public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: "Kinney, Michael D" <michael.d.kinney@intel.com>,
	"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Subject: Re: [RFC v3 2/4] FmpDevicePkg: Add library instances
Date: Mon, 4 Jun 2018 23:09:29 +0000	[thread overview]
Message-ID: <74D8A39837DF1E4DA445A8C0B3885C503AC27A65@shsmsx102.ccr.corp.intel.com> (raw)
In-Reply-To: <20180529223715.23896-3-michael.d.kinney@intel.com>

Looks good.

Can we add "Is" before the function - LowestSupportedVersionCheckRequired (), LockFmpDeviceAtLockEventGuidRequired () ?

That is IsLowestSupportedVersionCheckRequired (), IsLockFmpDeviceAtLockEventGuidRequired ().

Thank you
Yao Jiewen

> -----Original Message-----
> From: Kinney, Michael D
> Sent: Tuesday, May 29, 2018 3:37 PM
> To: edk2-devel@lists.01.org
> Cc: Kinney, Michael D <michael.d.kinney@intel.com>; Sean Brogan
> <sean.brogan@microsoft.com>; Yao, Jiewen <jiewen.yao@intel.com>
> Subject: [RFC v3 2/4] FmpDevicePkg: Add library instances
> 
> From: "Kinney, Michael D" <michael.d.kinney@intel.com>
> 
> https://bugzilla.tianocore.org/show_bug.cgi?id=922
> 
> Based on content from the following branch:
> 
> https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport/MsCapsu
> leUpdatePkg
> 
> Add library instances for FmpDeviceLib, CapsuleUpdatePolicyLib,
> and FmpPayloadHeaderLib.
> 
> Library Classes
> ===============
> * FmpDeviceLibNull - Non-functional template of the FmpDeviceLib
>   that can be used as a starting point for an FmpDeviceLib for
>   a specific firmware storage device.
> * CapsuleUpdatePolicyLibNull - Functional template of the
>   CapsuleUpdatePolicyLib that can be used as a starting point
>   of a platform specific implementation.
> * FmpPayloadHeaderLibV1 - Version 1 of the FmpPayloadHeaderLib.
>   This library is indented to be used "as is" with no need for
>   any device specific or platform specific changes.
> 
> Cc: Sean Brogan <sean.brogan@microsoft.com>
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Contributed-under: TianoCore Contribution Agreement 1.1
> Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
> ---
>  .../CapsuleUpdatePolicyLibNull.c                   | 136 +++++++
>  .../CapsuleUpdatePolicyLibNull.inf                 |  45 +++
>  .../CapsuleUpdatePolicyLibNull.uni                 |  17 +
>  .../Library/FmpDeviceLibNull/FmpDeviceLib.c        | 427
> +++++++++++++++++++++
>  .../Library/FmpDeviceLibNull/FmpDeviceLibNull.inf  |  48 +++
>  .../Library/FmpDeviceLibNull/FmpDeviceLibNull.uni  |  18 +
>  .../FmpPayloadHeaderLibV1/FmpPayloadHeaderLib.c    | 188 +++++++++
>  .../FmpPayloadHeaderLibV1.inf                      |  48 +++
>  .../FmpPayloadHeaderLibV1.uni                      |  21 +
>  9 files changed, 948 insertions(+)
>  create mode 100644
> FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull
> .c
>  create mode 100644
> FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull
> .inf
>  create mode 100644
> FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull
> .uni
>  create mode 100644
> FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c
>  create mode 100644
> FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
>  create mode 100644
> FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.uni
>  create mode 100644
> FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLib.c
>  create mode 100644
> FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf
>  create mode 100644
> FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.uni
> 
> diff --git
> a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.c
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.c
> new file mode 100644
> index 0000000000..b4cccc8f01
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.c
> @@ -0,0 +1,136 @@
> +/**  @file
> +  Provides platform policy services used during a capsule update.
> +
> +  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +
> +  Redistribution and use in source and binary forms, with or without
> +  modification, are permitted provided that the following conditions are met:
> +  1. Redistributions of source code must retain the above copyright notice,
> +  this list of conditions and the following disclaimer.
> +  2. Redistributions in binary form must reproduce the above copyright notice,
> +  this list of conditions and the following disclaimer in the documentation
> +  and/or other materials provided with the distribution.
> +
> +  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +**/
> +
> +#include <PiDxe.h>
> +#include <Library/CapsuleUpdatePolicyLib.h>
> +
> +/**
> +  Determine if the system power state supports a capsule update.
> +
> +  @param[out] Good  Returns TRUE if system power state supports a capsule
> +                    update.  Returns FALSE if system power state does not
> +                    support a capsule update.  Return value is only valid if
> +                    return status is EFI_SUCCESS.
> +
> +  @retval EFI_SUCCESS            Good parameter has been updated with
> result.
> +  @retval EFI_INVALID_PARAMETER  Good is NULL.
> +  @retval EFI_DEVICE_ERROR       System power state can not be
> determined.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +CheckSystemPower (
> +  OUT BOOLEAN  *Good
> +  )
> +{
> +  *Good = TRUE;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Determines if the system thermal state supports a capsule update.
