mirror of https://github.com/acidanthera/audk.git
Revert "Capsule-on-Disk entire Patch
This reverts commit0d4aa276d1
,6470a43160
,fd72860895
,7837d12498
,6b32af2e10
,8636f70b5a
,f17935321a
due to incorrect review process. Cc: Wei6 Xu <wei6.xu@intel.com> Cc: Hao A Wu <hao.a.wu@intel.com> Signed-off-by: Zhang, Chao B <chao.b.zhang@intel.com> Reviewed-by: Hao A Wu <hao.a.wu@intel.com>
This commit is contained in:
parent
425d8d487f
commit
57ec204e69
MdeModulePkg
Application/CapsuleApp
Core/DxeIplPeim
Include
Library
DxeCapsuleLibFmp
CapsuleOnDisk.cCapsuleOnDisk.hDxeCapsuleLib.cDxeCapsuleLib.infDxeCapsuleProcessLib.cDxeCapsuleReportLib.cDxeCapsuleReportLibNull.cDxeRuntimeCapsuleLib.inf
DxeCapsuleLibNull
Universal
BdsDxe
CapsuleOnDiskLoadPei
CapsuleRuntimeDxe
|
@ -849,7 +849,7 @@ PrintUsage (
|
|||
Print(L"Parameter:\n");
|
||||
Print(L" -NR: No reset will be triggered for the capsule\n");
|
||||
Print(L" with CAPSULE_FLAGS_PERSIST_ACROSS_RESET and without CAPSULE_FLAGS_INITIATE_RESET.\n");
|
||||
Print(L" -OD: Delivery of Capsules via file on Mass Storage device.\n");
|
||||
Print(L" -OD: Delivery of Capsules via file on Mass Storage device.");
|
||||
Print(L" -S: Dump capsule report variable (EFI_CAPSULE_REPORT_GUID),\n");
|
||||
Print(L" which is defined in UEFI specification.\n");
|
||||
Print(L" -C: Clear capsule report variable (EFI_CAPSULE_REPORT_GUID),\n");
|
||||
|
@ -1020,39 +1020,40 @@ UefiMain (
|
|||
}
|
||||
}
|
||||
|
||||
if (ParaOdIndex > ParaNrIndex) {
|
||||
if (ParaNrIndex != 0) {
|
||||
CapsuleLastIndex = ParaNrIndex - 1;
|
||||
} else {
|
||||
CapsuleLastIndex = ParaOdIndex - 1;
|
||||
}
|
||||
|
||||
if (ParaOdIndex == Argc -1) {
|
||||
if (ParaOdIndex != 0) {
|
||||
if (ParaOdIndex == Argc - 1) {
|
||||
MapFsStr = NULL;
|
||||
} else if (ParaOdIndex == Argc - 2) {
|
||||
MapFsStr = Argv[Argc-1];
|
||||
} else {
|
||||
Print (L"CapsuleApp: Cannot specify more than one FS mapping!\n");
|
||||
Print (L"CapsuleApp: Invalid Position for -OD Options\n");
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto Done;
|
||||
}
|
||||
} else if (ParaOdIndex < ParaNrIndex) {
|
||||
if (ParaOdIndex != 0) {
|
||||
CapsuleLastIndex = ParaOdIndex - 1;
|
||||
if (ParaOdIndex == ParaNrIndex - 1) {
|
||||
MapFsStr = NULL;
|
||||
} else if (ParaOdIndex == ParaNrIndex - 2) {
|
||||
MapFsStr = Argv[ParaOdIndex + 1];
|
||||
|
||||
if (ParaNrIndex != 0) {
|
||||
if (ParaNrIndex + 1 == ParaOdIndex) {
|
||||
CapsuleLastIndex = ParaNrIndex - 1;
|
||||
} else {
|
||||
Print (L"CapsuleApp: Cannot specify more than one FS mapping!\n");
|
||||
Print (L"CapsuleApp: Invalid Position for -NR Options\n");
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto Done;
|
||||
}
|
||||
} else {
|
||||
CapsuleLastIndex = ParaNrIndex - 1;
|
||||
CapsuleLastIndex = ParaOdIndex - 1;
|
||||
}
|
||||
} else {
|
||||
CapsuleLastIndex = Argc - 1;
|
||||
if (ParaNrIndex != 0) {
|
||||
if (ParaNrIndex == Argc -1) {
|
||||
CapsuleLastIndex = ParaNrIndex - 1;
|
||||
} else {
|
||||
Print (L"CapsuleApp: Invalid Position for -NR Options\n");
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto Done;
|
||||
}
|
||||
} else {
|
||||
CapsuleLastIndex = Argc - 1;
|
||||
}
|
||||
}
|
||||
|
||||
CapsuleNum = CapsuleLastIndex - CapsuleFirstIndex + 1;
|
||||
|
|
|
@ -812,8 +812,8 @@ DumpCapsuleFromDisk (
|
|||
//
|
||||
// Get file count first
|
||||
//
|
||||
Status = FileHandleFindFirstFile (DirHandle, &FileInfo);
|
||||
do {
|
||||
Status = FileHandleFindFirstFile (DirHandle, &FileInfo);
|
||||
if (EFI_ERROR (Status) || FileInfo == NULL) {
|
||||
Print (L"Get File Info Fail. Status = %r\n", Status);
|
||||
goto Done;
|
||||
|
@ -846,8 +846,8 @@ DumpCapsuleFromDisk (
|
|||
//
|
||||
// Get all file info
|
||||
//
|
||||
Status = FileHandleFindFirstFile (DirHandle, &FileInfo);
|
||||
do {
|
||||
Status = FileHandleFindFirstFile (DirHandle, &FileInfo);
|
||||
if (EFI_ERROR (Status) || FileInfo == NULL) {
|
||||
Print (L"Get File Info Fail. Status = %r\n", Status);
|
||||
goto Done;
|
||||
|
|
|
@ -23,8 +23,6 @@
|
|||
#include <Guid/GlobalVariable.h>
|
||||
#include <Guid/Gpt.h>
|
||||
|
||||
#define MAX_CAPSULE_NUM 10
|
||||
|
||||
EFI_GUID mCapsuleOnDiskBootOptionGuid = { 0x4CC29BB7, 0x2413, 0x40A2, { 0xB0, 0x6D, 0x25, 0x3E, 0x37, 0x10, 0xF5, 0x32 } };
|
||||
|
||||
/**
|
||||
|
@ -746,41 +744,6 @@ SetCapsuleStatusVariable (
|
|||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Check if Capsule On Disk is supported.
|
||||
|
||||
@retval TRUE Capsule On Disk is supported.
|
||||
@retval FALSE Capsule On Disk is not supported.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
IsCapsuleOnDiskSupported (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINT64 OsIndicationsSupported;
|
||||
UINTN DataSize;
|
||||
|
||||
DataSize = sizeof(UINT64);
|
||||
Status = gRT->GetVariable (
|
||||
L"OsIndicationsSupported",
|
||||
&gEfiGlobalVariableGuid,
|
||||
NULL,
|
||||
&DataSize,
|
||||
&OsIndicationsSupported
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (OsIndicationsSupported & EFI_OS_INDICATIONS_FILE_CAPSULE_DELIVERY_SUPPORTED) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Process Capsule On Disk.
|
||||
|
||||
|
@ -807,16 +770,6 @@ ProcessCapsuleOnDisk (
|
|||
UINT16 BootNext;
|
||||
EFI_SIMPLE_FILE_SYSTEM_PROTOCOL *Fs;
|
||||
BOOLEAN UpdateBootNext;
|
||||
CHAR16 *FileName[MAX_CAPSULE_NUM];
|
||||
UINTN Index;
|
||||
|
||||
//
|
||||
// Check if Capsule On Disk is supported
|
||||
//
|
||||
if (!IsCapsuleOnDiskSupported ()) {
|
||||
Print (L"CapsuleApp: Capsule On Disk is not supported.\n");
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
//
|
||||
// Get a valid file system from boot path
|
||||
|
@ -829,17 +782,10 @@ ProcessCapsuleOnDisk (
|
|||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Get file name from file path
|
||||
//
|
||||
for (Index = 0; Index < CapsuleNum; Index ++) {
|
||||
FileName[Index] = GetFileNameFromPath (FilePath[Index]);
|
||||
}
|
||||
|
||||
//
|
||||
// Copy capsule image to '\efi\UpdateCapsule\'
|
||||
//
|
||||
Status = WriteUpdateFile (CapsuleBuffer, CapsuleBufferSize, FileName, CapsuleNum, Fs);
|
||||
Status = WriteUpdateFile (CapsuleBuffer, CapsuleBufferSize, FilePath, CapsuleNum, Fs);
|
||||
if (EFI_ERROR (Status)) {
|
||||
Print (L"CapsuleApp: capsule image could not be copied for update.\n");
|
||||
return Status;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
Master header file for DxeIpl PEIM. All source files in this module should
|
||||
include this file for common definitions.
|
||||
|
||||
Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -21,7 +21,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
|||
#include <Ppi/LoadFile.h>
|
||||
#include <Ppi/S3Resume2.h>
|
||||
#include <Ppi/RecoveryModule.h>
|
||||
#include <Ppi/CapsuleOnDisk.h>
|
||||
#include <Ppi/VectorHandoffInfo.h>
|
||||
|
||||
#include <Guid/MemoryTypeInformation.h>
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# PPI to discover and dispatch the DXE Foundation and components that are
|
||||
# needed to run the DXE Foundation.
|
||||
#
|
||||
# Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
# Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
@ -76,19 +76,17 @@
|
|||
ArmMmuLib
|
||||
|
||||
[Ppis]
|
||||
gEfiDxeIplPpiGuid ## PRODUCES
|
||||
gEfiPeiDecompressPpiGuid ## PRODUCES
|
||||
gEfiEndOfPeiSignalPpiGuid ## SOMETIMES_PRODUCES # Not produced on S3 boot path
|
||||
gEfiPeiReadOnlyVariable2PpiGuid ## SOMETIMES_CONSUMES
|
||||
gEfiPeiLoadFilePpiGuid ## SOMETIMES_CONSUMES
|
||||
gEfiPeiS3Resume2PpiGuid ## SOMETIMES_CONSUMES # Consumed on S3 boot path
|
||||
gEfiPeiRecoveryModulePpiGuid ## SOMETIMES_CONSUMES # Consumed on recovery boot path
|
||||
gEfiDxeIplPpiGuid ## PRODUCES
|
||||
gEfiPeiDecompressPpiGuid ## PRODUCES
|
||||
gEfiEndOfPeiSignalPpiGuid ## SOMETIMES_PRODUCES # Not produced on S3 boot path
|
||||
gEfiPeiReadOnlyVariable2PpiGuid ## SOMETIMES_CONSUMES
|
||||
gEfiPeiLoadFilePpiGuid ## SOMETIMES_CONSUMES
|
||||
gEfiPeiS3Resume2PpiGuid ## SOMETIMES_CONSUMES # Consumed on S3 boot path
|
||||
gEfiPeiRecoveryModulePpiGuid ## SOMETIMES_CONSUMES # Consumed on recovery boot path
|
||||
## SOMETIMES_CONSUMES
|
||||
## UNDEFINED # HOB
|
||||
gEfiVectorHandoffInfoPpiGuid
|
||||
gEfiPeiMemoryDiscoveredPpiGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiPeiBootInCapsuleOnDiskModePpiGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiPeiCapsuleOnDiskPpiGuid ## SOMETIMES_CONSUMES # Consumed on firmware update boot path
|
||||
gEfiPeiMemoryDiscoveredPpiGuid ## SOMETIMES_CONSUMES
|
||||
|
||||
[Guids]
|
||||
## SOMETIMES_CONSUMES ## Variable:L"MemoryTypeInformation"
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Responsibility of this module is to load the DXE Core from a Firmware Volume.
|
||||
|
||||
Copyright (c) 2016 HP Development Company, L.P.
|
||||
Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -265,9 +265,7 @@ DxeLoadCore (
|
|||
UINTN DataSize;
|
||||
EFI_PEI_S3_RESUME2_PPI *S3Resume;
|
||||
EFI_PEI_RECOVERY_MODULE_PPI *PeiRecovery;
|
||||
EFI_PEI_CAPSULE_ON_DISK_PPI *PeiCapsuleOnDisk;
|
||||
EFI_MEMORY_TYPE_INFORMATION MemoryData[EfiMaxMemoryType + 1];
|
||||
VOID *CapsuleOnDiskModePpi;
|
||||
|
||||
//
|
||||
// if in S3 Resume, restore configure
|
||||
|
@ -332,32 +330,6 @@ DxeLoadCore (
|
|||
//
|
||||
// Now should have a HOB with the DXE core
|
||||
//
|
||||
} else if (BootMode == BOOT_ON_FLASH_UPDATE) {
|
||||
//
|
||||
// If Capsule On Disk mode, call storage stack to read Capsule Relocation file
|
||||
// IoMmmu is highly recommmended to enable before reading
|
||||
//
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEdkiiPeiBootInCapsuleOnDiskModePpiGuid,
|
||||
0,
|
||||
NULL,
|
||||
&CapsuleOnDiskModePpi
|
||||
);
|
||||
if (!EFI_ERROR(Status)) {
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEdkiiPeiCapsuleOnDiskPpiGuid,
|
||||
0,
|
||||
NULL,
|
||||
(VOID **) &PeiCapsuleOnDisk
|
||||
);
|
||||
|
||||
//
|
||||
// Whether failed, still goes to Firmware Update boot path. BDS will clear corresponding indicator and reboot later on
|
||||
//
|
||||
if (!EFI_ERROR (Status)) {
|
||||
Status = PeiCapsuleOnDisk->LoadCapsuleOnDisk (PeiServices, PeiCapsuleOnDisk);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (GetFirstGuidHob ((CONST EFI_GUID *)&gEfiMemoryTypeInformationGuid) == NULL) {
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
This library class defines a set of interfaces for how to process capsule image updates.
|
||||
|
||||
Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -10,11 +10,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
|||
#ifndef __CAPSULE_LIB_H__
|
||||
#define __CAPSULE_LIB_H__
|
||||
|
||||
//
|
||||
// BOOLEAN Variable to indicate whether system is in the capsule on disk state.
|
||||
//
|
||||
#define COD_RELOCATION_INFO_VAR_NAME L"CodRelocationInfo"
|
||||
|
||||
/**
|
||||
The firmware checks whether the capsule image is supported
|
||||
by the CapsuleGuid in CapsuleHeader or if there is other specific information in
|
||||
|
@ -86,75 +81,4 @@ ProcessCapsules (
|
|||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
This routine is called to check if CapsuleOnDisk flag in OsIndications Variable
|
||||
is enabled.
|
||||
|
||||
@retval TRUE Flag is enabled
|
||||
@retval FALSE Flag is not enabled
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
CoDCheckCapsuleOnDiskFlag(
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
This routine is called to clear CapsuleOnDisk flags including OsIndications and BootNext variable
|
||||
|
||||
@retval EFI_SUCCESS All Capsule On Disk flags are cleared
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDClearCapsuleOnDiskFlag(
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Relocate Capsule on Disk from EFI system partition.
|
||||
|
||||
Two solution to deliver Capsule On Disk:
|
||||
Solution A: If PcdCapsuleInRamSupport is enabled, relocate Capsule On Disk to memory and call UpdateCapsule().
|
||||
Solution B: If PcdCapsuleInRamSupport is disabled, relocate Capsule On Disk to a platform-specific NV storage
|
||||
device with BlockIo protocol.
|
||||
|
||||
Device enumeration like USB costs time, user can input MaxRetry to tell function to retry.
|
||||
Function will stall 100ms between each retry.
|
||||
|
||||
Side Effects:
|
||||
Capsule Delivery Supported Flag in OsIndication variable and BootNext variable will be cleared.
|
||||
Solution B: Content corruption. Block IO write directly touches low level write. Orignal partitions, file
|
||||
systems of the relocation device will be corrupted.
|
||||
|
||||
@param[in] MaxRetry Max Connection Retry. Stall 100ms between each connection try to ensure
|
||||
devices like USB can get enumerated. Input 0 means no retry.
|
||||
|
||||
@retval EFI_SUCCESS Capsule on Disk images are successfully relocated.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDRelocateCapsule(
|
||||
UINTN MaxRetry
|
||||
);
|
||||
|
||||
/**
|
||||
Remove the temp file from the root of EFI System Partition.
|
||||
Device enumeration like USB costs time, user can input MaxRetry to tell function to retry.
|
||||
Function will stall 100ms between each retry.
|
||||
|
||||
@param[in] MaxRetry Max Connection Retry. Stall 100ms between each connection try to ensure
|
||||
devices like USB can get enumerated. Input 0 means no retry.
|
||||
|
||||
@retval EFI_SUCCESS Remove the temp file successfully.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDRemoveTempFile (
|
||||
UINTN MaxRetry
|
||||
);
|
||||
|
||||
#endif
|
||||
|
|
|
@ -1,55 +0,0 @@
|
|||
/** @file
|
||||
This file declares Capsule On Disk PPI. This PPI is used to find and load the
|
||||
capsule on files that are relocated into a temp file under rootdir.
|
||||
|
||||
Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __PEI_CAPSULE_ON_DISK_PPI_H__
|
||||
#define __PEI_CAPSULE_ON_DISK_PPI_H__
|
||||
|
||||
#define EFI_PEI_CAPSULE_ON_DISK_PPI_GUID \
|
||||
{ \
|
||||
0x71a9ea61, 0x5a35, 0x4a5d, {0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } \
|
||||
}
|
||||
|
||||
typedef struct _EFI_PEI_CAPSULE_ON_DISK_PPI EFI_PEI_CAPSULE_ON_DISK_PPI;
|
||||
|
||||
/**
|
||||
Loads a DXE capsule from some media into memory and updates the HOB table
|
||||
with the DXE firmware volume information.
|
||||
|
||||
@param PeiServices General-purpose services that are available to every PEIM.
|
||||
@param This Indicates the EFI_PEI_RECOVERY_MODULE_PPI instance.
|
||||
|
||||
@retval EFI_SUCCESS The capsule was loaded correctly.
|
||||
@retval EFI_DEVICE_ERROR A device error occurred.
|
||||
@retval EFI_NOT_FOUND A recovery DXE capsule cannot be found.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EFI_PEI_LOAD_CAPSULE_ON_DISK)(
|
||||
IN EFI_PEI_SERVICES **PeiServices,
|
||||
IN EFI_PEI_CAPSULE_ON_DISK_PPI *This
|
||||
);
|
||||
|
||||
///
|
||||
/// Finds and loads the recovery files.
|
||||
///
|
||||
struct _EFI_PEI_CAPSULE_ON_DISK_PPI {
|
||||
EFI_PEI_LOAD_CAPSULE_ON_DISK LoadCapsuleOnDisk; ///< Loads a DXE binary capsule into memory.
|
||||
};
|
||||
|
||||
extern EFI_GUID gEdkiiPeiCapsuleOnDiskPpiGuid;
|
||||
|
||||
#define EFI_PEI_BOOT_IN_CAPSULE_ON_DISK_MODE_PPI \
|
||||
{ \
|
||||
0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } \
|
||||
}
|
||||
|
||||
extern EFI_GUID gEfiPeiBootInCapsuleOnDiskModePpiGuid;
|
||||
|
||||
#endif
|
File diff suppressed because it is too large
Load Diff
|
@ -1,75 +0,0 @@
|
|||
/** @file
|
||||
Defines several datastructures used by Capsule On Disk feature.
|
||||
They are mainly used for FAT files.
|
||||
|
||||
Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _CAPSULES_ON_DISK_H_
|
||||
#define _CAPSULES_ON_DISK_H_
|
||||
|
||||
#include <Uefi.h>
|
||||
#include <Pi/PiMultiPhase.h>
|
||||
|
||||
#include <Library/UefiLib.h>
|
||||
#include <Library/DebugLib.h>
|
||||
#include <Library/BaseLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Library/UefiRuntimeServicesTableLib.h>
|
||||
#include <Library/UefiRuntimeLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/FileHandleLib.h>
|
||||
#include <Library/CapsuleLib.h>
|
||||
#include <Library/DevicePathLib.h>
|
||||
#include <Library/PrintLib.h>
|
||||
#include <Library/UefiBootManagerLib.h>
|
||||
|
||||
#include <Protocol/SimpleFileSystem.h>
|
||||
#include <Protocol/DiskIo.h>
|
||||
#include <Protocol/BlockIo.h>
|
||||
|
||||
#include <Guid/CapsuleVendor.h>
|
||||
#include <Guid/FileInfo.h>
|
||||
#include <Guid/GlobalVariable.h>
|
||||
|
||||
//
|
||||
// This data structure is the part of FILE_INFO_ENTRY
|
||||
//
|
||||
#define FILE_INFO_SIGNATURE SIGNATURE_32 ('F', 'L', 'I', 'F')
|
||||
|
||||
//
|
||||
// LoadOptionNumber of the boot option where the capsules is relocated.
|
||||
//
|
||||
#define COD_RELOCATION_LOAD_OPTION_VAR_NAME L"CodRelocationLoadOption"
|
||||
|
||||
//
|
||||
// (20 * (6+5+2))+1) unicode characters from EFI FAT spec (doubled for bytes)
|
||||
//
|
||||
#define MAX_FILE_NAME_SIZE 522
|
||||
#define MAX_FILE_NAME_LEN (MAX_FILE_NAME_SIZE / sizeof(CHAR16))
|
||||
#define MAX_FILE_INFO_LEN (OFFSET_OF(EFI_FILE_INFO, FileName) + MAX_FILE_NAME_LEN)
|
||||
|
||||
typedef struct {
|
||||
UINTN Signature;
|
||||
LIST_ENTRY Link; /// Linked list members.
|
||||
EFI_FILE_INFO *FileInfo; /// Pointer to the FileInfo struct for this file or NULL.
|
||||
CHAR16 *FileNameFirstPart; /// Text to the left of right-most period in the file name. String is capitialized
|
||||
CHAR16 *FileNameSecondPart; /// Text to the right of right-most period in the file name.String is capitialized. Maybe NULL
|
||||
} FILE_INFO_ENTRY;
|
||||
|
||||
typedef struct {
|
||||
//
|
||||
// image address.
|
||||
//
|
||||
VOID *ImageAddress;
|
||||
//
|
||||
// The file info of the image comes from.
|
||||
// if FileInfo == NULL. means image does not come from file
|
||||
//
|
||||
EFI_FILE_INFO *FileInfo;
|
||||
} IMAGE_INFO;
|
||||
|
||||
#endif // _CAPSULES_ON_DISK_H_
|
|
@ -10,7 +10,7 @@
|
|||
ValidateFmpCapsule(), and DisplayCapsuleImage() receives untrusted input and
|
||||
performs basic validation.
|
||||
|
||||
Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -80,7 +80,6 @@ RecordCapsuleStatusVariable (
|
|||
@param[in] PayloadIndex FMP payload index
|
||||
@param[in] ImageHeader FMP image header
|
||||
@param[in] FmpDevicePath DevicePath associated with the FMP producer
|
||||
@param[in] CapFileName Capsule file name
|
||||
|
||||
@retval EFI_SUCCESS The capsule status variable is recorded.
|
||||
@retval EFI_OUT_OF_RESOURCES No resource to record the capsule status variable.
|
||||
|
@ -91,8 +90,7 @@ RecordFmpCapsuleStatusVariable (
|
|||
IN EFI_STATUS CapsuleStatus,
|
||||
IN UINTN PayloadIndex,
|
||||
IN EFI_FIRMWARE_MANAGEMENT_CAPSULE_IMAGE_HEADER *ImageHeader,
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath, OPTIONAL
|
||||
IN CHAR16 *CapFileName OPTIONAL
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath OPTIONAL
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -111,22 +109,6 @@ UpdateImageProgress (
|
|||
IN UINTN Completion
|
||||
);
|
||||
|
||||
/**
|
||||
Return if this capsule is a capsule name capsule, based upon CapsuleHeader.
|
||||
|
||||
@param[in] CapsuleHeader A pointer to EFI_CAPSULE_HEADER
|
||||
|
||||
@retval TRUE It is a capsule name capsule.
|
||||
@retval FALSE It is not a capsule name capsule.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsCapsuleNameCapsule (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader
|
||||
)
|
||||
{
|
||||
return CompareGuid (&CapsuleHeader->CapsuleGuid, &gEdkiiCapsuleOnDiskNameGuid);
|
||||
}
|
||||
|
||||
/**
|
||||
Return if this CapsuleGuid is a FMP capsule GUID or not.
|
||||
|
||||
|
@ -1052,12 +1034,11 @@ StartFmpImage (
|
|||
/**
|
||||
Record FMP capsule status.
|
||||
|
||||
@param[in] Handle A FMP handle.
|
||||
@param[in] Handle A FMP handle.
|
||||
@param[in] CapsuleHeader The capsule image header
|
||||
@param[in] CapsuleStatus The capsule process stauts
|
||||
@param[in] PayloadIndex FMP payload index
|
||||
@param[in] ImageHeader FMP image header
|
||||
@param[in] CapFileName Capsule file name
|
||||
**/
|
||||
VOID
|
||||
RecordFmpCapsuleStatus (
|
||||
|
@ -1065,8 +1046,7 @@ RecordFmpCapsuleStatus (
|
|||
IN EFI_CAPSULE_HEADER *CapsuleHeader,
|
||||
IN EFI_STATUS CapsuleStatus,
|
||||
IN UINTN PayloadIndex,
|
||||
IN EFI_FIRMWARE_MANAGEMENT_CAPSULE_IMAGE_HEADER *ImageHeader,
|
||||
IN CHAR16 *CapFileName OPTIONAL
|
||||
IN EFI_FIRMWARE_MANAGEMENT_CAPSULE_IMAGE_HEADER *ImageHeader
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
|
@ -1090,8 +1070,7 @@ RecordFmpCapsuleStatus (
|
|||
CapsuleStatus,
|
||||
PayloadIndex,
|
||||
ImageHeader,
|
||||
FmpDevicePath,
|
||||
CapFileName
|
||||
FmpDevicePath
|
||||
);
|
||||
|
||||
//
|
||||
|
@ -1136,7 +1115,6 @@ RecordFmpCapsuleStatus (
|
|||
This function need support nested FMP capsule.
|
||||
|
||||
@param[in] CapsuleHeader Points to a capsule header.
|
||||
@param[in] CapFileName Capsule file name.
|
||||
@param[out] ResetRequired Indicates whether reset is required or not.
|
||||
|
||||
@retval EFI_SUCESS Process Capsule Image successfully.
|
||||
|
@ -1148,7 +1126,6 @@ RecordFmpCapsuleStatus (
|
|||
EFI_STATUS
|
||||
ProcessFmpCapsuleImage (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader,
|
||||
IN CHAR16 *CapFileName, OPTIONAL
|
||||
OUT BOOLEAN *ResetRequired OPTIONAL
|
||||
)
|
||||
{
|
||||
|
@ -1168,7 +1145,7 @@ ProcessFmpCapsuleImage (
|
|||
BOOLEAN Abort;
|
||||
|
||||
if (!IsFmpCapsuleGuid(&CapsuleHeader->CapsuleGuid)) {
|
||||
return ProcessFmpCapsuleImage ((EFI_CAPSULE_HEADER *)((UINTN)CapsuleHeader + CapsuleHeader->HeaderSize), CapFileName, ResetRequired);
|
||||
return ProcessFmpCapsuleImage ((EFI_CAPSULE_HEADER *)((UINTN)CapsuleHeader + CapsuleHeader->HeaderSize), ResetRequired);
|
||||
}
|
||||
|
||||
NotReady = FALSE;
|
||||
|
@ -1250,8 +1227,7 @@ ProcessFmpCapsuleImage (
|
|||
CapsuleHeader,
|
||||
EFI_NOT_READY,
|
||||
Index - FmpCapsuleHeader->EmbeddedDriverCount,
|
||||
ImageHeader,
|
||||
CapFileName
|
||||
ImageHeader
|
||||
);
|
||||
continue;
|
||||
}
|
||||
|
@ -1263,8 +1239,7 @@ ProcessFmpCapsuleImage (
|
|||
CapsuleHeader,
|
||||
EFI_ABORTED,
|
||||
Index - FmpCapsuleHeader->EmbeddedDriverCount,
|
||||
ImageHeader,
|
||||
CapFileName
|
||||
ImageHeader
|
||||
);
|
||||
continue;
|
||||
}
|
||||
|
@ -1287,8 +1262,7 @@ ProcessFmpCapsuleImage (
|
|||
CapsuleHeader,
|
||||
Status,
|
||||
Index - FmpCapsuleHeader->EmbeddedDriverCount,
|
||||
ImageHeader,
|
||||
CapFileName
|
||||
ImageHeader
|
||||
);
|
||||
}
|
||||
if (HandleBuffer != NULL) {
|
||||
|
@ -1440,13 +1414,6 @@ SupportCapsuleImage (
|
|||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
//
|
||||
// Check capsule file name capsule
|
||||
//
|
||||
if (IsCapsuleNameCapsule(CapsuleHeader)) {
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
if (IsFmpCapsule(CapsuleHeader)) {
|
||||
//
|
||||
// Fake capsule header is valid case in QueryCapsuleCpapbilities().
|
||||
|
@ -1469,7 +1436,6 @@ SupportCapsuleImage (
|
|||
Caution: This function may receive untrusted input.
|
||||
|
||||
@param[in] CapsuleHeader Points to a capsule header.
|
||||
@param[in] CapFileName Capsule file name.
|
||||
@param[out] ResetRequired Indicates whether reset is required or not.
|
||||
|
||||
@retval EFI_SUCESS Process Capsule Image successfully.
|
||||
|
@ -1481,7 +1447,6 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
ProcessThisCapsuleImage (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader,
|
||||
IN CHAR16 *CapFileName, OPTIONAL
|
||||
OUT BOOLEAN *ResetRequired OPTIONAL
|
||||
)
|
||||
{
|
||||
|
@ -1519,7 +1484,7 @@ ProcessThisCapsuleImage (
|
|||
// Process EFI FMP Capsule
|
||||
//
|
||||
DEBUG((DEBUG_INFO, "ProcessFmpCapsuleImage ...\n"));
|
||||
Status = ProcessFmpCapsuleImage(CapsuleHeader, CapFileName, ResetRequired);
|
||||
Status = ProcessFmpCapsuleImage(CapsuleHeader, ResetRequired);
|
||||
DEBUG((DEBUG_INFO, "ProcessFmpCapsuleImage - %r\n", Status));
|
||||
|
||||
return Status;
|
||||
|
@ -1546,7 +1511,7 @@ ProcessCapsuleImage (
|
|||
IN EFI_CAPSULE_HEADER *CapsuleHeader
|
||||
)
|
||||
{
|
||||
return ProcessThisCapsuleImage (CapsuleHeader, NULL, NULL);
|
||||
return ProcessThisCapsuleImage (CapsuleHeader, NULL);
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
#
|
||||
# Capsule library instance for DXE_DRIVER module types.
|
||||
#
|
||||
# Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
# Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
##
|
||||
|
@ -29,8 +29,6 @@
|
|||
DxeCapsuleLib.c
|
||||
DxeCapsuleProcessLib.c
|
||||
DxeCapsuleReportLib.c
|
||||
CapsuleOnDisk.c
|
||||
CapsuleOnDisk.h
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
|
@ -49,8 +47,6 @@
|
|||
HobLib
|
||||
BmpSupportLib
|
||||
DisplayUpdateProgressLib
|
||||
FileHandleLib
|
||||
UefiBootManagerLib
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleMax ## CONSUMES
|
||||
|
@ -63,19 +59,12 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleStatusCodeUpdateFirmwareSuccess ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleStatusCodeUpdateFirmwareFailed ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleStatusCodeResettingSystem ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleInRamSupport ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleOnDiskSupport ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCodRelocationDevPath ## SOMETIMES_CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName ## CONSUMES
|
||||
|
||||
[Protocols]
|
||||
gEsrtManagementProtocolGuid ## CONSUMES
|
||||
gEfiFirmwareManagementProtocolGuid ## CONSUMES
|
||||
gEdkiiVariableLockProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiFirmwareManagementProgressProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSimpleFileSystemProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiBlockIoProtocolGuid ## CONSUMES
|
||||
gEfiDiskIoProtocolGuid ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gEfiFmpCapsuleGuid ## SOMETIMES_CONSUMES ## GUID
|
||||
|
@ -85,14 +74,6 @@
|
|||
gEfiCapsuleReportGuid
|
||||
gEfiCapsuleVendorGuid ## SOMETIMES_CONSUMES ## Variable:L"CapsuleUpdateData"
|
||||
gEfiEndOfDxeEventGroupGuid ## CONSUMES ## Event
|
||||
gEfiPartTypeSystemPartGuid ## SOMETIMES_CONSUMES
|
||||
gEfiCapsuleVendorGuid ## SOMETIMES_CONSUMES ## Variable:L"CodRelocationInfo"
|
||||
## SOMETIMES_CONSUMES ## Variable:L"OsIndications"
|
||||
## SOMETIMES_PRODUCES ## Variable:L"OsIndications"
|
||||
## SOMETIMES_CONSUMES ## Variable:L"BootNext"
|
||||
## SOMETIMES_PRODUCES ## Variable:L"BootNext"
|
||||
gEfiGlobalVariableGuid
|
||||
gEdkiiCapsuleOnDiskNameGuid ## SOMETIMES_CONSUMES ## GUID
|
||||
|
||||
[Depex]
|
||||
gEfiVariableWriteArchProtocolGuid
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
ProcessCapsules(), ProcessTheseCapsules() will receive untrusted
|
||||
input and do basic validation.
|
||||
|
||||
Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -92,41 +92,10 @@ IsValidCapsuleHeader (
|
|||
IN UINT64 CapsuleSize
|
||||
);
|
||||
|
||||
/**
|
||||
Return if this capsule is a capsule name capsule, based upon CapsuleHeader.
|
||||
|
||||
@param[in] CapsuleHeader A pointer to EFI_CAPSULE_HEADER
|
||||
|
||||
@retval TRUE It is a capsule name capsule.
|
||||
@retval FALSE It is not a capsule name capsule.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsCapsuleNameCapsule (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader
|
||||
);
|
||||
|
||||
/**
|
||||
Check the integrity of the capsule name capsule.
|
||||
If the capsule is vaild, return the physical address of each capsule name string.
|
||||
|
||||
@param[in] CapsuleHeader Pointer to the capsule header of a capsule name capsule.
|
||||
@param[out] CapsuleNameNum Number of capsule name.
|
||||
|
||||
@retval NULL Capsule name capsule is not valid.
|
||||
@retval CapsuleNameBuf Array of capsule name physical address.
|
||||
|
||||
**/
|
||||
EFI_PHYSICAL_ADDRESS *
|
||||
ValidateCapsuleNameCapsuleIntegrity (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader,
|
||||
OUT UINTN *CapsuleNameNum
|
||||
);
|
||||
|
||||
extern BOOLEAN mDxeCapsuleLibEndOfDxe;
|
||||
BOOLEAN mNeedReset = FALSE;
|
||||
|
||||
VOID **mCapsulePtr;
|
||||
CHAR16 **mCapsuleNamePtr;
|
||||
EFI_STATUS *mCapsuleStatusArray;
|
||||
UINT32 mCapsuleTotalNumber;
|
||||
|
||||
|
@ -147,7 +116,6 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
ProcessThisCapsuleImage (
|
||||
IN EFI_CAPSULE_HEADER *CapsuleHeader,
|
||||
IN CHAR16 *CapFileName, OPTIONAL
|
||||
OUT BOOLEAN *ResetRequired OPTIONAL
|
||||
);
|
||||
|
||||
|
@ -217,18 +185,6 @@ InitCapsulePtr (
|
|||
{
|
||||
EFI_PEI_HOB_POINTERS HobPointer;
|
||||
UINTN Index;
|
||||
UINTN Index2;
|
||||
UINTN Index3;
|
||||
UINTN CapsuleNameNumber;
|
||||
UINTN CapsuleNameTotalNumber;
|
||||
UINTN CapsuleNameCapsuleTotalNumber;
|
||||
VOID **CapsuleNameCapsulePtr;
|
||||
EFI_PHYSICAL_ADDRESS *CapsuleNameAddress;
|
||||
|
||||
CapsuleNameNumber = 0;
|
||||
CapsuleNameTotalNumber = 0;
|
||||
CapsuleNameCapsuleTotalNumber = 0;
|
||||
CapsuleNameCapsulePtr = NULL;
|
||||
|
||||
//
|
||||
// Find all capsule images from hob
|
||||
|
@ -238,11 +194,7 @@ InitCapsulePtr (
|
|||
if (!IsValidCapsuleHeader((VOID *)(UINTN)HobPointer.Capsule->BaseAddress, HobPointer.Capsule->Length)) {
|
||||
HobPointer.Header->HobType = EFI_HOB_TYPE_UNUSED; // Mark this hob as invalid
|
||||
} else {
|
||||
if (IsCapsuleNameCapsule((VOID *)(UINTN)HobPointer.Capsule->BaseAddress)) {
|
||||
CapsuleNameCapsuleTotalNumber++;
|
||||
} else {
|
||||
mCapsuleTotalNumber++;
|
||||
}
|
||||
mCapsuleTotalNumber++;
|
||||
}
|
||||
HobPointer.Raw = GET_NEXT_HOB (HobPointer);
|
||||
}
|
||||
|
@ -272,72 +224,15 @@ InitCapsulePtr (
|
|||
}
|
||||
SetMemN (mCapsuleStatusArray, sizeof (EFI_STATUS) * mCapsuleTotalNumber, EFI_NOT_READY);
|
||||
|
||||
if (CapsuleNameCapsuleTotalNumber != 0) {
|
||||
CapsuleNameCapsulePtr = (VOID **) AllocateZeroPool (sizeof (VOID *) * CapsuleNameCapsuleTotalNumber);
|
||||
if (CapsuleNameCapsulePtr == NULL) {
|
||||
DEBUG ((DEBUG_ERROR, "Allocate CapsuleNameCapsulePtr fail!\n"));
|
||||
FreePool (mCapsulePtr);
|
||||
FreePool (mCapsuleStatusArray);
|
||||
mCapsulePtr = NULL;
|
||||
mCapsuleStatusArray = NULL;
|
||||
mCapsuleTotalNumber = 0;
|
||||
return ;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// Find all capsule images from hob
|
||||
//
|
||||
HobPointer.Raw = GetHobList ();
|
||||
Index = 0;
|
||||
Index2 = 0;
|
||||
Index = 0;
|
||||
while ((HobPointer.Raw = GetNextHob (EFI_HOB_TYPE_UEFI_CAPSULE, HobPointer.Raw)) != NULL) {
|
||||
if (!IsCapsuleNameCapsule ((VOID *) (UINTN) HobPointer.Capsule->BaseAddress)) {
|
||||
mCapsulePtr [Index++] = (VOID *) (UINTN) HobPointer.Capsule->BaseAddress;
|
||||
} else {
|
||||
CapsuleNameCapsulePtr [Index2++] = (VOID *) (UINTN) HobPointer.Capsule->BaseAddress;
|
||||
}
|
||||
mCapsulePtr [Index++] = (VOID *) (UINTN) HobPointer.Capsule->BaseAddress;
|
||||
HobPointer.Raw = GET_NEXT_HOB (HobPointer);
|
||||
}
|
||||
|
||||
//
|
||||
// Find Capsule On Disk Names
|
||||
//
|
||||
for (Index = 0; Index < CapsuleNameCapsuleTotalNumber; Index ++) {
|
||||
CapsuleNameAddress = ValidateCapsuleNameCapsuleIntegrity (CapsuleNameCapsulePtr[Index], &CapsuleNameNumber);
|
||||
if (CapsuleNameAddress != NULL ) {
|
||||
CapsuleNameTotalNumber += CapsuleNameNumber;
|
||||
}
|
||||
}
|
||||
|
||||
if (CapsuleNameTotalNumber == mCapsuleTotalNumber) {
|
||||
mCapsuleNamePtr = (CHAR16 **) AllocateZeroPool (sizeof (CHAR16 *) * mCapsuleTotalNumber);
|
||||
if (mCapsuleNamePtr == NULL) {
|
||||
DEBUG ((DEBUG_ERROR, "Allocate mCapsuleNamePtr fail!\n"));
|
||||
FreePool (mCapsulePtr);
|
||||
FreePool (mCapsuleStatusArray);
|
||||
FreePool (CapsuleNameCapsulePtr);
|
||||
mCapsulePtr = NULL;
|
||||
mCapsuleStatusArray = NULL;
|
||||
mCapsuleTotalNumber = 0;
|
||||
return ;
|
||||
}
|
||||
|
||||
for (Index = 0, Index3 = 0; Index < CapsuleNameCapsuleTotalNumber; Index ++) {
|
||||
CapsuleNameAddress = ValidateCapsuleNameCapsuleIntegrity (CapsuleNameCapsulePtr[Index], &CapsuleNameNumber);
|
||||
if (CapsuleNameAddress != NULL ) {
|
||||
for (Index2 = 0; Index2 < CapsuleNameNumber; Index2 ++) {
|
||||
mCapsuleNamePtr[Index3 ++] = (CHAR16 *)(UINTN) CapsuleNameAddress[Index2];
|
||||
}
|
||||
}
|
||||
}
|
||||
} else {
|
||||
mCapsuleNamePtr = NULL;
|
||||
}
|
||||
|
||||
if (CapsuleNameCapsulePtr != NULL) {
|
||||
FreePool (CapsuleNameCapsulePtr);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -501,7 +396,6 @@ ProcessTheseCapsules (
|
|||
ESRT_MANAGEMENT_PROTOCOL *EsrtManagement;
|
||||
UINT16 EmbeddedDriverCount;
|
||||
BOOLEAN ResetRequired;
|
||||
CHAR16 *CapsuleName;
|
||||
|
||||
REPORT_STATUS_CODE(EFI_PROGRESS_CODE, (EFI_SOFTWARE | PcdGet32(PcdStatusCodeSubClassCapsule) | PcdGet32(PcdCapsuleStatusCodeProcessCapsulesBegin)));
|
||||
|
||||
|
@ -514,7 +408,6 @@ ProcessTheseCapsules (
|
|||
// We didn't find a hob, so had no errors.
|
||||
//
|
||||
DEBUG ((DEBUG_ERROR, "We can not find capsule data in capsule update boot mode.\n"));
|
||||
mNeedReset = TRUE;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -537,11 +430,10 @@ ProcessTheseCapsules (
|
|||
//
|
||||
for (Index = 0; Index < mCapsuleTotalNumber; Index++) {
|
||||
CapsuleHeader = (EFI_CAPSULE_HEADER*) mCapsulePtr [Index];
|
||||
CapsuleName = (mCapsuleNamePtr == NULL) ? NULL : mCapsuleNamePtr[Index];
|
||||
if (CompareGuid (&CapsuleHeader->CapsuleGuid, &gWindowsUxCapsuleGuid)) {
|
||||
DEBUG ((DEBUG_INFO, "ProcessThisCapsuleImage (Ux) - 0x%x\n", CapsuleHeader));
|
||||
DEBUG ((DEBUG_INFO, "Display logo capsule is found.\n"));
|
||||
Status = ProcessThisCapsuleImage (CapsuleHeader, CapsuleName, NULL);
|
||||
Status = ProcessThisCapsuleImage (CapsuleHeader, NULL);
|
||||
mCapsuleStatusArray [Index] = EFI_SUCCESS;
|
||||
DEBUG((DEBUG_INFO, "ProcessThisCapsuleImage (Ux) - %r\n", Status));
|
||||
break;
|
||||
|
@ -559,7 +451,6 @@ ProcessTheseCapsules (
|
|||
continue;
|
||||
}
|
||||
CapsuleHeader = (EFI_CAPSULE_HEADER*) mCapsulePtr [Index];
|
||||
CapsuleName = (mCapsuleNamePtr == NULL) ? NULL : mCapsuleNamePtr[Index];
|
||||
if (!CompareGuid (&CapsuleHeader->CapsuleGuid, &gWindowsUxCapsuleGuid)) {
|
||||
//
|
||||
// Call capsule library to process capsule image.
|
||||
|
@ -580,7 +471,7 @@ ProcessTheseCapsules (
|
|||
if ((!FirstRound) || (EmbeddedDriverCount == 0)) {
|
||||
DEBUG((DEBUG_INFO, "ProcessThisCapsuleImage - 0x%x\n", CapsuleHeader));
|
||||
ResetRequired = FALSE;
|
||||
Status = ProcessThisCapsuleImage (CapsuleHeader, CapsuleName, &ResetRequired);
|
||||
Status = ProcessThisCapsuleImage (CapsuleHeader, &ResetRequired);
|
||||
mCapsuleStatusArray [Index] = Status;
|
||||
DEBUG((DEBUG_INFO, "ProcessThisCapsuleImage - %r\n", Status));
|
||||
|
||||
|
@ -639,8 +530,7 @@ DoResetSystem (
|
|||
Caution: This function may receive untrusted input.
|
||||
|
||||
The capsules reported in EFI_HOB_UEFI_CAPSULE are processed.
|
||||
If there is no EFI_HOB_UEFI_CAPSULE, it means error occurs, force reset to
|
||||
normal boot path.
|
||||
If there is no EFI_HOB_UEFI_CAPSULE, this routine does nothing.
|
||||
|
||||
This routine should be called twice in BDS.
|
||||
1) The first call must be before EndOfDxe. The system capsules is processed.
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
DXE capsule report related function.
|
||||
|
||||
Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2016 - 2017, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -29,18 +29,6 @@
|
|||
|
||||
#include <IndustryStandard/WindowsUxCapsule.h>
|
||||
|
||||
/**
|
||||
This routine is called to clear CapsuleOnDisk Relocation Info variable.
|
||||
Total Capsule On Disk length is recorded in this variable
|
||||
|
||||
@retval EFI_SUCCESS Capsule On Disk flags are cleared
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
CoDClearCapsuleRelocationInfo(
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Get current capsule last variable index.
|
||||
|
||||
|
@ -186,7 +174,6 @@ RecordCapsuleStatusVariable (
|
|||
@param[in] PayloadIndex FMP payload index
|
||||
@param[in] ImageHeader FMP image header
|
||||
@param[in] FmpDevicePath DevicePath associated with the FMP producer
|
||||
@param[in] CapFileName Capsule file name
|
||||
|
||||
@retval EFI_SUCCESS The capsule status variable is recorded.
|
||||
@retval EFI_OUT_OF_RESOURCES No resource to record the capsule status variable.
|
||||
|
@ -197,8 +184,7 @@ RecordFmpCapsuleStatusVariable (
|
|||
IN EFI_STATUS CapsuleStatus,
|
||||
IN UINTN PayloadIndex,
|
||||
IN EFI_FIRMWARE_MANAGEMENT_CAPSULE_IMAGE_HEADER *ImageHeader,
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath, OPTIONAL
|
||||
IN CHAR16 *CapFileName OPTIONAL
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath OPTIONAL
|
||||
)
|
||||
{
|
||||
EFI_CAPSULE_RESULT_VARIABLE_HEADER *CapsuleResultVariableHeader;
|
||||
|
@ -208,11 +194,8 @@ RecordFmpCapsuleStatusVariable (
|
|||
UINTN CapsuleResultVariableSize;
|
||||
CHAR16 *DevicePathStr;
|
||||
UINTN DevicePathStrSize;
|
||||
UINTN CapFileNameSize;
|
||||
|
||||
DevicePathStr = NULL;
|
||||
CapFileNameSize = sizeof(CHAR16);
|
||||
|
||||
DevicePathStr = NULL;
|
||||
if (FmpDevicePath != NULL) {
|
||||
DevicePathStr = ConvertDevicePathToText (FmpDevicePath, FALSE, FALSE);
|
||||
}
|
||||
|
@ -221,16 +204,10 @@ RecordFmpCapsuleStatusVariable (
|
|||
} else {
|
||||
DevicePathStrSize = sizeof(CHAR16);
|
||||
}
|
||||
|
||||
if (CapFileName != NULL) {
|
||||
CapFileNameSize = StrSize(CapFileName);
|
||||
}
|
||||
|
||||
//
|
||||
// Allocate room for CapsuleFileName.
|
||||
// Allocate zero CHAR16 for CapsuleFileName.
|
||||
//
|
||||
CapsuleResultVariableSize = sizeof(EFI_CAPSULE_RESULT_VARIABLE_HEADER) + sizeof(EFI_CAPSULE_RESULT_VARIABLE_FMP) + CapFileNameSize + DevicePathStrSize;
|
||||
|
||||
CapsuleResultVariableSize = sizeof(EFI_CAPSULE_RESULT_VARIABLE_HEADER) + sizeof(EFI_CAPSULE_RESULT_VARIABLE_FMP) + sizeof(CHAR16) + DevicePathStrSize;
|
||||
CapsuleResultVariable = AllocateZeroPool (CapsuleResultVariableSize);
|
||||
if (CapsuleResultVariable == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
|
@ -248,13 +225,8 @@ RecordFmpCapsuleStatusVariable (
|
|||
CapsuleResultVariableFmp->PayloadIndex = (UINT8)PayloadIndex;
|
||||
CapsuleResultVariableFmp->UpdateImageIndex = ImageHeader->UpdateImageIndex;
|
||||
CopyGuid (&CapsuleResultVariableFmp->UpdateImageTypeId, &ImageHeader->UpdateImageTypeId);
|
||||
|
||||
if (CapFileName != NULL) {
|
||||
CopyMem((UINT8 *)CapsuleResultVariableFmp + sizeof(EFI_CAPSULE_RESULT_VARIABLE_FMP), CapFileName, CapFileNameSize);
|
||||
}
|
||||
|
||||
if (DevicePathStr != NULL) {
|
||||
CopyMem ((UINT8 *)CapsuleResultVariableFmp + sizeof(EFI_CAPSULE_RESULT_VARIABLE_FMP) + CapFileNameSize, DevicePathStr, DevicePathStrSize);
|
||||
CopyMem ((UINT8 *)CapsuleResultVariableFmp + sizeof(EFI_CAPSULE_RESULT_VARIABLE_FMP) + sizeof(CHAR16), DevicePathStr, DevicePathStrSize);
|
||||
FreePool (DevicePathStr);
|
||||
DevicePathStr = NULL;
|
||||
}
|
||||
|
@ -428,31 +400,6 @@ InitCapsuleUpdateVariable (
|
|||
}
|
||||
}
|
||||
|
||||
/**
|
||||
Initialize capsule relocation info variable.
|
||||
**/
|
||||
VOID
|
||||
InitCapsuleRelocationInfo (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock;
|
||||
|
||||
CoDClearCapsuleRelocationInfo();
|
||||
|
||||
//
|
||||
// Unlock Capsule On Disk relocation Info variable only when Capsule On Disk flag is enabled
|
||||
//
|
||||
if (!CoDCheckCapsuleOnDiskFlag()) {
|
||||
Status = gBS->LocateProtocol (&gEdkiiVariableLockProtocolGuid, NULL, (VOID **) &VariableLock);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
Status = VariableLock->RequestToLock (VariableLock, COD_RELOCATION_INFO_VAR_NAME, &gEfiCapsuleVendorGuid);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
Initialize capsule related variables.
|
||||
**/
|
||||
|
@ -464,8 +411,6 @@ InitCapsuleVariable (
|
|||
InitCapsuleUpdateVariable();
|
||||
InitCapsuleMaxVariable();
|
||||
InitCapsuleLastVariable();
|
||||
InitCapsuleRelocationInfo();
|
||||
|
||||
//
|
||||
// No need to clear L"Capsule####", because OS/APP should refer L"CapsuleLast"
|
||||
// to check status and delete them.
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Dummy function for runtime module, because CapsuleDxeRuntime
|
||||
does not need record capsule status variable.
|
||||
|
||||
Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -39,7 +39,6 @@ RecordCapsuleStatusVariable (
|
|||
@param[in] PayloadIndex FMP payload index
|
||||
@param[in] ImageHeader FMP image header
|
||||
@param[in] FmpDevicePath DevicePath associated with the FMP producer
|
||||
@param[in] CapFileName Capsule file name
|
||||
|
||||
@retval EFI_SUCCESS The capsule status variable is recorded.
|
||||
@retval EFI_OUT_OF_RESOURCES No resource to record the capsule status variable.
|
||||
|
@ -50,8 +49,7 @@ RecordFmpCapsuleStatusVariable (
|
|||
IN EFI_STATUS CapsuleStatus,
|
||||
IN UINTN PayloadIndex,
|
||||
IN EFI_FIRMWARE_MANAGEMENT_CAPSULE_IMAGE_HEADER *ImageHeader,
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath, OPTIONAL
|
||||
IN CHAR16 *CapFileName OPTIONAL
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FmpDevicePath OPTIONAL
|
||||
)
|
||||
{
|
||||
return EFI_UNSUPPORTED;
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
#
|
||||
# Capsule library instance for DXE_RUNTIME_DRIVER module types.
|
||||
#
|
||||
# Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
# Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
##
|
||||
|
@ -68,7 +68,6 @@
|
|||
gEfiEndOfDxeEventGroupGuid ## CONSUMES ## Event
|
||||
gEfiEventReadyToBootGuid ## CONSUMES ## Event
|
||||
gEfiEventVirtualAddressChangeGuid ## CONSUMES ## Event
|
||||
gEdkiiCapsuleOnDiskNameGuid ## SOMETIMES_CONSUMES ## GUID
|
||||
|
||||
[Depex]
|
||||
gEfiVariableWriteArchProtocolGuid
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
Null Dxe Capsule Library instance does nothing and returns unsupport status.
|
||||
|
||||
Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -85,86 +85,3 @@ ProcessCapsules (
|
|||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
This routine is called to check if CapsuleOnDisk flag in OsIndications Variable
|
||||
is enabled.
|
||||
|
||||
@retval TRUE Flag is enabled
|
||||
@retval FALSE Flag is not enabled
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
CoDCheckCapsuleOnDiskFlag(
|
||||
VOID
|
||||
)
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
This routine is called to clear CapsuleOnDisk flags including OsIndications and BootNext variable.
|
||||
|
||||
@retval EFI_SUCCESS All Capsule On Disk flags are cleared
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDClearCapsuleOnDiskFlag(
|
||||
VOID
|
||||
)
|
||||
{
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
/**
|
||||
Relocate Capsule on Disk from EFI system partition.
|
||||
|
||||
Two solution to deliver Capsule On Disk:
|
||||
Solution A: If PcdCapsuleInRamSupport is enabled, relocate Capsule On Disk to memory and call UpdateCapsule().
|
||||
Solution B: If PcdCapsuleInRamSupport is disabled, relocate Capsule On Disk to a platform-specific NV storage
|
||||
device with BlockIo protocol.
|
||||
|
||||
Device enumeration like USB costs time, user can input MaxRetry to tell function to retry.
|
||||
Function will stall 100ms between each retry.
|
||||
|
||||
Side Effects:
|
||||
Capsule Delivery Supported Flag in OsIndication variable and BootNext variable will be cleared.
|
||||
Solution B: Content corruption. Block IO write directly touches low level write. Orignal partitions, file
|
||||
systems of the relocation device will be corrupted.
|
||||
|
||||
@param[in] MaxRetry Max Connection Retry. Stall 100ms between each connection try to ensure
|
||||
devices like USB can get enumerated. Input 0 means no retry.
|
||||
|
||||
@retval EFI_SUCCESS Capsule on Disk images are successfully relocated.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDRelocateCapsule(
|
||||
UINTN MaxRetry
|
||||
)
|
||||
{
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
/**
|
||||
Remove the temp file from the root of EFI System Partition.
|
||||
Device enumeration like USB costs time, user can input MaxRetry to tell function to retry.
|
||||
Function will stall 100ms between each retry.
|
||||
|
||||
@param[in] MaxRetry Max Connection Retry. Stall 100ms between each connection try to ensure
|
||||
devices like USB can get enumerated. Input 0 means no retry.
|
||||
|
||||
@retval EFI_SUCCESS Remove the temp file successfully.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoDRemoveTempFile (
|
||||
UINTN MaxRetry
|
||||
)
|
||||
{
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
|
|
@ -399,9 +399,6 @@
|
|||
## Include/Guid/SerialPortLibVendor.h
|
||||
gEdkiiSerialPortLibVendorGuid = { 0xD3987D4B, 0x971A, 0x435F, { 0x8C, 0xAF, 0x49, 0x67, 0xEB, 0x62, 0x72, 0x41 } }
|
||||
|
||||
## GUID indicates the capsule is to store Capsule On Disk file names.
|
||||
gEdkiiCapsuleOnDiskNameGuid = { 0x98c80a4f, 0xe16b, 0x4d11, { 0x93, 0x9a, 0xab, 0xe5, 0x61, 0x26, 0x3, 0x30 } }
|
||||
|
||||
[Ppis]
|
||||
## Include/Ppi/AtaController.h
|
||||
gPeiAtaControllerPpiGuid = { 0xa45e60d1, 0xc719, 0x44aa, { 0xb0, 0x7a, 0xaa, 0x77, 0x7f, 0x85, 0x90, 0x6d }}
|
||||
|
@ -472,10 +469,6 @@
|
|||
## Include/Ppi/Debug.h
|
||||
gEdkiiDebugPpiGuid = { 0x999e699c, 0xb013, 0x475e, { 0xb1, 0x7b, 0xf3, 0xa8, 0xae, 0x5c, 0x48, 0x75 } }
|
||||
|
||||
## Include/Ppi/CapsuleOnDisk.h
|
||||
gEdkiiPeiCapsuleOnDiskPpiGuid = { 0x71a9ea61, 0x5a35, 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } }
|
||||
gEdkiiPeiBootInCapsuleOnDiskModePpiGuid = { 0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } }
|
||||
|
||||
[Protocols]
|
||||
## Load File protocol provides capability to load and unload EFI image into memory and execute it.
|
||||
# Include/Protocol/LoadPe32Image.h
|
||||
|
@ -1485,22 +1478,6 @@
|
|||
# @Prompt Maximum Number of PEI Reset Filters, Reset Notifications or Reset Handlers.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMaximumPeiResetNotifies|0x10|UINT32|0x0000010A
|
||||
|
||||
## Capsule On Disk is to deliver capsules via files on Mass Storage device.<BR><BR>
|
||||
# This PCD indicates if the Capsule On Disk is supported.<BR>
|
||||
# TRUE - Capsule On Disk is supported.<BR>
|
||||
# FALSE - Capsule On Disk is not supported.<BR>
|
||||
# If platform does not use this feature, this PCD should be set to FALSE.<BR><BR>
|
||||
# Two sulotions to deliver Capsule On Disk:<BR>
|
||||
# a) If PcdCapsuleInRamSupport = TRUE, Load Capsule On Disk image out of TCB, and reuse
|
||||
# Capsule In Ram to deliver capsule.<BR>
|
||||
# b) If PcdCapsuleInRamSupport = FALSE, Relocate Capsule On Disk image to RootDir out
|
||||
# of TCB, and reuse FatPei to load capsules from external storage.<BR>
|
||||
# Note:<BR>
|
||||
# If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule
|
||||
# On Disk will be bypassed.
|
||||
# @Prompt Enable Capsule On Disk support.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleOnDiskSupport|FALSE|BOOLEAN|0x0000002d
|
||||
|
||||
[PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
|
||||
## This PCD defines the Console output row. The default value is 25 according to UEFI spec.
|
||||
# This PCD could be set to 0 then console output would be at max column and max row.
|
||||
|
@ -1960,17 +1937,6 @@
|
|||
# @Prompt Recover file name in PEI phase
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdRecoveryFileName|L"FVMAIN.FV"|VOID*|0x30001045
|
||||
|
||||
## This is Capsule Temp Relocation file name in PEI phase.
|
||||
# The file must be in the root directory.
|
||||
# The file name must be the 8.3 format.
|
||||
# The PCD data must be in UNICODE format.
|
||||
# CapsuleOnDiskLoadPei PEI module will set value of this PCD to PcdRecoveryFileName, then
|
||||
# leverage recovery to get Capsule On Disk Temp Relocation file.
|
||||
# Note: The file name must be shorter than PcdRecoveryFileName, otherwise CapsuleOnDiskLoadPei
|
||||
# PEI module will fail to get Capsule On Disk Temp Relocation file.
|
||||
# @Prompt Capsule On Disk Temp Relocation file name in PEI phase
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName|L"TempCod.tmp"|VOID*|0x30001048
|
||||
|
||||
## This PCD hold a list GUIDs for the ImageTypeId to indicate the
|
||||
# FMP capsule is a system FMP.
|
||||
# @Prompt A list of system FMP ImageTypeId GUIDs
|
||||
|
@ -1982,20 +1948,6 @@
|
|||
# @Prompt The address mask when memory encryption is enabled.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047
|
||||
|
||||
## Capsule In Ram is to use memory to deliver the capsules that will be processed after system
|
||||
# reset.<BR><BR>
|
||||
# This PCD indicates if the Capsule In Ram is supported.<BR>
|
||||
# TRUE - Capsule In Ram is supported.<BR>
|
||||
# FALSE - Capsule In Ram is not supported.
|
||||
# @Prompt Enable Capsule In Ram support.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleInRamSupport|TRUE|BOOLEAN|0x0000002e
|
||||
|
||||
## Full device path of plaform specific device to store Capsule On Disk temp relocation file.<BR>
|
||||
# If this PCD is set, Capsule On Disk temp relocation file will be stored in the device specified
|
||||
# by this PCD, instead of the EFI System Partition that stores capsule image file.
|
||||
# @Prompt Capsule On Disk relocation device path.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCodRelocationDevPath|{0xFF}|VOID*|0x0000002f
|
||||
|
||||
[PcdsPatchableInModule]
|
||||
## Specify memory size with page number for PEI code when
|
||||
# Loading Module at Fixed Address feature is enabled.
|
||||
|
|
|
@ -199,9 +199,6 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizePopulateCapsule|0x0
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMaxPeiPerformanceLogEntries|28
|
||||
|
||||
[PcdsDynamicExDefault]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdRecoveryFileName|L"FVMAIN.FV"
|
||||
|
||||
[Components]
|
||||
MdeModulePkg/Application/HelloWorld/HelloWorld.inf
|
||||
MdeModulePkg/Application/DumpDynPcd/DumpDynPcd.inf
|
||||
|
@ -336,7 +333,6 @@
|
|||
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
|
||||
MdeModulePkg/Universal/BootManagerPolicyDxe/BootManagerPolicyDxe.inf
|
||||
MdeModulePkg/Universal/CapsulePei/CapsulePei.inf
|
||||
MdeModulePkg/Universal/CapsuleOnDiskLoadPei/CapsuleOnDiskLoadPei.inf
|
||||
MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
|
||||
MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
|
||||
MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
|
||||
|
|
|
@ -1066,15 +1066,6 @@
|
|||
"The file name must be the 8.3 format.\n"
|
||||
"The PCD data must be in UNICODE format."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCoDRelocationFileName_PROMPT #language en-US "Capsule On Disk Temp Relocation file name in PEI phase"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCoDRelocationFileName_HELP #language en-US "This is Capsule Temp Relocation file name in PEI phase.<BR>"
|
||||
"The file must be in the root directory.<BR>"
|
||||
"The file name must be the 8.3 format.<BR>"
|
||||
"The PCD data must be in UNICODE format.<BR>"
|
||||
"CapsuleOnDiskLoadPei PEI module will set value of this PCD to PcdRecoveryFileName, then leverage recovery to get Capsule On Disk Temp Relocation file.<BR>"
|
||||
"Note: The file name must be shorter than PcdRecoveryFileName, otherwise CapsuleOnDiskLoadPei PEI module will fail to get Capsule On Disk Temp Relocation file.<BR>"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSystemFmpCapsuleImageTypeIdGuid_PROMPT #language en-US "A list of system FMP ImageTypeId GUIDs"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSystemFmpCapsuleImageTypeIdGuid_HELP #language en-US "This PCD hold a list GUIDs for the ImageTypeId to indicate the\n"
|
||||
|
@ -1140,31 +1131,6 @@
|
|||
"enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.\n"
|
||||
"This mask should be applied when creating 1:1 virtual to physical mapping tables."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleOnDiskSupport_PROMPT #language en-US "Enable Capsule On Disk support"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleOnDiskSupport_HELP #language en-US "Capsule On Disk is to deliver capsules via files on Mass Storage device.<BR><BR>"
|
||||
"This PCD indicates if the Capsule On Disk is supported.<BR>"
|
||||
" TRUE - Capsule On Disk is supported.<BR>"
|
||||
" FALSE - Capsule On Disk is not supported.<BR>"
|
||||
"If platform does not use this feature, this PCD should be set to FALSE.<BR><BR>"
|
||||
"Two sulotions to deliver Capsule On Disk:<BR>"
|
||||
" a) If PcdCapsuleInRamSupport = TRUE, Load Capsule On Disk image out of TCB, and reuse Capsule In Ram to deliver capsule.<BR>"
|
||||
" b) If PcdCapsuleInRamSupport = FALSE, Relocate Capsule On Disk image to RootDir out of TCB, and reuse FatPei to load capsules from external storage.<BR>"
|
||||
"Note:<BR>"
|
||||
"If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule On Disk will be bypassed."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_PROMPT #language en-US "Enable Capsule In Ram support"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_HELP #language en-US "Capsule In Ram is to use memory to deliver the capsules that will be processed after system reset.<BR><BR>"
|
||||
"This PCD indicates if the Capsule In Ram is supported.<BR>"
|
||||
" TRUE - Capsule In Ram is supported.<BR>"
|
||||
" FALSE - Capsule In Ram is not supported."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCodRelocationDevPath_PROMPT #language en-US "Capsule On Disk relacation device path."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCodRelocationDevPath_HELP #language en-US "Full device path of plaform specific device to store Capsule On Disk temp relocation file.<BR>"
|
||||
"If this PCD is set, Capsule On Disk temp relocation file will be stored in the device specified by this PCD, instead of the EFI System Partition that stores capsule image file."
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNullPointerDetectionPropertyMask_PROMPT #language en-US "Enable NULL pointer detection"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNullPointerDetectionPropertyMask_HELP #language en-US "Mask to control the NULL address detection in code for different phases.\n"
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# gEfiBdsArchProtocolGuid. After DxeCore finish dispatching, DxeCore will invoke Entry
|
||||
# interface of protocol gEfiBdsArchProtocolGuid, then BDS phase is entered.
|
||||
#
|
||||
# Copyright (c) 2008 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
# Copyright (c) 2008 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
##
|
||||
|
@ -95,7 +95,6 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdConInConnectOnDemand ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdErrorCodeSetVariable ## SOMETIMES_CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdTestKeyUsed ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleOnDiskSupport ## CONSUMES
|
||||
|
||||
[Depex]
|
||||
TRUE
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
After DxeCore finish DXE phase, gEfiBdsArchProtocolGuid->BdsEntry will be invoked
|
||||
to enter BDS phase.
|
||||
|
||||
Copyright (c) 2004 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2004 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
(C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
|
||||
(C) Copyright 2015 Hewlett-Packard Development Company, L.P.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
@ -552,10 +552,6 @@ BdsFormalizeOSIndicationVariable (
|
|||
OsIndicationSupport = EFI_OS_INDICATIONS_START_PLATFORM_RECOVERY;
|
||||
}
|
||||
|
||||
if (PcdGetBool(PcdCapsuleOnDiskSupport)) {
|
||||
OsIndicationSupport |= EFI_OS_INDICATIONS_FILE_CAPSULE_DELIVERY_SUPPORTED;
|
||||
}
|
||||
|
||||
Status = gRT->SetVariable (
|
||||
EFI_OS_INDICATIONS_SUPPORT_VARIABLE_NAME,
|
||||
&gEfiGlobalVariableGuid,
|
||||
|
|
|
@ -1,442 +0,0 @@
|
|||
/** @file
|
||||
Recovery module.
|
||||
|
||||
Caution: This module requires additional review when modified.
|
||||
This module will have external input - Capsule-on-Disk Temp Relocation image.
|
||||
This external input must be validated carefully to avoid security issue like
|
||||
buffer overflow, integer overflow.
|
||||
|
||||
RetrieveRelocatedCapsule() will receive untrusted input and do basic validation.
|
||||
|
||||
Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
//
|
||||
// The package level header files this module uses
|
||||
//
|
||||
#include <Uefi.h>
|
||||
#include <PiPei.h>
|
||||
|
||||
//
|
||||
// The protocols, PPI and GUID defintions for this module
|
||||
//
|
||||
#include <Ppi/MasterBootMode.h>
|
||||
#include <Ppi/FirmwareVolumeInfo.h>
|
||||
#include <Ppi/ReadOnlyVariable2.h>
|
||||
#include <Ppi/Capsule.h>
|
||||
#include <Ppi/CapsuleOnDisk.h>
|
||||
#include <Ppi/DeviceRecoveryModule.h>
|
||||
|
||||
#include <Guid/FirmwareFileSystem2.h>
|
||||
//
|
||||
// The Library classes this module consumes
|
||||
//
|
||||
#include <Library/DebugLib.h>
|
||||
#include <Library/PeimEntryPoint.h>
|
||||
#include <Library/PeiServicesLib.h>
|
||||
#include <Library/HobLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/PcdLib.h>
|
||||
#include <Library/CapsuleLib.h>
|
||||
#include <Library/ReportStatusCodeLib.h>
|
||||
|
||||
/**
|
||||
Loads a DXE capsule from some media into memory and updates the HOB table
|
||||
with the DXE firmware volume information.
|
||||
|
||||
@param[in] PeiServices General-purpose services that are available to every PEIM.
|
||||
@param[in] This Indicates the EFI_PEI_RECOVERY_MODULE_PPI instance.
|
||||
|
||||
@retval EFI_SUCCESS The capsule was loaded correctly.
|
||||
@retval EFI_DEVICE_ERROR A device error occurred.
|
||||
@retval EFI_NOT_FOUND A recovery DXE capsule cannot be found.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
LoadCapsuleOnDisk (
|
||||
IN EFI_PEI_SERVICES **PeiServices,
|
||||
IN EFI_PEI_CAPSULE_ON_DISK_PPI *This
|
||||
);
|
||||
|
||||
EFI_PEI_CAPSULE_ON_DISK_PPI mCapsuleOnDiskPpi = {
|
||||
LoadCapsuleOnDisk
|
||||
};
|
||||
|
||||
EFI_PEI_PPI_DESCRIPTOR mCapsuleOnDiskPpiList = {
|
||||
(EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||
&gEdkiiPeiCapsuleOnDiskPpiGuid,
|
||||
&mCapsuleOnDiskPpi
|
||||
};
|
||||
|
||||
/**
|
||||
Determine if capsule comes from memory by checking Capsule PPI.
|
||||
|
||||
@param[in] PeiServices General purpose services available to every PEIM.
|
||||
|
||||
@retval TRUE Capsule comes from memory.
|
||||
@retval FALSE No capsule comes from memory.
|
||||
|
||||
**/
|
||||
static
|
||||
BOOLEAN
|
||||
CheckCapsuleFromRam (
|
||||
IN CONST EFI_PEI_SERVICES **PeiServices
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
PEI_CAPSULE_PPI *Capsule;
|
||||
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEfiPeiCapsulePpiGuid,
|
||||
0,
|
||||
NULL,
|
||||
(VOID **) &Capsule
|
||||
);
|
||||
if (!EFI_ERROR(Status)) {
|
||||
Status = Capsule->CheckCapsuleUpdate ((EFI_PEI_SERVICES **)PeiServices);
|
||||
if (!EFI_ERROR(Status)) {
|
||||
return TRUE;
|
||||
}
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Determine if it is a Capsule On Disk mode.
|
||||
|
||||
@retval TRUE Capsule On Disk mode.
|
||||
@retval FALSE Not capsule On Disk mode.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
IsCapsuleOnDiskMode (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN Size;
|
||||
EFI_PEI_READ_ONLY_VARIABLE2_PPI *PPIVariableServices;
|
||||
BOOLEAN CodRelocInfo;
|
||||
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEfiPeiReadOnlyVariable2PpiGuid,
|
||||
0,
|
||||
NULL,
|
||||
(VOID **) &PPIVariableServices
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
Size = sizeof (BOOLEAN);
|
||||
Status = PPIVariableServices->GetVariable (
|
||||
PPIVariableServices,
|
||||
COD_RELOCATION_INFO_VAR_NAME,
|
||||
&gEfiCapsuleVendorGuid,
|
||||
NULL,
|
||||
&Size,
|
||||
&CodRelocInfo
|
||||
);
|
||||
|
||||
if (EFI_ERROR (Status) || Size != sizeof(BOOLEAN) || !CodRelocInfo) {
|
||||
DEBUG (( DEBUG_ERROR, "Error Get CodRelocationInfo variable %r!\n", Status));
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/**
|
||||
Gets capsule images from relocated capsule buffer.
|
||||
Create Capsule hob for each Capsule.
|
||||
|
||||
Caution: This function may receive untrusted input.
|
||||
Capsule-on-Disk Temp Relocation image is external input, so this function
|
||||
will validate Capsule-on-Disk Temp Relocation image to make sure the content
|
||||
is read within the buffer.
|
||||
|
||||
@param[in] RelocCapsuleBuf Buffer pointer to the relocated capsule.
|
||||
@param[in] RelocCapsuleTotalSize Total size of the relocated capsule.
|
||||
|
||||
@retval EFI_SUCCESS Succeed to get capsules and create hob.
|
||||
@retval Others Fail to get capsules and create hob.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
RetrieveRelocatedCapsule (
|
||||
IN UINT8 *RelocCapsuleBuf,
|
||||
IN UINTN RelocCapsuleTotalSize
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN Index;
|
||||
UINT8 *CapsuleDataBufEnd;
|
||||
UINT8 *CapsulePtr;
|
||||
UINT32 CapsuleSize;
|
||||
UINT64 TotalImageSize;
|
||||
UINTN CapsuleNum;
|
||||
|
||||
CapsuleNum = 0;
|
||||
|
||||
//
|
||||
// Temp file contains at least 2 capsule (including 1 capsule name capsule) & 1 UINT64
|
||||
//
|
||||
if (RelocCapsuleTotalSize < sizeof(UINT64) + sizeof(EFI_CAPSULE_HEADER) * 2) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
CopyMem(&TotalImageSize, RelocCapsuleBuf, sizeof(UINT64));
|
||||
|
||||
DEBUG ((DEBUG_INFO, "ProcessRelocatedCapsule CapsuleBuf %x TotalCapSize %lx\n",
|
||||
RelocCapsuleBuf, TotalImageSize));
|
||||
|
||||
RelocCapsuleBuf += sizeof(UINT64);
|
||||
|
||||
//
|
||||
// TempCaspule file length check
|
||||
//
|
||||
if (MAX_ADDRESS - TotalImageSize <= sizeof(UINT64) ||
|
||||
(UINT64)RelocCapsuleTotalSize != TotalImageSize + sizeof(UINT64) ||
|
||||
(UINTN)(MAX_ADDRESS - (PHYSICAL_ADDRESS)(UINTN)RelocCapsuleBuf) <= TotalImageSize) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
CapsuleDataBufEnd = RelocCapsuleBuf + TotalImageSize;
|
||||
|
||||
//
|
||||
// TempCapsule file integrity check over Capsule Header to ensure no data corruption in NV Var & Relocation storage
|
||||
//
|
||||
CapsulePtr = RelocCapsuleBuf;
|
||||
|
||||
while (CapsulePtr < CapsuleDataBufEnd) {
|
||||
if ((CapsuleDataBufEnd - CapsulePtr) < sizeof(EFI_CAPSULE_HEADER) ||
|
||||
((EFI_CAPSULE_HEADER *)CapsulePtr)->CapsuleImageSize < sizeof(EFI_CAPSULE_HEADER) ||
|
||||
(UINTN)(MAX_ADDRESS - (PHYSICAL_ADDRESS)(UINTN)CapsulePtr) < ((EFI_CAPSULE_HEADER *)CapsulePtr)->CapsuleImageSize
|
||||
) {
|
||||
break;
|
||||
}
|
||||
CapsulePtr += ((EFI_CAPSULE_HEADER *)CapsulePtr)->CapsuleImageSize;
|
||||
CapsuleNum ++;
|
||||
}
|
||||
|
||||
if (CapsulePtr != CapsuleDataBufEnd) {
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
//
|
||||
// Capsule count must be less than PcdCapsuleMax, avoid building too many CvHobs to occupy all the free space in HobList.
|
||||
//
|
||||
if (CapsuleNum > PcdGet16 (PcdCapsuleMax)) {
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
//
|
||||
// Re-iterate the capsule buffer to create Capsule hob & Capsule Name Str Hob for each Capsule saved in relocated capsule file
|
||||
//
|
||||
CapsulePtr = RelocCapsuleBuf;
|
||||
Index = 0;
|
||||
while (CapsulePtr < CapsuleDataBufEnd) {
|
||||
CapsuleSize = ((EFI_CAPSULE_HEADER *)CapsulePtr)->CapsuleImageSize;
|
||||
BuildCvHob ((EFI_PHYSICAL_ADDRESS)(UINTN)CapsulePtr, CapsuleSize);
|
||||
|
||||
DEBUG((DEBUG_INFO, "Capsule saved in address %x size %x\n", CapsulePtr, CapsuleSize));
|
||||
|
||||
CapsulePtr += CapsuleSize;
|
||||
Index++;
|
||||
}
|
||||
|
||||
EXIT:
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Recovery module entrypoint
|
||||
|
||||
@param[in] FileHandle Handle of the file being invoked.
|
||||
@param[in] PeiServices Describes the list of possible PEI Services.
|
||||
|
||||
@return EFI_SUCCESS Recovery module is initialized.
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
InitializeCapsuleOnDiskLoad (
|
||||
IN EFI_PEI_FILE_HANDLE FileHandle,
|
||||
IN CONST EFI_PEI_SERVICES **PeiServices
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN BootMode;
|
||||
UINTN FileNameSize;
|
||||
|
||||
BootMode = GetBootModeHob();
|
||||
ASSERT(BootMode == BOOT_ON_FLASH_UPDATE);
|
||||
|
||||
//
|
||||
// If there are capsules provisioned in memory, quit.
|
||||
// Only one capsule resource is accept, CapsuleOnRam's priority is higher than CapsuleOnDisk.
|
||||
//
|
||||
if (CheckCapsuleFromRam(PeiServices)) {
|
||||
DEBUG((DEBUG_ERROR, "Capsule On Memory Detected! Quit.\n"));
|
||||
return EFI_ABORTED;
|
||||
}
|
||||
|
||||
DEBUG_CODE (
|
||||
VOID *CapsuleOnDiskModePpi;
|
||||
|
||||
if (!IsCapsuleOnDiskMode()){
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
//
|
||||
// Check Capsule On Disk Relocation flag. If exists, load capsule & create Capsule Hob
|
||||
//
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEdkiiPeiBootInCapsuleOnDiskModePpiGuid,
|
||||
0,
|
||||
NULL,
|
||||
(VOID **)&CapsuleOnDiskModePpi
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((DEBUG_ERROR, "Locate CapsuleOnDiskModePpi error %x\n", Status));
|
||||
return Status;
|
||||
}
|
||||
);
|
||||
|
||||
Status = PeiServicesInstallPpi (&mCapsuleOnDiskPpiList);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
FileNameSize = PcdGetSize (PcdCoDRelocationFileName);
|
||||
Status = PcdSetPtrS (PcdRecoveryFileName, &FileNameSize, (VOID *) PcdGetPtr(PcdCoDRelocationFileName));
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Loads a DXE capsule from some media into memory and updates the HOB table
|
||||
with the DXE firmware volume information.
|
||||
|
||||
@param[in] PeiServices General-purpose services that are available to every PEIM.
|
||||
@param[in] This Indicates the EFI_PEI_RECOVERY_MODULE_PPI instance.
|
||||
|
||||
@retval EFI_SUCCESS The capsule was loaded correctly.
|
||||
@retval EFI_DEVICE_ERROR A device error occurred.
|
||||
@retval EFI_NOT_FOUND A recovery DXE capsule cannot be found.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
LoadCapsuleOnDisk (
|
||||
IN EFI_PEI_SERVICES **PeiServices,
|
||||
IN EFI_PEI_CAPSULE_ON_DISK_PPI *This
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_PEI_DEVICE_RECOVERY_MODULE_PPI *DeviceRecoveryPpi;
|
||||
UINTN NumberRecoveryCapsules;
|
||||
UINTN Instance;
|
||||
UINTN CapsuleInstance;
|
||||
UINTN CapsuleSize;
|
||||
EFI_GUID CapsuleType;
|
||||
VOID *CapsuleBuffer;
|
||||
|
||||
DEBUG ((DEBUG_INFO | DEBUG_LOAD, "Load Capsule On Disk Entry\n"));
|
||||
|
||||
for (Instance = 0; ; Instance++) {
|
||||
Status = PeiServicesLocatePpi (
|
||||
&gEfiPeiDeviceRecoveryModulePpiGuid,
|
||||
Instance,
|
||||
NULL,
|
||||
(VOID **)&DeviceRecoveryPpi
|
||||
);
|
||||
DEBUG ((DEBUG_INFO, "LoadCapsuleOnDisk - LocateRecoveryPpi (%d) - %r\n", Instance, Status));
|
||||
if (EFI_ERROR (Status)) {
|
||||
if (Instance == 0) {
|
||||
REPORT_STATUS_CODE (
|
||||
EFI_ERROR_CODE | EFI_ERROR_MAJOR,
|
||||
(EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_RECOVERY_PPI_NOT_FOUND)
|
||||
);
|
||||
}
|
||||
break;
|
||||
}
|
||||
NumberRecoveryCapsules = 0;
|
||||
Status = DeviceRecoveryPpi->GetNumberRecoveryCapsules (
|
||||
(EFI_PEI_SERVICES **)PeiServices,
|
||||
DeviceRecoveryPpi,
|
||||
&NumberRecoveryCapsules
|
||||
);
|
||||
DEBUG ((DEBUG_INFO, "LoadCapsuleOnDisk - GetNumberRecoveryCapsules (%d) - %r\n", NumberRecoveryCapsules, Status));
|
||||
if (EFI_ERROR (Status)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
for (CapsuleInstance = 1; CapsuleInstance <= NumberRecoveryCapsules; CapsuleInstance++) {
|
||||
CapsuleSize = 0;
|
||||
Status = DeviceRecoveryPpi->GetRecoveryCapsuleInfo (
|
||||
(EFI_PEI_SERVICES **)PeiServices,
|
||||
DeviceRecoveryPpi,
|
||||
CapsuleInstance,
|
||||
&CapsuleSize,
|
||||
&CapsuleType
|
||||
);
|
||||
DEBUG ((DEBUG_INFO, "LoadCapsuleOnDisk - GetRecoveryCapsuleInfo (%d - %x) - %r\n", CapsuleInstance, CapsuleSize, Status));
|
||||
if (EFI_ERROR (Status)) {
|
||||
break;
|
||||
}
|
||||
|
||||
//
|
||||
// Allocate the memory so that it gets preserved into DXE.
|
||||
// Capsule is special because it may need to populate to system table
|
||||
//
|
||||
CapsuleBuffer = AllocateRuntimePages (EFI_SIZE_TO_PAGES (CapsuleSize));
|
||||
|
||||
if (CapsuleBuffer == NULL) {
|
||||
DEBUG ((DEBUG_ERROR, "LoadCapsuleOnDisk - AllocateRuntimePages fail\n"));
|
||||
continue;
|
||||
}
|
||||
|
||||
Status = DeviceRecoveryPpi->LoadRecoveryCapsule (
|
||||
(EFI_PEI_SERVICES **)PeiServices,
|
||||
DeviceRecoveryPpi,
|
||||
CapsuleInstance,
|
||||
CapsuleBuffer
|
||||
);
|
||||
DEBUG ((DEBUG_INFO, "LoadCapsuleOnDisk - LoadRecoveryCapsule (%d) - %r\n", CapsuleInstance, Status));
|
||||
if (EFI_ERROR (Status)) {
|
||||
FreePages (CapsuleBuffer, EFI_SIZE_TO_PAGES(CapsuleSize));
|
||||
break;
|
||||
}
|
||||
|
||||
//
|
||||
// Capsule Update Mode, Split relocated Capsule buffer into different capsule vehical hobs.
|
||||
//
|
||||
Status = RetrieveRelocatedCapsule(CapsuleBuffer, CapsuleSize);
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
REPORT_STATUS_CODE (
|
||||
EFI_ERROR_CODE | EFI_ERROR_MAJOR,
|
||||
(EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_NO_RECOVERY_CAPSULE)
|
||||
);
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Any attack against GPT, Relocation Info Variable or temp relocation file will result in no Capsule HOB and return EFI_NOT_FOUND.
|
||||
// After flow to DXE phase. since no capsule hob is detected. Platform will clear Info flag and force restart.
|
||||
// No volunerability will be exposed
|
||||
//
|
||||
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
|
@ -1,64 +0,0 @@
|
|||
## @file
|
||||
# Load Capsule on Disk module.
|
||||
#
|
||||
# Load Capsule On Disk from Root Directory file system. Create CV hob
|
||||
# based on temporary Capsule On Disk file.
|
||||
#
|
||||
# Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
##
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = CapsuleOnDiskLoadPei
|
||||
MODULE_UNI_FILE = CapsuleOnDiskLoadPei.uni
|
||||
FILE_GUID = 8ADEDF9E-2EC8-40fb-AE56-B76D90225D2D
|
||||
MODULE_TYPE = PEIM
|
||||
VERSION_STRING = 1.0
|
||||
ENTRY_POINT = InitializeCapsuleOnDiskLoad
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 EBC
|
||||
#
|
||||
|
||||
[Sources]
|
||||
CapsuleOnDiskLoadPei.c
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
MdeModulePkg/MdeModulePkg.dec
|
||||
|
||||
[LibraryClasses]
|
||||
PeimEntryPoint
|
||||
DebugLib
|
||||
HobLib
|
||||
BaseMemoryLib
|
||||
MemoryAllocationLib
|
||||
ReportStatusCodeLib
|
||||
|
||||
[Ppis]
|
||||
gEdkiiPeiCapsuleOnDiskPpiGuid ## PRODUCES
|
||||
gEfiPeiReadOnlyVariable2PpiGuid ## CONSUMES
|
||||
gEdkiiPeiBootInCapsuleOnDiskModePpiGuid ## SOMETIMES_CONSUMES
|
||||
gEfiPeiDeviceRecoveryModulePpiGuid ## CONSUMES
|
||||
gEfiPeiCapsulePpiGuid ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gEfiCapsuleVendorGuid ## SOMETIMES_CONSUMES ## Variable L"CodRelocationInfo"
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleMax ## CONSUMES
|
||||
|
||||
[PcdEx]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdRecoveryFileName ## PRODUCES
|
||||
|
||||
[Depex]
|
||||
gEdkiiPeiBootInCapsuleOnDiskModePpiGuid
|
||||
|
||||
[UserExtensions.TianoCore."ExtraFiles"]
|
||||
CapsuleOnDiskLoadPeiExtra.uni
|
|
@ -1,15 +0,0 @@
|
|||
// /** @file
|
||||
// Caspule On Disk Load module.
|
||||
//
|
||||
// Load Capsule On Disk and build CV hob.
|
||||
//
|
||||
// Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
//
|
||||
// SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
//
|
||||
// **/
|
||||
|
||||
|
||||
#string STR_MODULE_ABSTRACT #language en-US "Caspule On Disk Load module."
|
||||
|
||||
#string STR_MODULE_DESCRIPTION #language en-US "Load Capsule On Disk and build CV hob."
|
|
@ -1,14 +0,0 @@
|
|||
// /** @file
|
||||
// CapsuleOnDiskLoadPei Localized Strings and Content
|
||||
//
|
||||
// Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||
//
|
||||
// SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
//
|
||||
// **/
|
||||
|
||||
#string STR_PROPERTIES_MODULE_NAME
|
||||
#language en-US
|
||||
"CapsuleOnDiskLoad PEI Driver"
|
||||
|
||||
|
|
@ -90,7 +90,6 @@
|
|||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizeNonPopulateCapsule ## SOMETIMES_CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizePopulateCapsule ## SOMETIMES_CONSUMES # Populate Image requires reset support.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleInRamSupport ## CONSUMES
|
||||
|
||||
[Pcd.X64]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdCapsulePeiLongModeStackSize ## SOMETIMES_CONSUMES
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
It installs the Capsule Architectural Protocol defined in PI1.0a to signify
|
||||
the capsule runtime services are ready.
|
||||
|
||||
Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -71,14 +71,6 @@ UpdateCapsule (
|
|||
CHAR16 CapsuleVarName[30];
|
||||
CHAR16 *TempVarName;
|
||||
|
||||
//
|
||||
// Check if platform support Capsule In RAM or not.
|
||||
// Platform could choose to drop CapsulePei/CapsuleX64 and do not support Capsule In RAM.
|
||||
//
|
||||
if (!PcdGetBool(PcdCapsuleInRamSupport)) {
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
//
|
||||
// Capsule Count can't be less than one.
|
||||
//
|
||||
|
@ -226,8 +218,6 @@ UpdateCapsule (
|
|||
|
||||
/**
|
||||
Returns if the capsule can be supported via UpdateCapsule().
|
||||
Notice: When PcdCapsuleInRamSupport is unsupported, even this routine returns a valid answer,
|
||||
the capsule still is unsupported via UpdateCapsule().
|
||||
|
||||
@param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules
|
||||
being passed into update capsule.
|
||||
|
|
Loading…
Reference in New Issue