1. Use the check IsAddressValid() to prevent SMM communication buffer overflow in SmmVariable, FtwSmm, FpdtSmm, SmmCorePerformance and SmmBaseHelper, and add check to prevent InfoSize overflows in SmmVariableHandler.
2. Refine the debug message. 3. Add check to make sure the input VariableName is A Null-terminated string. 4. Use local variable to hold StrSize (VariableName) to avoid duplicated StrSize calculation. Signed-off-by: Star Zeng <star.zeng@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com> Reviewed-by: Chao Zhang <chao.b.zhang@intel.com> git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@14317 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
@ -11,7 +11,7 @@
|
|||||||
|
|
||||||
SmmHandlerEntry() will receive untrusted input and do validation.
|
SmmHandlerEntry() will receive untrusted input and do validation.
|
||||||
|
|
||||||
Copyright (c) 2009 - 2012, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2009 - 2013, Intel Corporation. All rights reserved.<BR>
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions of the BSD License
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
which accompanies this distribution. The full text of the license may be found at
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
@ -732,6 +732,33 @@ IsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
IsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Thunk service of EFI_SMM_BASE_PROTOCOL.Register().
|
Thunk service of EFI_SMM_BASE_PROTOCOL.Register().
|
||||||
|
|
||||||
@ -1068,7 +1095,7 @@ SmmHandlerEntry (
|
|||||||
ASSERT (CommBufferSize != NULL);
|
ASSERT (CommBufferSize != NULL);
|
||||||
|
|
||||||
if (*CommBufferSize == sizeof (SMMBASE_FUNCTION_DATA) &&
|
if (*CommBufferSize == sizeof (SMMBASE_FUNCTION_DATA) &&
|
||||||
!IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
IsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
FunctionData = (SMMBASE_FUNCTION_DATA *)CommBuffer;
|
FunctionData = (SMMBASE_FUNCTION_DATA *)CommBuffer;
|
||||||
|
|
||||||
switch (FunctionData->Function) {
|
switch (FunctionData->Function) {
|
||||||
|
@ -16,7 +16,7 @@
|
|||||||
|
|
||||||
SmmPerformanceHandlerEx(), SmmPerformanceHandler() will receive untrusted input and do basic validation.
|
SmmPerformanceHandlerEx(), SmmPerformanceHandler() will receive untrusted input and do basic validation.
|
||||||
|
|
||||||
Copyright (c) 2011 - 2012, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2011 - 2013, Intel Corporation. All rights reserved.<BR>
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions of the BSD License
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
which accompanies this distribution. The full text of the license may be found at
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
@ -477,6 +477,33 @@ IsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
IsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Communication service SMI Handler entry.
|
Communication service SMI Handler entry.
|
||||||
|
|
||||||
@ -527,8 +554,8 @@ SmmPerformanceHandlerEx (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!IsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communcation data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communcation data buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -551,8 +578,8 @@ SmmPerformanceHandlerEx (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
DataSize = SmmPerfCommData->NumberOfEntries * sizeof(GAUGE_DATA_ENTRY_EX);
|
DataSize = SmmPerfCommData->NumberOfEntries * sizeof(GAUGE_DATA_ENTRY_EX);
|
||||||
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)SmmPerfCommData->GaugeDataEx, DataSize)) {
|
if (!IsAddressValid ((UINTN)SmmPerfCommData->GaugeDataEx, DataSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM Performance Data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM Performance Data buffer in SMRAM or overflow!\n"));
|
||||||
Status = EFI_ACCESS_DENIED;
|
Status = EFI_ACCESS_DENIED;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@ -628,8 +655,8 @@ SmmPerformanceHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!IsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communcation data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communcation data buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -652,8 +679,8 @@ SmmPerformanceHandler (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
DataSize = SmmPerfCommData->NumberOfEntries * sizeof(GAUGE_DATA_ENTRY);
|
DataSize = SmmPerfCommData->NumberOfEntries * sizeof(GAUGE_DATA_ENTRY);
|
||||||
if (IsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)SmmPerfCommData->GaugeData, DataSize)) {
|
if (!IsAddressValid ((UINTN)SmmPerfCommData->GaugeData, DataSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM Performance Data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM Performance Data buffer in SMRAM or overflow!\n"));
|
||||||
Status = EFI_ACCESS_DENIED;
|
Status = EFI_ACCESS_DENIED;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
|
|
||||||
FpdtSmiHandler() will receive untrusted input and do basic validation.