> +
> +  @param[out] Good  Returns TRUE if system thermal state supports a
> capsule
> +                    update.  Returns FALSE if system thermal state does
> not
> +                    support a capsule update.  Return value is only valid if
> +                    return status is EFI_SUCCESS.
> +
> +  @retval EFI_SUCCESS            Good parameter has been updated with
> result.
> +  @retval EFI_INVALID_PARAMETER  Good is NULL.
> +  @retval EFI_DEVICE_ERROR       System thermal state can not be
> determined.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +CheckSystemThermal (
> +  IN OUT BOOLEAN  *Good
> +  )
> +{
> +  *Good = TRUE;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Determines if the system environment state supports a capsule update.
> +
> +  @param[out] Good  Returns TRUE if system environment state supports a
> capsule
> +                    update.  Returns FALSE if system environment state
> does not
> +                    support a capsule update.  Return value is only valid if
> +                    return status is EFI_SUCCESS.
> +
> +  @retval EFI_SUCCESS            Good parameter has been updated with
> result.
> +  @retval EFI_INVALID_PARAMETER  Good is NULL.
> +  @retval EFI_DEVICE_ERROR       System environment state can not be
> determined.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +CheckSystemEnvironment (
> +  IN OUT BOOLEAN  *Good
> +  )
> +{
> +  *Good = TRUE;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Determines if the Lowest Supported Version checks should be performed.
> The
> +  expected result from this function is TRUE.  A platform can choose to return
> +  FALSE (e.g. during manufacturing or servicing) to allow a capsule update to a
> +  version below the current Lowest Supported Version.
> +
> +  @retval TRUE   The lowest supported version check is required.
> +  @retval FALSE  Do not perform lowest support version check.
> +
> +**/
> +BOOLEAN
> +EFIAPI
> +LowestSupportedVersionCheckRequired (
> +  VOID
> +  )
> +{
> +  return TRUE;
> +}
> +
> +/**
> +  Determines if the FMP device should be locked when the event specified by
> +  PcdFmpDeviceLockEventGuid is signaled. The expected result from this
> function
> +  is TRUE so the FMP device is always locked.  A platform can choose to return
> +  FALSE (e.g. during manufacturing) to allow FMP devices to remain unlocked.
> +
> +  @retval TRUE   The FMP device lock action is required at lock event guid.
> +  @retval FALSE  Do not perform FMP device lock at lock event guid.
> +
> +**/
> +BOOLEAN
> +EFIAPI
> +LockFmpDeviceAtLockEventGuidRequired (
> +  VOID
> +  )
> +{
> +  return TRUE;
> +}
> diff --git
> a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.inf
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.inf
> new file mode 100644
> index 0000000000..c7c669e3e0
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.inf
> @@ -0,0 +1,45 @@
> +## @file
> +#  Provides platform policy services used during a capsule update.
> +#
> +#  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +#  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +#
> +#  Redistribution and use in source and binary forms, with or without
> +#  modification, are permitted provided that the following conditions are met:
> +#  1. Redistributions of source code must retain the above copyright notice,
> +#  this list of conditions and the following disclaimer.
> +#  2. Redistributions in binary form must reproduce the above copyright
> notice,
> +#  this list of conditions and the following disclaimer in the documentation
> +#  and/or other materials provided with the distribution.
> +#
> +#  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +#  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +#  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +#  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +#  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +#  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +#  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +#  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +#  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +#  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +##
> +
> +[Defines]
> +  INF_VERSION     = 0x00010005
> +  BASE_NAME       = CapsuleUpdatePolicyLibNull
> +  MODULE_UNI_FILE = CapsuleUpdatePolicyLibNull.uni
> +  FILE_GUID       = 8E36EC87-440D-44F9-AB2F-AA806C61A1A6
> +  MODULE_TYPE     = BASE
> +  VERSION_STRING  = 1.0
> +  LIBRARY_CLASS   = CapsuleUpdatePolicyLib
> +
> +#
> +#  VALID_ARCHITECTURES           = IA32 X64 IPF ARM AARCH64
> +#
> +
> +[Sources]
> +  CapsuleUpdatePolicyLibNull.c
> +
> +[Packages]
> +  MdePkg/MdePkg.dec
> +  FmpDevicePkg/FmpDevicePkg.dec
> diff --git
> a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.uni
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.uni
> new file mode 100644
> index 0000000000..0f16fea391
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibN
> ull.uni
> @@ -0,0 +1,17 @@
> +// /** @file
> +// Provides platform policy services used during a capsule update.
> +//
> +// Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +//
> +// This program and the accompanying materials
> +// are licensed and made available under the terms and conditions of the BSD
> License
> +// which accompanies this distribution. The full text of the license may be found
> at
> +// http://opensource.org/licenses/bsd-license.php
> +// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS"
> BASIS,
> +// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> EXPRESS OR IMPLIED.
> +//
> +// **/
> +
> +#string STR_MODULE_ABSTRACT     #language en-US  "Provides platform
> policy services used during a capsule update."
> +
> +#string STR_MODULE_DESCRIPTION  #language en-US  "Provides platform
> policy services used during a capsule update."
