]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Universal/Variable/RuntimeDxe/TcgMorLockSmm.c
MdeModulePkg/Variable/RuntimeDxe: permit MorLock deletion for passthru req
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / TcgMorLockSmm.c
CommitLineData
abad83e6
JY
1/** @file\r
2 TCG MOR (Memory Overwrite Request) Lock Control support (SMM version).\r
3\r
4 This module initilizes MemoryOverwriteRequestControlLock variable.\r
5 This module adds Variable Hook and check MemoryOverwriteRequestControlLock.\r
6\r
7Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>\r
8This program and the accompanying materials\r
9are licensed and made available under the terms and conditions of the BSD License\r
10which accompanies this distribution. The full text of the license may be found at\r
11http://opensource.org/licenses/bsd-license.php\r
12\r
13THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
14WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
15\r
16**/\r
17\r
18#include <PiDxe.h>\r
19#include <Guid/MemoryOverwriteControl.h>\r
20#include <IndustryStandard/MemoryOverwriteRequestControlLock.h>\r
21#include <Library/DebugLib.h>\r
22#include <Library/BaseLib.h>\r
23#include <Library/BaseMemoryLib.h>\r
24#include "Variable.h"\r
25\r
26typedef struct {\r
27 CHAR16 *VariableName;\r
28 EFI_GUID *VendorGuid;\r
29} VARIABLE_TYPE;\r
30\r
31VARIABLE_TYPE mMorVariableType[] = {\r
32 {MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME, &gEfiMemoryOverwriteControlDataGuid},\r
33 {MEMORY_OVERWRITE_REQUEST_CONTROL_LOCK_NAME, &gEfiMemoryOverwriteRequestControlLockGuid},\r
34};\r
35\r
36#define MOR_LOCK_DATA_UNLOCKED 0x0\r
37#define MOR_LOCK_DATA_LOCKED_WITHOUT_KEY 0x1\r
38#define MOR_LOCK_DATA_LOCKED_WITH_KEY 0x2\r
39\r
40#define MOR_LOCK_V1_SIZE 1\r
41#define MOR_LOCK_V2_KEY_SIZE 8\r
42\r
43typedef enum {\r
44 MorLockStateUnlocked = 0,\r
45 MorLockStateLocked = 1,\r
46} MOR_LOCK_STATE;\r
47\r
48UINT8 mMorLockKey[MOR_LOCK_V2_KEY_SIZE];\r
49BOOLEAN mMorLockKeyEmpty = TRUE;\r
50BOOLEAN mMorLockPassThru = FALSE;\r
51MOR_LOCK_STATE mMorLockState = MorLockStateUnlocked;\r
52\r
53/**\r
54 Returns if this is MOR related variable.\r
55\r
56 @param VariableName the name of the vendor's variable, it's a Null-Terminated Unicode String\r
57 @param VendorGuid Unify identifier for vendor.\r
58\r
59 @retval TRUE The variable is MOR related.\r
60 @retval FALSE The variable is NOT MOR related.\r
61**/\r
62BOOLEAN\r
63IsAnyMorVariable (\r
64 IN CHAR16 *VariableName,\r
65 IN EFI_GUID *VendorGuid\r
66 )\r
67{\r
68 UINTN Index;\r
69\r
70 for (Index = 0; Index < sizeof(mMorVariableType)/sizeof(mMorVariableType[0]); Index++) {\r
71 if ((StrCmp (VariableName, mMorVariableType[Index].VariableName) == 0) &&\r
72 (CompareGuid (VendorGuid, mMorVariableType[Index].VendorGuid))) {\r
73 return TRUE;\r
74 }\r
75 }\r
76 return FALSE;\r
77}\r
78\r
79/**\r
80 Returns if this is MOR lock variable.\r
81\r
82 @param VariableName the name of the vendor's variable, it's a Null-Terminated Unicode String\r
83 @param VendorGuid Unify identifier for vendor.\r
84\r
85 @retval TRUE The variable is MOR lock variable.\r
86 @retval FALSE The variable is NOT MOR lock variable.\r
87**/\r
88BOOLEAN\r
89IsMorLockVariable (\r
90 IN CHAR16 *VariableName,\r
91 IN EFI_GUID *VendorGuid\r
92 )\r
93{\r
94 if ((StrCmp (VariableName, MEMORY_OVERWRITE_REQUEST_CONTROL_LOCK_NAME) == 0) &&\r
95 (CompareGuid (VendorGuid, &gEfiMemoryOverwriteRequestControlLockGuid))) {\r
96 return TRUE;\r
97 }\r
98 return FALSE;\r
99}\r
100\r
101/**\r
102 Set MOR lock variable.\r
103\r
104 @param Data MOR Lock variable data.\r
105\r
106 @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as\r
107 defined by the Attributes.\r
108 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied, or the\r
109 DataSize exceeds the maximum allowed.\r
110 @retval EFI_INVALID_PARAMETER VariableName is an empty Unicode string.\r
111 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data.\r
112 @retval EFI_DEVICE_ERROR The variable could not be saved due to a hardware failure.\r
113 @retval EFI_WRITE_PROTECTED The variable in question is read-only.\r
114 @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted.\r
115 @retval EFI_SECURITY_VIOLATION The variable could not be written due to EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS\r
116 set but the AuthInfo does NOT pass the validation check carried\r
117 out by the firmware.\r
118 @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found.\r
119**/\r
120EFI_STATUS\r
121SetMorLockVariable (\r
122 IN UINT8 Data\r
123 )\r
124{\r
125 EFI_STATUS Status;\r
126\r
127 mMorLockPassThru = TRUE;\r
128 Status = VariableServiceSetVariable (\r
129 MEMORY_OVERWRITE_REQUEST_CONTROL_LOCK_NAME,\r
130 &gEfiMemoryOverwriteRequestControlLockGuid,\r
131 EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
132 sizeof(Data),\r
133 &Data\r
134 );\r
135 mMorLockPassThru = FALSE;\r
136 return Status;\r
137}\r
138\r
139/**\r
140 This service is an MorLock checker handler for the SetVariable().\r
141\r
142 @param VariableName the name of the vendor's variable, as a\r
143 Null-Terminated Unicode String\r
144 @param VendorGuid Unify identifier for vendor.\r
145 @param Attributes Point to memory location to return the attributes of variable. If the point\r
146 is NULL, the parameter would be ignored.\r
147 @param DataSize The size in bytes of Data-Buffer.\r
148 @param Data Point to the content of the variable.\r
149\r
150 @retval EFI_SUCCESS The MorLock check pass, and Variable driver can store the variable data.\r
151 @retval EFI_INVALID_PARAMETER The MorLock data or data size or attributes is not allowed.\r
152 @retval EFI_ACCESS_DENIED The MorLock is locked.\r
153 @retval EFI_WRITE_PROTECTED The MorLock deletion is not allowed.\r
154 @retval EFI_ALREADY_STARTED The MorLock variable is handled inside this function.\r
155 Variable driver can just return EFI_SUCCESS.\r
156**/\r
157EFI_STATUS\r
158SetVariableCheckHandlerMorLock (\r
159 IN CHAR16 *VariableName,\r
160 IN EFI_GUID *VendorGuid,\r
161 IN UINT32 Attributes,\r
162 IN UINTN DataSize,\r
163 IN VOID *Data\r
164 )\r
165{\r
166 EFI_STATUS Status;\r
167\r
168 //\r
169 // Basic Check\r
170 //\r
171 if (Attributes == 0 || DataSize == 0 || Data == NULL) {\r
e3531164
LE
172 //\r
173 // Permit deletion for passthru request, deny it otherwise.\r
174 //\r
175 return mMorLockPassThru ? EFI_SUCCESS : EFI_WRITE_PROTECTED;\r
abad83e6
JY
176 }\r
177\r
178 if ((Attributes != (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS)) ||\r
179 ((DataSize != MOR_LOCK_V1_SIZE) && (DataSize != MOR_LOCK_V2_KEY_SIZE))) {\r
180 return EFI_INVALID_PARAMETER;\r
181 }\r
182\r
183 //\r
184 // Do not check if the request is passthru.\r
185 //\r
186 if (mMorLockPassThru) {\r
187 return EFI_SUCCESS;\r
188 }\r
189\r
190 if (mMorLockState == MorLockStateUnlocked) {\r
191 //\r
192 // In Unlocked State\r
193 //\r
194 if (DataSize == MOR_LOCK_V1_SIZE) {\r
195 //\r
0a18956d 196 // V1 - lock permanently\r
abad83e6
JY
197 //\r
198 if (*(UINT8 *)Data == MOR_LOCK_DATA_UNLOCKED) {\r
199 //\r
200 // Unlock\r
201 //\r
202 Status = SetMorLockVariable (MOR_LOCK_DATA_UNLOCKED);\r
203 if (!EFI_ERROR (Status)) {\r
204 //\r
205 // return EFI_ALREADY_STARTED to skip variable set.\r
206 //\r
207 return EFI_ALREADY_STARTED;\r
208 } else {\r
209 //\r
210 // SetVar fail\r
211 //\r
212 return Status;\r
213 }\r
214 } else if (*(UINT8 *)Data == MOR_LOCK_DATA_LOCKED_WITHOUT_KEY) {\r
215 //\r
216 // Lock without key\r
217 //\r
218 Status = SetMorLockVariable (MOR_LOCK_DATA_LOCKED_WITHOUT_KEY);\r
219 if (!EFI_ERROR (Status)) {\r
220 //\r
221 // Lock success\r
222 //\r
223 mMorLockState = MorLockStateLocked;\r
224 //\r
225 // return EFI_ALREADY_STARTED to skip variable set.\r
226 //\r
227 return EFI_ALREADY_STARTED;\r
228 } else {\r
229 //\r
230 // SetVar fail\r
231 //\r
232 return Status;\r
233 }\r
234 } else {\r
235 return EFI_INVALID_PARAMETER;\r
236 }\r
237 } else if (DataSize == MOR_LOCK_V2_KEY_SIZE) {\r
238 //\r
239 // V2 lock and provision the key\r
240 //\r
241\r
242 //\r
243 // Need set here because the data value on flash is different\r
244 //\r
245 Status = SetMorLockVariable (MOR_LOCK_DATA_LOCKED_WITH_KEY);\r
246 if (EFI_ERROR(Status)) {\r
247 //\r
248 // SetVar fail, do not provision the key\r
249 //\r
250 return Status;\r
251 } else {\r
252 //\r
253 // Lock success, provision the key\r
254 //\r
255 mMorLockKeyEmpty = FALSE;\r
256 CopyMem (mMorLockKey, Data, MOR_LOCK_V2_KEY_SIZE);\r
257 mMorLockState = MorLockStateLocked;\r
258 //\r
259 // return EFI_ALREADY_STARTED to skip variable set.\r
260 //\r
261 return EFI_ALREADY_STARTED;\r
262 }\r
263 } else {\r
264 ASSERT (FALSE);\r
265 return EFI_OUT_OF_RESOURCES;\r
266 }\r
267 } else {\r
268 //\r
269 // In Locked State\r
270 //\r
271 if (mMorLockKeyEmpty || (DataSize != MOR_LOCK_V2_KEY_SIZE)) {\r
272 return EFI_ACCESS_DENIED;\r
273 }\r
274 if ((CompareMem (Data, mMorLockKey, MOR_LOCK_V2_KEY_SIZE) == 0)) {\r
275 //\r
276 // Key match - unlock\r
277 //\r
278\r
279 //\r
280 // Need set here because the data value on flash is different\r
281 //\r
282 Status = SetMorLockVariable (MOR_LOCK_DATA_UNLOCKED);\r
283 if (EFI_ERROR (Status)) {\r
284 //\r
285 // SetVar fail\r
286 //\r
287 return Status;\r
288 } else {\r
289 //\r
290 // Unlock Success\r
291 //\r
292 mMorLockState = MorLockStateUnlocked;\r
293 mMorLockKeyEmpty = TRUE;\r
294 ZeroMem (mMorLockKey, sizeof(mMorLockKey));\r
295 //\r
296 // return EFI_ALREADY_STARTED to skip variable set.\r
297 //\r
298 return EFI_ALREADY_STARTED;\r
299 }\r
300 } else {\r
301 //\r
302 // Key mismatch - Prevent Dictionary Attack\r
303 //\r
304 mMorLockState = MorLockStateLocked;\r
305 mMorLockKeyEmpty = TRUE;\r
306 ZeroMem (mMorLockKey, sizeof(mMorLockKey));\r
307 return EFI_ACCESS_DENIED;\r
308 }\r
309 }\r
310}\r
311\r
312/**\r
313 This service is an MOR/MorLock checker handler for the SetVariable().\r
314\r
03877377
LE
315 @param[in] VariableName the name of the vendor's variable, as a\r
316 Null-Terminated Unicode String\r
317 @param[in] VendorGuid Unify identifier for vendor.\r
318 @param[in] Attributes Attributes bitmask to set for the variable.\r
319 @param[in] DataSize The size in bytes of Data-Buffer.\r
320 @param[in] Data Point to the content of the variable.\r
321\r
322 @retval EFI_SUCCESS The MOR/MorLock check pass, and Variable\r
323 driver can store the variable data.\r
324 @retval EFI_INVALID_PARAMETER The MOR/MorLock data or data size or\r
325 attributes is not allowed for MOR variable.\r
abad83e6 326 @retval EFI_ACCESS_DENIED The MOR/MorLock is locked.\r
03877377
LE
327 @retval EFI_ALREADY_STARTED The MorLock variable is handled inside this\r
328 function. Variable driver can just return\r
329 EFI_SUCCESS.\r
abad83e6
JY
330**/\r
331EFI_STATUS\r
332SetVariableCheckHandlerMor (\r
333 IN CHAR16 *VariableName,\r
334 IN EFI_GUID *VendorGuid,\r
335 IN UINT32 Attributes,\r
336 IN UINTN DataSize,\r
337 IN VOID *Data\r
338 )\r
339{\r
340 //\r
341 // do not handle non-MOR variable\r
342 //\r
343 if (!IsAnyMorVariable (VariableName, VendorGuid)) {\r
344 return EFI_SUCCESS;\r
345 }\r
346\r
347 //\r
348 // MorLock variable\r
349 //\r
350 if (IsMorLockVariable (VariableName, VendorGuid)) {\r
351 return SetVariableCheckHandlerMorLock (\r
352 VariableName,\r
353 VendorGuid,\r
354 Attributes,\r
355 DataSize,\r
356 Data\r
357 );\r
358 }\r
359\r
360 //\r
361 // Mor Variable\r
362 //\r
363\r
364 //\r
365 // Basic Check\r
366 //\r
367 if ((Attributes != (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS)) ||\r
368 (DataSize != sizeof(UINT8)) ||\r
369 (Data == NULL)) {\r
370 return EFI_INVALID_PARAMETER;\r
371 }\r
372 if (mMorLockState == MorLockStateLocked) {\r
373 //\r
374 // If lock, deny access\r
375 //\r
376 return EFI_ACCESS_DENIED;\r
377 }\r
378 //\r
379 // grant access\r
380 //\r
381 return EFI_SUCCESS;\r
382}\r
383\r
384/**\r
03877377 385 Initialization for MOR Control Lock.\r
abad83e6 386\r
03877377 387 @retval EFI_SUCCESS MorLock initialization success.\r
abad83e6
JY
388 @return Others Some error occurs.\r
389**/\r
390EFI_STATUS\r
391MorLockInit (\r
392 VOID\r
393 )\r
394{\r
395 //\r
396 // Set variable to report capability to OS\r
397 //\r
398 return SetMorLockVariable (0);\r
399}\r
f1304280
LE
400\r
401/**\r
402 Delayed initialization for MOR Control Lock at EndOfDxe.\r
403\r
404 This function performs any operations queued by MorLockInit().\r
405**/\r
406VOID\r
407MorLockInitAtEndOfDxe (\r
408 VOID\r
409 )\r
410{\r
411 //\r
412 // Do nothing.\r
413 //\r
414}\r