Seamless crisis prevention and recovery

If a firmware update fails, the results can be devastating. At best, the update fails, but the system is resilient and recovers without the end-user becoming aware. At worst, it's possible for a failed firmware update to result in a unusable system, requiring the end-user to return their system to the retailer or manufacturer for repair. The latter case is what we call a crisis.

A crisis can result from a failed firmware update, or due to firmware that is incompatible with Windows or other aspects of the system. This section discusses features designed to prevent and recover from crises that resulting from failed firmware updates. Our expectation is that firmware update test coverage by the firmware author prevents most crises resulting from incompatible firmware.

In order to provide a great experience for end-users, the following crisis prevention and recovery requirements must be met for the firmware driver package update mechanism. These requirements don't preclude additional crisis prevention or recovery solutions.

Preinstallation criteria

When the system firmware is performing the actual update, there are a series of preinstallation checks that must be performed. System firmware must perform this check to ensure there's enough power to complete the update. It's also recommended that the checks be made for each of the updates before the update is applied if there are multiple firmware updates. The list of items to check and validate are provided in the following table. All of the checks must be performed where applicable. There's no specific order to the execution of the tests.

Check type Description
Power System must have at least 25% battery charge.

Tethered power (power via USB cable and/or AC power) isn't required.

In a test/laboratory environment it's acceptable to have no battery present yet still allow firmware updates as long as tethered power is provided. However a differentiation must be made between a dead/not charging battery and no battery present.
Security Validate update capsule payload is properly signed.

Validate that any PE-based EFI files in the payload are properly signed with a proper EFI cert
Integrity Perform an integrity check on the firmware update payload.
Version Verify that the firmware being applied doesn't downgrade the current, installed firmware beyond the LowestSupportedFirmwareVersion value.
Storage The following checks are performed as appropriate, depending upon the system's hardware

There's sufficient room for backups of the current firmware that will be replaced

There's sufficient room in the device to accommodate the new firmware.

Any failure must result in an appropriate Last Attempt Status error code. For more information, see the Last Attempt Status error code information in ESRT table definition and Firmware update status.

If multiple updates are being applied and some pass the preinstallation checks and others don't, platform firmware can proceed with updating the firmware for the resources that passed the preinstallation checks. However, any resource that failed the preinstallation check must not be updated.

Post-installation criteria

After firmware (device or system) has been installed, it must be checked to validate that the new updated firmware image is what was intended. This is to minimize any risks of any corruption introduced during the actual updating process (for example sticky bits in flash ROM, noise on a bus during the updating, and so on).

The updating process must validate that the updated firmware passes integrity checks. If it fails, then it must recover by rolling back to the last known good version of the firmware.

Any failure must result in an appropriate Last Attempt Status error code. For more information, see the Last Attempt Status error code information in ESRT table definition and Firmware update status.

Recovering from install and boot failures

In order to prevent a system from reaching a non-bootable state, the firmware update mechanism must meet the following requirements in cases where firmware updates fail to install, or in cases where the system fails to boot successfully.

In the following sections, the term "committed" is used to describe firmware. Once firmware has been "committed", the firmware is treated as fully installed, and won't be automatically rolled back by the firmware due to boot failure, etc. "Uncommitted" firmware describes partially updated firmware and can potentially be rolled back to a previous version in cases where the firmware update can't be completed or a failure is detected by the updating firmware (for example, invalid CRC check in the update). Whether firmware is committed is something that the firmware should track internally, and isn't captured as part of the ESRT.

Firmware update unsuccessful

If an individual system or device firmware can't be installed, or has been installed incorrectly (for example, due to some kind of corruption, or a power loss while installing the update), the update may be retried up to a total of three (3) attempts, including the first attempt. If additional retry attempts will be performed by the firmware, the system must not boot into Windows between any of the attempts. If all attempts fail, the updating firmware must discard the update. If the update was partially applied, the firmware must roll back to the previous version. The firmware must roll back to the previous version without any user interaction. The update failure doesn't affect other pending updates; pending firmware updates should be attempted.

After all of the updates have been processed, UEFI will resume booting Windows. The UEFI firmware must verify that any noncommitted firmware updates were successfully installed in order to mitigate problems due to power loss (UEFI should never attempt to boot Windows with partially written firmware).

Possible causes for install failure include, but aren't limited to the following issues:

Install failure cause Error code
Insufficient resources STATUS_INSUFFICIENT_RESOURCES
Power loss STATUS_INSUFFICIENT_POWER
Hardware failure STATUS_POWER_STATE_INVALID

Firmware update succeeds but Windows fails to boot

The UEFI firmware isn't responsible for rolling back updated firmware once it has been committed. Existing failover logic in Windows will divert the end-user to the Windows Recovery Environment (WinRE) after two unsuccessful boot attempts. WinRE may or may not boot successfully. The end-user has to take a manual recovery step to recover their system, or will have to return their device to the retailer/manufacturer.

Possible causes for this class of failure include, but aren't limited to:

  • Firmware incompatible with OS drivers.

  • Firmware incompatible with OS components.

If a hardware vendor decides to implement additional logic to determine whether Windows has successfully booted, that is acceptable. As mentioned previously, the expectation is that firmware update test coverage by the firmware author prevents most crises resulting from incompatible firmware.

ESRT table definition

Plug and play device

Authoring an update driver package

Processing updates

Device I/O from the UEFI environment

Firmware update status