2008-04-09 07:50:10 +02:00
|
|
|
/** @file
|
2009-02-25 11:50:45 +01:00
|
|
|
Capsule Runtime Driver produces two UEFI capsule runtime services.
|
2008-07-09 15:33:20 +02:00
|
|
|
(UpdateCapsule, QueryCapsuleCapabilities)
|
2018-06-27 15:08:52 +02:00
|
|
|
It installs the Capsule Architectural Protocol defined in PI1.0a to signify
|
2009-01-04 04:20:55 +01:00
|
|
|
the capsule runtime services are ready.
|
2007-07-18 16:31:27 +02:00
|
|
|
|
2018-06-27 15:08:52 +02:00
|
|
|
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
2010-04-24 11:33:45 +02:00
|
|
|
This program and the accompanying materials
|
2007-07-18 16:31:27 +02:00
|
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
2008-04-09 07:50:10 +02:00
|
|
|
**/
|
2007-07-18 16:31:27 +02:00
|
|
|
|
MdeModulePkg/CapsuleRuntimeDxe: clean the capsule payload to DRAM
When capsule updates are staged for processing after a warm reboot,
they are copied into memory with the MMU and caches enabled. When
the capsule PEI gets around to coalescing the capsule, the MMU and
caches may still be disabled, and so on architectures where uncached
accesses are incoherent with the caches (such as ARM and AARCH64),
we need to ensure that the data passed into UpdateCapsule() is
written back to main memory before performing the warm reboot.
Unfortunately, on ARM, the only type of cache maintenance instructions
that are suitable for this purpose operate on virtual addresses only,
and given that the UpdateCapsule() prototype includes the physical
address of a linked list of scatter/gather data structures that are
mapped at an address that is unknown to the firmware (and may not even
be mapped at all when UpdateCapsule() is invoked), we can only perform
this cache maintenance at boot time. Fortunately, both Windows and Linux
only invoke UpdateCapsule() before calling ExitBootServices(), so this
is not a problem in practice.
In the future, we may propose adding a secure firmware service that
permits performing the cache maintenance at OS runtime, in which case
this code may be enhanced to call that service if available. For now,
we just fail any UpdateCapsule() calls performed at OS runtime on ARM.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Star Zeng <star.zeng@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
2018-06-12 12:37:08 +02:00
|
|
|
#include "CapsuleService.h"
|
|
|
|
|
2009-09-16 03:29:14 +02:00
|
|
|
//
|
|
|
|
// Handle for the installation of Capsule Architecture Protocol.
|
|
|
|
//
|
|
|
|
EFI_HANDLE mNewHandle = NULL;
|
|
|
|
|
2010-02-23 03:33:17 +01:00
|
|
|
//
|
|
|
|
// The times of calling UpdateCapsule ()
|
|
|
|
//
|
|
|
|
UINTN mTimes = 0;
|
|
|
|
|
2013-12-16 02:34:01 +01:00
|
|
|
UINT32 mMaxSizePopulateCapsule = 0;
|
|
|
|
UINT32 mMaxSizeNonPopulateCapsule = 0;
|
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
/**
|
|
|
|
Passes capsules to the firmware with both virtual and physical mapping. Depending on the intended
|
|
|
|
consumption, the firmware may process the capsule immediately. If the payload should persist
|
|
|
|
across a system reset, the reset value returned from EFI_QueryCapsuleCapabilities must
|
|
|
|
be passed into ResetSystem() and will cause the capsule to be processed by the firmware as
|
|
|
|
part of the reset process.
|
|
|
|
|
|
|
|
@param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules
|
|
|
|
being passed into update capsule.
|
|
|
|
@param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in
|
|
|
|
CaspuleHeaderArray.
|
|
|
|
@param ScatterGatherList Physical pointer to a set of
|
|
|
|
EFI_CAPSULE_BLOCK_DESCRIPTOR that describes the
|
|
|
|
location in physical memory of a set of capsules.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Valid capsule was passed. If
|
|
|
|
CAPSULE_FLAGS_PERSIT_ACROSS_RESET is not set, the
|
|
|
|
capsule has been successfully processed by the firmware.
