From nobody Sat Apr 27 22:07:11 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+82670+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+82670+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1635228662; cv=none; d=zohomail.com; s=zohoarc; b=ZZR4ZpoK/GwraYQae9dl+mcO6kK02jJRU3Y6d9j+P1Dh0m2COOVPRdvGtEJI4gdILImE2L442/+j2/siawAlo385WBXUPM/O/SNMURAxGDMDqHeMjzDP69v1+eBq94kIJ0g9ey1O3yM9fKzaBD0hzSga3QL/0n4HLn9IgxHGCPY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1635228662; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=nNvtkSng1shq7wZ4b3keSMhj38Mc+rm/Zkkg19tdV7Y=; b=LZVlplT07eWIRD+pCDDyU/30WyTQoO/NPz94fLFuHovS0Ml+oCK6znZJGDLoaxq7Fh/UYCcJtsIGVJtWJIhQ6bWfjIDHYbbCt+kclqZzU56Pf4HplqWtuL5QYgHeiX+bnGxzZmsyittmOSK9HauF/Z3SApg0+RetAR5575BUDIg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+82670+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 16352286619511016.8067725339101; Mon, 25 Oct 2021 23:11:01 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id QFzSYY1788612xLlsUxMC1Gy; Mon, 25 Oct 2021 23:11:01 -0700 X-Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web11.8571.1635228660058396759 for ; Mon, 25 Oct 2021 23:11:00 -0700 X-IronPort-AV: E=McAfee;i="6200,9189,10148"; a="229777498" X-IronPort-AV: E=Sophos;i="5.87,182,1631602800"; d="scan'208";a="229777498" X-Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Oct 2021 23:10:58 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,182,1631602800"; d="scan'208";a="465174406" X-Received: from desktop-yang.ccr.corp.intel.com ([10.239.158.131]) by orsmga002.jf.intel.com with ESMTP; 25 Oct 2021 23:10:56 -0700 From: "Yang Jie" To: devel@edk2.groups.io Cc: jian.j.wang@intel.com, hao.a.wu@intel.com, liming.gao@intel.com, lersek@redhat.com, philmd@redhat.com, Yang Jie Subject: [edk2-devel] MdeModulePkg/DxeCapsuleLibFmp: Use new Variable Lock interface Date: Tue, 26 Oct 2021 14:10:48 +0800 Message-Id: <20211026061048.2858-1-jie.yang@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jie.yang@intel.com X-Gm-Message-State: 73nnCUH4cTHcpZdXyD3ZBLdyx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1635228661; bh=9iYrp80CJ2IK7OC89ZyId62JqCl1TQdPILk2bH/ujvk=; h=Cc:Date:From:Reply-To:Subject:To; b=G3ei6vkE0jmBS8RB/NbCk8VwSSqhONzgi0898xvJxpGRndT39HQJ0HEaDJGblNS5RBx sR7jwUL2eKdiEOfm1752vd6YNiq5aKqqHrxiyjOM5e3RfedMxvFQCnX/GLCqP9irC+pQx BC/+wHRHthN0douZTGuvSJvzF5NvceAir3o= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1635228663745100001 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3699 The code in MdeModulePkg\Library\DxeCapsuleLibFmp call the deprecated=20 interface VariableLockRequestToLockc. So I changed the code in FmpDevicePkg using RegisterBasicVariablePolicy, instead of the=20 deprecated interface. Signed-off-by: Yang Jie Cc: Jian J Wang Cc: Hao A Wu Cc: Liming Gao Cc: Laszlo Ersek Cc: Philippe Mathieu-Daude --- .../DxeCapsuleLibFmp/DxeCapsuleLib.inf | 5 +- .../DxeCapsuleLibFmp/DxeCapsuleReportLib.c | 66 ++++++++++++------- 2 files changed, 47 insertions(+), 24 deletions(-) diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf b/MdeM= odulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf index 05de4299fb..9212c81d68 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleLib.inf @@ -3,7 +3,7 @@ # # Capsule library instance for DXE_DRIVER module types. # -# Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.
+# Copyright (c) 2016 - 2021, Intel Corporation. All rights reserved.
# SPDX-License-Identifier: BSD-2-Clause-Patent # ## @@ -51,6 +51,7 @@ DisplayUpdateProgressLib FileHandleLib UefiBootManagerLib + VariablePolicyHelperLib =20 [Pcd] gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleMax = ## CONSUMES @@ -71,11 +72,11 @@ [Protocols] gEsrtManagementProtocolGuid ## CONSUMES gEfiFirmwareManagementProtocolGuid ## CONSUMES - gEdkiiVariableLockProtocolGuid ## SOMETIMES_CONSUMES gEdkiiFirmwareManagementProgressProtocolGuid ## SOMETIMES_CONSUMES gEfiSimpleFileSystemProtocolGuid ## SOMETIMES_CONSUMES gEfiBlockIoProtocolGuid ## CONSUMES gEfiDiskIoProtocolGuid ## CONSUMES + gEdkiiVariablePolicyProtocolGuid ## CONSUMES =20 [Guids] gEfiFmpCapsuleGuid ## SOMETIMES_CONSUMES ## GUID diff --git a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c b/= MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c index 0ec5f20676..665b7d06d9 100644 --- a/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c +++ b/MdeModulePkg/Library/DxeCapsuleLibFmp/DxeCapsuleReportLib.c @@ -1,14 +1,13 @@ /** @file DXE capsule report related function. =20 - Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.
+ Copyright (c) 2016 - 2021, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ =20 #include #include -#include #include #include #include @@ -26,6 +25,7 @@ #include #include #include +#include =20 #include =20 @@ -94,6 +94,44 @@ GetNewCapsuleResultIndex ( return CurrentIndex + 1; } =20 +/** + Lock Variable by variable policy + + @param[in] VariableGuid The Guid of the variable to be locked + @param[in] VariableName The name of the variable to be locked +**/ +VOID LockVaraible ( + IN CONST EFI_GUID VariableGuid, + IN CHAR16 *VariableName + ) +{ + EFI_STATUS Status; + EDKII_VARIABLE_POLICY_PROTOCOL *VariablePolicy; + + // Locate the VariablePolicy protocol + Status =3D gBS->LocateProtocol (&gEdkiiVariablePolicyProtocolGuid, NULL,= (VOID**)&VariablePolicy); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "DxeCapsuleReportLib %a - Could not locate Variab= lePolicy protocol! %r\n", __FUNCTION__, Status)); + ASSERT_EFI_ERROR (Status); + } + // If success, go ahead and set the policies to protect the target varia= bles. + Status =3D RegisterBasicVariablePolicy (VariablePolicy, + &VariableGuid, + VariableName, + VARIABLE_POLICY_NO_MIN_SIZE, + VARIABLE_POLICY_NO_MAX_SIZE, + VARIABLE_POLICY_NO_MUST_ATTR, + VARIABLE_POLICY_NO_CANT_ATTR, + VARIABLE_POLICY_TYPE_LOCK_NOW); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "DxeCapsuleLibFmp: Failed to lock variable %g %s.= Status =3D %r\n", + &VariableGuid, + L"CapsuleLast", + Status)); + ASSERT_EFI_ERROR (Status); + } +} + /** Write a new capsule status variable. =20 @@ -278,7 +316,7 @@ InitCapsuleMaxVariable ( EFI_STATUS Status; UINTN Size; CHAR16 CapsuleMaxStr[sizeof("Capsule####")]; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; + //EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; =20 UnicodeSPrint( CapsuleMaxStr, @@ -297,11 +335,7 @@ InitCapsuleMaxVariable ( ); if (!EFI_ERROR(Status)) { // Lock it per UEFI spec. - Status =3D gBS->LocateProtocol(&gEdkiiVariableLockProtocolGuid, NULL, = (VOID **)&VariableLock); - if (!EFI_ERROR(Status)) { - Status =3D VariableLock->RequestToLock(VariableLock, L"CapsuleMax", = &gEfiCapsuleReportGuid); - ASSERT_EFI_ERROR(Status); - } + LockVaraible (gEfiCapsuleReportGuid, L"CapsuleMax"); } } =20 @@ -315,7 +349,6 @@ InitCapsuleLastVariable ( { EFI_STATUS Status; EFI_BOOT_MODE BootMode; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; VOID *CapsuleResult; UINTN Size; CHAR16 CapsuleLastStr[sizeof("Capsule####")]; @@ -372,11 +405,7 @@ InitCapsuleLastVariable ( } =20 // Lock it in normal boot path per UEFI spec. - Status =3D gBS->LocateProtocol(&gEdkiiVariableLockProtocolGuid, NULL, = (VOID **)&VariableLock); - if (!EFI_ERROR(Status)) { - Status =3D VariableLock->RequestToLock(VariableLock, L"CapsuleLast",= &gEfiCapsuleReportGuid); - ASSERT_EFI_ERROR(Status); - } + LockVaraible (gEfiCapsuleReportGuid, L"CapsuleLast"); } } =20 @@ -436,20 +465,13 @@ InitCapsuleRelocationInfo ( VOID ) { - EFI_STATUS Status; - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; - CoDClearCapsuleRelocationInfo(); =20 // // Unlock Capsule On Disk relocation Info variable only when Capsule On = Disk flag is enabled // if (!CoDCheckCapsuleOnDiskFlag()) { - Status =3D gBS->LocateProtocol (&gEdkiiVariableLockProtocolGuid, NULL,= (VOID **) &VariableLock); - if (!EFI_ERROR (Status)) { - Status =3D VariableLock->RequestToLock (VariableLock, COD_RELOCATION= _INFO_VAR_NAME, &gEfiCapsuleVendorGuid); - ASSERT_EFI_ERROR (Status); - } + LockVaraible (gEfiCapsuleVendorGuid, COD_RELOCATION_INFO_VAR_NAME); } } =20 --=20 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#82670): https://edk2.groups.io/g/devel/message/82670 Mute This Topic: https://groups.io/mt/86596949/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-