]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.c
Update the copyright notice format
[mirror_edk2.git] / OvmfPkg / EmuVariableFvbRuntimeDxe / Fvb.c
1 /** @file
2 Firmware Block Services to support emulating non-volatile variables
3 by pretending that a memory buffer is storage for the NV variables.
4
5 Copyright (c) 2006 - 2010, Intel Corporation. All rights reserved.<BR>
6 This program and the accompanying materials
7 are licensed and made available under the terms and conditions of the BSD License
8 which accompanies this distribution. The full text of the license may be found at
9 http://opensource.org/licenses/bsd-license.php
10
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13
14 **/
15
16 #include "PiDxe.h"
17 #include <Guid/EventGroup.h>
18 #include <Guid/SystemNvDataGuid.h>
19 #include <Guid/VariableFormat.h>
20
21 #include <Protocol/FirmwareVolumeBlock.h>
22 #include <Protocol/DevicePath.h>
23
24 #include <Library/UefiLib.h>
25 #include <Library/UefiDriverEntryPoint.h>
26 #include <Library/BaseLib.h>
27 #include <Library/UefiRuntimeLib.h>
28 #include <Library/DebugLib.h>
29 #include <Library/BaseMemoryLib.h>
30 #include <Library/MemoryAllocationLib.h>
31 #include <Library/UefiBootServicesTableLib.h>
32 #include <Library/DevicePathLib.h>
33 #include <Library/PcdLib.h>
34 #include <Library/PlatformFvbLib.h>
35 #include "Fvb.h"
36
37 //
38 // Virtual Address Change Event
39 //
40 // This is needed for runtime variable access.
41 //
42 EFI_EVENT mEmuVarsFvbAddrChangeEvent = NULL;
43
44 //
45 // This is the single instance supported by this driver. It
46 // supports the FVB and Device Path protocols.
47 //
48 EFI_FW_VOL_BLOCK_DEVICE mEmuVarsFvb = {
49 FVB_DEVICE_SIGNATURE,
50 { // DevicePath
51 {
52 {
53 HARDWARE_DEVICE_PATH,
54 HW_MEMMAP_DP,
55 {
56 sizeof (MEMMAP_DEVICE_PATH),
57 0
58 }
59 },
60 EfiMemoryMappedIO,
61 0,
62 0,
63 },
64 {
65 END_DEVICE_PATH_TYPE,
66 END_ENTIRE_DEVICE_PATH_SUBTYPE,
67 {
68 sizeof (EFI_DEVICE_PATH_PROTOCOL),
69 0
70 }
71 }
72 },
73 NULL, // BufferPtr
74 FixedPcdGet32 (PcdFlashNvStorageFtwSpareSize), // BlockSize
75 2 * FixedPcdGet32 (PcdFlashNvStorageFtwSpareSize), // Size
76 { // FwVolBlockInstance
77 FvbProtocolGetAttributes,
78 FvbProtocolSetAttributes,
79 FvbProtocolGetPhysicalAddress,
80 FvbProtocolGetBlockSize,
81 FvbProtocolRead,
82 FvbProtocolWrite,
83 FvbProtocolEraseBlocks,
84 NULL
85 },
86 };
87
88
89 /**
90 Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.
91
92 This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
93 It converts pointer to new virtual address.
94
95 @param Event Event whose notification function is being invoked.
96 @param Context Pointer to the notification function's context.
97
98 **/
99 VOID
100 EFIAPI
101 FvbVirtualAddressChangeEvent (
102 IN EFI_EVENT Event,
103 IN VOID *Context
104 )
105 {
106 EfiConvertPointer (0x0, &mEmuVarsFvb.BufferPtr);
107 }
108
109
110 //
111 // FVB protocol APIs
112 //
113
114 /**
115 The GetPhysicalAddress() function retrieves the base address of
116 a memory-mapped firmware volume. This function should be called
117 only for memory-mapped firmware volumes.
118
119 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
120
121 @param Address Pointer to a caller-allocated
122 EFI_PHYSICAL_ADDRESS that, on successful
123 return from GetPhysicalAddress(), contains the
124 base address of the firmware volume.
125
126 @retval EFI_SUCCESS The firmware volume base address is returned.
127
128 @retval EFI_NOT_SUPPORTED The firmware volume is not memory mapped.
