/** @file
Copyright (c) 2010 - 2011, Intel Corporation. All rights reserved.<BR>
This program and the accompanying materials
are licensed and made available under the terms and conditions
of the BSD License which accompanies this distribution. The
full text of the license may be found at
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
**/
#include <PiPei.h>
#include <PiDxe.h>
#include <PiSmm.h>
#include <Library/PeiServicesTablePointerLib.h>
#include <Library/PeiServicesLib.h>
#include <Library/BaseMemoryLib.h>
#include <Library/LockBoxLib.h>
#include <Library/DebugLib.h>
#include <Protocol/SmmCommunication.h>
#include <Ppi/SmmCommunication.h>
#include <Ppi/SmmAccess.h>
#include <Guid/AcpiS3Context.h>
#include <Guid/SmmLockBox.h>
#include "SmmLockBoxLibPrivate.h"
#if defined (MDE_CPU_IA32)
struct _LIST_ENTRY64 {
};
typedef struct {
typedef struct {
#endif
#if defined (MDE_CPU_X64)
#endif
/**
This function return first node of LinkList queue.
@param LockBoxQueue LinkList queue
@return first node of LinkList queue
**/
)
{
//
// 32 PEI + 64 DXE
//
} else {
return LinkList->ForwardLink;
}
}
/**
This function return next node of LinkList.
@param Link LinkList node
@return next node of LinkList
**/
)
{
//
// 32 PEI + 64 DXE
//
} else {
return Link->ForwardLink;
}
}
/**
This function find LockBox by GUID from SMRAM.
@param LockBoxQueue The LockBox queue in SMRAM
@param Guid The guid to indentify the LockBox
@return LockBoxData
**/
)
{
Link != LockBoxQueue;
Link,
);
return LockBox;
}
}
return NULL;
}
/**
Get VendorTable by VendorGuid in Smst.
@param Signature Signature of SMM_S3_RESUME_STATE
@param Smst SMM system table
@param VendorGuid vendor guid
@return vendor table.
**/
VOID *
)
{
//
// 32 PEI + 64 DXE
//
}
}
return NULL;
} else {
}
}
return NULL;
}
}
/**
Get SMM LockBox context.
@return SMM LockBox context.
**/
)
{
);
return SmmLockBoxContext;
}
/**
This function will restore confidential information from lockbox in SMRAM directly.
@param Guid the guid to identify the confidential information
@param Buffer the address of the restored confidential information
NULL means restored to original address, Length MUST be NULL at same time.
@param Length the length of the restored confidential information
@retval RETURN_SUCCESS the information is restored successfully.
@retval RETURN_WRITE_PROTECTED Buffer and Length are NULL, but the LockBox has no
LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE attribute.
@retval RETURN_BUFFER_TOO_SMALL the Length is too small to hold the confidential information.
@retval RETURN_NOT_FOUND the requested GUID not found.
**/
)
{
//
// Get needed resource
//
0,
NULL,
);
}
}
//
// Get LockBox context
//
//
// We do NOT check Buffer address in SMRAM, because if SMRAM not locked, we trust the caller.
//
//
// Restore this, Buffer and Length MUST be both NULL or both non-NULL
//
//
// Find LockBox
//
//
// Not found
//
return EFI_NOT_FOUND;
}
//
// Set RestoreBuffer
//
//
// restore to new buffer
//
} else {
//
// restore to original buffer
//
return EFI_WRITE_PROTECTED;
}
}
//
// Set RestoreLength
//
//
// Input buffer is too small to hold all data.
//
return EFI_BUFFER_TOO_SMALL;
}
}
//
// Restore data
//
//
// Done
//
return EFI_SUCCESS;
}
/**
This function will restore confidential information from all lockbox which have RestoreInPlace attribute.
@retval RETURN_SUCCESS the information is restored successfully.
**/
)
{
//
// Get needed resource
//
0,
NULL,
);
}
}
//
// Get LockBox context
//
//
// We do NOT check Buffer address in SMRAM, because if SMRAM not locked, we trust the caller.
//
//
// Restore all, Buffer and Length MUST be NULL
//
Link != LockBoxQueue;
Link,
);
//
// Restore data
//
CopyMem ((VOID *)(UINTN)LockBox->Buffer, (VOID *)(UINTN)LockBox->SmramBuffer, (UINTN)LockBox->Length);
}
}
//
// Done
//
return EFI_SUCCESS;
}
/**
This function will save confidential information to lockbox.
@param Guid the guid to identify the confidential information
@param Buffer the address of the confidential information
@param Length the length of the confidential information
@retval RETURN_SUCCESS the information is saved successfully.
@retval RETURN_INVALID_PARAMETER the Guid is NULL, or Buffer is NULL, or Length is 0
@retval RETURN_ALREADY_STARTED the requested GUID already exist.
@retval RETURN_OUT_OF_RESOURCES no enough resource to save the information.
@retval RETURN_ACCESS_DENIED it is too late to invoke this interface
@retval RETURN_NOT_STARTED it is too early to invoke this interface
@retval RETURN_UNSUPPORTED the service is not supported by implementaion.
**/
)
{
//
// No support to save at PEI phase
//
return RETURN_UNSUPPORTED;
}
/**
This function will set lockbox attributes.
@param Guid the guid to identify the confidential information
@param Attributes the attributes of the lockbox
@retval RETURN_SUCCESS the information is saved successfully.
@retval RETURN_INVALID_PARAMETER attributes is invalid.
@retval RETURN_NOT_FOUND the requested GUID not found.
@retval RETURN_ACCESS_DENIED it is too late to invoke this interface
@retval RETURN_NOT_STARTED it is too early to invoke this interface
@retval RETURN_UNSUPPORTED the service is not supported by implementaion.
**/
)
{
//
// No support to save at PEI phase
//
return RETURN_UNSUPPORTED;
}
/**
This function will update confidential information to lockbox.
@param Guid the guid to identify the original confidential information
@param Offset the offset of the original confidential information
@param Buffer the address of the updated confidential information
@param Length the length of the updated confidential information
@retval RETURN_SUCCESS the information is saved successfully.
@retval RETURN_INVALID_PARAMETER the Guid is NULL, or Buffer is NULL, or Length is 0.
@retval RETURN_NOT_FOUND the requested GUID not found.
@retval RETURN_BUFFER_TOO_SMALL the original buffer to too small to hold new information.
@retval RETURN_ACCESS_DENIED it is too late to invoke this interface
@retval RETURN_NOT_STARTED it is too early to invoke this interface
@retval RETURN_UNSUPPORTED the service is not supported by implementaion.
**/
)
{
//
// No support to update at PEI phase
//
return RETURN_UNSUPPORTED;
}
/**
This function will restore confidential information from lockbox.
@param Guid the guid to identify the confidential information
@param Buffer the address of the restored confidential information
NULL means restored to original address, Length MUST be NULL at same time.
@param Length the length of the restored confidential information
@retval RETURN_SUCCESS the information is restored successfully.
@retval RETURN_INVALID_PARAMETER the Guid is NULL, or one of Buffer and Length is NULL.
@retval RETURN_WRITE_PROTECTED Buffer and Length are NULL, but the LockBox has no
LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE attribute.
@retval RETURN_BUFFER_TOO_SMALL the Length is too small to hold the confidential information.
@retval RETURN_NOT_FOUND the requested GUID not found.
@retval RETURN_NOT_STARTED it is too early to invoke this interface
@retval RETURN_ACCESS_DENIED not allow to restore to the address
@retval RETURN_UNSUPPORTED the service is not supported by implementaion.
**/
)
{
//
// Please aware that there is UINTN in EFI_SMM_COMMUNICATE_HEADER. It might be UINT64 in DXE, while it is UINT32 in PEI.
// typedef struct {
// EFI_GUID HeaderGuid;
// UINTN MessageLength;
// UINT8 Data[1];
// } EFI_SMM_COMMUNICATE_HEADER;
//
//
// Basic check
//
return EFI_INVALID_PARAMETER;
}
//
// Get needed resource
//
0,
NULL,
(VOID **)&SmmCommunicationPpi
);
return EFI_NOT_STARTED;
}
//
// Prepare parameter
//
CopyMem (&CommHeader->HeaderGuid, &gEfiSmmLockBoxCommunicationGuid, sizeof(gEfiSmmLockBoxCommunicationGuid));
MessageLength = sizeof(*LockBoxParameterRestore);
CopyMem (&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength)], &MessageLength, sizeof(MessageLength));
} else {
}
LockBoxParameterRestore = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINT64)];
} else {
LockBoxParameterRestore = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINTN)];
}
if (Guid != 0) {
} else {
}
} else {
}
//
// Send command
//
CommSize = sizeof(CommBuffer);
&CommBuffer[0],
);
if (Status == EFI_NOT_STARTED) {
//
// Pei SMM communication not ready yet, so we access SMRAM directly
//
}
}
}
if (Status != EFI_SUCCESS) {
// Need or MAX_BIT, because there might be case that SMM is X64 while PEI is IA32.
}
//
// Done
//
return Status;
}
/**
This function will restore confidential information from all lockbox which have RestoreInPlace attribute.
@retval RETURN_SUCCESS the information is restored successfully.
@retval RETURN_NOT_STARTED it is too early to invoke this interface
@retval RETURN_UNSUPPORTED the service is not supported by implementaion.
**/
)
{
UINT8 CommBuffer[sizeof(EFI_GUID) + sizeof(UINT64) + sizeof(EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE)];
//
// Please aware that there is UINTN in EFI_SMM_COMMUNICATE_HEADER. It might be UINT64 in DXE, while it is UINT32 in PEI.
// typedef struct {
// EFI_GUID HeaderGuid;
// UINTN MessageLength;
// UINT8 Data[1];
// } EFI_SMM_COMMUNICATE_HEADER;
//
//
// Get needed resource
//
0,
NULL,
(VOID **)&SmmCommunicationPpi
);
return EFI_NOT_STARTED;
}
//
// Prepare parameter
//
CopyMem (&CommHeader->HeaderGuid, &gEfiSmmLockBoxCommunicationGuid, sizeof(gEfiSmmLockBoxCommunicationGuid));
MessageLength = sizeof(*LockBoxParameterRestoreAllInPlace);
CopyMem (&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength)], &MessageLength, sizeof(MessageLength));
} else {
}
LockBoxParameterRestoreAllInPlace = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINT64)];
} else {
LockBoxParameterRestoreAllInPlace = (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)&CommBuffer[OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, MessageLength) + sizeof(UINTN)];
}
//
// Send command
//
CommSize = sizeof(CommBuffer);
&CommBuffer[0],
);
if (Status == EFI_NOT_STARTED) {
//
// Pei SMM communication not ready yet, so we access SMRAM directly
//
}
if (Status != EFI_SUCCESS) {
// Need or MAX_BIT, because there might be case that SMM is X64 while PEI is IA32.
}
//
// Done
//
return Status;
}