From: "Patrick Rudolph" <patrick.rudolph@9elements.com>
To: "Dong, Guo" <guo.dong@intel.com>
Cc: "Rhodes, Sean" <sean@starlabs.systems>,
"devel@edk2.groups.io" <devel@edk2.groups.io>,
"Ni, Ray" <ray.ni@intel.com>,
"Ma, Maurice" <maurice.ma@intel.com>,
"You, Benjamin" <benjamin.you@intel.com>
Subject: Re: [PATCH 5/5] UefiPayloadPkg: Add support for Firmware Volume Block Protocol
Date: Wed, 23 Mar 2022 19:24:40 +0100 [thread overview]
Message-ID: <CALNFmy14cBFKHX2GAfLgoVJd5M=5k_kinQ1vCYSj3QS2txYMtA@mail.gmail.com> (raw)
In-Reply-To: <BYAPR11MB362255267B3F87D417C290E99E189@BYAPR11MB3622.namprd11.prod.outlook.com>
Hi Guo,
I don't see where it's written that UefiPayloadPkg is bootloader
independent. Can you point me to that documentation?
Reading the BuildAndIntegrationInstructions.txt I understand that it
is very bootloader specific, as it's basically designed as a
bootloader payload.
Where do you draw the line between platform code and "generic" payload code?
Regards,
Patrick Rudolph
On Wed, Mar 23, 2022 at 7:12 PM Dong, Guo <guo.dong@intel.com> wrote:
>
>
> Hi Sean,
> SMMSTORE and this FVB module are specific for coreboot while UefiPayloadPkg in Edk2 is targeting platform/bootloader independent.
> I just submitted an "add UEFI payload platform FV" patch to edk2-platforms repo, in this patch it moves PCH specific modules from
> Edk2 UefiPayloadPkg to edk2-platforms Platform/Intel/PayloadPlatformPkg. Maybe these coreboot specific modules could also target
> to edk2-platforms repo?
>
> Thanks,
> Guo
> -----Original Message-----
> From: Sean Rhodes <sean@starlabs.systems>
> Sent: Monday, March 21, 2022 2:10 AM
> To: devel@edk2.groups.io
> Cc: Rhodes, Sean <sean@starlabs.systems>; Dong, Guo <guo.dong@intel.com>; Ni, Ray <ray.ni@intel.com>; Ma, Maurice <maurice.ma@intel.com>; You, Benjamin <benjamin.you@intel.com>; Patrick Rudolph <patrick.rudolph@9elements.com>
> Subject: [PATCH 5/5] UefiPayloadPkg: Add support for Firmware Volume Block Protocol
>
> This adds support for FVB in order to support a platform independent
> and non-volatile variable store on UefiPayloadPkg. The variable store
> makes use the SmmStoreLib to provide an unauthenticed variable store.
>
> Since commit bc744f5893fc4d53275ed26dd8d968011c6a09c1 coreboot supports
> the SMMSTORE v2 feature. It implements a SMI handler that is able to
> write, read and erase pages in the boot media (SPI flash).
> The communication is done using a fixed communication buffer that is
> allocated in CBMEM. The existence of this optional feature is advertised
> by a coreboot table.
> When the SMMSTORE feature is not available the variable emulation is used
> by setting PcdEmuVariableNvModeEnable to TRUE.
>
> The DXE component provides runtime services and takes care of virtual to
> physical mapping the communication buffers between SMM and OS.
>
> The contents of the variable store can be accessed and modified by any
> priviledged application. As authentication is done by runtime services
> only the store shouldn't be used to store authenticated variables.
>
> Tested on Linux and Windows 10 on real hardware.
> Currently this cannot be tested on coreboot and qemu as it doesn't support
> the SMMSTORE on qemu.
>
> Cc: Guo Dong <guo.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Maurice Ma <maurice.ma@intel.com>
> Cc: Benjamin You <benjamin.you@intel.com>
> Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
> Signed-off-by: Sean Rhodes <sean@starlabs.systems>
> ---
> .../SmmStoreFvb/SmmStoreFvbRuntime.c | 282 ++++++
> .../SmmStoreFvb/SmmStoreFvbRuntime.h | 111 +++
> .../SmmStoreFvb/SmmStoreFvbRuntimeDxe.c | 849 ++++++++++++++++++
> .../SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf | 66 ++
> UefiPayloadPkg/UefiPayloadPkg.dsc | 24 +-
> UefiPayloadPkg/UefiPayloadPkg.fdf | 4 +
> 6 files changed, 1330 insertions(+), 6 deletions(-)
> create mode 100644 UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.c
> create mode 100644 UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.h
> create mode 100644 UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.c
> create mode 100644 UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf
>
> diff --git a/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.c b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.c
> new file mode 100644
> index 0000000000..08d5c408fb
> --- /dev/null
> +++ b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.c
> @@ -0,0 +1,282 @@
> +/** @file SmmStoreFvbRuntime.c
>
> +
>
> + Copyright (c) 2022, 9elements GmbH<BR>
>
> +
>
> + SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +
>
> +**/
>
> +
>
> +#include <Library/UefiLib.h>
>
> +#include <Library/BaseMemoryLib.h>
>
> +#include <Library/MemoryAllocationLib.h>
>
> +#include <Library/DxeServicesTableLib.h>
>
> +#include <Library/DevicePathLib.h>
>
> +#include <Library/UefiBootServicesTableLib.h>
>
> +#include <Library/PcdLib.h>
>
> +#include <Library/SmmStoreLib.h>
>
> +
>
> +#include "SmmStoreFvbRuntime.h"
>
> +
>
> +STATIC EFI_EVENT mSmmStoreVirtualAddrChangeEvent;
>
> +
>
> +//
>
> +// Global variable declarations
>
> +//
>
> +SMMSTORE_INSTANCE *mSmmStoreInstance;
>
> +
>
> +SMMSTORE_INSTANCE mSmmStoreInstanceTemplate = {
>
> + SMMSTORE_SIGNATURE, // Signature
>
> + NULL, // Handle ... NEED TO BE FILLED
>
> + {
>
> + FvbGetAttributes, // GetAttributes
>
> + FvbSetAttributes, // SetAttributes
>
> + FvbGetPhysicalAddress, // GetPhysicalAddress
>
> + FvbGetBlockSize, // GetBlockSize
>
> + FvbRead, // Read
>
> + FvbWrite, // Write
>
> + FvbEraseBlocks, // EraseBlocks
>
> + NULL, // ParentHandle
>
> + }, // FvbProtoccol
>
> + 0, // BlockSize ... NEED TO BE FILLED
>
> + 0, // LastBlock ... NEED TO BE FILLED
>
> + 0, // MmioAddress ... NEED TO BE FILLED
>
> + {
>
> + {
>
> + {
>
> + HARDWARE_DEVICE_PATH,
>
> + HW_MEMMAP_DP,
>
> + {
>
> + (UINT8)(sizeof (MEMMAP_DEVICE_PATH)),
>
> + (UINT8)(sizeof (MEMMAP_DEVICE_PATH) >> 8)
>
> + }
>
> + },
>
> + EfiMemoryMappedIO,
>
> + (EFI_PHYSICAL_ADDRESS)0, // NEED TO BE FILLED
>
> + (EFI_PHYSICAL_ADDRESS)0, // NEED TO BE FILLED
>
> + },
>
> + {
>
> + END_DEVICE_PATH_TYPE,
>
> + END_ENTIRE_DEVICE_PATH_SUBTYPE,
>
> + {
>
> + END_DEVICE_PATH_LENGTH,
>
> + 0
>
> + }
>
> + }
>
> + } // DevicePath
>
> +};
>
> +
>
> +/**
>
> + Initialize the SmmStore instance.
>
> +
>
> +
>
> + @param[in] FvBase The physical MMIO base address of the FV containing
>
> + the variable store.
>
> +
>
> + @param[in] NumberofBlocks Number of blocks within the FV.
>
> + @param[in] BlockSize The size in bytes of one block within the FV.
>
> + @param[in, out] Instance The SmmStore instace to initialize
>
> +
>
> +**/
>
> +STATIC
>
> +EFI_STATUS
>
> +SmmStoreInitInstance (
>
> + IN EFI_PHYSICAL_ADDRESS FvBase,
>
> + IN UINTN NumberofBlocks,
>
> + IN UINTN BlockSize,
>
> + IN OUT SMMSTORE_INSTANCE *Instance
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + FV_MEMMAP_DEVICE_PATH *FvDevicePath;
>
> +
>
> + ASSERT (Instance != NULL);
>
> +
>
> + Instance->BlockSize = BlockSize;
>
> + Instance->LastBlock = NumberofBlocks - 1;
>
> + Instance->MmioAddress = FvBase;
>
> +
>
> + FvDevicePath = &Instance->DevicePath;
>
> + FvDevicePath->MemMapDevPath.StartingAddress = FvBase;
>
> + FvDevicePath->MemMapDevPath.EndingAddress = FvBase + BlockSize * NumberofBlocks - 1;
>
> +
>
> + Status = FvbInitialize (Instance);
>
> + if (EFI_ERROR (Status)) {
>
> + return Status;
>
> + }
>
> +
>
> + Status = gBS->InstallMultipleProtocolInterfaces (
>
> + &Instance->Handle,
>
> + &gEfiDevicePathProtocolGuid,
>
> + &Instance->DevicePath,
>
> + &gEfiFirmwareVolumeBlockProtocolGuid,
>
> + &Instance->FvbProtocol,
>
> + NULL
>
> + );
>
> + if (EFI_ERROR (Status)) {
>
> + return Status;
>
> + }
>
> +
>
> + DEBUG ((DEBUG_INFO, "%a: Created a new instance\n", __FUNCTION__));
>
> +
>
> + return Status;
>
> +}
>
> +
>
> +/**
>
> + Fixup internal data so that EFI can be call in virtual mode.
>
> + Call the passed in Child Notify event and convert any pointers in
>
> + lib to virtual mode.
>
> +
>
> + @param[in] Event The Event that is being processed
>
> + @param[in] Context Event Context
>
> +**/
>
> +STATIC
>
> +VOID
>
> +EFIAPI
>
> +SmmStoreVirtualNotifyEvent (
>
> + IN EFI_EVENT Event,
>
> + IN VOID *Context
>
> + )
>
> +{
>
> + // Convert Fvb
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.EraseBlocks);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.GetAttributes);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.GetBlockSize);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.GetPhysicalAddress);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.Read);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.SetAttributes);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->FvbProtocol.Write);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance->MmioAddress);
>
> + EfiConvertPointer (0x0, (VOID **)&mSmmStoreInstance);
>
> +
>
> + return;
>
> +}
>
> +
>
> +/**
>
> + The user Entry Point for module SmmStoreFvbRuntimeDxe. The user code starts with this function.
>
> +
>
> + @param[in] ImageHandle The firmware allocated handle for the EFI image.
>
> + @param[in] SystemTable A pointer to the EFI System Table.
>
> +
>
> + @retval EFI_SUCCESS The entry point is executed successfully.
>
> + @retval other Some error occurs when executing this entry point.
>
> +
>
> +**/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +SmmStoreInitialize (
>
> + IN EFI_HANDLE ImageHandle,
>
> + IN EFI_SYSTEM_TABLE *SystemTable
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + EFI_PHYSICAL_ADDRESS MmioAddress;
>
> + UINTN BlockSize;
>
> + UINTN BlockCount;
>
> + UINT32 NvStorageBase;
>
> + UINT32 NvStorageSize;
>
> + UINT32 NvVariableSize;
>
> + UINT32 FtwWorkingSize;
>
> + UINT32 FtwSpareSize;
>
> +
>
> + Status = SmmStoreLibInitialize ();
>
> + if (EFI_ERROR (Status)) {
>
> + DEBUG ((DEBUG_ERROR, "%a: Failed to initialize SmmStoreLib\n", __FUNCTION__));
>
> + return Status;
>
> + }
>
> +
>
> + Status = SmmStoreLibGetMmioAddress (&MmioAddress);
>
> + if (EFI_ERROR (Status)) {
>
> + DEBUG ((DEBUG_ERROR, "%a: Failed to get SmmStore MMIO address\n", __FUNCTION__));
>
> + SmmStoreLibDeinitialize ();
>
> + return Status;
>
> + }
>
> +
>
> + Status = SmmStoreLibGetNumBlocks (&BlockCount);
>
> + if (EFI_ERROR (Status)) {
>
> + DEBUG ((DEBUG_ERROR, "%a: Failed to get SmmStore No. blocks\n", __FUNCTION__));
>
> + SmmStoreLibDeinitialize ();
>
> + return Status;
>
> + }
>
> +
>
> + Status = SmmStoreLibGetBlockSize (&BlockSize);
>
> + if (EFI_ERROR (Status)) {
>
> + DEBUG ((DEBUG_ERROR, "%a: Failed to get SmmStore block size\n", __FUNCTION__));
>
> + SmmStoreLibDeinitialize ();
>
> + return Status;
>
> + }
>
> +
>
> + NvStorageSize = BlockCount * BlockSize;
>
> + NvStorageBase = MmioAddress;
>
> +
>
> + FtwSpareSize = (BlockCount / 2) * BlockSize;
>
> + FtwWorkingSize = BlockSize;
>
> + NvVariableSize = NvStorageSize - FtwSpareSize - FtwWorkingSize;
>
> + DEBUG ((DEBUG_INFO, "NvStorageBase:0x%x, NvStorageSize:0x%x\n", NvStorageBase, NvStorageSize));
>
> +
>
> + if (NvVariableSize >= 0x80000000) {
>
> + SmmStoreLibDeinitialize ();
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + Status = PcdSet32S (PcdFlashNvStorageVariableSize, NvVariableSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet32S (PcdFlashNvStorageVariableBase, NvStorageBase);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet64S (PcdFlashNvStorageVariableBase64, NvStorageBase);
>
> + ASSERT_EFI_ERROR (Status);
>
> +
>
> + Status = PcdSet32S (PcdFlashNvStorageFtwWorkingSize, FtwWorkingSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet32S (PcdFlashNvStorageFtwWorkingBase, NvStorageBase + NvVariableSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet64S (PcdFlashNvStorageFtwWorkingBase64, NvStorageBase + NvVariableSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> +
>
> + Status = PcdSet32S (PcdFlashNvStorageFtwSpareSize, FtwSpareSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet32S (PcdFlashNvStorageFtwSpareBase, NvStorageBase + NvVariableSize + FtwWorkingSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> + Status = PcdSet64S (PcdFlashNvStorageFtwSpareBase64, NvStorageBase + NvVariableSize + FtwWorkingSize);
>
> + ASSERT_EFI_ERROR (Status);
>
> +
>
> + mSmmStoreInstance = AllocateRuntimeCopyPool (sizeof (SMMSTORE_INSTANCE), &mSmmStoreInstanceTemplate);
>
> + if (mSmmStoreInstance == NULL) {
>
> + SmmStoreLibDeinitialize ();
>
> + DEBUG ((DEBUG_ERROR, "%a: Out of resources\n", __FUNCTION__));
>
> + return EFI_OUT_OF_RESOURCES;
>
> + }
>
> +
>
> + Status = SmmStoreInitInstance (
>
> + MmioAddress,
>
> + BlockCount,
>
> + BlockSize,
>
> + mSmmStoreInstance
>
> + );
>
> + if (EFI_ERROR (Status)) {
>
> + DEBUG (
>
> + (
>
> + DEBUG_ERROR,
>
> + "%a: Fail to create instance for SmmStore\n",
>
> + __FUNCTION__
>
> + )
>
> + );
>
> + FreePool (mSmmStoreInstance);
>
> + SmmStoreLibDeinitialize ();
>
> + return Status;
>
> + }
>
> +
>
> + //