|
FpdtSmiHandler() will receive untrusted input and do basic validation.
|
||||||
|
|
||||||
Copyright (c) 2011 - 2012, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2011 - 2013, Intel Corporation. All rights reserved.<BR>
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions of the BSD License
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
which accompanies this distribution. The full text of the license may be found at
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
@ -204,6 +204,33 @@ InternalIsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
InternalIsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Communication service SMI Handler entry.
|
Communication service SMI Handler entry.
|
||||||
|
|
||||||
@ -251,8 +278,8 @@ FpdtSmiHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!InternalIsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication data buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -275,8 +302,8 @@ FpdtSmiHandler (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
SmmCommData->BootRecordSize = mBootRecordSize;
|
SmmCommData->BootRecordSize = mBootRecordSize;
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)SmmCommData->BootRecordData, mBootRecordSize)) {
|
if (!InternalIsAddressValid ((UINTN)SmmCommData->BootRecordData, mBootRecordSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM Data buffer is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM Data buffer in SMRAM or overflow!\n"));
|
||||||
Status = EFI_ACCESS_DENIED;
|
Status = EFI_ACCESS_DENIED;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -99,6 +99,32 @@ InternalIsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
InternalIsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Retrive the SMM FVB protocol interface by HANDLE.
|
Retrive the SMM FVB protocol interface by HANDLE.
|
||||||
@ -356,8 +382,8 @@ SmmFaultTolerantWriteHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!InternalIsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication buffer size is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
SmmLockBoxHandler(), SmmLockBoxRestore(), SmmLockBoxUpdate(), SmmLockBoxSave()
|
SmmLockBoxHandler(), SmmLockBoxRestore(), SmmLockBoxUpdate(), SmmLockBoxSave()
|
||||||
will receive untrusted input and do basic validation.
|
will receive untrusted input and do basic validation.
|
||||||
|
|
||||||
Copyright (c) 2010 - 2012, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2010 - 2013, Intel Corporation. All rights reserved.<BR>
|
||||||
|
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions
|
are licensed and made available under the terms and conditions
|
||||||
@ -125,7 +125,7 @@ SmmLockBoxSave (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
if (!IsAddressValid ((UINTN)LockBoxParameterSave->Buffer, (UINTN)LockBoxParameterSave->Length)) {
|
if (!IsAddressValid ((UINTN)LockBoxParameterSave->Buffer, (UINTN)LockBoxParameterSave->Length)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SmmLockBox Save address in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SmmLockBox Save address in SMRAM or buffer overflow!\n"));
|
||||||
LockBoxParameterSave->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
LockBoxParameterSave->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
@ -203,7 +203,7 @@ SmmLockBoxUpdate (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
if (!IsAddressValid ((UINTN)LockBoxParameterUpdate->Buffer, (UINTN)LockBoxParameterUpdate->Length)) {
|
if (!IsAddressValid ((UINTN)LockBoxParameterUpdate->Buffer, (UINTN)LockBoxParameterUpdate->Length)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SmmLockBox Update address in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SmmLockBox Update address in SMRAM or buffer overflow!\n"));
|
||||||
LockBoxParameterUpdate->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
LockBoxParameterUpdate->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
@ -241,7 +241,7 @@ SmmLockBoxRestore (
|
|||||||
// Sanity check
|
// Sanity check
|
||||||
//
|
//
|
||||||
if (!IsAddressValid ((UINTN)LockBoxParameterRestore->Buffer, (UINTN)LockBoxParameterRestore->Length)) {
|
if (!IsAddressValid ((UINTN)LockBoxParameterRestore->Buffer, (UINTN)LockBoxParameterRestore->Length)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SmmLockBox Restore address in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SmmLockBox Restore address in SMRAM or buffer overflow!\n"));
|
||||||
LockBoxParameterRestore->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
LockBoxParameterRestore->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
@ -320,7 +320,7 @@ SmmLockBoxHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
if (!IsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
if (!IsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SmmLockBox Command Buffer in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SmmLockBox Command Buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -93,6 +93,32 @@ InternalIsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
InternalIsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Initializes a basic mutual exclusion lock.