> diff --git a/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c
> b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c
> new file mode 100644
> index 0000000000..03e8750661
> --- /dev/null
> +++ b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c
> @@ -0,0 +1,427 @@
> +/**  @file
> +  Provides firmware device specific services to support updates of a firmware
> +  image stored in a firmware device.
> +
> +  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +
> +  Redistribution and use in source and binary forms, with or without
> +  modification, are permitted provided that the following conditions are met:
> +  1. Redistributions of source code must retain the above copyright notice,
> +  this list of conditions and the following disclaimer.
> +  2. Redistributions in binary form must reproduce the above copyright notice,
> +  this list of conditions and the following disclaimer in the documentation
> +  and/or other materials provided with the distribution.
> +
> +  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +**/
> +
> +#include <PiDxe.h>
> +#include <Library/FmpDeviceLib.h>
> +
> +/**
> +  Provide a function to install the Firmware Management Protocol instance
> onto a
> +  device handle when the device is managed by a driver that follows the UEFI
> +  Driver Model.  If the device is not managed by a driver that follows the UEFI
> +  Driver Model, then EFI_UNSUPPORTED is returned.
> +
> +  @param[in] FmpInstaller  Function that installs the Firmware Management
> +                           Protocol.
> +
> +  @retval EFI_SUCCESS      The device is managed by a driver that follows
> the
> +                           UEFI Driver Model.  FmpInstaller must be
> called on
> +                           each Driver Binding Start().
> +  @retval EFI_UNSUPPORTED  The device is not managed by a driver that
> follows
> +                           the UEFI Driver Model.
> +  @retval other            The Firmware Management Protocol for this
> firmware
> +                           device is not installed.  The firmware device is
> +                           still locked using FmpDeviceLock().
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +RegisterFmpInstaller (
> +  IN FMP_DEVICE_LIB_REGISTER_FMP_INSTALLER  Function
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Returns the size, in bytes, of the firmware image currently stored in the
> +  firmware device.  This function is used to by the GetImage() and
> +  GetImageInfo() services of the Firmware Management Protocol.  If the
> image
> +  size can not be determined from the firmware device, then 0 must be
> returned.
> +
> +  @param[out] Size  Pointer to the size, in bytes, of the firmware image
> +                    currently stored in the firmware device.
> +
> +  @retval EFI_SUCCESS            The size of the firmware image currently
> +                                 stored in the firmware device was
> returned.
> +  @retval EFI_INVALID_PARAMETER  Size is NULL.
> +  @retval EFI_UNSUPPORTED        The firmware device does not support
> reporting
> +                                 the size of the currently stored firmware
> image.
> +  @retval EFI_DEVICE_ERROR       An error occurred attempting to
> determine the
> +                                 size of the firmware image currently
> stored in
> +                                 in the firmware device.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetSize (
> +  IN UINTN  *Size
> +  )
> +{
> +  if (Size == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +  *Size = 0;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Returns the GUID value used to fill in the ImageTypeId field of the
> +  EFI_FIRMWARE_IMAGE_DESCRIPTOR structure that is returned by the
> GetImageInfo()
> +  service of the Firmware Management Protocol.  If EFI_UNSUPPORTED is
> returned,
> +  then the ImageTypeId field is set to gEfiCallerIdGuid.  If EFI_SUCCESS is
> +  returned, then ImageTypeId is set to the Guid returned from this function.
> +
> +  @param[out] Guid  Double pointer to a GUID value that is updated to point
> to
> +                    to a GUID value.  The GUID value is not allocated and
> must
> +                    not be modified or freed by the caller.
> +
> +  @retval EFI_SUCCESS      EFI_FIRMWARE_IMAGE_DESCRIPTOR
> ImageTypeId GUID is set
> +                           to the returned Guid value.
> +  @retval EFI_UNSUPPORTED  EFI_FIRMWARE_IMAGE_DESCRIPTOR
> ImageTypeId GUID is set
> +                           to gEfiCallerIdGuid.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetImageTypeIdGuidPtr (
> +  OUT EFI_GUID  **Guid
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Returns values used to fill in the AttributesSupported and AttributesSettings
> +  fields of the EFI_FIRMWARE_IMAGE_DESCRIPTOR structure that is returned
> by the
> +  GetImageInfo() service of the Firmware Management Protocol.  The
> following
> +  bit values from the Firmware Management Protocol may be combined:
> +    IMAGE_ATTRIBUTE_IMAGE_UPDATABLE
> +    IMAGE_ATTRIBUTE_RESET_REQUIRED
> +    IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED
> +    IMAGE_ATTRIBUTE_IN_USE
> +    IMAGE_ATTRIBUTE_UEFI_IMAGE
> +
> +  @param[out] Supported  Attributes supported by this firmware device.
> +  @param[out] Setting    Attributes settings for this firmware device.
> +
> +  @retval EFI_SUCCESS            The attributes supported by the
> firmware
> +                                 device were returned.
> +  @retval EFI_INVALID_PARAMETER  Supported is NULL.
> +  @retval EFI_INVALID_PARAMETER  Setting is NULL.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetAttributes (
> +  IN OUT UINT64  *Supported,
> +  IN OUT UINT64  *Setting
> +  )
> +{
> +  if (Supported == NULL || Setting == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +  *Supported = 0;
> +  *Setting   = 0;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Returns the value used to fill in the LowestSupportedVersion field of the
> +  EFI_FIRMWARE_IMAGE_DESCRIPTOR structure that is returned by the
> GetImageInfo()
> +  service of the Firmware Management Protocol.  If EFI_SUCCESS is returned,
> then
> +  the firmware device supports a method to report the
> LowestSupportedVersion
> +  value from the currently stored firmware image.  If the value can not be
> +  reported for the firmware image currently stored in the firmware device,
> then
> +  EFI_UNSUPPORTED must be returned.  EFI_DEVICE_ERROR is returned if an
> error
> +  occurs attempting to retrieve the LowestSupportedVersion value for the
> +  currently stored firmware image.
> +
> +  @note It is recommended that all firmware devices support a method to
> report
> +        the LowestSupportedVersion value from the currently stored
> firmware
> +        image.
> +
> +  @param[out] LowestSupportedVersion  LowestSupportedVersion value
> retrieved
> +                                      from the currently stored
> firmware image.
> +
> +  @retval EFI_SUCCESS       The lowest supported version of currently
> stored
> +                            firmware image was returned in
> LowestSupportedVersion.
> +  @retval EFI_UNSUPPORTED   The firmware device does not support a
> method to
> +                            report the lowest supported version of the
> currently
> +                            stored firmware image.
> +  @retval EFI_DEVICE_ERROR  An error occurred attempting to retrieve the
> lowest
> +                            supported version of the currently stored
> firmware
> +                            image.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetLowestSupportedVersion (
> +  OUT UINT32  *LowestSupportedVersion
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Returns the Null-terminated Unicode string that is used to fill in the
> +  VersionName field of the EFI_FIRMWARE_IMAGE_DESCRIPTOR structure that
> is
> +  returned by the GetImageInfo() service of the Firmware Management
> Protocol.
> +  The returned string must be allocated using
> EFI_BOOT_SERVICES.AllocatePool().
> +
> +  @note It is recommended that all firmware devices support a method to
> report
> +        the VersionName string from the currently stored firmware image.
> +
> +  @param[out] VersionString  The version string retrieved from the currently
> +                             stored firmware image.
> +
> +  @retval EFI_SUCCESS            The version string of currently stored
> +                                 firmware image was returned in
> Version.
> +  @retval EFI_INVALID_PARAMETER  VersionString is NULL.
> +  @retval EFI_UNSUPPORTED        The firmware device does not support
> a method
> +                                 to report the version string of the
> currently
> +                                 stored firmware image.
> +  @retval EFI_DEVICE_ERROR       An error occurred attempting to retrieve
> the
> +                                 version string of the currently stored
> +                                 firmware image.
> +  @retval EFI_OUT_OF_RESOURCES   There are not enough resources to
> allocate the
> +                                 buffer for the version string of the
> currently
> +                                 stored firmware image.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetVersionString (
> +  OUT CHAR16  **VersionString
> +  )
> +{
> +  if (VersionString == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +  *VersionString = NULL;
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Returns the value used to fill in the Version field of the
> +  EFI_FIRMWARE_IMAGE_DESCRIPTOR structure that is returned by the
> GetImageInfo()
> +  service of the Firmware Management Protocol.  If EFI_SUCCESS is returned,
> then
> +  the firmware device supports a method to report the Version value from the
> +  currently stored firmware image.  If the value can not be reported for the
> +  firmware image currently stored in the firmware device, then
> EFI_UNSUPPORTED
> +  must be returned.  EFI_DEVICE_ERROR is returned if an error occurs
> attempting
> +  to retrieve the LowestSupportedVersion value for the currently stored
> firmware
> +  image.
> +
> +  @note It is recommended that all firmware devices support a method to
> report
> +        the Version value from the currently stored firmware image.
> +
> +  @param[out] Version  The version value retrieved from the currently stored
> +                       firmware image.
> +
> +  @retval EFI_SUCCESS       The version of currently stored firmware image
> was
> +                            returned in Version.
> +  @retval EFI_UNSUPPORTED   The firmware device does not support a
> method to
> +                            report the version of the currently stored
> firmware
> +                            image.
> +  @retval EFI_DEVICE_ERROR  An error occurred attempting to retrieve the
> version
> +                            of the currently stored firmware image.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetVersion (
> +  OUT UINT32  *Version
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Returns a copy of the firmware image currently stored in the firmware
> device.
> +
> +  @note It is recommended that all firmware devices support a method to
> retrieve
> +        a copy currently stored firmware image.  This can be used to support
> +        features such as recovery and rollback.
> +
> +  @param[out]    Image      Pointer to a caller allocated buffer where the
> +                            currently stored firmware image is copied to.
> +  @param[in out] ImageSize  Pointer the size, in bytes, of the Image buffer.
> +                            On return, points to the size, in bytes, of
> firmware
> +                            image currently stored in the firmware device.