>
> + // Register for the virtual address change event
>
> + //
>
> + Status = gBS->CreateEventEx (
>
> + EVT_NOTIFY_SIGNAL,
>
> + TPL_NOTIFY,
>
> + SmmStoreVirtualNotifyEvent,
>
> + NULL,
>
> + &gEfiEventVirtualAddressChangeGuid,
>
> + &mSmmStoreVirtualAddrChangeEvent
>
> + );
>
> + ASSERT_EFI_ERROR (Status);
>
> +
>
> + return Status;
>
> +}
>
> diff --git a/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.h b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.h
> new file mode 100644
> index 0000000000..8015d12d13
> --- /dev/null
> +++ b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntime.h
> @@ -0,0 +1,111 @@
> +/** @file SmmStoreFvbRuntime.h
>
> +
>
> + Copyright (c) 2022, 9elements GmbH<BR>
>
> +
>
> + SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +
>
> +**/
>
> +
>
> +#ifndef SMM_STORE_DXE_H_
>
> +#define SMM_STORE_DXE_H_
>
> +
>
> +#include <Base.h>
>
> +#include <PiDxe.h>
>
> +
>
> +#include <Guid/EventGroup.h>
>
> +
>
> +#include <Protocol/FirmwareVolumeBlock.h>
>
> +
>
> +#include <Library/DebugLib.h>
>
> +#include <Library/IoLib.h>
>
> +#include <Library/UefiLib.h>
>
> +#include <Library/UefiRuntimeLib.h>
>
> +
>
> +#define SMMSTORE_SIGNATURE SIGNATURE_32('S', 'M', 'M', 'S')
>
> +#define INSTANCE_FROM_FVB_THIS(a) CR(a, SMMSTORE_INSTANCE, FvbProtocol, SMMSTORE_SIGNATURE)
>
> +
>
> +typedef struct _SMMSTORE_INSTANCE SMMSTORE_INSTANCE;
>
> +
>
> +typedef struct {
>
> + MEMMAP_DEVICE_PATH MemMapDevPath;
>
> + EFI_DEVICE_PATH_PROTOCOL EndDevPath;
>
> +} FV_MEMMAP_DEVICE_PATH;
>
> +
>
> +struct _SMMSTORE_INSTANCE {
>
> + UINT32 Signature;
>
> + EFI_HANDLE Handle;
>
> + EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL FvbProtocol;
>
> + UINTN BlockSize;
>
> + UINTN LastBlock;
>
> + EFI_PHYSICAL_ADDRESS MmioAddress;
>
> + FV_MEMMAP_DEVICE_PATH DevicePath;
>
> +};
>
> +
>
> +//
>
> +// SmmStoreFvbRuntimeDxe.c
>
> +//
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbInitialize (
>
> + IN SMMSTORE_INSTANCE *Instance
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetAttributes (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + OUT EFI_FVB_ATTRIBUTES_2 *Attributes
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbSetAttributes (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetPhysicalAddress (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + OUT EFI_PHYSICAL_ADDRESS *Address
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetBlockSize (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + OUT UINTN *BlockSize,
>
> + OUT UINTN *NumberOfBlocks
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbRead (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + IN UINTN Offset,
>
> + IN OUT UINTN *NumBytes,
>
> + IN OUT UINT8 *Buffer
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbWrite (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + IN UINTN Offset,
>
> + IN OUT UINTN *NumBytes,
>
> + IN UINT8 *Buffer
>
> + );
>
> +
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbEraseBlocks (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + ...
>
> + );
>
> +
>
> +#endif // SMM_STORE_DXE_H_
>
> diff --git a/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.c b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.c
> new file mode 100644
> index 0000000000..14d4ec324d
> --- /dev/null
> +++ b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.c
> @@ -0,0 +1,849 @@
> +/** @file SmmStoreFvbRuntimeDxe.c
>
> +
>
> + Copyright (c) 2022, 9elements GmbH<BR>
>
> +
>
> + SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +
>
> +**/
>
> +
>
> +#include <PiDxe.h>
>
> +
>
> +#include <Library/PcdLib.h>
>
> +#include <Library/BaseLib.h>
>
> +#include <Library/HobLib.h>
>
> +#include <Library/UefiLib.h>
>
> +#include <Library/BaseMemoryLib.h>
>
> +#include <Library/MemoryAllocationLib.h>
>
> +#include <Library/DxeServicesTableLib.h>
>
> +#include <Library/UefiBootServicesTableLib.h>
>
> +#include <Library/SmmStoreLib.h>
>
> +
>
> +#include <Guid/VariableFormat.h>
>
> +#include <Guid/SystemNvDataGuid.h>
>
> +#include <Guid/NvVarStoreFormatted.h>
>
> +
>
> +#include "SmmStoreFvbRuntime.h"
>
> +
>
> +///
>
> +/// The Firmware Volume Block Protocol is the low-level interface
>
> +/// to a firmware volume. File-level access to a firmware volume
>
> +/// should not be done using the Firmware Volume Block Protocol.
>
> +/// Normal access to a firmware volume must use the Firmware
>
> +/// Volume Protocol. Typically, only the file system driver that
>
> +/// produces the Firmware Volume Protocol will bind to the
>
> +/// Firmware Volume Block Protocol.
>
> +///
>
> +
>
> +/**
>
> + Initialises the FV Header and Variable Store Header
>
> + to support variable operations.
>
> +
>
> + @param[in] Instance - Pointer to SmmStore instance
>
> +
>
> +**/
>
> +EFI_STATUS
>
> +InitializeFvAndVariableStoreHeaders (
>
> + IN SMMSTORE_INSTANCE *Instance
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + VOID *Headers;
>
> + UINTN HeadersLength;
>
> + EFI_FIRMWARE_VOLUME_HEADER *FirmwareVolumeHeader;
>
> + VARIABLE_STORE_HEADER *VariableStoreHeader;
>
> + UINT32 NvStorageFtwSpareSize;
>
> + UINT32 NvStorageFtwWorkingSize;
>
> + UINT32 NvStorageVariableSize;
>
> + UINT64 NvStorageFtwSpareBase;
>
> + UINT64 NvStorageFtwWorkingBase;
>
> + UINT64 NvStorageVariableBase;
>
> +
>
> + HeadersLength = sizeof (EFI_FIRMWARE_VOLUME_HEADER) + sizeof (EFI_FV_BLOCK_MAP_ENTRY) + sizeof (VARIABLE_STORE_HEADER);
>
> + Headers = AllocateZeroPool (HeadersLength);
>
> +
>
> + NvStorageFtwWorkingSize = PcdGet32 (PcdFlashNvStorageFtwWorkingSize);
>
> + NvStorageFtwSpareSize = PcdGet32 (PcdFlashNvStorageFtwSpareSize);
>
> + NvStorageVariableSize = PcdGet32 (PcdFlashNvStorageVariableSize);
>
> +
>
> + NvStorageFtwSpareBase = (PcdGet64 (PcdFlashNvStorageFtwSpareBase64) != 0) ?
>
> + PcdGet64 (PcdFlashNvStorageFtwSpareBase64) : PcdGet32 (PcdFlashNvStorageFtwSpareBase);
>
> + NvStorageFtwWorkingBase = (PcdGet64 (PcdFlashNvStorageFtwWorkingBase64) != 0) ?
>
> + PcdGet64 (PcdFlashNvStorageFtwWorkingBase64) : PcdGet32 (PcdFlashNvStorageFtwWorkingBase);
>
> + NvStorageVariableBase = (PcdGet64 (PcdFlashNvStorageVariableBase64) != 0) ?
>
> + PcdGet64 (PcdFlashNvStorageVariableBase64) : PcdGet32 (PcdFlashNvStorageVariableBase);
>
> +
>
> + // FirmwareVolumeHeader->FvLength is declared to have the Variable area AND the FTW working area AND the FTW Spare contiguous.