129
130 **/
131 EFI_STATUS
132 EFIAPI
133 FvbProtocolGetPhysicalAddress (
134 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
135 OUT EFI_PHYSICAL_ADDRESS *Address
136 )
137 {
138 EFI_FW_VOL_BLOCK_DEVICE *FvbDevice;
139
140 FvbDevice = FVB_DEVICE_FROM_THIS (This);
141
142 *Address = (EFI_PHYSICAL_ADDRESS)(UINTN) FvbDevice->BufferPtr;
143
144 return EFI_SUCCESS;
145 }
146
147
148 /**
149 The GetBlockSize() function retrieves the size of the requested
150 block. It also returns the number of additional blocks with
151 the identical size. The GetBlockSize() function is used to
152 retrieve the block map (see EFI_FIRMWARE_VOLUME_HEADER).
153
154
155 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
156
157 @param Lba Indicates the block for which to return the size.
158
159 @param BlockSize Pointer to a caller-allocated UINTN in which
160 the size of the block is returned.
161
162 @param NumberOfBlocks Pointer to a caller-allocated UINTN in
163 which the number of consecutive blocks,
164 starting with Lba, is returned. All
165 blocks in this range have a size of
166 BlockSize.
167
168
169 @retval EFI_SUCCESS The firmware volume base address is returned.
170
171 @retval EFI_INVALID_PARAMETER The requested LBA is out of range.
172
173 **/
174 EFI_STATUS
175 EFIAPI
176 FvbProtocolGetBlockSize (
177 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
178 IN EFI_LBA Lba,
179 OUT UINTN *BlockSize,
180 OUT UINTN *NumberOfBlocks
181 )
182 {
183 EFI_FW_VOL_BLOCK_DEVICE *FvbDevice;
184
185 if (Lba > 1) {
186 return EFI_INVALID_PARAMETER;
187 }
188
189 FvbDevice = FVB_DEVICE_FROM_THIS (This);
190
191 *BlockSize = FvbDevice->BlockSize;
192 *NumberOfBlocks = (UINTN) (2 - (UINTN) Lba);
193
194 return EFI_SUCCESS;
195 }
196
197
198 /**
199 The GetAttributes() function retrieves the attributes and
200 current settings of the block. Status Codes Returned
201
202 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
203
204 @param Attributes Pointer to EFI_FVB_ATTRIBUTES_2 in which the
205 attributes and current settings are
206 returned. Type EFI_FVB_ATTRIBUTES_2 is defined
207 in EFI_FIRMWARE_VOLUME_HEADER.
208
209 @retval EFI_SUCCESS The firmware volume attributes were
210 returned.
211
212 **/
213 EFI_STATUS
214 EFIAPI
215 FvbProtocolGetAttributes (
216 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
217 OUT EFI_FVB_ATTRIBUTES_2 *Attributes
218 )
219 {
220 *Attributes =
221 (EFI_FVB_ATTRIBUTES_2) (
222 EFI_FVB2_READ_ENABLED_CAP |
223 EFI_FVB2_READ_STATUS |
224 EFI_FVB2_WRITE_ENABLED_CAP |
225 EFI_FVB2_WRITE_STATUS |
226 EFI_FVB2_ERASE_POLARITY
227 );
228
229 return EFI_SUCCESS;
230 }
231
232
233 /**
234 The SetAttributes() function sets configurable firmware volume
235 attributes and returns the new settings of the firmware volume.
236
237 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
238
239 @param Attributes On input, Attributes is a pointer to
240 EFI_FVB_ATTRIBUTES_2 that contains the
241 desired firmware volume settings. On
242 successful return, it contains the new
243 settings of the firmware volume. Type
244 EFI_FVB_ATTRIBUTES_2 is defined in
245 EFI_FIRMWARE_VOLUME_HEADER.
246
247 @retval EFI_SUCCESS The firmware volume attributes were returned.
248
249 @retval EFI_INVALID_PARAMETER The attributes requested are in
250 conflict with the capabilities
251 as declared in the firmware
252 volume header.
253
254 **/
255 EFI_STATUS
256 EFIAPI
257 FvbProtocolSetAttributes (
258 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
259 IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
260 )
261 {
262 return EFI_ACCESS_DENIED;
263 }
264
265
266 /**
267 Erases and initializes a firmware volume block.
268
269 The EraseBlocks() function erases one or more blocks as denoted
270 by the variable argument list. The entire parameter list of
271 blocks must be verified before erasing any blocks. If a block is
272 requested that does not exist within the associated firmware
273 volume (it has a larger index than the last block of the
274 firmware volume), the EraseBlocks() function must return the
275 status code EFI_INVALID_PARAMETER without modifying the contents
276 of the firmware volume. Implementations should be mindful that
277 the firmware volume might be in the WriteDisabled state. If it
278 is in this state, the EraseBlocks() function must return the
279 status code EFI_ACCESS_DENIED without modifying the contents of
280 the firmware volume. All calls to EraseBlocks() must be fully
281 flushed to the hardware before the EraseBlocks() service
282 returns.
283
284 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL
285 instance.
286
287 @param ... The variable argument list is a list of tuples.
288 Each tuple describes a range of LBAs to erase
289 and consists of the following:
290 - An EFI_LBA that indicates the starting LBA
291 - A UINTN that indicates the number of blocks to
292 erase
293
294 The list is terminated with an
295 EFI_LBA_LIST_TERMINATOR. For example, the
296 following indicates that two ranges of blocks
297 (5-7 and 10-11) are to be erased: EraseBlocks
298 (This, 5, 3, 10, 2, EFI_LBA_LIST_TERMINATOR);
299
300 @retval EFI_SUCCESS The erase request was successfully
301 completed.
302
303 @retval EFI_ACCESS_DENIED The firmware volume is in the
304 WriteDisabled state.
305 @retval EFI_DEVICE_ERROR The block device is not functioning
306 correctly and could not be written.
307 The firmware device may have been
308 partially erased.
309 @retval EFI_INVALID_PARAMETER One or more of the LBAs listed
310 in the variable argument list do
311 not exist in the firmware volume.
312
313 **/
314 EFI_STATUS
315 EFIAPI
316 FvbProtocolEraseBlocks (
317 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
318 ...
319 )
320 {
321 EFI_FW_VOL_BLOCK_DEVICE *FvbDevice;
322 VA_LIST args;
323 EFI_LBA StartingLba;
324 UINTN NumOfLba;
325 UINT8 Erase;
326 VOID *ErasePtr;
327 UINTN EraseSize;
328
329 FvbDevice = FVB_DEVICE_FROM_THIS (This);
330 Erase = 0;
331
332 VA_START (args, This);
333
334 do {
335 StartingLba = VA_ARG (args, EFI_LBA);
336 if (StartingLba == EFI_LBA_LIST_TERMINATOR) {
337 break;
338 }
339
340 NumOfLba = VA_ARG (args, UINT32);
341
342 //
343 // Check input parameters
344 //
345 if ((NumOfLba == 0) || (StartingLba > 1) || ((StartingLba + NumOfLba) > 2)) {
346 VA_END (args);
347 return EFI_INVALID_PARAMETER;
348 }
349
350 if (StartingLba == 0) {
351 Erase = (UINT8) (Erase | BIT0);
352 }
353 if ((StartingLba + NumOfLba) == 2) {
354 Erase = (UINT8) (Erase | BIT1);
355 }
356
357 } while (1);
358
359 VA_END (args);
360
361 ErasePtr = (UINT8*) FvbDevice->BufferPtr;
362 EraseSize = 0;
363
364 if ((Erase & BIT0) != 0) {
365 EraseSize = EraseSize + FvbDevice->BlockSize;
366 } else {
367 ErasePtr = (VOID*) ((UINT8*)ErasePtr + FvbDevice->BlockSize);
368 }
369
370 if ((Erase & BIT1) != 0) {
371 EraseSize = EraseSize + FvbDevice->BlockSize;
372 }
373
374 if (EraseSize != 0) {
375 SetMem (
376 (VOID*) ErasePtr,
377 EraseSize,
378 ERASED_UINT8
379 );
380 }
381
382 return EFI_SUCCESS;
383 }
384
385
386 /**
387 Writes the specified number of bytes from the input buffer to the block.
388
389 The Write() function writes the specified number of bytes from
390 the provided buffer to the specified block and offset. If the
391 firmware volume is sticky write, the caller must ensure that
392 all the bits of the specified range to write are in the
393 EFI_FVB_ERASE_POLARITY state before calling the Write()
394 function, or else the result will be unpredictable. This
395 unpredictability arises because, for a sticky-write firmware
396 volume, a write may negate a bit in the EFI_FVB_ERASE_POLARITY
397 state but cannot flip it back again. In general, before
398 calling the Write() function, the caller should call the
399 EraseBlocks() function first to erase the specified block to
400 write. A block erase cycle will transition bits from the
401 (NOT)EFI_FVB_ERASE_POLARITY state back to the
402 EFI_FVB_ERASE_POLARITY state. Implementations should be
403 mindful that the firmware volume might be in the WriteDisabled
404 state. If it is in this state, the Write() function must
405 return the status code EFI_ACCESS_DENIED without modifying the
406 contents of the firmware volume. The Write() function must
407 also prevent spanning block boundaries. If a write is
408 requested that spans a block boundary, the write must store up
409 to the boundary but not beyond. The output parameter NumBytes
410 must be set to correctly indicate the number of bytes actually
411 written. The caller must be aware that a write may be
412 partially completed. All writes, partial or otherwise, must be
413 fully flushed to the hardware before the Write() service
414 returns.
415
416 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
417
418 @param Lba The starting logical block index to write to.
419
420 @param Offset Offset into the block at which to begin writing.
421
422 @param NumBytes Pointer to a UINTN. At entry, *NumBytes
423 contains the total size of the buffer. At
424 exit, *NumBytes contains the total number of
425 bytes actually written.
426
427 @param Buffer Pointer to a caller-allocated buffer that
428 contains the source for the write.
429
430 @retval EFI_SUCCESS The firmware volume was written successfully.
431
432 @retval EFI_BAD_BUFFER_SIZE The write was attempted across an
433 LBA boundary. On output, NumBytes
434 contains the total number of bytes
435 actually written.
436
437 @retval EFI_ACCESS_DENIED The firmware volume is in the
438 WriteDisabled state.
439
440 @retval EFI_DEVICE_ERROR The block device is malfunctioning
441 and could not be written.
442
443
444 **/
445 EFI_STATUS
446 EFIAPI
447 FvbProtocolWrite (
448 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
449 IN EFI_LBA Lba,
450 IN UINTN Offset,
451 IN OUT UINTN *NumBytes,
452 IN UINT8 *Buffer
453 )
454 {
455
456 EFI_FW_VOL_BLOCK_DEVICE *FvbDevice;
457 UINT8 *FvbDataPtr;
458
459 FvbDevice = FVB_DEVICE_FROM_THIS (This);
460
461 if ((Lba > 1) || (Offset > FvbDevice->BlockSize)) {
462 return EFI_INVALID_PARAMETER;
463 }
464
465 if ((Offset + *NumBytes) > FvbDevice->BlockSize) {
466 *NumBytes = FvbDevice->BlockSize - Offset;
467 }
468
469 FvbDataPtr =
470 (UINT8*) FvbDevice->BufferPtr +
471 MultU64x32 (Lba, (UINT32) FvbDevice->BlockSize) +
472 Offset;
473
474 if (*NumBytes > 0) {
475 CopyMem (FvbDataPtr, Buffer, *NumBytes);
476 PlatformFvbDataWritten (This, Lba);
477 }
478
479 return EFI_SUCCESS;
480 }
481
482
483 /**
484 Reads the specified number of bytes into a buffer from the specified block.
485
486 The Read() function reads the requested number of bytes from the
487 requested block and stores them in the provided buffer.
488 Implementations should be mindful that the firmware volume
489 might be in the ReadDisabled state. If it is in this state,
490 the Read() function must return the status code
491 EFI_ACCESS_DENIED without modifying the contents of the
492 buffer. The Read() function must also prevent spanning block
493 boundaries. If a read is requested that would span a block
494 boundary, the read must read up to the boundary but not
495 beyond. The output parameter NumBytes must be set to correctly
496 indicate the number of bytes actually read. The caller must be
497 aware that a read may be partially completed.
498
499 @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL instance.
500
501 @param Lba The starting logical block index
502 from which to read.
503
504 @param Offset Offset into the block at which to begin reading.
505
506 @param NumBytes Pointer to a UINTN. At entry, *NumBytes
507 contains the total size of the buffer. At
508 exit, *NumBytes contains the total number of
509 bytes read.
510
511 @param Buffer Pointer to a caller-allocated buffer that will
512 be used to hold the data that is read.
513
514 @retval EFI_SUCCESS The firmware volume was read successfully
515 and contents are in Buffer.
516
517 @retval EFI_BAD_BUFFER_SIZE Read attempted across an LBA
518 boundary. On output, NumBytes
519 contains the total number of bytes
520 returned in Buffer.
521
522 @retval EFI_ACCESS_DENIED The firmware volume is in the
523 ReadDisabled state.
524
525 @retval EFI_DEVICE_ERROR The block device is not
526 functioning correctly and could
527 not be read.
528
529 **/
530 EFI_STATUS
531 EFIAPI
532 FvbProtocolRead (
533 IN CONST EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL *This,
534 IN EFI_LBA Lba,
535 IN UINTN Offset,
536 IN OUT UINTN *NumBytes,
537 IN OUT UINT8 *Buffer
538 )
539 {
540 EFI_FW_VOL_BLOCK_DEVICE *FvbDevice;
541 UINT8 *FvbDataPtr;
542
543 FvbDevice = FVB_DEVICE_FROM_THIS (This);
544
545 if ((Lba > 1) || (Offset > FvbDevice->BlockSize)) {
546 return EFI_INVALID_PARAMETER;
547 }
548
549 if ((Offset + *NumBytes) > FvbDevice->BlockSize) {
550 *NumBytes = FvbDevice->BlockSize - Offset;
551 }
552
553 FvbDataPtr =
554 (UINT8*) FvbDevice->BufferPtr +
555 MultU64x32 (Lba, (UINT32) FvbDevice->BlockSize) +
556 Offset;
557
558 if (*NumBytes > 0) {
559 CopyMem (Buffer, FvbDataPtr, *NumBytes);
560 }
561
562 return EFI_SUCCESS;
563 }
564
565
566 /**
567 Check the integrity of firmware volume header.
568
569 @param[in] FwVolHeader - A pointer to a firmware volume header
570
571 @retval EFI_SUCCESS - The firmware volume is consistent
572 @retval EFI_NOT_FOUND - The firmware volume has been corrupted.
573
574 **/
575 EFI_STATUS
576 ValidateFvHeader (
577 IN EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader
578 )
579 {
580 UINT16 Checksum;
581
582 //
583 // Verify the header revision, header signature, length
584 // Length of FvBlock cannot be 2**64-1
585 // HeaderLength cannot be an odd number
586 //
587 if ((FwVolHeader->Revision != EFI_FVH_REVISION) ||
588 (FwVolHeader->Signature != EFI_FVH_SIGNATURE) ||
589 (FwVolHeader->FvLength != EMU_FVB_SIZE) ||
590 (FwVolHeader->HeaderLength != EMU_FV_HEADER_LENGTH)
591 ) {
592 DEBUG ((EFI_D_INFO, "EMU Variable FVB: Basic FV headers were invalid\n"));
593 return EFI_NOT_FOUND;
594 }
595 //
596 // Verify the header checksum
597 //
598 Checksum = CalculateSum16((VOID*) FwVolHeader, FwVolHeader->HeaderLength);
599
600 if (Checksum != 0) {
601 DEBUG ((EFI_D_INFO, "EMU Variable FVB: FV checksum was invalid\n"));
602 return EFI_NOT_FOUND;
603 }
604
605 return EFI_SUCCESS;
606 }
607
608
609 /**
610 Initializes the FV Header and Variable Store Header
611 to support variable operations.
612
613 @param[in] Ptr - Location to initialize the headers
614
615 **/
616 VOID
617 InitializeFvAndVariableStoreHeaders (
618 IN VOID *Ptr
619 )
620 {
621 STATIC FVB_FV_HDR_AND_VARS_TEMPLATE FvAndVarTemplate = {
622 { // EFI_FIRMWARE_VOLUME_HEADER FvHdr;
623 // UINT8 ZeroVector[16];
624 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
625
626 // EFI_GUID FileSystemGuid;
627 EFI_SYSTEM_NV_DATA_FV_GUID,
628
629 // UINT64 FvLength;
630 EMU_FVB_SIZE,
631
632 // UINT32 Signature;
633 EFI_FVH_SIGNATURE,
634
635 // EFI_FVB_ATTRIBUTES_2 Attributes;
636 0x4feff,
637
638 // UINT16 HeaderLength;
639 EMU_FV_HEADER_LENGTH,
640
641 // UINT16 Checksum;
642 0,
643
644 // UINT16 ExtHeaderOffset;
645 0,
646
647 // UINT8 Reserved[1];
648 0,
649
650 // UINT8 Revision;
651 EFI_FVH_REVISION,
652
653 // EFI_FV_BLOCK_MAP_ENTRY BlockMap[1];
654 { 2, // UINT32 NumBlocks;
655 EMU_FVB_BLOCK_SIZE // UINT32 Length;
656 }
657 },
658 // EFI_FV_BLOCK_MAP_ENTRY EndBlockMap;
659 { 0, 0 }, // End of block map
660 { // VARIABLE_STORE_HEADER VarHdr;
661 // EFI_GUID Signature;
662 EFI_VARIABLE_GUID,
663
664 // UINT32 Size;
665 (
666 FixedPcdGet32 (PcdVariableStoreSize) -
667 OFFSET_OF (FVB_FV_HDR_AND_VARS_TEMPLATE, VarHdr)
668 ),
669
670 // UINT8 Format;
671 VARIABLE_STORE_FORMATTED,
672
673 // UINT8 State;
674 VARIABLE_STORE_HEALTHY,
675
676 // UINT16 Reserved;
677 0,
678
679 // UINT32 Reserved1;
680 0
681 }
682 };
683 EFI_FIRMWARE_VOLUME_HEADER *Fv;
684
685 //
686 // Copy the template structure into the location
687 //
688 CopyMem (Ptr, (VOID*)&FvAndVarTemplate, sizeof (FvAndVarTemplate));
689
690 //
691 // Update the checksum for the FV header
692 //
693 Fv = (EFI_FIRMWARE_VOLUME_HEADER*) Ptr;
694 Fv->Checksum = CalculateCheckSum16 (Ptr, Fv->HeaderLength);
695 }
696
697
698 /**
699 Initializes the Fault Tolerant Write data structure
700
701 This data structure is used by the Fault Tolerant Write driver.
702
703 @param[in] Buffer - Location for the FTW data structure
704
705 **/
706 VOID
707 InitializeFtwState (
708 IN VOID *Buffer
709 )
710 {
711 EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER *Hdr;
712 UINT32 TempCrc;
713 STATIC EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER DefaultFtw = {
714 EFI_SYSTEM_NV_DATA_FV_GUID, // EFI_GUID Signature;
715 ERASED_UINT32, // UINT32 Crc;
716 ERASED_BIT, // UINT8 WorkingBlockValid : 1;
717 ERASED_BIT, // UINT8 WorkingBlockInvalid : 1;
718 0, // UINT8 Reserved : 6;
719 { 0, 0, 0 }, // UINT8 Reserved3[3];
720 FTW_WRITE_QUEUE_SIZE // UINT64 WriteQueueSize;
721 };
722
723 CopyMem (Buffer, (VOID*) &DefaultFtw, sizeof (DefaultFtw));
724
725 Hdr = (EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER*) Buffer;
726
727 //
728 // Calculate checksum.
729 //
730 // The Crc, WorkingBlockValid and WorkingBlockInvalid bits should
731 // be set to the erased state before computing the checksum.
732 //
733 gBS->CalculateCrc32 (Buffer, sizeof (DefaultFtw), &TempCrc);
734 Hdr->Crc = TempCrc;
735
736 //
737 // Mark as valid.
738 //
739 Hdr->WorkingBlockValid = NOT_ERASED_BIT;
740 }
741
742
743 /**
744 Main entry point.
745
746 @param[in] ImageHandle The firmware allocated handle for the EFI image.
747 @param[in] SystemTable A pointer to the EFI System Table.
748
749 @retval EFI_SUCCESS Successfully initialized.
750
751 **/
752 EFI_STATUS
753 EFIAPI
754 FvbInitialize (
755 IN EFI_HANDLE ImageHandle,
756 IN EFI_SYSTEM_TABLE *SystemTable
757 )
758 {
759 EFI_STATUS Status;
760 VOID *Ptr;
761 VOID *SubPtr;
762 BOOLEAN Initialize;
763 EFI_HANDLE Handle;
764 EFI_PHYSICAL_ADDRESS Address;
765
766 DEBUG ((EFI_D_INFO, "EMU Variable FVB Started\n"));
767
768 //
769 // Verify that the PCD's are set correctly.
770 //
771 if (
772 (PcdGet32 (PcdVariableStoreSize) +
773 PcdGet32 (PcdFlashNvStorageFtwWorkingSize)
774 ) >
775 EMU_FVB_BLOCK_SIZE
776 ) {
777 DEBUG ((EFI_D_ERROR, "EMU Variable invalid PCD sizes\n"));
778 return EFI_INVALID_PARAMETER;
779 }
780
781 //
782 // By default we will initialize the FV contents. But, if
783 // PcdEmuVariableNvStoreReserved is non-zero, then we will
784 // use this location for our buffer.
785 //
786 // If this location does not have a proper FV header, then
787 // we will initialize it.
788 //
789 Initialize = TRUE;
790 if (PcdGet64 (PcdEmuVariableNvStoreReserved) != 0) {
791 Ptr = (VOID*)(UINTN) PcdGet64 (PcdEmuVariableNvStoreReserved);
792 DEBUG ((
793 EFI_D_INFO,
794 "EMU Variable FVB: Using pre-reserved block at %p\n",
795 Ptr
796 ));
797 Status = ValidateFvHeader (Ptr);
798 if (!EFI_ERROR (Status)) {
799 DEBUG ((EFI_D_INFO, "EMU Variable FVB: Found valid pre-existing FV\n"));
800 Initialize = FALSE;
801 }
802 } else {
803 Ptr = AllocateAlignedRuntimePages (
804 EFI_SIZE_TO_PAGES (EMU_FVB_SIZE),
805 SIZE_64KB
806 );
807 }
808
809 mEmuVarsFvb.BufferPtr = Ptr;
810
811 //
812 // Initialize the main FV header and variable store header
813 //
814 if (Initialize) {
815 SetMem (Ptr, EMU_FVB_SIZE, ERASED_UINT8);
816 InitializeFvAndVariableStoreHeaders (Ptr);
817 }
818 PcdSet32 (PcdFlashNvStorageVariableBase, (UINT32)(UINTN) Ptr);
819
820 //
821 // Initialize the Fault Tolerant Write data area
822 //
823 SubPtr = (VOID*) ((UINT8*) Ptr + PcdGet32 (PcdVariableStoreSize));
824 if (Initialize) {
825 InitializeFtwState (SubPtr);
826 }
827 PcdSet32 (PcdFlashNvStorageFtwWorkingBase, (UINT32)(UINTN) SubPtr);
828
829 //
830 // Initialize the Fault Tolerant Write spare block
831 //
832 SubPtr = (VOID*) ((UINT8*) Ptr + EMU_FVB_BLOCK_SIZE);
833 PcdSet32 (PcdFlashNvStorageFtwSpareBase, (UINT32)(UINTN) SubPtr);
834
835 //
836 // Setup FVB device path
837 //
838 Address = (EFI_PHYSICAL_ADDRESS)(UINTN) Ptr;
839 mEmuVarsFvb.DevicePath.MemMapDevPath.StartingAddress = Address;
840 mEmuVarsFvb.DevicePath.MemMapDevPath.EndingAddress = Address + EMU_FVB_SIZE - 1;
841
842 //
843 // Install the protocols
844 //
845 DEBUG ((EFI_D_INFO, "Installing FVB for EMU Variable support\n"));
846 Handle = 0;
847 Status = gBS->InstallMultipleProtocolInterfaces (
848 &Handle,
849 &gEfiFirmwareVolumeBlockProtocolGuid,
850 &mEmuVarsFvb.FwVolBlockInstance,
851 &gEfiDevicePathProtocolGuid,
852 &mEmuVarsFvb.DevicePath,
853 NULL
854 );
855 ASSERT_EFI_ERROR (Status);
856
857 //
858 // Register for the virtual address change event
859 //
860 Status = gBS->CreateEventEx (
861 EVT_NOTIFY_SIGNAL,
862 TPL_NOTIFY,
863 FvbVirtualAddressChangeEvent,
864 NULL,
865 &gEfiEventVirtualAddressChangeGuid,
866 &mEmuVarsFvbAddrChangeEvent
867 );
868 ASSERT_EFI_ERROR (Status);
869
870 return EFI_SUCCESS;
871 }
872
873