> +
> +  @retval EFI_SUCCESS            Image contains a copy of the firmware
> image
> +                                 currently stored in the firmware device,
> and
> +                                 ImageSize contains the size, in bytes, of
> the
> +                                 firmware image currently stored in the
> +                                 firmware device.
> +  @retval EFI_BUFFER_TOO_SMALL   The buffer specified by ImageSize is
> too small
> +                                 to hold the firmware image currently
> stored in
> +                                 the firmware device. The buffer size
> required
> +                                 is returned in ImageSize.
> +  @retval EFI_INVALID_PARAMETER  The Image is NULL.
> +  @retval EFI_INVALID_PARAMETER  The ImageSize is NULL.
> +  @retval EFI_UNSUPPORTED        The operation is not supported.
> +  @retval EFI_DEVICE_ERROR       An error occurred attempting to retrieve
> the
> +                                 firmware image currently stored in the
> firmware
> +                                 device.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceGetImage (
> +  IN OUT    VOID   *Image,
> +  IN IN OUT UINTN  *ImageSize
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Checks if a new firmware image is valid for the firmware device.  This
> +  function allows firmware update operation to validate the firmware image
> +  before FmpDeviceSetImage() is called.
> +
> +  @param[in]  Image           Points to a new firmware image.
> +  @param[in]  ImageSize       Size, in bytes, of a new firmware image.
> +  @param[out] ImageUpdatable  Indicates if a new firmware image is valid
> for
> +                              a firmware update to the firmware device.
> The
> +                              following values from the Firmware
> Management
> +                              Protocol are supported:
> +                                IMAGE_UPDATABLE_VALID
> +                                IMAGE_UPDATABLE_INVALID
> +                                IMAGE_UPDATABLE_INVALID_TYPE
> +                                IMAGE_UPDATABLE_INVALID_OLD
> +
> IMAGE_UPDATABLE_VALID_WITH_VENDOR_CODE
> +
> +  @retval EFI_SUCCESS            The image was successfully checked.
> Additional
> +                                 status information is returned in
> +                                 ImageUpdateable.
> +  @retval EFI_INVALID_PARAMETER  Image is NULL.
> +  @retval EFI_INVALID_PARAMETER  ImageUpdateable is NULL.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceCheckImage (
> +  IN  CONST VOID  *Image,
> +  IN  UINTN       ImageSize,
> +  OUT UINT32      *ImageUpdateable
> +  )
> +{
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Updates a firmware device with a new firmware image.  This function
> returns
> +  EFI_UNSUPPORTED if the firmware image is not updatable.  If the firmware
> image
> +  is updatable, the function should perform the following minimal validations
> +  before proceeding to do the firmware image update.
> +    - Validate that the image is a supported image for this firmware device.
> +      Return EFI_ABORTED if the image is not supported.  Additional details
> +      on why the image is not a supported image may be returned in
> AbortReason.
> +    - Validate the data from VendorCode if is not NULL.  Firmware image
> +      validation must be performed before VendorCode data validation.
> +      VendorCode data is ignored or considered invalid if image validation
> +      fails.  Return EFI_ABORTED if the VendorCode data is invalid.
> +
> +  VendorCode enables vendor to implement vendor-specific firmware image
> update
> +  policy.  Null if the caller did not specify the policy or use the default
> +  policy.  As an example, vendor can implement a policy to allow an option to
> +  force a firmware image update when the abort reason is due to the new
> firmware
> +  image version is older than the current firmware image version or bad image
> +  checksum.  Sensitive operations such as those wiping the entire firmware
> image
> +  and render the device to be non-functional should be encoded in the image
> +  itself rather than passed with the VendorCode.  AbortReason enables
> vendor to
> +  have the option to provide a more detailed description of the abort reason to
> +  the caller.
> +
> +  @param[in]  Image             Points to the new firmware image.
> +  @param[in]  ImageSize         Size, in bytes, of the new firmware image.
> +  @param[in]  VendorCode        This enables vendor to implement
> vendor-specific
> +                                firmware image update policy.  NULL
> indicates
> +                                the caller did not specify the policy or use
> the
> +                                default policy.
> +  @param[in]  Progress          A function used to report the progress of
> +                                updating the firmware device with the
> new
> +                                firmware image.
> +  @param[in]  CapsuleFwVersion  The version of the new firmware image
> from the
> +                                update capsule that provided the new
> firmware
> +                                image.
> +  @param[out] AbortReason       A pointer to a pointer to a
> Null-terminated
> +                                Unicode string providing more details on
> an
> +                                aborted operation. The buffer is allocated
> by
> +                                this function with
> +                                EFI_BOOT_SERVICES.AllocatePool().  It
> is the
> +                                caller's responsibility to free this buffer
> with
> +                                EFI_BOOT_SERVICES.FreePool().
> +
> +  @retval EFI_SUCCESS            The firmware device was successfully
> updated
> +                                 with the new firmware image.
> +  @retval EFI_ABORTED            The operation is aborted.  Additional
> details
> +                                 are provided in AbortReason.
> +  @retval EFI_INVALID_PARAMETER  The Image was NULL.
