]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.c
SecurityPkg: Convert all .uni files to utf-8
[mirror_edk2.git] / SecurityPkg / Library / SmmTcg2PhysicalPresenceLib / SmmTcg2PhysicalPresenceLib.c
CommitLineData
1abfa4ce
JY
1/** @file\r
2 Handle TPM 2.0 physical presence requests from OS.\r
3 \r
4 This library will handle TPM 2.0 physical presence request from OS.\r
5\r
6 Caution: This module requires additional review when modified.\r
7 This driver will have external input - variable.\r
8 This external input must be validated carefully to avoid security issue.\r
9\r
10 Tcg2PhysicalPresenceLibSubmitRequestToPreOSFunction() and Tcg2PhysicalPresenceLibGetUserConfirmationStatusFunction()\r
11 will receive untrusted input and do validation.\r
12\r
13Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>\r
14This program and the accompanying materials \r
15are licensed and made available under the terms and conditions of the BSD License \r
16which accompanies this distribution. The full text of the license may be found at \r
17http://opensource.org/licenses/bsd-license.php\r
18\r
19THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
20WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
21\r
22**/\r
23\r
24#include <PiSmm.h>\r
25\r
26#include <Guid/Tcg2PhysicalPresenceData.h>\r
27\r
28#include <Protocol/SmmVariable.h>\r
29\r
30#include <Library/DebugLib.h>\r
31#include <Library/Tcg2PpVendorLib.h>\r
32#include <Library/SmmServicesTableLib.h>\r
33\r
34EFI_SMM_VARIABLE_PROTOCOL *mTcg2PpSmmVariable;\r
35\r
36/**\r
37 The handler for TPM physical presence function:\r
38 Return TPM Operation Response to OS Environment.\r
39\r
40 This API should be invoked in OS runtime phase to interface with ACPI method.\r
41\r
42 @param[out] MostRecentRequest Most recent operation request.\r
43 @param[out] Response Response to the most recent operation request.\r
44\r
45 @return Return Code for Return TPM Operation Response to OS Environment.\r
46**/\r
47UINT32\r
48EFIAPI\r
49Tcg2PhysicalPresenceLibReturnOperationResponseToOsFunction (\r
50 OUT UINT32 *MostRecentRequest,\r
51 OUT UINT32 *Response\r
52 )\r
53{\r
54 EFI_STATUS Status;\r
55 UINTN DataSize;\r
56 EFI_TCG2_PHYSICAL_PRESENCE PpData;\r
57\r
58 DEBUG ((EFI_D_INFO, "[TPM2] ReturnOperationResponseToOsFunction\n"));\r
59\r
60 //\r
61 // Get the Physical Presence variable\r
62 //\r
63 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE);\r
64 Status = mTcg2PpSmmVariable->SmmGetVariable (\r
65 TCG2_PHYSICAL_PRESENCE_VARIABLE,\r
66 &gEfiTcg2PhysicalPresenceGuid,\r
67 NULL,\r
68 &DataSize,\r
69 &PpData\r
70 );\r
71 if (EFI_ERROR (Status)) {\r
72 *MostRecentRequest = 0;\r
73 *Response = 0;\r
74 DEBUG ((EFI_D_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
75 return TCG_PP_RETURN_TPM_OPERATION_RESPONSE_FAILURE;\r
76 }\r
77\r
78 *MostRecentRequest = PpData.LastPPRequest;\r
79 *Response = PpData.PPResponse;\r
80\r
81 return TCG_PP_RETURN_TPM_OPERATION_RESPONSE_SUCCESS;\r
82}\r
83\r
84/**\r
85 The handler for TPM physical presence function:\r
86 Submit TPM Operation Request to Pre-OS Environment and\r
87 Submit TPM Operation Request to Pre-OS Environment 2.\r
88\r
89 This API should be invoked in OS runtime phase to interface with ACPI method.\r
90\r
91 Caution: This function may receive untrusted input.\r
92 \r
93 @param[in] OperationRequest TPM physical presence operation request.\r
94 @param[in] RequestParameter TPM physical presence operation request parameter.\r
95\r
96 @return Return Code for Submit TPM Operation Request to Pre-OS Environment and\r
97 Submit TPM Operation Request to Pre-OS Environment 2.\r
98**/\r
99UINT32\r
100EFIAPI\r
101Tcg2PhysicalPresenceLibSubmitRequestToPreOSFunction (\r
102 IN UINT32 OperationRequest,\r
103 IN UINT32 RequestParameter\r
104 )\r
105{\r
106 EFI_STATUS Status;\r
107 UINTN DataSize;\r
108 EFI_TCG2_PHYSICAL_PRESENCE PpData;\r
109 EFI_TCG2_PHYSICAL_PRESENCE_FLAGS Flags;\r
110\r
111 DEBUG ((EFI_D_INFO, "[TPM2] SubmitRequestToPreOSFunction, Request = %x, %x\n", OperationRequest, RequestParameter));\r
112\r
113 //\r
114 // Get the Physical Presence variable\r
115 //\r
116 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE);\r
117 Status = mTcg2PpSmmVariable->SmmGetVariable (\r
118 TCG2_PHYSICAL_PRESENCE_VARIABLE,\r
119 &gEfiTcg2PhysicalPresenceGuid,\r
120 NULL,\r
121 &DataSize,\r
122 &PpData\r
123 );\r
124 if (EFI_ERROR (Status)) {\r
125 DEBUG ((EFI_D_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
126 return TCG_PP_SUBMIT_REQUEST_TO_PREOS_GENERAL_FAILURE;\r
127 }\r
128\r
129 if ((OperationRequest > TCG2_PHYSICAL_PRESENCE_NO_ACTION_MAX) &&\r
130 (OperationRequest < TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION) ) {\r
131 //\r
132 // This command requires UI to prompt user for Auth data.\r
133 //\r
134 return TCG_PP_SUBMIT_REQUEST_TO_PREOS_NOT_IMPLEMENTED;\r
135 }\r
136\r
137 if (PpData.PPRequest != OperationRequest) {\r
138 PpData.PPRequest = (UINT8)OperationRequest;\r
139 PpData.PPRequestParameter = RequestParameter;\r
140 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE);\r
141 Status = mTcg2PpSmmVariable->SmmSetVariable (\r
142 TCG2_PHYSICAL_PRESENCE_VARIABLE,\r
143 &gEfiTcg2PhysicalPresenceGuid,\r
144 EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
145 DataSize,\r
146 &PpData\r
147 );\r
148 }\r
149\r
150 if (EFI_ERROR (Status)) { \r
151 DEBUG ((EFI_D_ERROR, "[TPM2] Set PP variable failure! Status = %r\n", Status));\r
152 return TCG_PP_SUBMIT_REQUEST_TO_PREOS_GENERAL_FAILURE;\r
153 }\r
154\r
155 if (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION) {\r
156 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE_FLAGS);\r
157 Status = mTcg2PpSmmVariable->SmmGetVariable (\r
158 TCG2_PHYSICAL_PRESENCE_FLAGS_VARIABLE,\r
159 &gEfiTcg2PhysicalPresenceGuid,\r
160 NULL,\r
161 &DataSize,\r
162 &Flags\r
163 );\r
164 if (EFI_ERROR (Status)) {\r
165 Flags.PPFlags = TCG2_BIOS_TPM_MANAGEMENT_FLAG_DEFAULT;\r
166 }\r
167 return Tcg2PpVendorLibSubmitRequestToPreOSFunction (OperationRequest, Flags.PPFlags, RequestParameter);\r
168 }\r
169\r
170 return TCG_PP_SUBMIT_REQUEST_TO_PREOS_SUCCESS;\r
171}\r
172\r
173/**\r
174 The handler for TPM physical presence function:\r
175 Get User Confirmation Status for Operation.\r
176\r
177 This API should be invoked in OS runtime phase to interface with ACPI method.\r
178\r
179 Caution: This function may receive untrusted input.\r
180 \r
181 @param[in] OperationRequest TPM physical presence operation request.\r
182\r
183 @return Return Code for Get User Confirmation Status for Operation.\r
184**/\r
185UINT32\r
186EFIAPI\r
187Tcg2PhysicalPresenceLibGetUserConfirmationStatusFunction (\r
188 IN UINT32 OperationRequest\r
189 )\r
190{\r
191 EFI_STATUS Status;\r
192 UINTN DataSize;\r
193 EFI_TCG2_PHYSICAL_PRESENCE PpData;\r
194 EFI_TCG2_PHYSICAL_PRESENCE_FLAGS Flags;\r
195 BOOLEAN RequestConfirmed;\r
196 \r
197 DEBUG ((EFI_D_INFO, "[TPM2] GetUserConfirmationStatusFunction, Request = %x\n", OperationRequest));\r
198\r
199 //\r
200 // Get the Physical Presence variable\r
201 //\r
202 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE);\r
203 Status = mTcg2PpSmmVariable->SmmGetVariable (\r
204 TCG2_PHYSICAL_PRESENCE_VARIABLE,\r
205 &gEfiTcg2PhysicalPresenceGuid,\r
206 NULL,\r
207 &DataSize,\r
208 &PpData\r
209 );\r
210 if (EFI_ERROR (Status)) {\r
211 DEBUG ((EFI_D_ERROR, "[TPM2] Get PP variable failure! Status = %r\n", Status));\r
212 return TCG_PP_GET_USER_CONFIRMATION_BLOCKED_BY_BIOS_CONFIGURATION;\r
213 }\r
214 //\r
215 // Get the Physical Presence flags\r
216 //\r
217 DataSize = sizeof (EFI_TCG2_PHYSICAL_PRESENCE_FLAGS);\r
218 Status = mTcg2PpSmmVariable->SmmGetVariable (\r
219 TCG2_PHYSICAL_PRESENCE_FLAGS_VARIABLE,\r
220 &gEfiTcg2PhysicalPresenceGuid,\r
221 NULL,\r
222 &DataSize,\r
223 &Flags\r
224 );\r
225 if (EFI_ERROR (Status)) {\r
226 DEBUG ((EFI_D_ERROR, "[TPM2] Get PP flags failure! Status = %r\n", Status));\r
227 return TCG_PP_GET_USER_CONFIRMATION_BLOCKED_BY_BIOS_CONFIGURATION;\r
228 }\r
229\r
230 RequestConfirmed = FALSE;\r
231\r
232 switch (OperationRequest) {\r
233 case TCG2_PHYSICAL_PRESENCE_CLEAR:\r
234 case TCG2_PHYSICAL_PRESENCE_ENABLE_CLEAR:\r
235 case TCG2_PHYSICAL_PRESENCE_ENABLE_CLEAR_2:\r
236 case TCG2_PHYSICAL_PRESENCE_ENABLE_CLEAR_3:\r
237 if ((Flags.PPFlags & TCG2_BIOS_TPM_MANAGEMENT_FLAG_PP_REQUIRED_FOR_CLEAR) == 0) {\r
238 RequestConfirmed = TRUE;\r
239 }\r
240 break;\r
241\r
242 case TCG2_PHYSICAL_PRESENCE_SET_PP_REQUIRED_FOR_CLEAR_TRUE:\r
243 RequestConfirmed = TRUE;\r
244 break;\r
245\r
246 case TCG2_PHYSICAL_PRESENCE_SET_PP_REQUIRED_FOR_CLEAR_FALSE:\r
247 break;\r
248\r
249 case TCG2_PHYSICAL_PRESENCE_SET_PCR_BANKS:\r
250 if ((Flags.PPFlags & TCG2_BIOS_TPM_MANAGEMENT_FLAG_PP_REQUIRED_FOR_CHANGE_PCRS) == 0) {\r
251 RequestConfirmed = TRUE;\r
252 }\r
253 break;\r
254\r
255 case TCG2_PHYSICAL_PRESENCE_CHANGE_EPS:\r
256 if ((Flags.PPFlags & TCG2_BIOS_TPM_MANAGEMENT_FLAG_PP_REQUIRED_FOR_CHANGE_EPS) == 0) {\r
257 RequestConfirmed = TRUE;\r
258 }\r
259 break;\r
260 \r
261 case TCG2_PHYSICAL_PRESENCE_LOG_ALL_DIGESTS:\r
262 RequestConfirmed = TRUE;\r
263 break;\r
264\r
265 default:\r
266 if (OperationRequest <= TCG2_PHYSICAL_PRESENCE_NO_ACTION_MAX) {\r
267 RequestConfirmed = TRUE;\r
268 } else {\r
269 if (OperationRequest < TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION) {\r
270 return TCG_PP_GET_USER_CONFIRMATION_NOT_IMPLEMENTED;\r
271 }\r
272 }\r
273 break;\r
274 }\r
275\r
276 if (OperationRequest >= TCG2_PHYSICAL_PRESENCE_VENDOR_SPECIFIC_OPERATION) {\r
277 return Tcg2PpVendorLibGetUserConfirmationStatusFunction (OperationRequest, Flags.PPFlags);\r
278 }\r
279\r
280 if (RequestConfirmed) {\r
281 return TCG_PP_GET_USER_CONFIRMATION_ALLOWED_AND_PPUSER_NOT_REQUIRED;\r
282 } else {\r
283 return TCG_PP_GET_USER_CONFIRMATION_ALLOWED_AND_PPUSER_REQUIRED;\r
284 } \r
285}\r
286\r
287/**\r
288 The constructor function register UNI strings into imageHandle.\r
289 \r
290 It will ASSERT() if that operation fails and it will always return EFI_SUCCESS. \r
291\r
292 @param ImageHandle The firmware allocated handle for the EFI image.\r
293 @param SystemTable A pointer to the EFI System Table.\r
294 \r
295 @retval EFI_SUCCESS The constructor successfully added string package.\r
296 @retval Other value The constructor can't add string package.\r
297**/\r
298EFI_STATUS\r
299EFIAPI\r
300Tcg2PhysicalPresenceLibConstructor (\r
301 IN EFI_HANDLE ImageHandle,\r
302 IN EFI_SYSTEM_TABLE *SystemTable\r
303 )\r
304{\r
305 EFI_STATUS Status;\r
306\r
307 //\r
308 // Locate SmmVariableProtocol.\r
309 //\r
310 Status = gSmst->SmmLocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, (VOID**)&mTcg2PpSmmVariable);\r
311 ASSERT_EFI_ERROR (Status);\r
312\r
313 return EFI_SUCCESS;\r
314}\r