|
|
|
|
@retval EFI_DEVICE_ERROR The capsule update was started, but failed due to a device error.
|
2009-09-16 03:29:14 +02:00
|
|
|
@retval EFI_INVALID_PARAMETER CapsuleSize is NULL, or an incompatible set of flags were
|
|
|
|
set in the capsule header.
|
|
|
|
@retval EFI_INVALID_PARAMETER CapsuleCount is Zero.
|
|
|
|
@retval EFI_INVALID_PARAMETER For across reset capsule image, ScatterGatherList is NULL.
|
2008-07-09 15:33:20 +02:00
|
|
|
@retval EFI_UNSUPPORTED CapsuleImage is not recognized by the firmware.
|
2018-06-27 15:08:52 +02:00
|
|
|
@retval EFI_OUT_OF_RESOURCES When ExitBootServices() has been previously called this error indicates the capsule
|
|
|
|
is compatible with this platform but is not capable of being submitted or processed
|
2013-09-11 07:56:52 +02:00
|
|
|
in runtime. The caller may resubmit the capsule prior to ExitBootServices().
|
2018-06-27 15:08:52 +02:00
|
|
|
@retval EFI_OUT_OF_RESOURCES When ExitBootServices() has not been previously called then this error indicates
|
2013-09-11 07:56:52 +02:00
|
|
|
the capsule is compatible with this platform but there are insufficient resources to process.
|
2008-07-09 15:33:20 +02:00
|
|
|
|
|
|
|
**/
|
2007-07-18 16:31:27 +02:00
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
UpdateCapsule (
|
|
|
|
IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,
|
|
|
|
IN UINTN CapsuleCount,
|
|
|
|
IN EFI_PHYSICAL_ADDRESS ScatterGatherList OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ArrayNumber;
|
|
|
|
EFI_STATUS Status;
|
|
|
|
EFI_CAPSULE_HEADER *CapsuleHeader;
|
2009-08-18 03:23:29 +02:00
|
|
|
BOOLEAN NeedReset;
|
2009-09-16 03:29:14 +02:00
|
|
|
BOOLEAN InitiateReset;
|
2010-02-23 03:33:17 +01:00
|
|
|
CHAR16 CapsuleVarName[30];
|
2018-06-27 15:08:52 +02:00
|
|
|
CHAR16 *TempVarName;
|
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
|
|
|
// Capsule Count can't be less than one.
|
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
if (CapsuleCount < 1) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2009-09-16 03:29:14 +02:00
|
|
|
|
2010-02-23 03:33:17 +01:00
|
|
|
NeedReset = FALSE;
|
|
|
|
InitiateReset = FALSE;
|
|
|
|
CapsuleHeader = NULL;
|
|
|
|
CapsuleVarName[0] = 0;
|
2007-07-18 16:31:27 +02:00
|
|
|
|
|
|
|
for (ArrayNumber = 0; ArrayNumber < CapsuleCount; ArrayNumber++) {
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
|
|
|
// A capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE flag must have
|
|
|
|
// CAPSULE_FLAGS_PERSIST_ACROSS_RESET set in its header as well.
|
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
CapsuleHeader = CapsuleHeaderArray[ArrayNumber];
|
|
|
|
if ((CapsuleHeader->Flags & (CAPSULE_FLAGS_PERSIST_ACROSS_RESET | CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE)) == CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
2009-09-16 03:29:14 +02:00
|
|
|
// A capsule which has the CAPSULE_FLAGS_INITIATE_RESET flag must have
|
|
|
|
// CAPSULE_FLAGS_PERSIST_ACROSS_RESET set in its header as well.