> +  @retval EFI_UNSUPPORTED        The operation is not supported.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceSetImage (
> +  IN  CONST VOID                                     *Image,
> +  IN  UINTN                                          ImageSize,
> +  IN  CONST VOID                                     *VendorCode,
> OPTIONAL
> +  IN  EFI_FIRMWARE_MANAGEMENT_UPDATE_IMAGE_PROGRESS
> Progress,          OPTIONAL
> +  IN  UINT32
> CapsuleFwVersion,
> +  OUT CHAR16                                         **AbortReason
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> +
> +/**
> +  Lock the firmware device that contains a firmware image.  Once a firmware
> +  device is locked, any attempts to modify the firmware image contents in the
> +  firmware device must fail.
> +
> +  @note It is recommended that all firmware devices support a lock method to
> +        prevent modifications to a stored firmware image.
> +
> +  @note A firmware device lock mechanism is typically only cleared by a full
> +        system reset (not just sleep state/low power mode).
> +
> +  @retval  EFI_SUCCESS      The firmware device was locked.
> +  @retval  EFI_UNSUPPORTED  The firmware device does not support
> locking
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +FmpDeviceLock (
> +  VOID
> +  )
> +{
> +  return EFI_UNSUPPORTED;
> +}
> diff --git a/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
> b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
> new file mode 100644
> index 0000000000..d51f69d0b9
> --- /dev/null
> +++ b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
> @@ -0,0 +1,48 @@
> +## @file
> +#  Provides firmware device specific services to support updates of a firmware
> +#  image stored in a firmware device.
> +#
> +#  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +#  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +#
> +#  Redistribution and use in source and binary forms, with or without
> +#  modification, are permitted provided that the following conditions are met:
> +#  1. Redistributions of source code must retain the above copyright notice,
> +#  this list of conditions and the following disclaimer.
> +#  2. Redistributions in binary form must reproduce the above copyright
> notice,
> +#  this list of conditions and the following disclaimer in the documentation
> +#  and/or other materials provided with the distribution.
> +#
> +#  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +#  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +#  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +#  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +#  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +#  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +#  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +#  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +#  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +#  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +##
> +
> +[Defines]
> +  INF_VERSION     = 0x00010005
> +  BASE_NAME       = FmpDeviceLibNull
> +  MODULE_UNI_FILE = FmpDeviceLibNull.uni
> +  FILE_GUID       = 8507642B-AE92-4664-B713-807F7774A96D
> +  MODULE_TYPE     = DXE_DRIVER
> +  VERSION_STRING  = 1.0
> +  LIBRARY_CLASS   = FmpDeviceLib|DXE_DRIVER
> +
> +#
> +# The following information is for reference only and not required by the build
> tools.
> +#
> +#  VALID_ARCHITECTURES           = IA32 X64 IPF ARM AARCH64
> +#
> +
> +[Sources]
> +  FmpDeviceLib.c
> +
> +[Packages]
> +  MdePkg/MdePkg.dec
> +  FmpDevicePkg/FmpDevicePkg.dec
> diff --git a/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.uni
> b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.uni
> new file mode 100644
> index 0000000000..bedb38e9cf
> --- /dev/null
> +++ b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.uni
> @@ -0,0 +1,18 @@
> +// /** @file
> +// Provides firmware device specific services to support updates of a firmware
> +// image stored in a firmware device.
> +//
> +// Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +//
> +// This program and the accompanying materials
> +// are licensed and made available under the terms and conditions of the BSD
> License
> +// which accompanies this distribution. The full text of the license may be found
> at
> +// http://opensource.org/licenses/bsd-license.php
> +// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS"
> BASIS,
> +// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> EXPRESS OR IMPLIED.
> +//
> +// **/
> +
> +#string STR_MODULE_ABSTRACT     #language en-US  "Provides firmware
> device specific services to support updates of a firmware image stored in a
> firmware device."
> +
> +#string STR_MODULE_DESCRIPTION  #language en-US  "Provides firmware
> device specific services to support updates of a firmware image stored in a
> firmware device."
> diff --git
> a/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLib.c
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLib.c
> new file mode 100644
> index 0000000000..5f08e8b0fd
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLib.c
> @@ -0,0 +1,188 @@
> +/**  @file
> +  Provides services to retrieve values from Version 1 of a capsule's FMP
> Payload
> +  Header. The FMP Payload Header structure is not defined in the library class.
> +  Instead, services are provided to retrieve information from the FMP Payload
> +  Header.  If information is added to the FMP Payload Header, then new
> services
> +  may be added to this library class to retrieve the new information.
> +
> +  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +
> +  Redistribution and use in source and binary forms, with or without
> +  modification, are permitted provided that the following conditions are met:
> +  1. Redistributions of source code must retain the above copyright notice,
> +  this list of conditions and the following disclaimer.
> +  2. Redistributions in binary form must reproduce the above copyright notice,
> +  this list of conditions and the following disclaimer in the documentation
> +  and/or other materials provided with the distribution.
> +
> +  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +**/
> +
> +#include <PiDxe.h>
> +#include <Library/FmpPayloadHeaderLib.h>
> +
> +///
> +/// Define FMP Payload Header structure here so it is not public
> +///
> +
> +#pragma pack(1)
> +
> +typedef struct {
> +  UINT32  Signature;
> +  UINT32  HeaderSize;
> +  UINT32  FwVersion;
> +  UINT32  LowestSupportedVersion;
> +} FMP_PAYLOAD_HEADER;
> +
> +#pragma pack()
> +
> +///
> +/// Identifier is used to make sure the data in the header is for this structure
> +/// and version.  If the structure changes update the last digit.
> +///
> +#define FMP_PAYLOAD_HEADER_SIGNATURE SIGNATURE_32 ('M', 'S', 'S', '1')
> +
> +/**
> +  Returns the FMP Payload Header size in bytes.
> +
> +  @param[in]  Header          FMP Payload Header to evaluate
> +  @param[in]  FmpPayloadSize  Size of FMP payload
> +  @param[out] Size            The size, in bytes, of the FMP Payload
> Header.
> +
> +  @retval EFI_SUCCESS            The firmware version was returned.
> +  @retval EFI_INVALID_PARAMETER  Header is NULL.
> +  @retval EFI_INVALID_PARAMETER  Size is NULL.
> +  @retval EFI_INVALID_PARAMETER  Header is not a valid FMP Payload
> Header.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +GetFmpPayloadHeaderSize (
> +  IN  CONST VOID   *Header,
> +  IN  CONST UINTN  FmpPayloadSize,
> +  OUT UINT32       *Size
> +  )
> +{
> +  FMP_PAYLOAD_HEADER  *FmpPayloadHeader;
> +
> +  FmpPayloadHeader = NULL;
> +
> +  if (Header == NULL || Size == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
> +  if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) <
> (UINTN)FmpPayloadHeader ||
> +      (UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >=
> (UINTN)FmpPayloadHeader + FmpPayloadSize ||
> +      FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  if (FmpPayloadHeader->Signature != FMP_PAYLOAD_HEADER_SIGNATURE) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  *Size = FmpPayloadHeader->HeaderSize;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Returns the version described in the FMP Payload Header.
> +
> +  @param[in]  Header          FMP Payload Header to evaluate
> +  @param[in]  FmpPayloadSize  Size of FMP payload
> +  @param[out] Version         The firmware version described in the FMP
> Payload
> +                              Header.
> +
> +  @retval EFI_SUCCESS            The firmware version was returned.
> +  @retval EFI_INVALID_PARAMETER  Header is NULL.
> +  @retval EFI_INVALID_PARAMETER  Version is NULL.
> +  @retval EFI_INVALID_PARAMETER  Header is not a valid FMP Payload
> Header.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +GetFmpPayloadHeaderVersion (
> +  IN  CONST VOID   *Header,
> +  IN  CONST UINTN  FmpPayloadSize,
> +  OUT UINT32       *Version
> +  )
> +{
> +  FMP_PAYLOAD_HEADER  *FmpPayloadHeader;
> +
> +  FmpPayloadHeader = NULL;
> +
> +  if (Header == NULL || Version == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
> +  if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) <
> (UINTN)FmpPayloadHeader ||
> +      (UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >=
> (UINTN)FmpPayloadHeader + FmpPayloadSize ||
> +      FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  if (FmpPayloadHeader->Signature != FMP_PAYLOAD_HEADER_SIGNATURE) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  *Version = FmpPayloadHeader->FwVersion;
> +  return EFI_SUCCESS;
> +}
> +
> +/**
> +  Returns the lowest supported version described in the FMP Payload Header.
> +
> +  @param[in]  Header                  FMP Payload Header to evaluate
> +  @param[in]  FmpPayloadSize          Size of FMP payload
> +  @param[out] LowestSupportedVersion  The lowest supported version
> described in
> +                                      the FMP Payload Header.
> +
> +  @retval EFI_SUCCESS            The lowest support version was
> returned.
> +  @retval EFI_INVALID_PARAMETER  Header is NULL.
> +  @retval EFI_INVALID_PARAMETER  LowestSupportedVersion is NULL.
> +  @retval EFI_INVALID_PARAMETER  Header is not a valid FMP Payload
> Header.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +GetFmpPayloadHeaderLowestSupportedVersion (
> +  IN     CONST VOID   *Header,
> +  IN     CONST UINTN  FmpPayloadSize,
> +  IN OUT UINT32       *LowestSupportedVersion
> +  )
> +{
> +  FMP_PAYLOAD_HEADER  *FmpPayloadHeader;
> +
> +  FmpPayloadHeader = NULL;
> +
> +  if (Header == NULL || LowestSupportedVersion == NULL) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  FmpPayloadHeader = (FMP_PAYLOAD_HEADER *)Header;
> +  if ((UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) <
> (UINTN)FmpPayloadHeader ||
> +      (UINTN)FmpPayloadHeader + sizeof (FMP_PAYLOAD_HEADER) >=
> (UINTN)FmpPayloadHeader + FmpPayloadSize ||
> +      FmpPayloadHeader->HeaderSize < sizeof (FMP_PAYLOAD_HEADER)) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  if (FmpPayloadHeader->Signature != FMP_PAYLOAD_HEADER_SIGNATURE) {
> +    return EFI_INVALID_PARAMETER;
> +  }
> +
> +  *LowestSupportedVersion = FmpPayloadHeader->LowestSupportedVersion;
> +  return EFI_SUCCESS;
> +}
> diff --git
> a/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.in
> f
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.in
> f
> new file mode 100644
> index 0000000000..41ed6e2aca
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.in
> f
> @@ -0,0 +1,48 @@
> +## @file
> +#  Provides services to retrieve values from Version 1 of a capsule's FMP
> Payload
> +#  Header. The FMP Payload Header structure is not defined in the library
> class.
> +#  Instead, services are provided to retrieve information from the FMP
> Payload
> +#  Header.  If information is added to the FMP Payload Header, then new
> services
> +#  may be added to this library class to retrieve the new information.
> +#
> +#  Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
> +#  Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +#
> +#  Redistribution and use in source and binary forms, with or without
> +#  modification, are permitted provided that the following conditions are met:
> +#  1. Redistributions of source code must retain the above copyright notice,
> +#  this list of conditions and the following disclaimer.
> +#  2. Redistributions in binary form must reproduce the above copyright
> notice,
> +#  this list of conditions and the following disclaimer in the documentation
> +#  and/or other materials provided with the distribution.
> +#
> +#  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS "AS IS" AND
> +#  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
> THE IMPLIED
> +#  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE ARE DISCLAIMED.
> +#  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
> FOR ANY DIRECT,
> +#  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> DAMAGES (INCLUDING,
> +#  BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
> LOSS OF USE,
> +#  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY THEORY OF
> +#  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
> NEGLIGENCE
> +#  OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
> EVEN IF
> +#  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +##
> +
> +[Defines]
> +  INF_VERSION                    = 0x00010005
> +  BASE_NAME                      = FmpPayloadHeaderLibV1
> +  FILE_GUID                      =
> 98A79A6C-513C-4E72-8375-39C0A7244C4B
> +  MODULE_TYPE                    = DXE_DRIVER
> +  VERSION_STRING                 = 1.0
> +  LIBRARY_CLASS                  = FmpPayloadHeaderLib|DXE_DRIVER
> UEFI_APPLICATION
> +
> +#
> +#  VALID_ARCHITECTURES           = IA32 X64 IPF ARM AARCH64
> +#
> +
> +[Sources]
> +  FmpPayloadHeaderLib.c
> +
> +[Packages]
> +  MdePkg/MdePkg.dec
> +  FmpDevicePkg/FmpDevicePkg.dec
> diff --git
> a/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.u
> ni
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.u
> ni
> new file mode 100644
> index 0000000000..4eef31753d
> --- /dev/null
> +++
> b/FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.u
> ni
> @@ -0,0 +1,21 @@
> +// /** @file
> +// Provides services to retrieve values from Version 1 of a capsule's FMP
> Payload
> +// Header. The FMP Payload Header structure is not defined in the library class.
> +// Instead, services are provided to retrieve information from the FMP Payload
> +// Header.  If information is added to the FMP Payload Header, then new
> services
> +// may be added to this library class to retrieve the new information.
> +//
> +// Copyright (c) 2018, Intel Corporation. All rights reserved.<BR>
> +//
> +// This program and the accompanying materials
> +// are licensed and made available under the terms and conditions of the BSD
> License
> +// which accompanies this distribution. The full text of the license may be found
> at
> +// http://opensource.org/licenses/bsd-license.php
> +// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS"
> BASIS,
> +// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> EXPRESS OR IMPLIED.
> +//
> +// **/
> +
> +#string STR_MODULE_ABSTRACT     #language en-US  "Provides services to
> retrieve values from Version 1 of a capsule's FMP Payload Header."
> +
> +#string STR_MODULE_DESCRIPTION  #language en-US  "Provides services to
> retrieve values from Version 1 of a capsule's FMP Payload Header."
> --
> 2.14.2.windows.3



  reply	other threads:[~2018-06-04 23:09 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-05-29 22:37 [RFC v3 0/4] Add FmpDevicePkg Michael D Kinney
2018-05-29 22:37 ` [RFC v3 1/4] FmpDevicePkg: Add package, library classes, and PCDs Michael D Kinney
2018-05-29 22:37 ` [RFC v3 2/4] FmpDevicePkg: Add library instances Michael D Kinney
2018-06-04 23:09   ` Yao, Jiewen [this message]
2018-06-04 23:54     ` Kinney, Michael D
2018-05-29 22:37 ` [RFC v3 3/4] FmpDevicePkg: Add FmpDxe module Michael D Kinney
2018-05-29 22:37 ` [RFC v3 4/4] FmpDevicePkg: Add DSC file to build all package components Michael D Kinney
2018-05-30  7:08 ` [RFC v3 0/4] Add FmpDevicePkg Ard Biesheuvel
2018-05-30 15:15   ` Kinney, Michael D
2018-05-31 11:13     ` Ard Biesheuvel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=74D8A39837DF1E4DA445A8C0B3885C503AC27A65@shsmsx102.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox