From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by mx.groups.io with SMTP id smtpd.web11.1232.1675801343600970083 for ; Tue, 07 Feb 2023 12:22:23 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=cdj0LLTG; spf=pass (domain: linux.microsoft.com, ip: 13.77.154.182, mailfrom: mikuback@linux.microsoft.com) Received: from [192.168.4.22] (unknown [47.201.8.94]) by linux.microsoft.com (Postfix) with ESMTPSA id 4438E20C7E35; Tue, 7 Feb 2023 12:22:22 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 4438E20C7E35 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1675801343; bh=edxH1i6rvP0a4QyqZ0qNcRpHR39b/fTf1+ShFwu8GXY=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=cdj0LLTGujLHn3tiOS4M9/hB5qQfMH7XNGSLFjUN5sFLVhrjZDsH65wr5GqTD/YCD aJCbGClg0BA4WYfsvfylupF9jEdlRG4zikoKCqafqpOtc5JECbRIcm9utMyar86baz zu2m/o8ZkOBWrOzgkNH78n4pANdyKKt2tF9gWYBw= Message-ID: <6c2435e1-6689-1aae-b787-8ae3bb21af34@linux.microsoft.com> Date: Tue, 7 Feb 2023 15:22:21 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 6.2; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.13.1 Subject: Re: [edk2-devel] [edk2-platforms: PATCH v3] IntelSiliconPkg/SpiFvbServiceSmm: Rewrite VariableStore header. To: devel@edk2.groups.io, chasel.chiu@intel.com Cc: Ashraf Ali S , Isaac Oram , Rangasai V Chaganty , Ray Ni , Michael Kubacki References: <20230207194258.2598-1-chasel.chiu@intel.com> From: "Michael Kubacki" In-Reply-To: <20230207194258.2598-1-chasel.chiu@intel.com> Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Hi Chasel, I agree with the high-level problem. Here's some observations. 1. I'm not a big fan of implicitly associating index zero of the mPlatformFvBaseAddress array as the variable FV entry. It could be easy for that to silently get out of sync in the future. Perhaps you could check if the base address at a given index equals the variable store address since it is retrieved via GetVariableFlashNvStorageInfo() at the beginning of FvbInitialize(). 2. VariableFlashInfoLib is meant to abstract var store info with GetVariableFlashNvStorageInfo(). Please use that instead of directly getting it with PcdGet32 (PcdFlashNvStorageVariableSize). 3. Suggest a blank link before the following text for readability. // // Write buffer to flash // 4. Usually there's a few default variables in the var store FV that form a foundation that the variable HOB gets written upon when the HOB gets flushed. Does the original var store FV still contain some of those entries? If so, this just restores an empty store, so those are known to be lost, right? If that's true, please call it out in the patch description. Thanks, Michael On 2/7/2023 2:42 PM, Chiu, Chasel wrote: > When invalid VariableStore FV header detected, current SpiFvbService > will erase both FV and VariableStore headers from flash, however, > it will only rewrite FV header back and cause invalid VariableStore > header. > > This patch adding the support for rewriting both FV header and > VariableStore header when VariableStore corruption happened. > > Platform has to set PcdFlashVariableStoreType to inform SpiFvbService > which VariableStoreType should be rewritten. > > Cc: Ashraf Ali S > Cc: Isaac Oram > Cc: Rangasai V Chaganty > Cc: Ray Ni > Cc: Michael Kubacki > Signed-off-by: Chasel Chiu > --- > Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceMm.c | 64 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----- > Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceSmm.inf | 4 ++++ > Silicon/Intel/IntelSiliconPkg/IntelSiliconPkg.dec | 8 ++++++++ > 3 files changed, 71 insertions(+), 5 deletions(-) > > diff --git a/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceMm.c b/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceMm.c > index 6b4bcdcfe3..6338442e1a 100644 > --- a/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceMm.c > +++ b/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceMm.c > @@ -12,6 +12,7 @@ > #include > > #include > > #include > > +#include > > > > /** > > The function installs EFI_FIRMWARE_VOLUME_BLOCK protocol > > @@ -114,6 +115,10 @@ FvbInitialize ( > UINT32 BytesWritten; > > UINTN BytesErased; > > UINT64 NvStorageFvSize; > > + UINT32 ExpectedBytesWritten; > > + VARIABLE_STORE_HEADER *VariableStoreHeader; > > + UINT8 VariableStoreType; > > + UINT8 *NvStoreBuffer; > > > > Status = GetVariableFlashNvStorageInfo (&BaseAddress, &NvStorageFvSize); > > if (EFI_ERROR (Status)) { > > @@ -186,8 +191,57 @@ FvbInitialize ( > } > > continue; > > } > > - BytesWritten = FvHeader->HeaderLength; > > - Status = SpiFlashWrite ((UINTN)BaseAddress, &BytesWritten, (UINT8*)FvHeader); > > + > > + BytesWritten = FvHeader->HeaderLength; > > + ExpectedBytesWritten = BytesWritten; > > + if (Idx != 0) { > > + Status = SpiFlashWrite ((UINTN)BaseAddress, &BytesWritten, (UINT8 *)FvHeader); > > + } else { > > + // > > + // This is Variable Store, rewrite both EFI_FIRMWARE_VOLUME_HEADER and VARIABLE_STORE_HEADER > > + // > > + NvStoreBuffer = NULL; > > + NvStoreBuffer = AllocateZeroPool (sizeof (VARIABLE_STORE_HEADER) + FvHeader->HeaderLength); > > + if (NvStoreBuffer != NULL) { > > + // > > + // Combine FV header and VariableStore header into the buffer. > > + // > > + CopyMem (NvStoreBuffer, FvHeader, FvHeader->HeaderLength); > > + VariableStoreHeader = (VARIABLE_STORE_HEADER *)(NvStoreBuffer + FvHeader->HeaderLength); > > + VariableStoreType = PcdGet8 (PcdFlashVariableStoreType); > > + switch (VariableStoreType) { > > + case 0: > > + DEBUG ((DEBUG_ERROR, "Type: gEfiVariableGuid\n")); > > + CopyGuid (&VariableStoreHeader->Signature, &gEfiVariableGuid); > > + break; > > + case 1: > > + DEBUG ((DEBUG_ERROR, "Type: gEfiAuthenticatedVariableGuid\n")); > > + CopyGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid); > > + break; > > + default: > > + break; > > + } > > + > > + // > > + // Initialize common VariableStore header fields > > + // > > + VariableStoreHeader->Size = PcdGet32 (PcdFlashNvStorageVariableSize) - FvHeader->HeaderLength; > > + VariableStoreHeader->Format = VARIABLE_STORE_FORMATTED; > > + VariableStoreHeader->State = VARIABLE_STORE_HEALTHY; > > + VariableStoreHeader->Reserved = 0; > > + VariableStoreHeader->Reserved1 = 0; > > + // > > + // Write buffer to flash > > + // > > + BytesWritten = FvHeader->HeaderLength + sizeof (VARIABLE_STORE_HEADER); > > + ExpectedBytesWritten = BytesWritten; > > + Status = SpiFlashWrite ((UINTN)BaseAddress, &BytesWritten, NvStoreBuffer); > > + FreePool (NvStoreBuffer); > > + } else { > > + Status = EFI_OUT_OF_RESOURCES; > > + } > > + } > > + > > if (EFI_ERROR (Status)) { > > DEBUG ((DEBUG_WARN, "ERROR - SpiFlashWrite Error %r\n", Status)); > > if (FvHeader != NULL) { > > @@ -195,9 +249,9 @@ FvbInitialize ( > } > > continue; > > } > > - if (BytesWritten != FvHeader->HeaderLength) { > > - DEBUG ((DEBUG_WARN, "ERROR - BytesWritten != HeaderLength\n")); > > - DEBUG ((DEBUG_INFO, " BytesWritten = 0x%X\n HeaderLength = 0x%X\n", BytesWritten, FvHeader->HeaderLength)); > > + if (BytesWritten != ExpectedBytesWritten) { > > + DEBUG ((DEBUG_WARN, "ERROR - BytesWritten != ExpectedBytesWritten\n")); > > + DEBUG ((DEBUG_INFO, " BytesWritten = 0x%X\n ExpectedBytesWritten = 0x%X\n", BytesWritten, ExpectedBytesWritten)); > > if (FvHeader != NULL) { > > FreePool (FvHeader); > > } > > diff --git a/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceSmm.inf b/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceSmm.inf > index 0cfa3f909b..0485b73679 100644 > --- a/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceSmm.inf > +++ b/Silicon/Intel/IntelSiliconPkg/Feature/Flash/SpiFvbService/SpiFvbServiceSmm.inf > @@ -45,6 +45,8 @@ > [Pcd] > > gIntelSiliconPkgTokenSpaceGuid.PcdFlashMicrocodeFvBase ## CONSUMES > > gIntelSiliconPkgTokenSpaceGuid.PcdFlashMicrocodeFvSize ## CONSUMES > > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize ## SOMETIMES_CONSUMES > > + gIntelSiliconPkgTokenSpaceGuid.PcdFlashVariableStoreType ## SOMETIMES_CONSUMES > > > > [Sources] > > FvbInfo.c > > @@ -61,6 +63,8 @@ > [Guids] > > gEfiFirmwareFileSystem2Guid ## CONSUMES > > gEfiSystemNvDataFvGuid ## CONSUMES > > + gEfiVariableGuid ## SOMETIMES_CONSUMES > > + gEfiAuthenticatedVariableGuid ## SOMETIMES_CONSUMES > > > > [Depex] > > TRUE > > diff --git a/Silicon/Intel/IntelSiliconPkg/IntelSiliconPkg.dec b/Silicon/Intel/IntelSiliconPkg/IntelSiliconPkg.dec > index 485cb3e80a..63dae756ad 100644 > --- a/Silicon/Intel/IntelSiliconPkg/IntelSiliconPkg.dec > +++ b/Silicon/Intel/IntelSiliconPkg/IntelSiliconPkg.dec > @@ -186,3 +186,11 @@ > # @Prompt VTd abort DMA mode support. > > gIntelSiliconPkgTokenSpaceGuid.PcdVTdSupportAbortDmaMode|FALSE|BOOLEAN|0x0000000C > > > > + ## Define Flash Variable Store type.

> > + # When Flash Variable Store corruption happened, the SpiFvbService will recreate Variable Store > > + # with valid header information provided by this PCD value.
> > + # 0: Variable Store is gEfiVariableGuid type.
> > + # 1: Variable Store is gEfiAuthenticatedVariableGuid type.
> > + # Other value: reserved for future use.
> > + # @Prompt Flash Variable Store type. > > + gIntelSiliconPkgTokenSpaceGuid.PcdFlashVariableStoreType|0x00|UINT8|0x0000000E >