|
|
|
|
//
|
|
|
|
if ((CapsuleHeader->Flags & (CAPSULE_FLAGS_PERSIST_ACROSS_RESET | CAPSULE_FLAGS_INITIATE_RESET)) == CAPSULE_FLAGS_INITIATE_RESET) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2013-10-15 03:31:49 +02:00
|
|
|
|
|
|
|
//
|
2018-06-27 15:08:52 +02:00
|
|
|
// Check FMP capsule flag
|
2013-10-15 03:31:49 +02:00
|
|
|
//
|
|
|
|
if (CompareGuid(&CapsuleHeader->CapsuleGuid, &gEfiFmpCapsuleGuid)
|
|
|
|
&& (CapsuleHeader->Flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) != 0 ) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2009-09-16 03:29:14 +02:00
|
|
|
//
|
2018-06-27 15:08:52 +02:00
|
|
|
// Check Capsule image without populate flag by firmware support capsule function
|
2007-12-05 10:58:33 +01:00
|
|
|
//
|
2013-10-15 03:31:49 +02:00
|
|
|
if ((CapsuleHeader->Flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) == 0) {
|
|
|
|
Status = SupportCapsuleImage (CapsuleHeader);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
|
|
return Status;
|
|
|
|
}
|
2007-12-05 10:58:33 +01:00
|
|
|
}
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
2009-09-16 03:29:14 +02:00
|
|
|
// Walk through all capsules, record whether there is a capsule needs reset
|
|
|
|
// or initiate reset. And then process capsules which has no reset flag directly.
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
for (ArrayNumber = 0; ArrayNumber < CapsuleCount ; ArrayNumber++) {
|
|
|
|
CapsuleHeader = CapsuleHeaderArray[ArrayNumber];
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
// Here should be in the boot-time for non-reset capsule image
|
|
|
|
// Platform specific update for the non-reset capsule image.
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
if ((CapsuleHeader->Flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) == 0) {
|
2018-06-27 15:08:52 +02:00
|
|
|
if (EfiAtRuntime ()) {
|
2013-09-11 07:56:52 +02:00
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
2009-08-18 03:23:29 +02:00
|
|
|
} else {
|
|
|
|
Status = ProcessCapsuleImage(CapsuleHeader);
|
|
|
|
}
|
|
|
|
if (EFI_ERROR(Status)) {
|
2007-11-16 11:14:34 +01:00
|
|
|
return Status;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
2009-08-18 03:23:29 +02:00
|
|
|
} else {
|
|
|
|
NeedReset = TRUE;
|
2009-09-16 03:29:14 +02:00
|
|
|
if ((CapsuleHeader->Flags & CAPSULE_FLAGS_INITIATE_RESET) != 0) {
|
|
|
|
InitiateReset = TRUE;
|
|
|
|
}
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
}
|
2018-06-27 15:08:52 +02:00
|
|
|
|
2009-08-18 03:23:29 +02:00
|
|
|
//
|
|
|
|
// After launching all capsules who has no reset flag, if no more capsules claims
|
|
|
|
// for a system reset just return.
|
|
|
|
//
|
|
|
|
if (!NeedReset) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2007-07-18 16:31:27 +02:00
|
|
|
|
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
// ScatterGatherList is only referenced if the capsules are defined to persist across
|
2018-06-27 15:08:52 +02:00
|
|
|
// system reset.
|
2007-07-18 16:31:27 +02:00
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
if (ScatterGatherList == (EFI_PHYSICAL_ADDRESS) (UINTN) NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
2009-08-18 03:23:29 +02:00
|
|
|
// Check if the platform supports update capsule across a system reset
|
2007-07-18 16:31:27 +02:00
|
|
|
//
|
MdeModulePkg/CapsuleRuntimeDxe: clean the capsule payload to DRAM
When capsule updates are staged for processing after a warm reboot,
they are copied into memory with the MMU and caches enabled. When
the capsule PEI gets around to coalescing the capsule, the MMU and
caches may still be disabled, and so on architectures where uncached
accesses are incoherent with the caches (such as ARM and AARCH64),
we need to ensure that the data passed into UpdateCapsule() is
written back to main memory before performing the warm reboot.
Unfortunately, on ARM, the only type of cache maintenance instructions
that are suitable for this purpose operate on virtual addresses only,
and given that the UpdateCapsule() prototype includes the physical
address of a linked list of scatter/gather data structures that are
mapped at an address that is unknown to the firmware (and may not even
be mapped at all when UpdateCapsule() is invoked), we can only perform
this cache maintenance at boot time. Fortunately, both Windows and Linux
only invoke UpdateCapsule() before calling ExitBootServices(), so this
is not a problem in practice.
In the future, we may propose adding a secure firmware service that
permits performing the cache maintenance at OS runtime, in which case
this code may be enhanced to call that service if available. For now,
we just fail any UpdateCapsule() calls performed at OS runtime on ARM.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Star Zeng <star.zeng@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
2018-06-12 12:37:08 +02:00
|
|
|
if (!IsPersistAcrossResetCapsuleSupported ()) {
|
2009-08-18 03:23:29 +02:00
|
|
|
return EFI_UNSUPPORTED;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
|
MdeModulePkg/CapsuleRuntimeDxe: clean the capsule payload to DRAM
When capsule updates are staged for processing after a warm reboot,
they are copied into memory with the MMU and caches enabled. When
the capsule PEI gets around to coalescing the capsule, the MMU and
caches may still be disabled, and so on architectures where uncached
accesses are incoherent with the caches (such as ARM and AARCH64),
we need to ensure that the data passed into UpdateCapsule() is
written back to main memory before performing the warm reboot.
Unfortunately, on ARM, the only type of cache maintenance instructions
that are suitable for this purpose operate on virtual addresses only,
and given that the UpdateCapsule() prototype includes the physical
address of a linked list of scatter/gather data structures that are
mapped at an address that is unknown to the firmware (and may not even
be mapped at all when UpdateCapsule() is invoked), we can only perform
this cache maintenance at boot time. Fortunately, both Windows and Linux
only invoke UpdateCapsule() before calling ExitBootServices(), so this
is not a problem in practice.
In the future, we may propose adding a secure firmware service that
permits performing the cache maintenance at OS runtime, in which case
this code may be enhanced to call that service if available. For now,
we just fail any UpdateCapsule() calls performed at OS runtime on ARM.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Star Zeng <star.zeng@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
2018-06-12 12:37:08 +02:00
|
|
|
CapsuleCacheWriteBack (ScatterGatherList);
|
|
|
|
|
2010-02-23 03:33:17 +01:00
|
|
|
//
|
|
|
|
// Construct variable name CapsuleUpdateData, CapsuleUpdateData1, CapsuleUpdateData2...
|
|
|
|
// if user calls UpdateCapsule multiple times.
|
|
|
|
//
|
2015-07-01 10:23:30 +02:00
|
|
|
StrCpyS (CapsuleVarName, sizeof(CapsuleVarName)/sizeof(CHAR16), EFI_CAPSULE_VARIABLE_NAME);
|
2010-02-23 03:33:17 +01:00
|
|
|
TempVarName = CapsuleVarName + StrLen (CapsuleVarName);
|
|
|
|
if (mTimes > 0) {
|
2017-01-18 03:31:02 +01:00
|
|
|
UnicodeValueToStringS (
|
|
|
|
TempVarName,
|
|
|
|
sizeof (CapsuleVarName) - ((UINTN)TempVarName - (UINTN)CapsuleVarName),
|
|
|
|
0,
|
|
|
|
mTimes,
|
|
|
|
0
|
|
|
|
);
|
2010-02-23 03:33:17 +01:00
|
|
|
}
|
|
|
|
|
2009-08-18 03:23:29 +02:00
|
|
|
//
|
|
|
|
// ScatterGatherList is only referenced if the capsules are defined to persist across
|
2018-06-27 15:08:52 +02:00
|
|
|
// system reset. Set its value into NV storage to let pre-boot driver to pick it up
|
2009-08-18 03:23:29 +02:00
|
|
|
// after coming through a system reset.
|
|
|
|
//
|
2010-02-11 07:27:18 +01:00
|
|
|
Status = EfiSetVariable (
|
2010-02-23 03:33:17 +01:00
|
|
|
CapsuleVarName,
|
2010-02-11 07:27:18 +01:00
|
|
|
&gEfiCapsuleVendorGuid,
|
|
|
|
EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS,
|
|
|
|
sizeof (UINTN),
|
|
|
|
(VOID *) &ScatterGatherList
|
|
|
|
);
|
2010-02-23 03:33:17 +01:00
|
|
|
if (!EFI_ERROR (Status)) {
|
|
|
|
//
|
|
|
|
// Variable has been set successfully, increase variable index.
|
|
|
|
//
|
|
|
|
mTimes++;
|
|
|
|
if(InitiateReset) {
|
|
|
|
//
|
|
|
|
// Firmware that encounters a capsule which has the CAPSULE_FLAGS_INITIATE_RESET Flag set in its header
|
2018-06-27 15:08:52 +02:00
|
|
|
// will initiate a reset of the platform which is compatible with the passed-in capsule request and will
|
2010-02-23 03:33:17 +01:00
|
|
|
// not return back to the caller.
|
|
|
|
//
|
|
|
|
EfiResetSystem (EfiResetWarm, EFI_SUCCESS, 0, NULL);
|
|
|
|
}
|
2009-09-16 03:29:14 +02:00
|
|
|
}
|
2009-08-18 03:23:29 +02:00
|
|
|
return Status;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
/**
|
|
|
|
Returns if the capsule can be supported via UpdateCapsule().
|
|
|
|
|
|
|
|
@param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules
|
|
|
|
being passed into update capsule.
|
|
|
|
@param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in
|
|
|
|
CaspuleHeaderArray.
|
|
|
|
@param MaxiumCapsuleSize On output the maximum size that UpdateCapsule() can
|
|
|
|
support as an argument to UpdateCapsule() via
|
|
|
|
CapsuleHeaderArray and ScatterGatherList.
|
|
|
|
@param ResetType Returns the type of reset required for the capsule update.
|
2007-07-18 16:31:27 +02:00
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
@retval EFI_SUCCESS Valid answer returned.
|
|
|
|
@retval EFI_UNSUPPORTED The capsule image is not supported on this platform, and
|
|
|
|
MaximumCapsuleSize and ResetType are undefined.
|
|
|
|
@retval EFI_INVALID_PARAMETER MaximumCapsuleSize is NULL, or ResetTyep is NULL,
|
|
|
|
Or CapsuleCount is Zero, or CapsuleImage is not valid.
|
2007-07-18 16:31:27 +02:00
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
**/
|
2007-07-18 16:31:27 +02:00
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
QueryCapsuleCapabilities (
|
|
|
|
IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,
|
|
|
|
IN UINTN CapsuleCount,
|
|
|
|
OUT UINT64 *MaxiumCapsuleSize,
|
|
|
|
OUT EFI_RESET_TYPE *ResetType
|
|
|
|
)
|
|
|
|
{
|
2013-10-15 03:31:49 +02:00
|
|
|
EFI_STATUS Status;
|
2007-07-18 16:31:27 +02:00
|
|
|
UINTN ArrayNumber;
|
|
|
|
EFI_CAPSULE_HEADER *CapsuleHeader;
|
2010-05-19 04:31:41 +02:00
|
|
|
BOOLEAN NeedReset;
|
2007-07-18 16:31:27 +02:00
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
|
|
|
// Capsule Count can't be less than one.
|
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
if (CapsuleCount < 1) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2018-06-27 15:08:52 +02:00
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
2009-09-16 03:29:14 +02:00
|
|
|
// Check whether input parameter is valid
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
if ((MaxiumCapsuleSize == NULL) ||(ResetType == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
CapsuleHeader = NULL;
|
2010-05-19 04:31:41 +02:00
|
|
|
NeedReset = FALSE;
|
2007-07-18 16:31:27 +02:00
|
|
|
|
|
|
|
for (ArrayNumber = 0; ArrayNumber < CapsuleCount; ArrayNumber++) {
|
|
|
|
CapsuleHeader = CapsuleHeaderArray[ArrayNumber];
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
|
|
|
// A capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE flag must have
|
|
|
|
// CAPSULE_FLAGS_PERSIST_ACROSS_RESET set in its header as well.
|
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
if ((CapsuleHeader->Flags & (CAPSULE_FLAGS_PERSIST_ACROSS_RESET | CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE)) == CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2007-11-16 11:14:34 +01:00
|
|
|
//
|
2009-09-16 03:29:14 +02:00
|
|
|
// A capsule which has the CAPSULE_FLAGS_INITIATE_RESET flag must have
|
|
|
|
// CAPSULE_FLAGS_PERSIST_ACROSS_RESET set in its header as well.
|
|
|
|
//
|
|
|
|
if ((CapsuleHeader->Flags & (CAPSULE_FLAGS_PERSIST_ACROSS_RESET | CAPSULE_FLAGS_INITIATE_RESET)) == CAPSULE_FLAGS_INITIATE_RESET) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2013-10-15 03:31:49 +02:00
|
|
|
|
|
|
|
//
|
2018-06-27 15:08:52 +02:00
|
|
|
// Check FMP capsule flag
|
2013-10-15 03:31:49 +02:00
|
|
|
//
|
|
|
|
if (CompareGuid(&CapsuleHeader->CapsuleGuid, &gEfiFmpCapsuleGuid)
|
|
|
|
&& (CapsuleHeader->Flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) != 0 ) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2009-09-16 03:29:14 +02:00
|
|
|
//
|
2008-07-09 15:33:20 +02:00
|
|
|
// Check Capsule image without populate flag is supported by firmware
|
2007-12-05 10:58:33 +01:00
|
|
|
//
|
2013-10-15 03:31:49 +02:00
|
|
|
if ((CapsuleHeader->Flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE) == 0) {
|
|
|
|
Status = SupportCapsuleImage (CapsuleHeader);
|
|
|
|
if (EFI_ERROR(Status)) {
|
|
|
|
return Status;
|
|
|
|
}
|
2007-12-05 10:58:33 +01:00
|
|
|
}
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
2018-06-27 15:08:52 +02:00
|
|
|
// Find out whether there is any capsule defined to persist across system reset.
|
2007-07-18 16:31:27 +02:00
|
|
|
//
|
2010-05-19 04:31:41 +02:00
|
|
|
for (ArrayNumber = 0; ArrayNumber < CapsuleCount ; ArrayNumber++) {
|
|
|
|
CapsuleHeader = CapsuleHeaderArray[ArrayNumber];
|
|
|
|
if ((CapsuleHeader->Flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) != 0) {
|
|
|
|
NeedReset = TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2013-10-15 03:31:49 +02:00
|
|
|
|
2010-05-19 04:31:41 +02:00
|
|
|
if (NeedReset) {
|
2007-07-18 16:31:27 +02:00
|
|
|
//
|
|
|
|
//Check if the platform supports update capsule across a system reset
|
|
|
|
//
|
MdeModulePkg/CapsuleRuntimeDxe: clean the capsule payload to DRAM
When capsule updates are staged for processing after a warm reboot,
they are copied into memory with the MMU and caches enabled. When
the capsule PEI gets around to coalescing the capsule, the MMU and
caches may still be disabled, and so on architectures where uncached
accesses are incoherent with the caches (such as ARM and AARCH64),
we need to ensure that the data passed into UpdateCapsule() is
written back to main memory before performing the warm reboot.
Unfortunately, on ARM, the only type of cache maintenance instructions
that are suitable for this purpose operate on virtual addresses only,
and given that the UpdateCapsule() prototype includes the physical
address of a linked list of scatter/gather data structures that are
mapped at an address that is unknown to the firmware (and may not even
be mapped at all when UpdateCapsule() is invoked), we can only perform
this cache maintenance at boot time. Fortunately, both Windows and Linux
only invoke UpdateCapsule() before calling ExitBootServices(), so this
is not a problem in practice.
In the future, we may propose adding a secure firmware service that
permits performing the cache maintenance at OS runtime, in which case
this code may be enhanced to call that service if available. For now,
we just fail any UpdateCapsule() calls performed at OS runtime on ARM.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Star Zeng <star.zeng@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
2018-06-12 12:37:08 +02:00
|
|
|
if (!IsPersistAcrossResetCapsuleSupported ()) {
|
2007-07-18 16:31:27 +02:00
|
|
|
return EFI_UNSUPPORTED;
|
|
|
|
}
|
2010-05-19 04:31:41 +02:00
|
|
|
*ResetType = EfiResetWarm;
|
2013-12-16 02:34:01 +01:00
|
|
|
*MaxiumCapsuleSize = (UINT64) mMaxSizePopulateCapsule;
|
2007-07-18 16:31:27 +02:00
|
|
|
} else {
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
|
|
|
// For non-reset capsule image.
|
|
|
|
//
|
2007-07-18 16:31:27 +02:00
|
|
|
*ResetType = EfiResetCold;
|
2013-12-16 02:34:01 +01:00
|
|
|
*MaxiumCapsuleSize = (UINT64) mMaxSizeNonPopulateCapsule;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|
2009-02-23 16:18:48 +01:00
|
|
|
|
2007-07-18 16:31:27 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
/**
|
|
|
|
|
2009-01-04 04:20:55 +01:00
|
|
|
This code installs UEFI capsule runtime service.
|
2008-07-09 15:33:20 +02:00
|
|
|
|
2018-06-27 15:08:52 +02:00
|
|
|
@param ImageHandle The firmware allocated handle for the EFI image.
|
2008-07-09 15:33:20 +02:00
|
|
|
@param SystemTable A pointer to the EFI System Table.
|
|
|
|
|
2018-06-27 15:08:52 +02:00
|
|
|
@retval EFI_SUCCESS UEFI Capsule Runtime Services are installed successfully.
|
2008-07-09 15:33:20 +02:00
|
|
|
|
|
|
|
**/
|
2007-07-18 16:31:27 +02:00
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
CapsuleServiceInitialize (
|
|
|
|
IN EFI_HANDLE ImageHandle,
|
|
|
|
IN EFI_SYSTEM_TABLE *SystemTable
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
2013-12-16 02:34:01 +01:00
|
|
|
|
|
|
|
mMaxSizePopulateCapsule = PcdGet32(PcdMaxSizePopulateCapsule);
|
|
|
|
mMaxSizeNonPopulateCapsule = PcdGet32(PcdMaxSizeNonPopulateCapsule);
|
|
|
|
|
2011-09-02 13:34:35 +02:00
|
|
|
//
|
2018-06-27 15:08:52 +02:00
|
|
|
// When PEI phase is IA32, DXE phase is X64, it is possible that capsule data are
|
2011-09-02 13:34:35 +02:00
|
|
|
// put above 4GB, so capsule PEI will transfer to long mode to get capsule data.
|
|
|
|
// The page table and stack is used to transfer processor mode from IA32 to long mode.
|
|
|
|
// Create the base address of page table and stack, and save them into variable.
|
|
|
|
// This is not needed when capsule with reset type is not supported.
|
|
|
|
//
|
|
|
|
SaveLongModeContext ();
|
2018-06-27 15:08:52 +02:00
|
|
|
|
2008-07-09 15:33:20 +02:00
|
|
|
//
|
|
|
|
// Install capsule runtime services into UEFI runtime service tables.
|
|
|
|
//
|
2009-01-04 04:20:55 +01:00
|
|
|
gRT->UpdateCapsule = UpdateCapsule;
|
|
|
|
gRT->QueryCapsuleCapabilities = QueryCapsuleCapabilities;
|
2007-07-18 16:31:27 +02:00
|
|
|
|
|
|
|
//
|
2008-07-09 15:33:20 +02:00
|
|
|
// Install the Capsule Architectural Protocol on a new handle
|
|
|
|
// to signify the capsule runtime services are ready.
|
2007-07-18 16:31:27 +02:00
|
|
|
//
|
|
|
|
Status = gBS->InstallMultipleProtocolInterfaces (
|
2009-09-16 03:29:14 +02:00
|
|
|
&mNewHandle,
|
2007-07-18 16:31:27 +02:00
|
|
|
&gEfiCapsuleArchProtocolGuid,
|
|
|
|
NULL,
|
|
|
|
NULL
|
|
|
|
);
|
|
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
|
2009-09-16 03:29:14 +02:00
|
|
|
return Status;
|
2007-07-18 16:31:27 +02:00
|
|
|
}
|