>
> + if ((NvStorageVariableBase + NvStorageVariableSize) != NvStorageFtwWorkingBase) {
>
> + DEBUG ((
>
> + DEBUG_ERROR,
>
> + "%a: NvStorageFtwWorkingBase is not contiguous with NvStorageVariableBase region\n",
>
> + __FUNCTION__
>
> + ));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + if ((NvStorageFtwWorkingBase + NvStorageFtwWorkingSize) != NvStorageFtwSpareBase) {
>
> + DEBUG ((
>
> + DEBUG_ERROR,
>
> + "%a: NvStorageFtwSpareBase is not contiguous with NvStorageFtwWorkingBase region\n",
>
> + __FUNCTION__
>
> + ));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + // Check if the size of the area is at least one block size
>
> + if ((NvStorageVariableSize <= 0) || (NvStorageVariableSize / Instance->BlockSize <= 0)) {
>
> + DEBUG ((
>
> + DEBUG_ERROR,
>
> + "%a: NvStorageVariableSize is 0x%x, should be atleast one block size\n",
>
> + __FUNCTION__,
>
> + NvStorageVariableSize
>
> + ));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + if ((NvStorageFtwWorkingSize <= 0) || (NvStorageFtwWorkingSize / Instance->BlockSize <= 0)) {
>
> + DEBUG ((
>
> + DEBUG_ERROR,
>
> + "%a: NvStorageFtwWorkingSize is 0x%x, should be atleast one block size\n",
>
> + __FUNCTION__,
>
> + NvStorageFtwWorkingSize
>
> + ));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + if ((NvStorageFtwSpareSize <= 0) || (NvStorageFtwSpareSize / Instance->BlockSize <= 0)) {
>
> + DEBUG ((
>
> + DEBUG_ERROR,
>
> + "%a: NvStorageFtwSpareSize is 0x%x, should be atleast one block size\n",
>
> + __FUNCTION__,
>
> + NvStorageFtwSpareSize
>
> + ));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + // Ensure the Variable area Base Addresses are aligned on a block size boundaries
>
> + if ((NvStorageVariableBase % Instance->BlockSize != 0) ||
>
> + (NvStorageFtwWorkingBase % Instance->BlockSize != 0) ||
>
> + (NvStorageFtwSpareBase % Instance->BlockSize != 0))
>
> + {
>
> + DEBUG ((DEBUG_ERROR, "%a: NvStorage Base addresses must be aligned to block size boundaries", __FUNCTION__));
>
> + return EFI_INVALID_PARAMETER;
>
> + }
>
> +
>
> + //
>
> + // EFI_FIRMWARE_VOLUME_HEADER
>
> + //
>
> + FirmwareVolumeHeader = (EFI_FIRMWARE_VOLUME_HEADER *)Headers;
>
> + CopyGuid (&FirmwareVolumeHeader->FileSystemGuid, &gEfiSystemNvDataFvGuid);
>
> + FirmwareVolumeHeader->FvLength =
>
> + PcdGet32 (PcdFlashNvStorageVariableSize) +
>
> + PcdGet32 (PcdFlashNvStorageFtwWorkingSize) +
>
> + PcdGet32 (PcdFlashNvStorageFtwSpareSize);
>
> + FirmwareVolumeHeader->Signature = EFI_FVH_SIGNATURE;
>
> + FirmwareVolumeHeader->Attributes = (EFI_FVB_ATTRIBUTES_2)(
>
> + EFI_FVB2_READ_ENABLED_CAP | // Reads may be enabled
>
> + EFI_FVB2_READ_STATUS | // Reads are currently enabled
>
> + EFI_FVB2_STICKY_WRITE | // A block erase is required to flip bits into EFI_FVB2_ERASE_POLARITY
>
> + EFI_FVB2_MEMORY_MAPPED | // It is memory mapped
>
> + EFI_FVB2_ERASE_POLARITY | // After erasure all bits take this value (i.e. '1')
>
> + EFI_FVB2_WRITE_STATUS | // Writes are currently enabled
>
> + EFI_FVB2_WRITE_ENABLED_CAP // Writes may be enabled
>
> + );
>
> + FirmwareVolumeHeader->HeaderLength = sizeof (EFI_FIRMWARE_VOLUME_HEADER) + sizeof (EFI_FV_BLOCK_MAP_ENTRY);
>
> + FirmwareVolumeHeader->Revision = EFI_FVH_REVISION;
>
> + FirmwareVolumeHeader->BlockMap[0].NumBlocks = Instance->LastBlock + 1;
>
> + FirmwareVolumeHeader->BlockMap[0].Length = Instance->BlockSize;
>
> + FirmwareVolumeHeader->BlockMap[1].NumBlocks = 0;
>
> + FirmwareVolumeHeader->BlockMap[1].Length = 0;
>
> + FirmwareVolumeHeader->Checksum = CalculateCheckSum16 ((UINT16 *)FirmwareVolumeHeader, FirmwareVolumeHeader->HeaderLength);
>
> +
>
> + //
>
> + // VARIABLE_STORE_HEADER
>
> + //
>
> + VariableStoreHeader = (VARIABLE_STORE_HEADER *)((UINTN)Headers + FirmwareVolumeHeader->HeaderLength);
>
> + CopyGuid (&VariableStoreHeader->Signature, &gEfiVariableGuid);
>
> + VariableStoreHeader->Size = PcdGet32 (PcdFlashNvStorageVariableSize) - FirmwareVolumeHeader->HeaderLength;
>
> + VariableStoreHeader->Format = VARIABLE_STORE_FORMATTED;
>
> + VariableStoreHeader->State = VARIABLE_STORE_HEALTHY;
>
> +
>
> + // Install the combined super-header in the NorFlash
>
> + Status = FvbWrite (&Instance->FvbProtocol, 0, 0, &HeadersLength, Headers);
>
> +
>
> + FreePool (Headers);
>
> + return Status;
>
> +}
>
> +
>
> +/**
>
> + Check the integrity of firmware volume header.
>
> +
>
> + @retval EFI_SUCCESS - The firmware volume is consistent
>
> + @retval EFI_NOT_FOUND - The firmware volume has been corrupted.
>
> +
>
> +**/
>
> +EFI_STATUS
>
> +ValidateFvHeader (
>
> + VOID
>
> + )
>
> +{
>
> + UINT16 Checksum;
>
> + EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;
>
> + VARIABLE_STORE_HEADER *VariableStoreHeader;
>
> + UINTN VariableStoreLength;
>
> + UINTN FvLength;
>
> + EFI_STATUS TempStatus;
>
> + UINTN BufferSize;
>
> + UINTN BufferSizeReqested;
>
> +
>
> + BufferSizeReqested = sizeof (EFI_FIRMWARE_VOLUME_HEADER);
>
> + FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *)AllocatePool (BufferSizeReqested);
>
> + if (!FwVolHeader) {
>
> + return EFI_OUT_OF_RESOURCES;
>
> + }
>
> +
>
> + BufferSize = BufferSizeReqested;
>
> + TempStatus = SmmStoreLibRead (0, 0, &BufferSize, (UINT8 *)FwVolHeader);
>
> + if (EFI_ERROR (TempStatus) || (BufferSizeReqested != BufferSize)) {
>
> + FreePool (FwVolHeader);
>
> + return EFI_DEVICE_ERROR;
>
> + }
>
> +
>
> + FvLength = PcdGet32 (PcdFlashNvStorageVariableSize) + PcdGet32 (PcdFlashNvStorageFtwWorkingSize) +
>
> + PcdGet32 (PcdFlashNvStorageFtwSpareSize);
>
> +
>
> + //
>
> + // Verify the header revision, header signature, length
>
> + // Length of FvBlock cannot be 2**64-1
>
> + // HeaderLength cannot be an odd number
>
> + //
>
> + if ( (FwVolHeader->Revision != EFI_FVH_REVISION)
>
> + || (FwVolHeader->Signature != EFI_FVH_SIGNATURE)
>
> + || (FwVolHeader->FvLength != FvLength)
>
> + )
>
> + {
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: No Firmware Volume header present\n",
>
> + __FUNCTION__
>
> + ));
>
> + FreePool (FwVolHeader);
>
> + return EFI_NOT_FOUND;
>
> + }
>
> +
>
> + // Check the Firmware Volume Guid
>
> + if ( CompareGuid (&FwVolHeader->FileSystemGuid, &gEfiSystemNvDataFvGuid) == FALSE ) {
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: Firmware Volume Guid non-compatible\n",
>
> + __FUNCTION__
>
> + ));
>
> + FreePool (FwVolHeader);
>
> + return EFI_NOT_FOUND;
>
> + }
>
> +
>
> + BufferSizeReqested = FwVolHeader->HeaderLength;
>
> + FreePool (FwVolHeader);
>
> + FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *)AllocatePool (BufferSizeReqested);
>
> + if (!FwVolHeader) {
>
> + return EFI_OUT_OF_RESOURCES;
>
> + }
>
> +
>
> + BufferSize = BufferSizeReqested;
>
> + TempStatus = SmmStoreLibRead (0, 0, &BufferSize, (UINT8 *)FwVolHeader);
>
> + if (EFI_ERROR (TempStatus) || (BufferSizeReqested != BufferSize)) {
>
> + FreePool (FwVolHeader);
>
> + return EFI_DEVICE_ERROR;
>
> + }
>
> +
>
> + // Verify the header checksum
>
