some initialization
678 Status
= InitFtwDevice (&mFtwDevice
);
679 if (EFI_ERROR(Status
)) {
684 // Get SMRAM information
686 Status
= gBS
->LocateProtocol (&gEfiSmmAccess2ProtocolGuid
, NULL
, (VOID
**)&SmmAccess
);
687 ASSERT_EFI_ERROR (Status
);
690 Status
= SmmAccess
->GetCapabilities (SmmAccess
, &Size
, NULL
);
691 ASSERT (Status
== EFI_BUFFER_TOO_SMALL
);
693 Status
= gSmst
->SmmAllocatePool (
694 EfiRuntimeServicesData
,
696 (VOID
**)&mSmramRanges
698 ASSERT_EFI_ERROR (Status
);
700 Status
= SmmAccess
->GetCapabilities (SmmAccess
, &Size
, mSmramRanges
);
701 ASSERT_EFI_ERROR (Status
);
703 mSmramRangeCount
= Size
/ sizeof (EFI_SMRAM_DESCRIPTOR
);
706 // Register EFI_SMM_END_OF_DXE_PROTOCOL_GUID notify function.
708 Status
= gSmst
->SmmRegisterProtocolNotify (
709 &gEfiSmmEndOfDxeProtocolGuid
,
711 &SmmEndOfDxeRegistration
713 ASSERT_EFI_ERROR (Status
);
716 // Register FvbNotificationEvent () notify function.
718 Status
= gSmst
->SmmRegisterProtocolNotify (
719 &gEfiSmmFirmwareVolumeBlockProtocolGuid
,
720 FvbNotificationEvent
,
723 ASSERT_EFI_ERROR (Status
);
725 FvbNotificationEvent (NULL
, NULL
, NULL
);