|
Initializes a basic mutual exclusion lock.
|
||||||
@ -418,6 +444,7 @@ SmmVariableHandler (
|
|||||||
SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *QueryVariableInfo;
|
SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *QueryVariableInfo;
|
||||||
VARIABLE_INFO_ENTRY *VariableInfo;
|
VARIABLE_INFO_ENTRY *VariableInfo;
|
||||||
UINTN InfoSize;
|
UINTN InfoSize;
|
||||||
|
UINTN NameBufferSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
// If input is invalid, stop processing this SMI
|
// If input is invalid, stop processing this SMI
|
||||||
@ -430,8 +457,8 @@ SmmVariableHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!InternalIsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication buffer size is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -439,6 +466,14 @@ SmmVariableHandler (
|
|||||||
switch (SmmVariableFunctionHeader->Function) {
|
switch (SmmVariableFunctionHeader->Function) {
|
||||||
case SMM_VARIABLE_FUNCTION_GET_VARIABLE:
|
case SMM_VARIABLE_FUNCTION_GET_VARIABLE:
|
||||||
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
||||||
|
if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||
|
||||||
|
((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
||||||
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
||||||
|
|
||||||
@ -451,6 +486,14 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceGetVariable (
|
Status = VariableServiceGetVariable (
|
||||||
SmmVariableHeader->Name,
|
SmmVariableHeader->Name,
|
||||||
&SmmVariableHeader->Guid,
|
&SmmVariableHeader->Guid,
|
||||||
@ -462,6 +505,13 @@ SmmVariableHandler (
|
|||||||
|
|
||||||
case SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME:
|
case SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME:
|
||||||
GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *) SmmVariableFunctionHeader->Data;
|
GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *) SmmVariableFunctionHeader->Data;
|
||||||
|
if ((UINTN)(~0) - GetNextVariableName->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
@ -473,6 +523,15 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NameBufferSize = *CommBufferSize - SMM_VARIABLE_COMMUNICATE_HEADER_SIZE - OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
||||||
|
if (NameBufferSize < sizeof (CHAR16) || GetNextVariableName->Name[NameBufferSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure input VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceGetNextVariableName (
|
Status = VariableServiceGetNextVariableName (
|
||||||
&GetNextVariableName->NameSize,
|
&GetNextVariableName->NameSize,
|
||||||
GetNextVariableName->Name,
|
GetNextVariableName->Name,
|
||||||
@ -482,6 +541,14 @@ SmmVariableHandler (
|
|||||||
|
|
||||||
case SMM_VARIABLE_FUNCTION_SET_VARIABLE:
|
case SMM_VARIABLE_FUNCTION_SET_VARIABLE:
|
||||||
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
||||||
|
if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||
|
||||||
|
((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
||||||
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
||||||
|
|
||||||
@ -495,6 +562,14 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceSetVariable (
|
Status = VariableServiceSetVariable (
|
||||||
SmmVariableHeader->Name,
|
SmmVariableHeader->Name,
|
||||||
&SmmVariableHeader->Guid,
|
&SmmVariableHeader->Guid,
|
||||||
@ -549,7 +624,7 @@ SmmVariableHandler (
|
|||||||
//
|
//
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBufferSize, sizeof(UINTN))) {
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBufferSize, sizeof(UINTN))) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication buffer size is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication buffer in SMRAM!\n"));
|
||||||
Status = EFI_ACCESS_DENIED;
|
Status = EFI_ACCESS_DENIED;
|
||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
@ -191,6 +191,7 @@ RuntimeServiceGetVariable (
|
|||||||
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
||||||
UINTN SmmCommBufPayloadSize;
|
UINTN SmmCommBufPayloadSize;
|
||||||
UINTN TempDataSize;
|
UINTN TempDataSize;
|
||||||
|
UINTN VariableNameSize;
|
||||||
|
|
||||||
if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
|
if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
@ -205,11 +206,12 @@ RuntimeServiceGetVariable (
|
|||||||
//
|
//
|
||||||
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
||||||
TempDataSize = *DataSize;
|
TempDataSize = *DataSize;
|
||||||
|
VariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
//
|
//
|
||||||
// If VariableName exceeds SMM payload limit. Return failure
|
// If VariableName exceeds SMM payload limit. Return failure
|
||||||
//
|
//
|
||||||
if (StrSize (VariableName) > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {
|
if (VariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -219,13 +221,13 @@ RuntimeServiceGetVariable (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
if (TempDataSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - StrSize (VariableName)) {
|
if (TempDataSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - VariableNameSize) {
|
||||||
//
|
//
|
||||||
// If output data buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
// If output data buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
||||||
//
|
//
|
||||||
TempDataSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - StrSize (VariableName);
|
TempDataSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - VariableNameSize;
|
||||||
}
|
}
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + TempDataSize;
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + VariableNameSize + TempDataSize;
|
||||||
|
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);
|
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
@ -235,7 +237,7 @@ RuntimeServiceGetVariable (
|
|||||||
|
|
||||||
CopyGuid (&SmmVariableHeader->Guid, VendorGuid);
|
CopyGuid (&SmmVariableHeader->Guid, VendorGuid);
|
||||||
SmmVariableHeader->DataSize = TempDataSize;
|
SmmVariableHeader->DataSize = TempDataSize;
|
||||||
SmmVariableHeader->NameSize = StrSize (VariableName);
|
SmmVariableHeader->NameSize = VariableNameSize;
|
||||||
if (Attributes == NULL) {
|
if (Attributes == NULL) {
|
||||||
SmmVariableHeader->Attributes = 0;
|
SmmVariableHeader->Attributes = 0;
|
||||||
} else {
|
} else {
|
||||||
@ -299,6 +301,8 @@ RuntimeServiceGetNextVariableName (
|
|||||||
UINTN PayloadSize;
|
UINTN PayloadSize;
|
||||||
SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;
|
SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;
|
||||||
UINTN SmmCommBufPayloadSize;
|
UINTN SmmCommBufPayloadSize;
|
||||||
|
UINTN OutVariableNameSize;
|
||||||
|
UINTN InVariableNameSize;
|
||||||
|
|
||||||
if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
|
if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
@ -308,11 +312,13 @@ RuntimeServiceGetNextVariableName (
|
|||||||
// SMM Communication Buffer max payload size
|
// SMM Communication Buffer max payload size
|
||||||
//
|
//
|
||||||
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
||||||
|
OutVariableNameSize = *VariableNameSize;
|
||||||
|
InVariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
//
|
//
|
||||||
// If input string exceeds SMM payload limit. Return failure
|
// If input string exceeds SMM payload limit. Return failure
|
||||||
//
|
//
|
||||||
if (StrSize (VariableName) > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
if (InVariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -322,16 +328,16 @@ RuntimeServiceGetNextVariableName (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
if (*VariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
if (OutVariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
//
|
//
|
||||||
// If output buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
// If output buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
||||||
//
|
//
|
||||||
*VariableNameSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
OutVariableNameSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
||||||
}
|
}
|
||||||
//
|
//
|
||||||
// Payload should be Guid + NameSize + MAX of Input & Output buffer
|
// Payload should be Guid + NameSize + MAX of Input & Output buffer
|
||||||
//
|
//
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + MAX (*VariableNameSize, StrSize (VariableName));
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + MAX (OutVariableNameSize, InVariableNameSize);
|
||||||
|
|
||||||
|
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);
|
Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);
|
||||||
@ -343,13 +349,16 @@ RuntimeServiceGetNextVariableName (
|
|||||||
//
|
//
|
||||||
// SMM comm buffer->NameSize is buffer size for return string
|
// SMM comm buffer->NameSize is buffer size for return string
|
||||||
//
|
//
|
||||||
SmmGetNextVariableName->NameSize = *VariableNameSize;
|
SmmGetNextVariableName->NameSize = OutVariableNameSize;
|
||||||
|
|
||||||
CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);
|
CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);
|
||||||
//
|
//
|
||||||
// Copy whole string
|
// Copy whole string
|
||||||
//
|
//
|
||||||
CopyMem (SmmGetNextVariableName->Name, VariableName, StrSize (VariableName));
|
CopyMem (SmmGetNextVariableName->Name, VariableName, InVariableNameSize);
|
||||||
|
if (OutVariableNameSize > InVariableNameSize) {
|
||||||
|
ZeroMem ((UINT8 *) SmmGetNextVariableName->Name + InVariableNameSize, OutVariableNameSize - InVariableNameSize);
|
||||||
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
// Send data to SMM
|
// Send data to SMM
|
||||||
@ -359,7 +368,13 @@ RuntimeServiceGetNextVariableName (
|
|||||||
//
|
//
|
||||||
// Get data from SMM.
|
// Get data from SMM.
|
||||||
//
|
//
|
||||||
*VariableNameSize = SmmGetNextVariableName->NameSize;
|
if (Status == EFI_SUCCESS || Status == EFI_BUFFER_TOO_SMALL) {
|
||||||
|
//
|
||||||
|
// SMM CommBuffer NameSize can be a trimed value
|
||||||
|
// Only update VariableNameSize when needed
|
||||||
|
//
|
||||||
|
*VariableNameSize = SmmGetNextVariableName->NameSize;
|
||||||
|
}
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto Done;
|
goto Done;
|
||||||
}
|
}
|
||||||
@ -402,6 +417,7 @@ RuntimeServiceSetVariable (
|
|||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
UINTN PayloadSize;
|
UINTN PayloadSize;
|
||||||
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
||||||
|
UINTN VariableNameSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
// Check input parameters.
|
// Check input parameters.
|
||||||
@ -423,8 +439,9 @@ RuntimeServiceSetVariable (
|
|||||||
//
|
//
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
VariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
if ((UINTN)(~0) - StrSize (VariableName) < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + DataSize) {
|
if ((UINTN)(~0) - VariableNameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + DataSize) {
|
||||||
//
|
//
|
||||||
// Prevent PayloadSize overflow
|
// Prevent PayloadSize overflow
|
||||||
//
|
//
|
||||||
@ -437,7 +454,7 @@ RuntimeServiceSetVariable (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + DataSize;
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + VariableNameSize + DataSize;
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);
|
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto Done;
|
goto Done;
|
||||||
@ -446,7 +463,7 @@ RuntimeServiceSetVariable (
|
|||||||
|
|
||||||
CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);
|
CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);
|
||||||
SmmVariableHeader->DataSize = DataSize;
|
SmmVariableHeader->DataSize = DataSize;
|
||||||
SmmVariableHeader->NameSize = StrSize (VariableName);
|
SmmVariableHeader->NameSize = VariableNameSize;
|
||||||
SmmVariableHeader->Attributes = Attributes;
|
SmmVariableHeader->Attributes = Attributes;
|
||||||
CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);
|
CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);
|
||||||
CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);
|
CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);
|
||||||
|
@ -93,6 +93,32 @@ InternalIsAddressInSmram (
|
|||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function check if the address refered by Buffer and Length is valid.
|
||||||
|
|
||||||
|
@param Buffer the buffer address to be checked.
|
||||||
|
@param Length the buffer length to be checked.
|
||||||
|
|
||||||
|
@retval TRUE this address is valid.
|
||||||
|
@retval FALSE this address is NOT valid.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
InternalIsAddressValid (
|
||||||
|
IN UINTN Buffer,
|
||||||
|
IN UINTN Length
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (Buffer > (MAX_ADDRESS - Length)) {
|
||||||
|
//
|
||||||
|
// Overflow happen
|
||||||
|
//
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)Buffer, (UINT64)Length)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Initializes a basic mutual exclusion lock.
|
Initializes a basic mutual exclusion lock.
|
||||||
@ -423,6 +449,7 @@ SmmVariableHandler (
|
|||||||
SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *QueryVariableInfo;
|
SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *QueryVariableInfo;
|
||||||
VARIABLE_INFO_ENTRY *VariableInfo;
|
VARIABLE_INFO_ENTRY *VariableInfo;
|
||||||
UINTN InfoSize;
|
UINTN InfoSize;
|
||||||
|
UINTN NameBufferSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
// If input is invalid, stop processing this SMI
|
// If input is invalid, stop processing this SMI
|
||||||
@ -435,8 +462,8 @@ SmmVariableHandler (
|
|||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBuffer, *CommBufferSize)) {
|
if (!InternalIsAddressValid ((UINTN)CommBuffer, *CommBufferSize)) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication buffer size is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication buffer in SMRAM or overflow!\n"));
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -445,6 +472,14 @@ SmmVariableHandler (
|
|||||||
switch (SmmVariableFunctionHeader->Function) {
|
switch (SmmVariableFunctionHeader->Function) {
|
||||||
case SMM_VARIABLE_FUNCTION_GET_VARIABLE:
|
case SMM_VARIABLE_FUNCTION_GET_VARIABLE:
|
||||||
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
||||||
|
if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||
|
||||||
|
((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
||||||
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
||||||
|
|
||||||
@ -457,6 +492,14 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceGetVariable (
|
Status = VariableServiceGetVariable (
|
||||||
SmmVariableHeader->Name,
|
SmmVariableHeader->Name,
|
||||||
&SmmVariableHeader->Guid,
|
&SmmVariableHeader->Guid,
|
||||||
@ -468,6 +511,13 @@ SmmVariableHandler (
|
|||||||
|
|
||||||
case SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME:
|
case SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME:
|
||||||
GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *) SmmVariableFunctionHeader->Data;
|
GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *) SmmVariableFunctionHeader->Data;
|
||||||
|
if ((UINTN)(~0) - GetNextVariableName->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
@ -479,6 +529,15 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NameBufferSize = *CommBufferSize - SMM_VARIABLE_COMMUNICATE_HEADER_SIZE - OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
||||||
|
if (NameBufferSize < sizeof (CHAR16) || GetNextVariableName->Name[NameBufferSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure input VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceGetNextVariableName (
|
Status = VariableServiceGetNextVariableName (
|
||||||
&GetNextVariableName->NameSize,
|
&GetNextVariableName->NameSize,
|
||||||
GetNextVariableName->Name,
|
GetNextVariableName->Name,
|
||||||
@ -488,6 +547,14 @@ SmmVariableHandler (
|
|||||||
|
|
||||||
case SMM_VARIABLE_FUNCTION_SET_VARIABLE:
|
case SMM_VARIABLE_FUNCTION_SET_VARIABLE:
|
||||||
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) SmmVariableFunctionHeader->Data;
|
||||||
|
if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||
|
||||||
|
((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {
|
||||||
|
//
|
||||||
|
// Prevent InfoSize overflow happen
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)
|
||||||
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
+ SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;
|
||||||
|
|
||||||
@ -501,6 +568,14 @@ SmmVariableHandler (
|
|||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {
|
||||||
|
//
|
||||||
|
// Make sure VariableName is A Null-terminated string.
|
||||||
|
//
|
||||||
|
Status = EFI_ACCESS_DENIED;
|
||||||
|
goto EXIT;
|
||||||
|
}
|
||||||
|
|
||||||
Status = VariableServiceSetVariable (
|
Status = VariableServiceSetVariable (
|
||||||
SmmVariableHeader->Name,
|
SmmVariableHeader->Name,
|
||||||
&SmmVariableHeader->Guid,
|
&SmmVariableHeader->Guid,
|
||||||
@ -555,7 +630,7 @@ SmmVariableHandler (
|
|||||||
//
|
//
|
||||||
|
|
||||||
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBufferSize, sizeof(UINTN))) {
|
if (InternalIsAddressInSmram ((EFI_PHYSICAL_ADDRESS)(UINTN)CommBufferSize, sizeof(UINTN))) {
|
||||||
DEBUG ((EFI_D_ERROR, "SMM communication buffer size is in SMRAM!\n"));
|
DEBUG ((EFI_D_ERROR, "SMM communication buffer in SMRAM!\n"));
|
||||||
Status = EFI_ACCESS_DENIED;
|
Status = EFI_ACCESS_DENIED;
|
||||||
goto EXIT;
|
goto EXIT;
|
||||||
}
|
}
|
||||||
|
@ -207,6 +207,7 @@ RuntimeServiceGetVariable (
|
|||||||
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
||||||
UINTN SmmCommBufPayloadSize;
|
UINTN SmmCommBufPayloadSize;
|
||||||
UINTN TempDataSize;
|
UINTN TempDataSize;
|
||||||
|
UINTN VariableNameSize;
|
||||||
|
|
||||||
if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
|
if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
@ -221,11 +222,12 @@ RuntimeServiceGetVariable (
|
|||||||
//
|
//
|
||||||
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
||||||
TempDataSize = *DataSize;
|
TempDataSize = *DataSize;
|
||||||
|
VariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
//
|
//
|
||||||
// If VariableName exceeds SMM payload limit. Return failure
|
// If VariableName exceeds SMM payload limit. Return failure
|
||||||
//
|
//
|
||||||
if (StrSize (VariableName) > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {
|
if (VariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -235,13 +237,13 @@ RuntimeServiceGetVariable (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
if (TempDataSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - StrSize (VariableName)) {
|
if (TempDataSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - VariableNameSize) {
|
||||||
//
|
//
|
||||||
// If output data buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
// If output data buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
||||||
//
|
//
|
||||||
TempDataSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - StrSize (VariableName);
|
TempDataSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) - VariableNameSize;
|
||||||
}
|
}
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + TempDataSize;
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + VariableNameSize + TempDataSize;
|
||||||
|
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);
|
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_GET_VARIABLE);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
@ -251,7 +253,7 @@ RuntimeServiceGetVariable (
|
|||||||
|
|
||||||
CopyGuid (&SmmVariableHeader->Guid, VendorGuid);
|
CopyGuid (&SmmVariableHeader->Guid, VendorGuid);
|
||||||
SmmVariableHeader->DataSize = TempDataSize;
|
SmmVariableHeader->DataSize = TempDataSize;
|
||||||
SmmVariableHeader->NameSize = StrSize (VariableName);
|
SmmVariableHeader->NameSize = VariableNameSize;
|
||||||
if (Attributes == NULL) {
|
if (Attributes == NULL) {
|
||||||
SmmVariableHeader->Attributes = 0;
|
SmmVariableHeader->Attributes = 0;
|
||||||
} else {
|
} else {
|
||||||
@ -315,6 +317,8 @@ RuntimeServiceGetNextVariableName (
|
|||||||
UINTN PayloadSize;
|
UINTN PayloadSize;
|
||||||
SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;
|
SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *SmmGetNextVariableName;
|
||||||
UINTN SmmCommBufPayloadSize;
|
UINTN SmmCommBufPayloadSize;
|
||||||
|
UINTN OutVariableNameSize;
|
||||||
|
UINTN InVariableNameSize;
|
||||||
|
|
||||||
if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
|
if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
@ -324,11 +328,13 @@ RuntimeServiceGetNextVariableName (
|
|||||||
// SMM Communication Buffer max payload size
|
// SMM Communication Buffer max payload size
|
||||||
//
|
//
|
||||||
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
SmmCommBufPayloadSize = mVariableBufferSize - (SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE);
|
||||||
|
OutVariableNameSize = *VariableNameSize;
|
||||||
|
InVariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
//
|
//
|
||||||
// If input string exceeds SMM payload limit. Return failure
|
// If input string exceeds SMM payload limit. Return failure
|
||||||
//
|
//
|
||||||
if (StrSize (VariableName) > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
if (InVariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -338,16 +344,16 @@ RuntimeServiceGetNextVariableName (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
if (*VariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
if (OutVariableNameSize > SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {
|
||||||
//
|
//
|
||||||
// If output buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
// If output buffer exceed SMM payload limit. Trim output buffer to SMM payload size
|
||||||
//
|
//
|
||||||
*VariableNameSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
OutVariableNameSize = SmmCommBufPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);
|
||||||
}
|
}
|
||||||
//
|
//
|
||||||
// Payload should be Guid + NameSize + MAX of Input & Output buffer
|
// Payload should be Guid + NameSize + MAX of Input & Output buffer
|
||||||
//
|
//
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + MAX (*VariableNameSize, StrSize (VariableName));
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + MAX (OutVariableNameSize, InVariableNameSize);
|
||||||
|
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);
|
Status = InitCommunicateBuffer ((VOID **)&SmmGetNextVariableName, PayloadSize, SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
@ -358,13 +364,16 @@ RuntimeServiceGetNextVariableName (
|
|||||||
//
|
//
|
||||||
// SMM comm buffer->NameSize is buffer size for return string
|
// SMM comm buffer->NameSize is buffer size for return string
|
||||||
//
|
//
|
||||||
SmmGetNextVariableName->NameSize = *VariableNameSize;
|
SmmGetNextVariableName->NameSize = OutVariableNameSize;
|
||||||
|
|
||||||
CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);
|
CopyGuid (&SmmGetNextVariableName->Guid, VendorGuid);
|
||||||
//
|
//
|
||||||
// Copy whole string
|
// Copy whole string
|
||||||
//
|
//
|
||||||
CopyMem (SmmGetNextVariableName->Name, VariableName, StrSize (VariableName));
|
CopyMem (SmmGetNextVariableName->Name, VariableName, InVariableNameSize);
|
||||||
|
if (OutVariableNameSize > InVariableNameSize) {
|
||||||
|
ZeroMem ((UINT8 *) SmmGetNextVariableName->Name + InVariableNameSize, OutVariableNameSize - InVariableNameSize);
|
||||||
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
// Send data to SMM
|
// Send data to SMM
|
||||||
@ -374,7 +383,13 @@ RuntimeServiceGetNextVariableName (
|
|||||||
//
|
//
|
||||||
// Get data from SMM.
|
// Get data from SMM.
|
||||||
//
|
//
|
||||||
*VariableNameSize = SmmGetNextVariableName->NameSize;
|
if (Status == EFI_SUCCESS || Status == EFI_BUFFER_TOO_SMALL) {
|
||||||
|
//
|
||||||
|
// SMM CommBuffer NameSize can be a trimed value
|
||||||
|
// Only update VariableNameSize when needed
|
||||||
|
//
|
||||||
|
*VariableNameSize = SmmGetNextVariableName->NameSize;
|
||||||
|
}
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto Done;
|
goto Done;
|
||||||
}
|
}
|
||||||
@ -420,6 +435,7 @@ RuntimeServiceSetVariable (
|
|||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
UINTN PayloadSize;
|
UINTN PayloadSize;
|
||||||
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *SmmVariableHeader;
|
||||||
|
UINTN VariableNameSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
// Check input parameters.
|
// Check input parameters.
|
||||||
@ -441,8 +457,9 @@ RuntimeServiceSetVariable (
|
|||||||
//
|
//
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
VariableNameSize = StrSize (VariableName);
|
||||||
|
|
||||||
if ((UINTN)(~0) - StrSize (VariableName) < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + DataSize) {
|
if ((UINTN)(~0) - VariableNameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + DataSize) {
|
||||||
//
|
//
|
||||||
// Prevent PayloadSize overflow
|
// Prevent PayloadSize overflow
|
||||||
//
|
//
|
||||||
@ -455,7 +472,7 @@ RuntimeServiceSetVariable (
|
|||||||
// Init the communicate buffer. The buffer data size is:
|
// Init the communicate buffer. The buffer data size is:
|
||||||
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
// SMM_COMMUNICATE_HEADER_SIZE + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE + PayloadSize.
|
||||||
//
|
//
|
||||||
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + StrSize (VariableName) + DataSize;
|
PayloadSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + VariableNameSize + DataSize;
|
||||||
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);
|
Status = InitCommunicateBuffer ((VOID **)&SmmVariableHeader, PayloadSize, SMM_VARIABLE_FUNCTION_SET_VARIABLE);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto Done;
|
goto Done;
|
||||||
@ -464,7 +481,7 @@ RuntimeServiceSetVariable (
|
|||||||
|
|
||||||
CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);
|
CopyGuid ((EFI_GUID *) &SmmVariableHeader->Guid, VendorGuid);
|
||||||
SmmVariableHeader->DataSize = DataSize;
|
SmmVariableHeader->DataSize = DataSize;
|
||||||
SmmVariableHeader->NameSize = StrSize (VariableName);
|
SmmVariableHeader->NameSize = VariableNameSize;
|
||||||
SmmVariableHeader->Attributes = Attributes;
|
SmmVariableHeader->Attributes = Attributes;
|
||||||
CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);
|
CopyMem (SmmVariableHeader->Name, VariableName, SmmVariableHeader->NameSize);
|
||||||
CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);
|
CopyMem ((UINT8 *) SmmVariableHeader->Name + SmmVariableHeader->NameSize, Data, DataSize);
|
||||||
|
Reference in New Issue
Block a user