> + Checksum = CalculateSum16 ((UINT16 *)FwVolHeader, FwVolHeader->HeaderLength);
>
> + if (Checksum != 0) {
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: FV checksum is invalid (Checksum:0x%X)\n",
>
> + __FUNCTION__,
>
> + Checksum
>
> + ));
>
> + FreePool (FwVolHeader);
>
> + return EFI_NOT_FOUND;
>
> + }
>
> +
>
> + BufferSizeReqested = sizeof (VARIABLE_STORE_HEADER);
>
> + VariableStoreHeader = (VARIABLE_STORE_HEADER *)AllocatePool (BufferSizeReqested);
>
> + if (!VariableStoreHeader) {
>
> + return EFI_OUT_OF_RESOURCES;
>
> + }
>
> +
>
> + BufferSize = BufferSizeReqested;
>
> + TempStatus = SmmStoreLibRead (0, FwVolHeader->HeaderLength, &BufferSize, (UINT8 *)VariableStoreHeader);
>
> + if (EFI_ERROR (TempStatus) || (BufferSizeReqested != BufferSize)) {
>
> + FreePool (VariableStoreHeader);
>
> + FreePool (FwVolHeader);
>
> + return EFI_DEVICE_ERROR;
>
> + }
>
> +
>
> + // Check the Variable Store Guid
>
> + if (!CompareGuid (&VariableStoreHeader->Signature, &gEfiVariableGuid) &&
>
> + !CompareGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid))
>
> + {
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: Variable Store Guid non-compatible\n",
>
> + __FUNCTION__
>
> + ));
>
> + FreePool (FwVolHeader);
>
> + FreePool (VariableStoreHeader);
>
> + return EFI_NOT_FOUND;
>
> + }
>
> +
>
> + VariableStoreLength = PcdGet32 (PcdFlashNvStorageVariableSize) - FwVolHeader->HeaderLength;
>
> + if (VariableStoreHeader->Size != VariableStoreLength) {
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: Variable Store Length does not match\n",
>
> + __FUNCTION__
>
> + ));
>
> + FreePool (FwVolHeader);
>
> + FreePool (VariableStoreHeader);
>
> + return EFI_NOT_FOUND;
>
> + }
>
> +
>
> + FreePool (FwVolHeader);
>
> + FreePool (VariableStoreHeader);
>
> +
>
> + return EFI_SUCCESS;
>
> +}
>
> +
>
> +/**
>
> + The GetAttributes() function retrieves the attributes and
>
> + current settings of the block.
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Attributes Pointer to EFI_FVB_ATTRIBUTES_2 in which the attributes and
>
> + current settings are returned.
>
> + Type EFI_FVB_ATTRIBUTES_2 is defined in EFI_FIRMWARE_VOLUME_HEADER.
>
> +
>
> + @retval EFI_SUCCESS The firmware volume attributes were returned.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetAttributes (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + OUT EFI_FVB_ATTRIBUTES_2 *Attributes
>
> + )
>
> +{
>
> + EFI_FVB_ATTRIBUTES_2 FlashFvbAttributes;
>
> +
>
> + FlashFvbAttributes = (EFI_FVB_ATTRIBUTES_2)(
>
> + EFI_FVB2_READ_STATUS | // Reads are currently enabled
>
> + EFI_FVB2_WRITE_STATUS | // Writes are enabled
>
> + EFI_FVB2_STICKY_WRITE | // A block erase is required to flip bits into EFI_FVB2_ERASE_POLARITY
>
> + EFI_FVB2_MEMORY_MAPPED | // It is memory mapped
>
> + EFI_FVB2_ERASE_POLARITY // After erasure all bits take this value (i.e. '1')
>
> + );
>
> +
>
> + *Attributes = FlashFvbAttributes;
>
> +
>
> + DEBUG ((DEBUG_BLKIO, "FvbGetAttributes(0x%X)\n", *Attributes));
>
> +
>
> + return EFI_SUCCESS;
>
> +}
>
> +
>
> +/**
>
> + The SetAttributes() function sets configurable firmware volume attributes
>
> + and returns the new settings of the firmware volume.
>
> +
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Attributes On input, Attributes is a pointer to EFI_FVB_ATTRIBUTES_2
>
> + that contains the desired firmware volume settings.
>
> + On successful return, it contains the new settings of
>
> + the firmware volume.
>
> + Type EFI_FVB_ATTRIBUTES_2 is defined in EFI_FIRMWARE_VOLUME_HEADER.
>
> +
>
> + @retval EFI_SUCCESS The firmware volume attributes were returned.
>
> +
>
> + @retval EFI_INVALID_PARAMETER The attributes requested are in conflict with the capabilities
>
> + as declared in the firmware volume header.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbSetAttributes (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
>
> + )
>
> +{
>
> + DEBUG ((DEBUG_ERROR, "FvbSetAttributes(0x%X) is not supported\n", *Attributes));
>
> + return EFI_UNSUPPORTED;
>
> +}
>
> +
>
> +/**
>
> + The GetPhysicalAddress() function retrieves the base address of
>
> + a memory-mapped firmware volume. This function should be called
>
> + only for memory-mapped firmware volumes.
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Address Pointer to a caller-allocated
>
> + EFI_PHYSICAL_ADDRESS that, on successful
>
> + return from GetPhysicalAddress(), contains the
>
> + base address of the firmware volume.
>
> +
>
> + @retval EFI_SUCCESS The firmware volume base address was returned.
>
> +
>
> + @retval EFI_NOT_SUPPORTED The firmware volume is not memory mapped.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetPhysicalAddress (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + OUT EFI_PHYSICAL_ADDRESS *Address
>
> + )
>
> +{
>
> + SMMSTORE_INSTANCE *Instance;
>
> +
>
> + Instance = INSTANCE_FROM_FVB_THIS (This);
>
> +
>
> + ASSERT (Address != NULL);
>
> + *Address = Instance->MmioAddress;
>
> +
>
> + return EFI_SUCCESS;
>
> +}
>
> +
>
> +/**
>
> + The GetBlockSize() function retrieves the size of the requested
>
> + block. It also returns the number of additional blocks with
>
> + the identical size. The GetBlockSize() function is used to
>
> + retrieve the block map (see EFI_FIRMWARE_VOLUME_HEADER).
>
> +
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Lba Indicates the block for which to return the size.
>
> +
>
> + @param BlockSize Pointer to a caller-allocated UINTN in which
>
> + the size of the block is returned.
>
> +
>
> + @param NumberOfBlocks Pointer to a caller-allocated UINTN in
>
> + which the number of consecutive blocks,
>
> + starting with Lba, is returned. All
>
> + blocks in this range have a size of
>
> + BlockSize.
>
> +
>
> +
>
> + @retval EFI_SUCCESS The firmware volume base address was returned.
>
> +
>
> + @retval EFI_INVALID_PARAMETER The requested LBA is out of range.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbGetBlockSize (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + OUT UINTN *BlockSize,
>
> + OUT UINTN *NumberOfBlocks
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + SMMSTORE_INSTANCE *Instance;
>
> +
>
> + Instance = INSTANCE_FROM_FVB_THIS (This);
>
> +
>
> + DEBUG ((DEBUG_BLKIO, "FvbGetBlockSize(Lba=%ld, BlockSize=0x%x, LastBlock=%ld)\n", Lba, Instance->BlockSize, Instance->LastBlock));
>
> +
>
> + if (Lba > Instance->LastBlock) {
>
> + DEBUG ((DEBUG_ERROR, "FvbGetBlockSize: ERROR - Parameter LBA %ld is beyond the last Lba (%ld).\n", Lba, Instance->LastBlock));
>
> + Status = EFI_INVALID_PARAMETER;
>
> + } else {
>
> + *BlockSize = (UINTN)Instance->BlockSize;
>
> + *NumberOfBlocks = (UINTN)(Instance->LastBlock - Lba + 1);
>
> +
>
> + DEBUG ((DEBUG_BLKIO, "FvbGetBlockSize: *BlockSize=0x%x, *NumberOfBlocks=0x%x.\n", *BlockSize, *NumberOfBlocks));
>
> +
>
> + Status = EFI_SUCCESS;
>
> + }
>
> +
>
> + return Status;
>
> +}
>
> +
>
> +/**
>
> + Reads the specified number of bytes into a buffer from the specified block.
