From nobody Sat May 18 12:29:58 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+82672+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+82672+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1635228917; cv=none; d=zohomail.com; s=zohoarc; b=A0nE3EyRwbovDgxOAwq4hc3Hl+cpfhwCFzuMAl/liNNbHH+yh0xsVCQyIy6odtBkShZF6JRDQ3PHdOzqfu/X0kfTG9UfSozz9vPdSmnM6/fgW+DJm5e43eg6C5JQIPoailfxVvwDoOS23n4j6SHDcXo6f5O+euvJHE+1SwJoATY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1635228917; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=Tc8oQVeEbGBU1wvePoSJ0+eCWLehIFBmMU+mk0dT53w=; b=Fc9NCc4DtWh3LUZi7DefG5BuDqTGtsrvjp9u97bvnKHepPobVGgtKYvlLtnHoaIOyr0mjwP+vDX11CknFm4KToL7YSIlZILy9cieKSAcVGPDXH25N0LUnk2ivjR6LB4oYi6kx0p3jRXsP4amE0oiNqvsZZKN6770X8ISYiPYY8M= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+82672+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 163522891796217.592137912303656; Mon, 25 Oct 2021 23:15:17 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id UlslYY1788612xhKtMo3rpEI; Mon, 25 Oct 2021 23:15:17 -0700 X-Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web08.8529.1635228916938834450 for ; Mon, 25 Oct 2021 23:15:17 -0700 X-IronPort-AV: E=McAfee;i="6200,9189,10148"; a="229691408" X-IronPort-AV: E=Sophos;i="5.87,182,1631602800"; d="scan'208";a="229691408" X-Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Oct 2021 23:15:15 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,182,1631602800"; d="scan'208";a="465175509" X-Received: from desktop-yang.ccr.corp.intel.com ([10.239.158.131]) by orsmga002.jf.intel.com with ESMTP; 25 Oct 2021 23:15:14 -0700 From: "Yang Jie" To: devel@edk2.groups.io Cc: gaoliming@byosoft.com.cn, guomin.jiang@intel.com, Yang Jie Subject: [edk2-devel] MdeModulePkg/DxeCapsuleLibFmp: Use new Variable Lock interface Date: Tue, 26 Oct 2021 14:15:09 +0800 Message-Id: <20211026061509.2912-1-jie.yang@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jie.yang@intel.com X-Gm-Message-State: tP3OruBhRsmT3zUQ2Uz0BZBwx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1635228917; bh=2NNrFWu2G5r42te+pkVZYe9PTImhg9n0ZnITY9HBINA=; h=Cc:Date:From:Reply-To:Subject:To; b=my9eypl4ZRTyWr2X55Xm5bKD0MVu2A2FMZ5HPxxc4YtUe6Rs6EDh7YKWgCBI0fq2FsQ v864IISG4CfYkct85L+9d+Qio57dQwCmNYQfoPoTmp3YxAdyttcrhPRpovcHZEycyYq93 7xL5om71fsTCtOqlJwyAGrimsuifE1BDNqs= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1635228918735100002 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3699 The code in MdeModulePkg\Library\DxeCapsuleLibFmp call the deprecated=20 interface VariableLockRequestToLockc. So I changed the code in FmpDevicePkg using RegisterBasicVariablePolicy, instead of the=20 deprecated interface. Signed-off-by: Yang Jie Cc: Guomin Jiang Cc: Liming Gao --- .../DxeCapsuleLibFmp/DxeCapsuleLib.inf | 5 +- .../DxeCapsuleLibFmp/DxeCapsuleReportLib.c | 66 ++++++++++++------- 2 files changed, 47 insertions(+), 24 deletions(-) diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf b/MdeM= odulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf index 05de4299fb..9212c81d68 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf @@ -3,7 +3,7 @@ # # Capsule library instance for DXE_DRIVER module types. # -# Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2021, Intel Corporation. All rights reserved.
# SPDX-License-Identifier: BSD-2-Clause-Patent # ## @@ -51,6 +51,7 @@ DisplayUpdateProgressLib FileHandleLib UefiBootManagerLib + VariablePolicyHelperLib =20 [Pcd] gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleMax = ## CONSUMES @@ -71,11 +72,11 @@ [Protocols] gEsrtManagementProtocolGuid ## CONSUMES gEfiFirmwareManagementProtocolGuid ## CONSUMES - gEdkiiVariableLockProtocolGuid ## SOMETIMES_CONSUMES gEdkiiFirmwareManagementProgressProtocolGuid ## SOMETIMES_CONSUMES gEfiSimpleFileSystemProtocolGuid ## SOMETIMES_CONSUMES gEfiBlockIoProtocolGuid ## CONSUMES gEfiDiskIoProtocolGuid ## CONSUMES + gEdkiiVariablePolicyProtocolGuid ## CONSUMES =20 [Guids] gEfiFmpCapsuleGuid ## SOMETIMES_CONSUMES ## GUID diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c b/= MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c index 0ec5f20676..665b7d06d9 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c @@ -1,14 +1,13 @@ /** @file DXE capsule report related function. =20 - Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2021, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ =20 #include #include -#include #include #include #include @@ -26,6 +25,7 @@ #include #include #include +#include =20 #include =20 @@ -94,6 +94,44 @@ GetNewCapsuleResultIndex ( return CurrentIndex + 1; } =20 +/** + Lock Variable by variable policy + + @param[in] VariableGuid The Guid of the variable to be locked + @param[in] VariableName The name of the variable to be locked +**/ +VOID LockVaraible ( + IN CONST EFI_GUID VariableGuid, + IN CHAR16 *VariableName + ) +{ + EFI_STATUS Status; + EDKII_VARIABLE_POLICY_PROTOCOL *VariablePolicy; + + // Locate the VariablePolicy protocol + Status =3D gBS->LocateProtocol (&gEdkiiVariablePolicyProtocolGuid, NULL,= (VOID**)&VariablePolicy); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "DxeCapsuleReportLib %a - Could not locate Variab= lePolicy protocol! %r\n", __FUNCTION__, Status)); + ASSERT_EFI_ERROR (Status); + } + // If success, go ahead and set the policies to protect the target varia= bles. + Status =3D RegisterBasicVariablePolicy (VariablePolicy, + &VariableGuid, + VariableName, + VARIABLE_POLICY_NO_MIN_SIZE, + VARIABLE_POLICY_NO_MAX_SIZE, + VARIABLE_POLICY_NO_MUST_ATTR, + VARIABLE_POLICY_NO_CANT_ATTR, + VARIABLE_POLICY_TYPE_LOCK_NOW); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "DxeCapsuleLibFmp: Failed to lock variable %g %s.= Status =3D %r\n", + &VariableGuid, + L"CapsuleLast", + Status)); + ASSERT_EFI_ERROR (Status); + } +} + /** Write a new capsule status variable. =20 @@ -278,7 +316,7 @@ InitCapsuleMaxVariable ( EFI_STATUS Status; UINTN Size; CHAR16 CapsuleMaxStr[sizeof("Capsule####")]; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; + //EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; =20 UnicodeSPrint( CapsuleMaxStr, @@ -297,11 +335,7 @@ InitCapsuleMaxVariable ( ); if (!EFI_ERROR(Status)) { // Lock it per UEFI spec. - Status =3D gBS->LocateProtocol(&gEdkiiVariableLockProtocolGuid, NULL, = (VOID **)&VariableLock); - if (!EFI_ERROR(Status)) { - Status =3D VariableLock->RequestToLock(VariableLock, L"CapsuleMax", = &gEfiCapsuleReportGuid); - ASSERT_EFI_ERROR(Status); - } + LockVaraible (gEfiCapsuleReportGuid, L"CapsuleMax"); } } =20 @@ -315,7 +349,6 @@ InitCapsuleLastVariable ( { EFI_STATUS Status; EFI_BOOT_MODE BootMode; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; VOID *CapsuleResult; UINTN Size; CHAR16 CapsuleLastStr[sizeof("Capsule####")]; @@ -372,11 +405,7 @@ InitCapsuleLastVariable ( } =20 // Lock it in normal boot path per UEFI spec. - Status =3D gBS->LocateProtocol(&gEdkiiVariableLockProtocolGuid, NULL, = (VOID **)&VariableLock); - if (!EFI_ERROR(Status)) { - Status =3D VariableLock->RequestToLock(VariableLock, L"CapsuleLast",= &gEfiCapsuleReportGuid); - ASSERT_EFI_ERROR(Status); - } + LockVaraible (gEfiCapsuleReportGuid, L"CapsuleLast"); } } =20 @@ -436,20 +465,13 @@ InitCapsuleRelocationInfo ( VOID ) { - EFI_STATUS Status; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; - CoDClearCapsuleRelocationInfo(); =20 // // Unlock Capsule On Disk relocation Info variable only when Capsule On = Disk flag is enabled // if (!CoDCheckCapsuleOnDiskFlag()) { - Status =3D gBS->LocateProtocol (&gEdkiiVariableLockProtocolGuid, NULL,= (VOID **) &VariableLock); - if (!EFI_ERROR (Status)) { - Status =3D VariableLock->RequestToLock (VariableLock, COD_RELOCATION= _INFO_VAR_NAME, &gEfiCapsuleVendorGuid); - ASSERT_EFI_ERROR (Status); - } + LockVaraible (gEfiCapsuleVendorGuid, COD_RELOCATION_INFO_VAR_NAME); } } =20 --=20 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#82672): https://edk2.groups.io/g/devel/message/82672 Mute This Topic: https://groups.io/mt/86596949/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-