Acidanthera UEFI Development Kit based on EDK II edk2-stable202311
Go to file
Michael Kubacki 6fe77f347e MdeModulePkg/Variable: Fix volatile variable RT cache update logic
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2333

During a SetVariable () invocation, UpdateVariable () is called.
UpdateVariable () contains logic to determine whether a volatile or
non-volatile UEFI variable was set so the corresponding runtime
cache can be updated to reflect the change. The current logic simply
evaluates Variable->Volatile to determine which runtime cache should
be updated.

The problem is Variable->Volatile does not always reflect whether a
volatile variable is being set. Variable->Volatile is set to TRUE
only in the case a pre-existing variable is found in the volatile
variable store. Therefore, the value is FALSE when a new volatile
variable is written.

This change updates the logic to take this into account. If a new
variable is written successfully, the Attributes will accurately
reflect whether the variable is non-volatile. If a pre-existing
variable is modified, the Volatile field will reflect the type of
variable (Attributes are not reliable; e.g. 0x0 indicates deletion).

* Observable symptom: A volatile variable that was set successfully
  might return EFI_NOT_FOUND when the variable should be found.

* The issue is a regression introduced to the variable services only
  when the variable runtime cache is enabled by the following PCD
  being set to TRUE:
  gEfiMdeModulePkgTokenSpaceGuid.PcdEnableVariableRuntimeCache

* The issue was implemented in commit aab3b9b9a1 but the PCD was not
  set to TRUE by default enabling the issue until commit e07b7d024a.

Fixes: aab3b9b9a1

Cc: Liming Gao <liming.gao@intel.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Hao A Wu <hao.a.wu@intel.com>
Signed-off-by: Michael Kubacki <michael.a.kubacki@intel.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
2019-11-15 01:16:01 +00:00
.azurepipelines .azurepipelines: Add Azure Pipelines YML configuration files 2019-11-11 13:02:47 -08:00
.mergify .mergify: Add Mergify YML pull request rules configuration file 2019-11-11 13:02:51 -08:00
.pytool .pytool: Add CISettings.py and Readme.md 2019-11-11 13:02:44 -08:00
ArmPkg ArmPkg: strip trailing whitespace 2019-10-04 11:18:22 +01:00
ArmPlatformPkg ArmPlatformPkg: strip trailing whitespace 2019-10-04 11:18:22 +01:00
ArmVirtPkg ArmVirtPkg/PlatformBootManagerLib: Don't update progress if Pcd is 0 2019-10-16 18:27:42 +02:00
BaseTools BaseTools: Fix build failure when using python38 2019-11-13 03:47:48 +00:00
Conf BaseTools:Delete FrameworkDatabase from BaseTools/Conf 2019-05-09 15:03:30 +08:00
CryptoPkg CryptoPkg: Add YAML file for CI builds 2019-11-11 13:02:07 -08:00
DynamicTablesPkg DynamicTablesPkg: Arm SRAT Table Generator 2019-10-21 16:16:50 +01:00
EmbeddedPkg EmbeddedPkg/DtPlatformDxe: Add DT/ACPI Default Flexibility 2019-11-07 12:54:53 +01:00
EmulatorPkg EmulatorPkg/PlatformSmbiosDxe: fix a spell error of platform. 2019-11-13 02:11:03 +00:00
FatPkg FatPkg: Add YAML file for CI builds 2019-11-11 13:02:10 -08:00
FmpDevicePkg FmpDevicePkg: Add YAML file for CI builds 2019-11-11 13:02:14 -08:00
IntelFsp2Pkg IntelFsp2Pkg/SplitFspBin.py: Command crashed when FV almost full. 2019-10-28 10:28:56 +08:00
IntelFsp2WrapperPkg IntelFsp2WrapperPkg: Remove unneeded MdeModulePkg dependency 2019-09-05 02:10:03 +08:00
MdeModulePkg MdeModulePkg/Variable: Fix volatile variable RT cache update logic 2019-11-15 01:16:01 +00:00
MdePkg MdePkg/SmBios.h: SMBIOS 3.3.0 Update Intel Persistent Memory string 2019-11-14 03:06:27 +00:00
NetworkPkg NetworkPkg: Add YAML file for CI builds 2019-11-11 13:02:24 -08:00
OvmfPkg OvmfPkg: Disable variable runtime cache 2019-11-05 21:55:54 -08:00
PcAtChipsetPkg PcAtChipsetPkg: Add YAML files for CI builds 2019-11-11 13:02:27 -08:00
SecurityPkg SecurityPkg: Add YAML files for CI builds 2019-11-11 13:02:30 -08:00
ShellPkg ShellPkg/SmbiosView: SMBIOS 3.3.0 Update "Intel persistent memory" 2019-11-14 03:06:27 +00:00
SignedCapsulePkg SignedCapsulePkg: Use BaseCryptLibNull to reduce package CI time 2019-11-11 13:02:41 -08:00
SourceLevelDebugPkg SourceLevelDebugPkg DebugCommLibUsb3: Address NULL ptr dereference case 2019-08-12 09:46:47 +08:00
StandaloneMmPkg StandaloneMmPkg/Core: Fix typo in function name 2019-10-17 09:09:25 +08:00
UefiCpuPkg UefiCpuPkg/RegisterCpuFeature: Remove CPU_FEATURE_XD macro 2019-11-13 07:26:16 +00:00
UefiPayloadPkg UefiPayloadPkg/BlSupportDxe: fix ReserveResourceInGcd() calls 2019-10-09 09:40:10 +02:00
.gitignore .gitignore: Ignore python compiled files, extdeps, and vscode 2019-11-11 13:01:25 -08:00
.gitmodules ArmPkg: import Berkeley Softfloat library as git submodule 2019-05-31 17:53:44 +02:00
License-History.txt edk2: Add License-History.txt 2019-04-09 09:10:18 -07:00
License.txt edk2: Change License.txt from 2-Clause BSD to BSD+Patent 2019-04-09 09:10:18 -07:00
Maintainers.txt Maintainers.txt: Add continuous integration(CI) directories 2019-11-11 13:01:16 -08:00
Readme.md Readme.md: Update EDK II CI build branch name 2019-11-12 03:53:00 +00:00
edksetup.bat Add VS2019 Support on ToolSetup Batches 2019-09-23 22:42:41 +08:00
edksetup.sh edksetup.sh: remove redundant -?, -h and --help in options parsing 2019-07-23 10:41:55 +02:00
pip-requirements.txt pip-requirements.txt: Add python pip requirements file 2019-11-11 13:01:31 -08:00

Readme.md

EDK II Project

A modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications from www.uefi.org.

Build Status

Host Type Toolchain Branch Build Status Test Status Code Coverage
Windows VS2019 master
Ubuntu GCC master

More CI Build information

License Details

The majority of the content in the EDK II open source project uses a BSD-2-Clause Plus Patent License. The EDK II open source project contains the following components that are covered by additional licenses:

The EDK II Project is composed of packages. The maintainers for each package are listed in Maintainers.txt.

Resources

Code Contributions

To make a contribution to a TianoCore project, follow these steps.

  1. Create a change description in the format specified below to use in the source control commit log.

  2. Your commit message must include your Signed-off-by signature

  3. Submit your code to the TianoCore project using the process that the project documents on its web page. If the process is not documented, then submit the code on development email list for the project.

  4. It is preferred that contributions are submitted using the same copyright license as the base project. When that is not possible, then contributions using the following licenses can be accepted:

    For documentation:

    Contributions of code put into the public domain can also be accepted.

    Contributions using other licenses might be accepted, but further review will be required.

Developer Certificate of Origin

Your change description should use the standard format for a commit message, and must include your Signed-off-by signature.

In order to keep track of who did what, all patches contributed must include a statement that to the best of the contributor's knowledge they have the right to contribute it under the specified license.

The test for this is as specified in the Developer's Certificate of Origin (DCO) 1.1. The contributor certifies compliance by adding a line saying

Signed-off-by: Developer Name developer@example.org

where Developer Name is the contributor's real name, and the email address is one the developer is reachable through at the time of contributing.

Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved.

Sample Change Description / Commit Message

From: Contributor Name <contributor@example.com>
Subject: [Repository/Branch PATCH] Pkg-Module: Brief-single-line-summary

Full-commit-message

Signed-off-by: Contributor Name <contributor@example.com>

Notes for sample patch email

  • The first line of commit message is taken from the email's subject line following [Repository/Branch PATCH]. The remaining portion of the commit message is the email's content.
  • git format-patch is one way to create this format

Definitions for sample patch email

  • Repository is the identifier of the repository the patch applies. This identifier should only be provided for repositories other than edk2. For example edk2-BuildSpecification or staging.
  • Branch is the identifier of the branch the patch applies. This identifier should only be provided for branches other than edk2/master. For example edk2/UDK2015, edk2-BuildSpecification/release/1.27, or staging/edk2-test.
  • Module is a short identifier for the affected code or documentation. For example MdePkg, MdeModulePkg/UsbBusDxe, Introduction, or EDK II INF File Format.
  • Brief-single-line-summary is a short summary of the change.
  • The entire first line should be less than ~70 characters.
  • Full-commit-message a verbose multiple line comment describing the change. Each line should be less than ~70 characters.
  • Signed-off-by is the contributor's signature identifying them by their real/legal name and their email address.

Submodules

Submodule in EDK II is allowed but submodule chain should be avoided as possible as we can. Currently EDK II contains the following submodules

  • CryptoPkg/Library/OpensslLib/openssl
  • ArmPkg/Library/ArmSoftFloatLib/berkeley-softfloat-3

ArmSoftFloatLib is actually required by OpensslLib. It's inevitable in openssl-1.1.1 (since stable201905) for floating point parameter conversion, but should be dropped once there's no such need in future release of openssl.

To get a full, buildable EDK II repository, use following steps of git command

$ git clone https://github.com/tianocore/edk2.git
$ cd edk2
$ git submodule update --init
$ cd ..

If there's update for submodules, use following git commands to get the latest submodules code.

$ cd edk2
$ git pull
$ git submodule update

Note: When cloning submodule repos, '--recursive' option is not recommended. EDK II itself will not use any code/feature from submodules in above submodules. So using '--recursive' adds a dependency on being able to reach servers we do not actually want any code from, as well as needlessly downloading code we will not use.