>
> +
>
> + The Read() function reads the requested number of bytes from the
>
> + requested block and stores them in the provided buffer.
>
> + Implementations should be mindful that the firmware volume
>
> + might be in the ReadDisabled state. If it is in this state,
>
> + the Read() function must return the status code
>
> + EFI_ACCESS_DENIED without modifying the contents of the
>
> + buffer. The Read() function must also prevent spanning block
>
> + boundaries. If a read is requested that would span a block
>
> + boundary, the read must read up to the boundary but not
>
> + beyond. The output parameter NumBytes must be set to correctly
>
> + indicate the number of bytes actually read. The caller must be
>
> + aware that a read may be partially completed.
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Lba The starting logical block index from which to read.
>
> +
>
> + @param Offset Offset into the block at which to begin reading.
>
> +
>
> + @param NumBytes Pointer to a UINTN.
>
> + At entry, *NumBytes contains the total size of the buffer.
>
> + At exit, *NumBytes contains the total number of bytes read.
>
> +
>
> + @param Buffer Pointer to a caller-allocated buffer that will be used
>
> + to hold the data that is read.
>
> +
>
> + @retval EFI_SUCCESS The firmware volume was read successfully, and contents are
>
> + in Buffer.
>
> +
>
> + @retval EFI_BAD_BUFFER_SIZE Read attempted across an LBA boundary.
>
> + On output, NumBytes contains the total number of bytes
>
> + returned in Buffer.
>
> +
>
> + @retval EFI_ACCESS_DENIED The firmware volume is in the ReadDisabled state.
>
> +
>
> + @retval EFI_DEVICE_ERROR The block device is not functioning correctly and could not be read.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbRead (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + IN UINTN Offset,
>
> + IN OUT UINTN *NumBytes,
>
> + IN OUT UINT8 *Buffer
>
> + )
>
> +{
>
> + UINTN BlockSize;
>
> + SMMSTORE_INSTANCE *Instance;
>
> +
>
> + Instance = INSTANCE_FROM_FVB_THIS (This);
>
> +
>
> + DEBUG ((DEBUG_BLKIO, "FvbRead(Parameters: Lba=%ld, Offset=0x%x, *NumBytes=0x%x, Buffer @ 0x%08x)\n", Lba, Offset, *NumBytes, Buffer));
>
> +
>
> + // Cache the block size to avoid de-referencing pointers all the time
>
> + BlockSize = Instance->BlockSize;
>
> +
>
> + // The read must not span block boundaries.
>
> + // We need to check each variable individually because adding two large values together overflows.
>
> + if ((Offset >= BlockSize) ||
>
> + (*NumBytes > BlockSize) ||
>
> + ((Offset + *NumBytes) > BlockSize))
>
> + {
>
> + DEBUG ((DEBUG_ERROR, "FvbRead: ERROR - EFI_BAD_BUFFER_SIZE: (Offset=0x%x + NumBytes=0x%x) > BlockSize=0x%x\n", Offset, *NumBytes, BlockSize));
>
> + return EFI_BAD_BUFFER_SIZE;
>
> + }
>
> +
>
> + // We must have some bytes to read
>
> + if (*NumBytes == 0) {
>
> + return EFI_BAD_BUFFER_SIZE;
>
> + }
>
> +
>
> + return SmmStoreLibRead (Lba, Offset, NumBytes, Buffer);
>
> +}
>
> +
>
> +/**
>
> + Writes the specified number of bytes from the input buffer to the block.
>
> +
>
> + The Write() function writes the specified number of bytes from
>
> + the provided buffer to the specified block and offset. If the
>
> + firmware volume is sticky write, the caller must ensure that
>
> + all the bits of the specified range to write are in the
>
> + EFI_FVB_ERASE_POLARITY state before calling the Write()
>
> + function, or else the result will be unpredictable. This
>
> + unpredictability arises because, for a sticky-write firmware
>
> + volume, a write may negate a bit in the EFI_FVB_ERASE_POLARITY
>
> + state but cannot flip it back again. Before calling the
>
> + Write() function, it is recommended for the caller to first call
>
> + the EraseBlocks() function to erase the specified block to
>
> + write. A block erase cycle will transition bits from the
>
> + (NOT)EFI_FVB_ERASE_POLARITY state back to the
>
> + EFI_FVB_ERASE_POLARITY state. Implementations should be
>
> + mindful that the firmware volume might be in the WriteDisabled
>
> + state. If it is in this state, the Write() function must
>
> + return the status code EFI_ACCESS_DENIED without modifying the
>
> + contents of the firmware volume. The Write() function must
>
> + also prevent spanning block boundaries. If a write is
>
> + requested that spans a block boundary, the write must store up
>
> + to the boundary but not beyond. The output parameter NumBytes
>
> + must be set to correctly indicate the number of bytes actually
>
> + written. The caller must be aware that a write may be
>
> + partially completed. All writes, partial or otherwise, must be
>
> + fully flushed to the hardware before the Write() service
>
> + returns.
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
>
> +
>
> + @param Lba The starting logical block index to write to.
>
> +
>
> + @param Offset Offset into the block at which to begin writing.
>
> +
>
> + @param NumBytes The pointer to a UINTN.
>
> + At entry, *NumBytes contains the total size of the buffer.
>
> + At exit, *NumBytes contains the total number of bytes actually written.
>
> +
>
> + @param Buffer The pointer to a caller-allocated buffer that contains the source for the write.
>
> +
>
> + @retval EFI_SUCCESS The firmware volume was written successfully.
>
> +
>
> + @retval EFI_BAD_BUFFER_SIZE The write was attempted across an LBA boundary.
>
> + On output, NumBytes contains the total number of bytes
>
> + actually written.
>
> +
>
> + @retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
>
> +
>
> + @retval EFI_DEVICE_ERROR The block device is malfunctioning and could not be written.
>
> +
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbWrite (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + IN EFI_LBA Lba,
>
> + IN UINTN Offset,
>
> + IN OUT UINTN *NumBytes,
>
> + IN UINT8 *Buffer
>
> + )
>
> +{
>
> + UINTN BlockSize;
>
> + SMMSTORE_INSTANCE *Instance;
>
> +
>
> + Instance = INSTANCE_FROM_FVB_THIS (This);
>
> +
>
> + DEBUG ((DEBUG_BLKIO, "FvbWrite(Parameters: Lba=%ld, Offset=0x%x, *NumBytes=0x%x, Buffer @ 0x%08x)\n", Lba, Offset, *NumBytes, Buffer));
>
> +
>
> + // Cache the block size to avoid de-referencing pointers all the time
>
> + BlockSize = Instance->BlockSize;
>
> +
>
> + // The read must not span block boundaries.
>
> + // We need to check each variable individually because adding two large values together overflows.
>
> + if ((Offset >= BlockSize) ||
>
> + (*NumBytes > BlockSize) ||
>
> + ((Offset + *NumBytes) > BlockSize))
>
> + {
>
> + DEBUG ((DEBUG_ERROR, "FvbRead: ERROR - EFI_BAD_BUFFER_SIZE: (Offset=0x%x + NumBytes=0x%x) > BlockSize=0x%x\n", Offset, *NumBytes, BlockSize));
>
> + return EFI_BAD_BUFFER_SIZE;
>
> + }
>
> +
>
> + // We must have some bytes to read
>
> + if (*NumBytes == 0) {
>
> + return EFI_BAD_BUFFER_SIZE;
>
> + }
>
> +
>
> + return SmmStoreLibWrite (Lba, Offset, NumBytes, Buffer);
>
> +}
>
> +
>
> +/**
>
> + Erases and initialises a firmware volume block.
>
> +
>
> + The EraseBlocks() function erases one or more blocks as denoted
>
> + by the variable argument list. The entire parameter list of
>
> + blocks must be verified before erasing any blocks. If a block is
>
> + requested that does not exist within the associated firmware
>
> + volume (it has a larger index than the last block of the
>
> + firmware volume), the EraseBlocks() function must return the
>
> + status code EFI_INVALID_PARAMETER without modifying the contents
>
> + of the firmware volume. Implementations should be mindful that
>
> + the firmware volume might be in the WriteDisabled state. If it
>
> + is in this state, the EraseBlocks() function must return the
>
> + status code EFI_ACCESS_DENIED without modifying the contents of
>
> + the firmware volume. All calls to EraseBlocks() must be fully
>
> + flushed to the hardware before the EraseBlocks() service
>
> + returns.
>
> +
>
> + @param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL
>
> + instance.
>
> +
>
> + @param ... The variable argument list is a list of tuples.
>
> + Each tuple describes a range of LBAs to erase
>
> + and consists of the following:
>
> + - An EFI_LBA that indicates the starting LBA
>
> + - A UINTN that indicates the number of blocks to erase.
>
> +
>
> + The list is terminated with an EFI_LBA_LIST_TERMINATOR.
>
> + For example, the following indicates that two ranges of blocks
>
> + (5-7 and 10-11) are to be erased:
>
> + EraseBlocks (This, 5, 3, 10, 2, EFI_LBA_LIST_TERMINATOR);
>
> +
>
> + @retval EFI_SUCCESS The erase request successfully completed.
>
> +
>
> + @retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
>
> +
>
> + @retval EFI_DEVICE_ERROR The block device is not functioning correctly and could not be written.
>
> + The firmware device may have been partially erased.
>
> +
>
> + @retval EFI_INVALID_PARAMETER One or more of the LBAs listed in the variable argument list do
>
> + not exist in the firmware volume.
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbEraseBlocks (
>
> + IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
>
> + ...
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + VA_LIST Args;
>
> + EFI_LBA StartingLba; // Lba from which we start erasing
>
> + UINTN NumOfLba; // Number of Lba blocks to erase
>
> + SMMSTORE_INSTANCE *Instance;
>
> +
>
> + Instance = INSTANCE_FROM_FVB_THIS (This);
>
> +
>
> + Status = EFI_SUCCESS;
>
> +
>
> + // Before erasing, check the entire list of parameters to ensure all specified blocks are valid
>
> +
>
> + VA_START (Args, This);
>
> + do {
>
> + // Get the Lba from which we start erasing
>
> + StartingLba = VA_ARG (Args, EFI_LBA);
>
> +
>
> + // Have we reached the end of the list?
>
> + if (StartingLba == EFI_LBA_LIST_TERMINATOR) {
>
> + // Exit the while loop
>
> + break;
>
> + }
>
> +
>
> + // How many Lba blocks are we requested to erase?
>
> + NumOfLba = VA_ARG (Args, UINTN);
>
> +
>
> + // All blocks must be within range
>
> + DEBUG ((
>
> + DEBUG_BLKIO,
>
> + "FvbEraseBlocks: Check if: ( StartingLba=%ld + NumOfLba=%Lu - 1 ) > LastBlock=%ld.\n",
>
> + StartingLba,
>
> + (UINT64)NumOfLba,
>
> + Instance->LastBlock
>
> + ));
>
> + if ((NumOfLba == 0) || ((StartingLba + NumOfLba - 1) > Instance->LastBlock)) {
>
> + VA_END (Args);
>
> + DEBUG ((DEBUG_ERROR, "FvbEraseBlocks: ERROR - Lba range goes past the last Lba.\n"));
>
> + Status = EFI_INVALID_PARAMETER;
>
> + goto EXIT;
>
> + }
>
> + } while (TRUE);
>
> +
>
> + VA_END (Args);
>
> +
>
> + //
>
> + // To get here, all must be ok, so start erasing
>
> + //
>
> + VA_START (Args, This);
>
> + do {
>
> + // Get the Lba from which we start erasing
>
> + StartingLba = VA_ARG (Args, EFI_LBA);
>
> +
>
> + // Have we reached the end of the list?
>
> + if (StartingLba == EFI_LBA_LIST_TERMINATOR) {
>
> + // Exit the while loop
>
> + break;
>
> + }
>
> +
>
> + // How many Lba blocks are we requested to erase?
>
> + NumOfLba = VA_ARG (Args, UINTN);
>
> +
>
> + // Go through each one and erase it
>
> + while (NumOfLba > 0) {
>
> + // Erase it
>
> + DEBUG ((DEBUG_BLKIO, "FvbEraseBlocks: Erasing Lba=%ld\n", StartingLba));
>
> + Status = SmmStoreLibEraseBlock (StartingLba);
>
> + if (EFI_ERROR (Status)) {
>
> + VA_END (Args);
>
> + Status = EFI_DEVICE_ERROR;
>
> + goto EXIT;
>
> + }
>
> +
>
> + // Move to the next Lba
>
> + StartingLba++;
>
> + NumOfLba--;
>
> + }
>
> + } while (TRUE);
>
> +
>
> + VA_END (Args);
>
> +
>
> +EXIT:
>
> + return Status;
>
> +}
>
> +
>
> +/**
>
> + Initialized the Firmware Volume if necessary and installs the
>
> + gEdkiiNvVarStoreFormattedGuid protocol.
>
> +
>
> + @param Instance Pointer to SmmStore instance
>
> +
>
> + **/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +FvbInitialize (
>
> + IN SMMSTORE_INSTANCE *Instance
>
> + )
>
> +{
>
> + EFI_STATUS Status;
>
> + UINT32 FvbNumLba;
>
> + EFI_BOOT_MODE BootMode;
>
> +
>
> + ASSERT ((Instance != NULL));
>
> +
>
> + BootMode = GetBootModeHob ();
>
> + if (BootMode == BOOT_WITH_DEFAULT_SETTINGS) {
>
> + Status = EFI_INVALID_PARAMETER;
>
> + } else {
>
> + // Determine if there is a valid header at the beginning of the NorFlash
>
> + Status = ValidateFvHeader ();
>
> + }
>
> +
>
> + // Install the Default FVB header if required
>
> + if (EFI_ERROR (Status)) {
>
> + // There is no valid header, so time to install one.
>
> + DEBUG ((DEBUG_INFO, "%a: The FVB Header is not valid.\n", __FUNCTION__));
>
> + DEBUG ((
>
> + DEBUG_INFO,
>
> + "%a: Installing a correct one for this volume.\n",
>
> + __FUNCTION__
>
> + ));
>
> +
>
> + // Erase all the NorFlash that is reserved for variable storage
>
> + FvbNumLba = (PcdGet32 (PcdFlashNvStorageVariableSize) +
>
> + PcdGet32 (PcdFlashNvStorageFtwWorkingSize) +
>
> + PcdGet32 (PcdFlashNvStorageFtwSpareSize)) / Instance->BlockSize;
>
> +
>
> + Status = FvbEraseBlocks (&Instance->FvbProtocol, (EFI_LBA)0, FvbNumLba, EFI_LBA_LIST_TERMINATOR);
>
> + if (EFI_ERROR (Status)) {
>
> + return Status;
>
> + }
>
> +
>
> + // Install all appropriate headers
>
> + Status = InitializeFvAndVariableStoreHeaders (Instance);
>
> + if (EFI_ERROR (Status)) {
>
> + return Status;
>
> + }
>
> + } else {
>
> + DEBUG ((DEBUG_INFO, "%a: FVB header is valid\n", __FUNCTION__));
>
> + }
>
> +
>
> + //
>
> + // The driver implementing the variable read service can now be dispatched;
>
> + // the varstore headers are in place.
>
> + //
>
> + Status = gBS->InstallProtocolInterface (
>
> + &gImageHandle,
>
> + &gEdkiiNvVarStoreFormattedGuid,
>
> + EFI_NATIVE_INTERFACE,
>
> + NULL
>
> + );
>
> + ASSERT_EFI_ERROR (Status);
>
> +
>
> + return Status;
>
> +}
>
> diff --git a/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf
> new file mode 100644
> index 0000000000..2bd8886bcc
> --- /dev/null
> +++ b/UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf
> @@ -0,0 +1,66 @@
> +## @file
>
> +# Component description file for SmmStore module
>
> +#
>
> +# This module produces the FirmwareVolumeBlock protocol on top of the
>
> +# SmmStore provided by bootloader and installs the NvVarStoreFormatted protocol.
>
> +#
>
> +# Copyright (c) 2022, 9elements GmbH<BR>
>
> +#
>
> +# SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +#
>
> +##
>
> +
>
> +[Defines]
>
> + INF_VERSION = 0x00010005
>
> + BASE_NAME = SmmStoreFvbRuntimeDxe
>
> + FILE_GUID = A0402FCA-6B25-4CEA-B7DD-C08F99714B29
>
> + MODULE_TYPE = DXE_RUNTIME_DRIVER
>
> + VERSION_STRING = 1.0
>
> + ENTRY_POINT = SmmStoreInitialize
>
> +
>
> +[Sources.common]
>
> + SmmStoreFvbRuntimeDxe.c
>
> + SmmStoreFvbRuntime.h
>
> + SmmStoreFvbRuntime.c
>
> +
>
> +[Packages]
>
> + MdePkg/MdePkg.dec
>
> + MdeModulePkg/MdeModulePkg.dec
>
> + EmbeddedPkg/EmbeddedPkg.dec
>
> + UefiPayloadPkg/UefiPayloadPkg.dec
>
> +
>
> +[LibraryClasses]
>
> + BaseLib
>
> + DebugLib
>
> + HobLib
>
> + SmmStoreLib
>
> + UefiLib
>
> + UefiDriverEntryPoint
>
> + UefiBootServicesTableLib
>
> + UefiRuntimeLib
>
> + DxeServicesTableLib
>
> +
>
> +[Guids]
>
> + gEfiSystemNvDataFvGuid
>
> + gEfiVariableGuid ## PRODUCES ## PROTOCOL
>
> + gEfiAuthenticatedVariableGuid
>
> + gEfiEventVirtualAddressChangeGuid
>
> + gEdkiiNvVarStoreFormattedGuid ## PRODUCES ## PROTOCOL
>
> +
>
> +[Protocols]
>
> + gEfiDevicePathProtocolGuid ## BY_START
>
> + gEfiFirmwareVolumeBlockProtocolGuid ## BY_START
>
> +
>
> +[Pcd]
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase64
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase64
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase64
>
> +
>
> +[Depex]
>
> + TRUE
>
> diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayloadPkg.dsc
> index cf440fee58..0f6421612c 100644
> --- a/UefiPayloadPkg/UefiPayloadPkg.dsc
> +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc
> @@ -97,6 +97,7 @@
> #
>
> # EMU: UEFI payload with EMU variable
>
> # SPI: UEFI payload with SPI NV variable support
>
> + # SMMSTORE: UEFI payload with coreboot SMM NV variable support
>
> # NONE: UEFI payload with no variable modules
>
> #
>
> DEFINE VARIABLE_SUPPORT = EMU
>
> @@ -261,9 +262,11 @@
> LockBoxLib|MdeModulePkg/Library/LockBoxNullLib/LockBoxNullLib.inf
>
> FileExplorerLib|MdeModulePkg/Library/FileExplorerLib/FileExplorerLib.inf
>
> AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLibNull.inf
>
> - SmmStoreLib|UefiPayloadPkg/Library/SmmStoreLib/SmmStoreLib.inf
>
> !if $(VARIABLE_SUPPORT) == "EMU"
>
> TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
>
> +!elseif $(VARIABLE_SUPPORT) == "SMMSTORE"
>
> + SmmStoreLib|UefiPayloadPkg/Library/SmmStoreLib/SmmStoreLib.inf
>
> + TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
>
> !elseif $(VARIABLE_SUPPORT) == "SPI"
>
> PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
>
> TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
>
> @@ -379,15 +382,13 @@
> gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmEnableBspElection|FALSE
>
>
>
> [PcdsFixedAtBuild]
>
> - gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize|0x10000
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdMaxHardwareErrorVariableSize|0x8000
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdVariableStoreSize|0x10000
>
> !if $(VARIABLE_SUPPORT) == "EMU"
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable |TRUE
>
> -!else
>
> +!elseif $(VARIABLE_SUPPORT) == "SPI" || $(VARIABLE_SUPPORT) == "SMMSTORE"
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable |FALSE
>
> !endif
>
> -
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdStatusCodeUseMemory|FALSE
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable|TRUE
>
> @@ -445,7 +446,6 @@
> gUefiCpuPkgTokenSpaceGuid.PcdCpuMaxLogicalProcessorNumber|$(MAX_LOGICAL_PROCESSORS)
>
> gUefiCpuPkgTokenSpaceGuid.PcdCpuNumberOfReservedVariableMtrrs|0
>
> gUefiPayloadPkgTokenSpaceGuid.PcdBootloaderParameter|0
>
> -
>
> ################################################################################
>
> #
>
> # Pcd DynamicEx Section - list of all EDK II PCD Entries defined by this Platform
>
> @@ -473,15 +473,19 @@
> !endif
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|FALSE
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase64|0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
>
> gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|3
>
> -!if $(VARIABLE_SUPPORT) == "SPI"
>
> +!if $(VARIABLE_SUPPORT) == "SPI" || $(VARIABLE_SUPPORT) == "SMMSTORE"
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize |0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize|0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize |0
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase |0
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase64|0
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase64|0
>
> + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase64|0
>
> !endif
>
> # Disable SMM S3 script
>
> gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiS3Enable|FALSE
>
> @@ -697,6 +701,14 @@
>
>
> !if $(VARIABLE_SUPPORT) == "EMU"
>
> MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
>
> +!elseif $(VARIABLE_SUPPORT) == "SMMSTORE"
>
> + UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf
>
> + MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
>
> + MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf {
>
> + <LibraryClasses>
>
> + NULL|MdeModulePkg/Library/VarCheckUefiLib/VarCheckUefiLib.inf
>
> + NULL|EmbeddedPkg/Library/NvVarStoreFormattedLib/NvVarStoreFormattedLib.inf
>
> + }
>
> !elseif $(VARIABLE_SUPPORT) == "SPI"
>
> MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf {
>
> <LibraryClasses>
>
> diff --git a/UefiPayloadPkg/UefiPayloadPkg.fdf b/UefiPayloadPkg/UefiPayloadPkg.fdf
> index c7b04978ad..ca44f48f6d 100644
> --- a/UefiPayloadPkg/UefiPayloadPkg.fdf
> +++ b/UefiPayloadPkg/UefiPayloadPkg.fdf
> @@ -140,6 +140,10 @@ INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
>
>
> !if $(VARIABLE_SUPPORT) == "EMU"
>
> INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
>
> +!elseif $(VARIABLE_SUPPORT) == "SMMSTORE"
>
> + INF UefiPayloadPkg/SmmStoreFvb/SmmStoreFvbRuntimeDxe.inf
>
> + INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
>
> + INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
>
> !elseif $(VARIABLE_SUPPORT) == "SPI"
>
> INF UefiPayloadPkg/FvbRuntimeDxe/FvbSmm.inf
>
> INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
>
> --
> 2.32.0
>
next prev parent reply other threads:[~2022-03-23 18:24 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-03-21 9:10 [PATCH 1/5] UefiPayloadPkg/UefiPayloadPkg.ci.yaml: Remove duplicated entry Sean Rhodes
2022-03-21 9:10 ` [PATCH 2/5] UefiPayloadPkg/Include/Coreboot: Add headers for SMMSTOREv2 table Sean Rhodes
2022-03-21 9:10 ` [PATCH 3/5] UefiPayloadPkg: Add SmmStoreInfoGuid Sean Rhodes
2022-03-21 9:10 ` [PATCH 4/5] UefiPayloadPkg: Add SmmStoreLib Sean Rhodes
2022-03-21 9:10 ` [PATCH 5/5] UefiPayloadPkg: Add support for Firmware Volume Block Protocol Sean Rhodes
2022-03-23 18:12 ` Guo Dong
2022-03-23 18:24 ` Patrick Rudolph [this message]
2022-03-23 19:27 ` [edk2-devel] " Guo Dong
2022-03-23 19:52 ` Sean Rhodes
2022-03-23 21:06 ` King Sumo
2022-03-23 21:20 ` Guo Dong
2022-03-23 17:58 ` [PATCH 1/5] UefiPayloadPkg/UefiPayloadPkg.ci.yaml: Remove duplicated entry Guo Dong
2022-03-24 0:37 ` Ni, Ray
2022-03-24 1:58 ` duntan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CALNFmy14cBFKHX2GAfLgoVJd5M=5k_kinQ1vCYSj3QS2txYMtA@mail.gmail.com' \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox