VirtualBox

source: vbox/trunk/src/VBox/Devices/EFI/FirmwareNew/MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxPeiLib.c@ 77662

Last change on this file since 77662 was 77662, checked in by vboxsync, 6 years ago

EFI: First step in UDK2018 merge. Does not build yet.

  • Property svn:eol-style set to native
File size: 24.0 KB
Line 
1/** @file
2
3Copyright (c) 2010 - 2011, Intel Corporation. All rights reserved.<BR>
4
5This program and the accompanying materials
6are licensed and made available under the terms and conditions
7of the BSD License which accompanies this distribution. The
8full text of the license may be found at
9http://opensource.org/licenses/bsd-license.php
10
11THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13
14**/
15
16#include <PiPei.h>
17#include <PiDxe.h>
18#include <PiSmm.h>
19#include <Library/PeiServicesTablePointerLib.h>
20#include <Library/PeiServicesLib.h>
21#include <Library/BaseLib.h>
22#include <Library/BaseMemoryLib.h>
23#include <Library/LockBoxLib.h>
24#include <Library/HobLib.h>
25#include <Library/DebugLib.h>
26#include <Library/PcdLib.h>
27#include <Protocol/SmmCommunication.h>
28#include <Ppi/SmmCommunication.h>
29#include <Ppi/SmmAccess.h>
30#include <Guid/AcpiS3Context.h>
31#include <Guid/SmmLockBox.h>
32
33#include "SmmLockBoxLibPrivate.h"
34
35#if defined (MDE_CPU_IA32)
36typedef struct _LIST_ENTRY64 LIST_ENTRY64;
37struct _LIST_ENTRY64 {
38 LIST_ENTRY64 *ForwardLink;
39 UINT32 Reserved1;
40 LIST_ENTRY64 *BackLink;
41 UINT32 Reserved2;
42};
43
44typedef struct {
45 EFI_TABLE_HEADER Hdr;
46 UINT64 SmmFirmwareVendor;
47 UINT64 SmmFirmwareRevision;
48 UINT64 SmmInstallConfigurationTable;
49 UINT64 SmmIoMemRead;
50 UINT64 SmmIoMemWrite;
51 UINT64 SmmIoIoRead;
52 UINT64 SmmIoIoWrite;
53 UINT64 SmmAllocatePool;
54 UINT64 SmmFreePool;
55 UINT64 SmmAllocatePages;
56 UINT64 SmmFreePages;
57 UINT64 SmmStartupThisAp;
58 UINT64 CurrentlyExecutingCpu;
59 UINT64 NumberOfCpus;
60 UINT64 CpuSaveStateSize;
61 UINT64 CpuSaveState;
62 UINT64 NumberOfTableEntries;
63 UINT64 SmmConfigurationTable;
64} EFI_SMM_SYSTEM_TABLE2_64;
65
66typedef struct {
67 EFI_GUID VendorGuid;
68 UINT64 VendorTable;
69} EFI_CONFIGURATION_TABLE64;
70#endif
71
72#if defined (MDE_CPU_X64)
73typedef LIST_ENTRY LIST_ENTRY64;
74typedef EFI_SMM_SYSTEM_TABLE2 EFI_SMM_SYSTEM_TABLE2_64;
75typedef EFI_CONFIGURATION_TABLE EFI_CONFIGURATION_TABLE64;
76#endif
77
78/**
79 This function return first node of LinkList queue.
80
81 @param LockBoxQueue LinkList queue
82
83 @return first node of LinkList queue
84**/
85LIST_ENTRY *
86InternalInitLinkDxe (
87 IN LIST_ENTRY *LinkList
88 )
89{
90 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
91 //
92 // 32 PEI + 64 DXE
93 //
94 return (LIST_ENTRY *)(((LIST_ENTRY64 *)LinkList)->ForwardLink);
95 } else {
96 return LinkList->ForwardLink;
97 }
98}
99
100/**
101 This function return next node of LinkList.
102
103 @param Link LinkList node
104
105 @return next node of LinkList
106**/
107LIST_ENTRY *
108InternalNextLinkDxe (
109 IN LIST_ENTRY *Link
110 )
111{
112 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
113 //
114 // 32 PEI + 64 DXE
115 //
116 return (LIST_ENTRY *)(((LIST_ENTRY64 *)Link)->ForwardLink);
117 } else {
118 return Link->ForwardLink;
119 }
120}
121
122/**
123 This function find LockBox by GUID from SMRAM.
124
125 @param LockBoxQueue The LockBox queue in SMRAM
126 @param Guid The guid to indentify the LockBox
127
128 @return LockBoxData
129**/
130SMM_LOCK_BOX_DATA *
131InternalFindLockBoxByGuidFromSmram (
132 IN LIST_ENTRY *LockBoxQueue,
133 IN EFI_GUID *Guid
134 )
135{
136 LIST_ENTRY *Link;
137 SMM_LOCK_BOX_DATA *LockBox;
138
139 for (Link = InternalInitLinkDxe (LockBoxQueue);
140 Link != LockBoxQueue;
141 Link = InternalNextLinkDxe (Link)) {
142 LockBox = BASE_CR (
143 Link,
144 SMM_LOCK_BOX_DATA,
145 Link
146 );
147 if (CompareGuid (&LockBox->Guid, Guid)) {
148 return LockBox;
149 }
150 }
151 return NULL;
152}
153
154/**
155 Get VendorTable by VendorGuid in Smst.
156
157 @param Signature Signature of SMM_S3_RESUME_STATE
158 @param Smst SMM system table
159 @param VendorGuid vendor guid
160
161 @return vendor table.
162**/
163VOID *
164InternalSmstGetVendorTableByGuid (
165 IN UINT64 Signature,
166 IN EFI_SMM_SYSTEM_TABLE2 *Smst,
167 IN EFI_GUID *VendorGuid
168 )
169{
170 EFI_CONFIGURATION_TABLE *SmmConfigurationTable;
171 UINTN NumberOfTableEntries;
172 UINTN Index;
173 EFI_SMM_SYSTEM_TABLE2_64 *Smst64;
174 EFI_CONFIGURATION_TABLE64 *SmmConfigurationTable64;
175
176 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode))) {
177 //
178 // 32 PEI + 64 DXE
179 //
180 Smst64 = (EFI_SMM_SYSTEM_TABLE2_64 *)Smst;
181 SmmConfigurationTable64 = (EFI_CONFIGURATION_TABLE64 *)(UINTN)Smst64->SmmConfigurationTable;
182 NumberOfTableEntries = (UINTN)Smst64->NumberOfTableEntries;
183 for (Index = 0; Index < NumberOfTableEntries; Index++) {
184 if (CompareGuid (&SmmConfigurationTable64[Index].VendorGuid, VendorGuid)) {
185 return (VOID *)(UINTN)SmmConfigurationTable64[Index].VendorTable;
186 }
187 }
188 return NULL;
189 } else {
190 SmmConfigurationTable = Smst->SmmConfigurationTable;
191 NumberOfTableEntries = Smst->NumberOfTableEntries;
192 for (Index = 0; Index < NumberOfTableEntries; Index++) {
193 if (CompareGuid (&SmmConfigurationTable[Index].VendorGuid, VendorGuid)) {
194 return (VOID *)SmmConfigurationTable[Index].VendorTable;
195 }
196 }
197 return NULL;
198 }
199}
200
201/**
202 Get SMM LockBox context.
203
204 @return SMM LockBox context.
205**/
206SMM_LOCK_BOX_CONTEXT *
207InternalGetSmmLockBoxContext (
208 VOID
209 )
210{
211 EFI_SMRAM_DESCRIPTOR *SmramDescriptor;
212 SMM_S3_RESUME_STATE *SmmS3ResumeState;
213 VOID *GuidHob;
214 SMM_LOCK_BOX_CONTEXT *SmmLockBoxContext;
215
216 GuidHob = GetFirstGuidHob (&gEfiAcpiVariableGuid);
217 ASSERT (GuidHob != NULL);
218 SmramDescriptor = (EFI_SMRAM_DESCRIPTOR *) GET_GUID_HOB_DATA (GuidHob);
219 SmmS3ResumeState = (SMM_S3_RESUME_STATE *)(UINTN)SmramDescriptor->CpuStart;
220
221 SmmLockBoxContext = (SMM_LOCK_BOX_CONTEXT *)InternalSmstGetVendorTableByGuid (
222 SmmS3ResumeState->Signature,
223 (EFI_SMM_SYSTEM_TABLE2 *)(UINTN)SmmS3ResumeState->Smst,
224 &gEfiSmmLockBoxCommunicationGuid
225 );
226 ASSERT (SmmLockBoxContext != NULL);
227
228 return SmmLockBoxContext;
229}
230
231/**
232 This function will restore confidential information from lockbox in SMRAM directly.
233
234 @param Guid the guid to identify the confidential information
235 @param Buffer the address of the restored confidential information
236 NULL means restored to original address, Length MUST be NULL at same time.
237 @param Length the length of the restored confidential information
238
239 @retval RETURN_SUCCESS the information is restored successfully.
240 @retval RETURN_WRITE_PROTECTED Buffer and Length are NULL, but the LockBox has no
241 LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE attribute.
242 @retval RETURN_BUFFER_TOO_SMALL the Length is too small to hold the confidential information.
243 @retval RETURN_NOT_FOUND the requested GUID not found.
244**/
245EFI_STATUS
246InternalRestoreLockBoxFromSmram (
247 IN GUID *Guid,
248 IN VOID *Buffer, OPTIONAL
249 IN OUT UINTN *Length OPTIONAL
250 )
251{
252 PEI_SMM_ACCESS_PPI *SmmAccess;
253 UINTN Index;
254 EFI_STATUS Status;
255 SMM_LOCK_BOX_CONTEXT *SmmLockBoxContext;
256 LIST_ENTRY *LockBoxQueue;
257 SMM_LOCK_BOX_DATA *LockBox;
258 VOID *RestoreBuffer;
259
260 //
261 // Get needed resource
262 //
263 Status = PeiServicesLocatePpi (
264 &gPeiSmmAccessPpiGuid,
265 0,
266 NULL,
267 (VOID **)&SmmAccess
268 );
269 if (!EFI_ERROR (Status)) {
270 for (Index = 0; !EFI_ERROR (Status); Index++) {
271 Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
272 }
273 }
274
275 //
276 // Get LockBox context
277 //
278 SmmLockBoxContext = InternalGetSmmLockBoxContext ();
279 LockBoxQueue = (LIST_ENTRY *)(UINTN)SmmLockBoxContext->LockBoxDataAddress;
280
281 //
282 // We do NOT check Buffer address in SMRAM, because if SMRAM not locked, we trust the caller.
283 //
284
285 //
286 // Restore this, Buffer and Length MUST be both NULL or both non-NULL
287 //
288
289 //
290 // Find LockBox
291 //
292 LockBox = InternalFindLockBoxByGuidFromSmram (LockBoxQueue, Guid);
293 if (LockBox == NULL) {
294 //
295 // Not found
296 //
297 return EFI_NOT_FOUND;
298 }
299
300 //
301 // Set RestoreBuffer
302 //
303 if (Buffer != NULL) {
304 //
305 // restore to new buffer
306 //
307 RestoreBuffer = Buffer;
308 } else {
309 //
310 // restore to original buffer
311 //
312 if ((LockBox->Attributes & LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE) == 0) {
313 return EFI_WRITE_PROTECTED;
314 }
315 RestoreBuffer = (VOID *)(UINTN)LockBox->Buffer;
316 }
317
318 //
319 // Set RestoreLength
320 //
321 if (Length != NULL) {
322 if (*Length < (UINTN)LockBox->Length) {
323 //
324 // Input buffer is too small to hold all data.
325 //
326 *Length = (UINTN)LockBox->Length;
327 return EFI_BUFFER_TOO_SMALL;
328 }
329 *Length = (UINTN)LockBox->Length;
330 }
331
332 //
333 // Restore data
334 //
335 CopyMem (RestoreBuffer, (VOID *)(UINTN)LockBox->SmramBuffer, (UINTN)LockBox->Length);
336
337 //
338 // Done
339 //
340 return EFI_SUCCESS;
341}
342
343/**
344 This function will restore confidential information from all lockbox which have RestoreInPlace attribute.
345
346 @retval RETURN_SUCCESS the information is restored successfully.
347**/
348EFI_STATUS
349InternalRestoreAllLockBoxInPlaceFromSmram (
350 VOID
351 )
352{
353 PEI_SMM_ACCESS_PPI *SmmAccess;
354 UINTN Index;
355 EFI_STATUS Status;
356 SMM_LOCK_BOX_CONTEXT *SmmLockBoxContext;
357 LIST_ENTRY *LockBoxQueue;
358 SMM_LOCK_BOX_DATA *LockBox;
359 LIST_ENTRY *Link;
360
361 //
362 // Get needed resource
363 //
364 Status = PeiServicesLocatePpi (
365 &gPeiSmmAccessPpiGuid,
366 0,
367 NULL,
368 (VOID **)&SmmAccess
369 );
370 if (!EFI_ERROR (Status)) {
371 for (Index = 0; !EFI_ERROR (Status); Index++) {
372 Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
373 }
374 }
375
376 //
377 // Get LockBox context
378 //
379 SmmLockBoxContext = InternalGetSmmLockBoxContext ();
380 LockBoxQueue = (LIST_ENTRY *)(UINTN)SmmLockBoxContext->LockBoxDataAddress;
381
382 //
383 // We do NOT check Buffer address in SMRAM, because if SMRAM not locked, we trust the caller.
384 //
385
386 //
387 // Restore all, Buffer and Length MUST be NULL
388 //
389 for (Link = InternalInitLinkDxe (LockBoxQueue);
390 Link != LockBoxQueue;
391 Link = InternalNextLinkDxe (Link)) {
392 LockBox = BASE_CR (
393 Link,
394 SMM_LOCK_BOX_DATA,
395 Link
396 );
397 if ((LockBox->Attributes & LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE) != 0) {
398 //
399 // Restore data
400 //
401 CopyMem ((VOID *)(UINTN)LockBox->Buffer, (VOID *)(UINTN)LockBox->SmramBuffer, (UINTN)LockBox->Length);
402 }
403 }
404 //
405 // Done
406 //
407 return EFI_SUCCESS;
408}
409
410/**
411 This function will save confidential information to lockbox.
412
413 @param Guid the guid to identify the confidential information
414 @param Buffer the address of the confidential information
415 @param Length the length of the confidential information
416
417 @retval RETURN_SUCCESS the information is saved successfully.
418 @retval RETURN_INVALID_PARAMETER the Guid is NULL, or Buffer is NULL, or Length is 0
419 @retval RETURN_ALREADY_STARTED the requested GUID already exist.
420 @retval RETURN_OUT_OF_RESOURCES no enough resource to save the information.
421 @retval RETURN_ACCESS_DENIED it is too late to invoke this interface
422 @retval RETURN_NOT_STARTED it is too early to invoke this interface
423 @retval RETURN_UNSUPPORTED the service is not supported by implementaion.
424**/
425RETURN_STATUS
426EFIAPI
427SaveLockBox (
428 IN GUID *Guid,
429 IN VOID *Buffer,
430 IN UINTN Length
431 )
432{
433 ASSERT (FALSE);
434
435 //
436 // No support to save at PEI phase
437 //
438 return RETURN_UNSUPPORTED;
439}
440
441/**
442 This function will set lockbox attributes.
443
444 @param Guid the guid to identify the confidential information
445 @param Attributes the attributes of the lockbox
446
447 @retval RETURN_SUCCESS the information is saved successfully.
448 @retval RETURN_INVALID_PARAMETER attributes is invalid.
449 @retval RETURN_NOT_FOUND the requested GUID not found.
450 @retval RETURN_ACCESS_DENIED it is too late to invoke this interface
451 @retval RETURN_NOT_STARTED it is too early to invoke this interface
452 @retval RETURN_UNSUPPORTED the service is not supported by implementaion.
453**/
454RETURN_STATUS
455EFIAPI
456SetLockBoxAttributes (
457 IN GUID *Guid,
458 IN UINT64 Attributes
459 )
460{
461 ASSERT (FALSE);
462
463 //
464 // No support to save at PEI phase
465 //
466 return RETURN_UNSUPPORTED;
467}
468
469/**
470 This function will update confidential information to lockbox.
471
472 @param Guid the guid to identify the original confidential information
473 @param Offset the offset of the original confidential information
474 @param Buffer the address of the updated confidential information
475 @param Length the length of the updated confidential information
476
477 @retval RETURN_SUCCESS the information is saved successfully.
478 @retval RETURN_INVALID_PARAMETER the Guid is NULL, or Buffer is NULL, or Length is 0.
479 @retval RETURN_NOT_FOUND the requested GUID not found.
480 @retval RETURN_BUFFER_TOO_SMALL the original buffer to too small to hold new information.
481 @retval RETURN_ACCESS_DENIED it is too late to invoke this interface
482 @retval RETURN_NOT_STARTED it is too early to invoke this interface
483 @retval RETURN_UNSUPPORTED the service is not supported by implementaion.
484**/
485RETURN_STATUS
486EFIAPI
487UpdateLockBox (
488 IN GUID *Guid,
489 IN UINTN Offset,
490 IN VOID *Buffer,
491 IN UINTN Length
492 )
493{
494 ASSERT (FALSE);
495
496 //
497 // No support to update at PEI phase
498 //
499 return RETURN_UNSUPPORTED;
500}
501
502/**
503 This function will restore confidential information from lockbox.
504
505 @param Guid the guid to identify the confidential information
506 @param Buffer the address of the restored confidential information
507 NULL means restored to original address, Length MUST be NULL at same time.
508 @param Length the length of the restored confidential information
509
510 @retval RETURN_SUCCESS the information is restored successfully.
511 @retval RETURN_INVALID_PARAMETER the Guid is NULL, or one of Buffer and Length is NULL.
512 @retval RETURN_WRITE_PROTECTED Buffer and Length are NULL, but the LockBox has no
513 LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE attribute.
514 @retval RETURN_BUFFER_TOO_SMALL the Length is too small to hold the confidential information.
515 @retval RETURN_NOT_FOUND the requested GUID not found.
516 @retval RETURN_NOT_STARTED it is too early to invoke this interface
517 @retval RETURN_ACCESS_DENIED not allow to restore to the address
518 @retval RETURN_UNSUPPORTED the service is not supported by implementaion.
519**/
520RETURN_STATUS
521EFIAPI
522RestoreLockBox (
523 IN GUID *Guid,
524 IN VOID *Buffer, OPTIONAL
525 IN OUT UINTN *Length OPTIONAL
526 )
527{
528 EFI_STATUS Status;
529 EFI_PEI_SMM_COMMUNICATION_PPI *SmmCommunicationPpi;
530 EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *LockBoxParameterRestore;
531 EFI_SMM_COMMUNICATE_HEADER *CommHeader;
532 UINT8 CommBuffer[sizeof(EFI_GUID) + sizeof(UINT64) + sizeof(EFI_SMM_LOCK_BOX_PARAMETER_RESTORE)];
533 UINTN CommSize;
534 UINT64 MessageLength;
535
536 //
537 // Please aware that there is UINTN in EFI_SMM_COMMUNICATE_HEADER. It might be UINT64 in DXE, while it is UINT32 in PEI.
538 // typedef struct {
539 // EFI_GUID HeaderGuid;
540 // UINTN MessageLength;
541 // UINT8 Data[1];
542 // } EFI_SMM_COMMUNICATE_HEADER;
543 //
544
545 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreLockBox - Enter\n"));
546
547 //
548 // Basic check
549 //
550 if ((Guid == NULL) ||
551 ((Buffer == NULL) && (Length != NULL)) ||
552 ((Buffer != NULL) && (Length == NULL))) {
553 return EFI_INVALID_PARAMETER;
554 }
555
556 //
557 // Get needed resource
558 //
559 Status = PeiServicesLocatePpi (
560 &gEfiPeiSmmCommunicationPpiGuid,
561 0,
562 NULL,
563 (VOID **)&SmmCommunicationPpi
564 );
565 if (EFI_ERROR (Status)) {
566 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib LocatePpi - (%r)\n", Status));
567 Status = InternalRestoreLockBoxFromSmram (Guid, Buffer, Length);
568 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreLockBox - Exit (%r)\n", Status));
569 return Status;
570 }
571
572 //
573 // Prepare parameter
574 //
575 CommHeader = (EFI_SMM_COMMUNICATE_HEADER *)&CommBuffer[0];
576 CopyMem (&CommHeader->HeaderGuid, &gEfiSmmLockBoxCommunicationGuid, sizeof(gEfiSmmLockBoxCommunicationGuid));
577 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
578 MessageLength = sizeof(*LockBoxParameterRestore);
579 CopyMem (&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength)], &MessageLength, sizeof(MessageLength));
580 } else {
581 CommHeader->MessageLength = sizeof(*LockBoxParameterRestore);
582 }
583
584 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib CommBuffer - %x\n", &CommBuffer[0]));
585 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
586 LockBoxParameterRestore = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINT64)];
587 } else {
588 LockBoxParameterRestore = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINTN)];
589 }
590 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib LockBoxParameterRestore - %x\n", LockBoxParameterRestore));
591 LockBoxParameterRestore->Header.Command = EFI_SMM_LOCK_BOX_COMMAND_RESTORE;
592 LockBoxParameterRestore->Header.DataLength = sizeof(*LockBoxParameterRestore);
593 LockBoxParameterRestore->Header.ReturnStatus = (UINT64)-1;
594 if (Guid != 0) {
595 CopyMem (&LockBoxParameterRestore->Guid, Guid, sizeof(*Guid));
596 } else {
597 ZeroMem (&LockBoxParameterRestore->Guid, sizeof(*Guid));
598 }
599 LockBoxParameterRestore->Buffer = (EFI_PHYSICAL_ADDRESS)(UINTN)Buffer;
600 if (Length != NULL) {
601 LockBoxParameterRestore->Length = (EFI_PHYSICAL_ADDRESS)*Length;
602 } else {
603 LockBoxParameterRestore->Length = 0;
604 }
605
606 //
607 // Send command
608 //
609 CommSize = sizeof(CommBuffer);
610 Status = SmmCommunicationPpi->Communicate (
611 SmmCommunicationPpi,
612 &CommBuffer[0],
613 &CommSize
614 );
615 if (Status == EFI_NOT_STARTED) {
616 //
617 // Pei SMM communication not ready yet, so we access SMRAM directly
618 //
619 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib Communicate - (%r)\n", Status));
620 Status = InternalRestoreLockBoxFromSmram (Guid, Buffer, Length);
621 LockBoxParameterRestore->Header.ReturnStatus = (UINT64)Status;
622 if (Length != NULL) {
623 LockBoxParameterRestore->Length = (UINT64)*Length;
624 }
625 }
626 ASSERT_EFI_ERROR (Status);
627
628 if (Length != NULL) {
629 *Length = (UINTN)LockBoxParameterRestore->Length;
630 }
631
632 Status = (EFI_STATUS)LockBoxParameterRestore->Header.ReturnStatus;
633 if (Status != EFI_SUCCESS) {
634 // Need or MAX_BIT, because there might be case that SMM is X64 while PEI is IA32.
635 Status |= MAX_BIT;
636 }
637
638 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreLockBox - Exit (%r)\n", Status));
639
640 //
641 // Done
642 //
643 return Status;
644}
645
646/**
647 This function will restore confidential information from all lockbox which have RestoreInPlace attribute.
648
649 @retval RETURN_SUCCESS the information is restored successfully.
650 @retval RETURN_NOT_STARTED it is too early to invoke this interface
651 @retval RETURN_UNSUPPORTED the service is not supported by implementaion.
652**/
653RETURN_STATUS
654EFIAPI
655RestoreAllLockBoxInPlace (
656 VOID
657 )
658{
659 EFI_STATUS Status;
660 EFI_PEI_SMM_COMMUNICATION_PPI *SmmCommunicationPpi;
661 EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *LockBoxParameterRestoreAllInPlace;
662 EFI_SMM_COMMUNICATE_HEADER *CommHeader;
663 UINT8 CommBuffer[sizeof(EFI_GUID) + sizeof(UINT64) + sizeof(EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE)];
664 UINTN CommSize;
665 UINT64 MessageLength;
666
667 //
668 // Please aware that there is UINTN in EFI_SMM_COMMUNICATE_HEADER. It might be UINT64 in DXE, while it is UINT32 in PEI.
669 // typedef struct {
670 // EFI_GUID HeaderGuid;
671 // UINTN MessageLength;
672 // UINT8 Data[1];
673 // } EFI_SMM_COMMUNICATE_HEADER;
674 //
675
676 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreAllLockBoxInPlace - Enter\n"));
677
678 //
679 // Get needed resource
680 //
681 Status = PeiServicesLocatePpi (
682 &gEfiPeiSmmCommunicationPpiGuid,
683 0,
684 NULL,
685 (VOID **)&SmmCommunicationPpi
686 );
687 if (EFI_ERROR (Status)) {
688 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib LocatePpi - (%r)\n", Status));
689 Status = InternalRestoreAllLockBoxInPlaceFromSmram ();
690 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreAllLockBoxInPlace - Exit (%r)\n", Status));
691 return Status;
692 }
693
694 //
695 // Prepare parameter
696 //
697 CommHeader = (EFI_SMM_COMMUNICATE_HEADER *)&CommBuffer[0];
698 CopyMem (&CommHeader->HeaderGuid, &gEfiSmmLockBoxCommunicationGuid, sizeof(gEfiSmmLockBoxCommunicationGuid));
699 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
700 MessageLength = sizeof(*LockBoxParameterRestoreAllInPlace);
701 CopyMem (&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength)], &MessageLength, sizeof(MessageLength));
702 } else {
703 CommHeader->MessageLength = sizeof(*LockBoxParameterRestoreAllInPlace);
704 }
705
706 if ((sizeof(UINTN) == sizeof(UINT32)) && (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) ) {
707 LockBoxParameterRestoreAllInPlace = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINT64)];
708 } else {
709 LockBoxParameterRestoreAllInPlace = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINTN)];
710 }
711 LockBoxParameterRestoreAllInPlace->Header.Command = EFI_SMM_LOCK_BOX_COMMAND_RESTORE_ALL_IN_PLACE;
712 LockBoxParameterRestoreAllInPlace->Header.DataLength = sizeof(*LockBoxParameterRestoreAllInPlace);
713 LockBoxParameterRestoreAllInPlace->Header.ReturnStatus = (UINT64)-1;
714
715 //
716 // Send command
717 //
718 CommSize = sizeof(CommBuffer);
719 Status = SmmCommunicationPpi->Communicate (
720 SmmCommunicationPpi,
721 &CommBuffer[0],
722 &CommSize
723 );
724 if (Status == EFI_NOT_STARTED) {
725 //
726 // Pei SMM communication not ready yet, so we access SMRAM directly
727 //
728 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib Communicate - (%r)\n", Status));
729 Status = InternalRestoreAllLockBoxInPlaceFromSmram ();
730 LockBoxParameterRestoreAllInPlace->Header.ReturnStatus = (UINT64)Status;
731 }
732 ASSERT_EFI_ERROR (Status);
733
734 Status = (EFI_STATUS)LockBoxParameterRestoreAllInPlace->Header.ReturnStatus;
735 if (Status != EFI_SUCCESS) {
736 // Need or MAX_BIT, because there might be case that SMM is X64 while PEI is IA32.
737 Status |= MAX_BIT;
738 }
739
740 DEBUG ((EFI_D_INFO, "SmmLockBoxPeiLib RestoreAllLockBoxInPlace - Exit (%r)\n", Status));
741
742 //
743 // Done
744 //
745 return Status;
746}
747
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette