This debug message should be info instead of error. This patch is to change the debug level to DEBUG_INFO. DEBUG((DEBUG_ERROR, "checking FV....0x%08x - 0x%x\n", FvHeader, FvHeader->FvLength)); // "Mark" This comment is inaccurate. This patch is to remove it. // // Check section // This debug message should be removed as FvHeader may have been out of range FdStart and FdSize, and the loop will go to "Mark" above again if FvHeader is not out of range FdStart and FdSize, and then that debug message will be shown. This patch is to remove this debug message. DEBUG((DEBUG_ERROR, "Next FV....0x%08x - 0x%x\n", FvHeader, FvHeader->FvLength)); Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Chasel Chiu <chasel.chiu@intel.com> Cc: Amy Chan <amy.chan@intel.com> Cc: Rangasai V Chaganty <rangasai.v.chaganty@intel.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Star Zeng <star.zeng@intel.com> Reviewed-by: Chasel Chiu <chasel.chiu@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
752 lines
27 KiB
C
752 lines
27 KiB
C
/** @file
|
|
EDKII System Capsule library.
|
|
|
|
EDKII System Capsule library instance.
|
|
|
|
CapsuleAuthenticateSystemFirmware(), ExtractAuthenticatedImage() will receive
|
|
untrusted input and do basic validation.
|
|
|
|
Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
**/
|
|
|
|
#include <PiDxe.h>
|
|
|
|
#include <Guid/SystemResourceTable.h>
|
|
#include <Guid/FirmwareContentsSigned.h>
|
|
#include <Guid/WinCertificate.h>
|
|
#include <Guid/EdkiiSystemFmpCapsule.h>
|
|
#include <Guid/WinCertificate.h>
|
|
#include <Guid/ImageAuthentication.h>
|
|
|
|
#include <Library/BaseLib.h>
|
|
#include <Library/BaseMemoryLib.h>
|
|
#include <Library/DebugLib.h>
|
|
#include <Library/PcdLib.h>
|
|
#include <Library/MemoryAllocationLib.h>
|
|
#include <Library/EdkiiSystemCapsuleLib.h>
|
|
#include <Library/FmpAuthenticationLib.h>
|
|
|
|
#include <Protocol/FirmwareManagement.h>
|
|
|
|
EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR *mImageFmpInfo;
|
|
UINTN mImageFmpInfoSize;
|
|
EFI_GUID mEdkiiSystemFirmwareFileGuid;
|
|
|
|
/**
|
|
Check if a block of buffer is erased.
|
|
|
|
@param[in] ErasePolarity Erase polarity attribute of the firmware volume
|
|
@param[in] InBuffer The buffer to be checked
|
|
@param[in] BufferSize Size of the buffer in bytes
|
|
|
|
@retval TRUE The block of buffer is erased
|
|
@retval FALSE The block of buffer is not erased
|
|
**/
|
|
BOOLEAN
|
|
IsBufferErased (
|
|
IN UINT8 ErasePolarity,
|
|
IN VOID *InBuffer,
|
|
IN UINTN BufferSize
|
|
)
|
|
{
|
|
UINTN Count;
|
|
UINT8 EraseByte;
|
|
UINT8 *Buffer;
|
|
|
|
if(ErasePolarity == 1) {
|
|
EraseByte = 0xFF;
|
|
} else {
|
|
EraseByte = 0;
|
|
}
|
|
|
|
Buffer = InBuffer;
|
|
for (Count = 0; Count < BufferSize; Count++) {
|
|
if (Buffer[Count] != EraseByte) {
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Get Section buffer pointer by SectionType and SectionInstance.
|
|
|
|
@param[in] SectionBuffer The buffer of section
|
|
@param[in] SectionBufferSize The size of SectionBuffer in bytes
|
|
@param[in] SectionType The SectionType of Section to be found
|
|
@param[in] SectionInstance The Instance of Section to be found
|
|
@param[out] OutSectionBuffer The section found, including SECTION_HEADER
|
|
@param[out] OutSectionSize The size of section found, including SECTION_HEADER
|
|
|
|
@retval TRUE The FFS buffer is found.
|
|
@retval FALSE The FFS buffer is not found.
|
|
**/
|
|
BOOLEAN
|
|
GetSectionByType (
|
|
IN VOID *SectionBuffer,
|
|
IN UINT32 SectionBufferSize,
|
|
IN EFI_SECTION_TYPE SectionType,
|
|
IN UINTN SectionInstance,
|
|
OUT VOID **OutSectionBuffer,
|
|
OUT UINTN *OutSectionSize
|
|
)
|
|
{
|
|
EFI_COMMON_SECTION_HEADER *SectionHeader;
|
|
UINTN SectionSize;
|
|
UINTN Instance;
|
|
|
|
DEBUG ((DEBUG_INFO, "GetSectionByType - Buffer: 0x%08x - 0x%08x\n", SectionBuffer, SectionBufferSize));
|
|
|
|
//
|
|
// Find Section
|
|
//
|
|
SectionHeader = SectionBuffer;
|
|
|
|
Instance = 0;
|
|
while ((UINTN)SectionHeader < (UINTN)SectionBuffer + SectionBufferSize) {
|
|
DEBUG ((DEBUG_INFO, "GetSectionByType - Section: 0x%08x\n", SectionHeader));
|
|
if (IS_SECTION2(SectionHeader)) {
|
|
SectionSize = SECTION2_SIZE(SectionHeader);
|
|
} else {
|
|
SectionSize = SECTION_SIZE(SectionHeader);
|
|
}
|
|
|
|
if (SectionHeader->Type == SectionType) {
|
|
if (Instance == SectionInstance) {
|
|
*OutSectionBuffer = (UINT8 *)SectionHeader;
|
|
*OutSectionSize = SectionSize;
|
|
DEBUG((DEBUG_INFO, "GetSectionByType - 0x%x - 0x%x\n", *OutSectionBuffer, *OutSectionSize));
|
|
return TRUE;
|
|
} else {
|
|
DEBUG((DEBUG_INFO, "GetSectionByType - find section instance %x\n", Instance));
|
|
Instance++;
|
|
}
|
|
} else {
|
|
//
|
|
// Skip other section type
|
|
//
|
|
DEBUG ((DEBUG_INFO, "GetSectionByType - other section type 0x%x\n", SectionHeader->Type));
|
|
}
|
|
|
|
//
|
|
// Next Section
|
|
//
|
|
SectionHeader = (EFI_COMMON_SECTION_HEADER *)((UINTN)SectionHeader + ALIGN_VALUE(SectionSize, 4));
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
Get FFS buffer pointer by FileName GUID and FileType.
|
|
|
|
@param[in] FdStart The System Firmware FD image
|
|
@param[in] FdSize The size of System Firmware FD image
|
|
@param[in] FileName The FileName GUID of FFS to be found
|
|
@param[in] Type The FileType of FFS to be found
|
|
@param[out] OutFfsBuffer The FFS buffer found, including FFS_FILE_HEADER
|
|
@param[out] OutFfsBufferSize The size of FFS buffer found, including FFS_FILE_HEADER
|
|
|
|
@retval TRUE The FFS buffer is found.
|
|
@retval FALSE The FFS buffer is not found.
|
|
**/
|
|
BOOLEAN
|
|
GetFfsByName (
|
|
IN VOID *FdStart,
|
|
IN UINTN FdSize,
|
|
IN EFI_GUID *FileName,
|
|
IN EFI_FV_FILETYPE Type,
|
|
OUT VOID **OutFfsBuffer,
|
|
OUT UINTN *OutFfsBufferSize
|
|
)
|
|
{
|
|
UINTN FvSize;
|
|
EFI_FIRMWARE_VOLUME_HEADER *FvHeader;
|
|
EFI_FIRMWARE_VOLUME_EXT_HEADER *FvExtHeader;
|
|
EFI_FFS_FILE_HEADER *FfsHeader;
|
|
UINT32 FfsSize;
|
|
UINTN TestLength;
|
|
BOOLEAN FvFound;
|
|
|
|
DEBUG ((DEBUG_INFO, "GetFfsByName - FV: 0x%08x - 0x%08x\n", (UINTN)FdStart, (UINTN)FdSize));
|
|
|
|
FvFound = FALSE;
|
|
FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *)FdStart;
|
|
while ((UINTN)FvHeader < (UINTN)FdStart + FdSize - 1) {
|
|
FvSize = (UINTN)FdStart + FdSize - (UINTN)FvHeader;
|
|
|
|
if (FvHeader->Signature != EFI_FVH_SIGNATURE) {
|
|
FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *)((UINTN)FvHeader + SIZE_4KB);
|
|
continue;
|
|
}
|
|
DEBUG((DEBUG_INFO, "checking FV....0x%08x - 0x%x\n", FvHeader, FvHeader->FvLength));
|
|
FvFound = TRUE;
|
|
if (FvHeader->FvLength > FvSize) {
|
|
DEBUG((DEBUG_ERROR, "GetFfsByName - FvSize: 0x%08x, MaxSize - 0x%08x\n", (UINTN)FvHeader->FvLength, (UINTN)FvSize));
|
|
return FALSE;
|
|
}
|
|
FvSize = (UINTN)FvHeader->FvLength;
|
|
|
|
//
|
|
// Find FFS
|
|
//
|
|
if (FvHeader->ExtHeaderOffset != 0) {
|
|
FvExtHeader = (EFI_FIRMWARE_VOLUME_EXT_HEADER *)((UINT8 *)FvHeader + FvHeader->ExtHeaderOffset);
|
|
FfsHeader = (EFI_FFS_FILE_HEADER *)((UINT8 *)FvExtHeader + FvExtHeader->ExtHeaderSize);
|
|
} else {
|
|
FfsHeader = (EFI_FFS_FILE_HEADER *)((UINT8 *)FvHeader + FvHeader->HeaderLength);
|
|
}
|
|
FfsHeader = (EFI_FFS_FILE_HEADER *)((UINTN)FvHeader + ALIGN_VALUE((UINTN)FfsHeader - (UINTN)FvHeader, 8));
|
|
|
|
while ((UINTN)FfsHeader < (UINTN)FvHeader + FvSize - 1) {
|
|
DEBUG((DEBUG_INFO, "GetFfsByName - FFS: 0x%08x\n", FfsHeader));
|
|
TestLength = (UINTN)((UINTN)FvHeader + FvSize - (UINTN)FfsHeader);
|
|
if (TestLength > sizeof(EFI_FFS_FILE_HEADER)) {
|
|
TestLength = sizeof(EFI_FFS_FILE_HEADER);
|
|
}
|
|
if (IsBufferErased(1, FfsHeader, TestLength)) {
|
|
break;
|
|
}
|
|
|
|
if (IS_FFS_FILE2(FfsHeader)) {
|
|
FfsSize = FFS_FILE2_SIZE(FfsHeader);
|
|
} else {
|
|
FfsSize = FFS_FILE_SIZE(FfsHeader);
|
|
}
|
|
|
|
if (CompareGuid(FileName, &FfsHeader->Name) &&
|
|
((Type == EFI_FV_FILETYPE_ALL) || (FfsHeader->Type == Type))) {
|
|
*OutFfsBuffer = FfsHeader;
|
|
*OutFfsBufferSize = FfsSize;
|
|
return TRUE;
|
|
} else {
|
|
//
|
|
// Any other type is not allowed
|
|
//
|
|
DEBUG((DEBUG_INFO, "GetFfsByName - other FFS type 0x%x, name %g\n", FfsHeader->Type, &FfsHeader->Name));
|
|
}
|
|
|
|
//
|
|
// Next File
|
|
//
|
|
FfsHeader = (EFI_FFS_FILE_HEADER *)((UINTN)FfsHeader + ALIGN_VALUE(FfsSize, 8));
|
|
}
|
|
|
|
//
|
|
// Next FV
|
|
//
|
|
FvHeader = (VOID *)(UINTN)((UINTN)FvHeader + FvHeader->FvLength);
|
|
}
|
|
|
|
if (!FvFound) {
|
|
DEBUG((DEBUG_ERROR, "GetFfsByName - NO FV Found\n"));
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
Extract the driver FV from an authenticated image.
|
|
|
|
@param[in] AuthenticatedImage The authenticated capsule image.
|
|
@param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
|
|
@param[out] DriverFvImage The driver FV image.
|
|
@param[out] DriverFvImageSize The size of the driver FV image in bytes.
|
|
|
|
@retval TRUE The driver Fv is extracted.
|
|
@retval FALSE The driver Fv is not extracted.
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
ExtractDriverFvImage (
|
|
IN VOID *AuthenticatedImage,
|
|
IN UINTN AuthenticatedImageSize,
|
|
OUT VOID **DriverFvImage,
|
|
OUT UINTN *DriverFvImageSize
|
|
)
|
|
{
|
|
BOOLEAN Result;
|
|
UINT32 FileHeaderSize;
|
|
|
|
*DriverFvImage = NULL;
|
|
*DriverFvImageSize = 0;
|
|
|
|
Result = GetFfsByName(AuthenticatedImage, AuthenticatedImageSize, &gEdkiiSystemFmpCapsuleDriverFvFileGuid, EFI_FV_FILETYPE_RAW, DriverFvImage, DriverFvImageSize);
|
|
if (!Result) {
|
|
return FALSE;
|
|
}
|
|
|
|
if (IS_FFS_FILE2(*DriverFvImage)) {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER2);
|
|
} else {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER);
|
|
}
|
|
*DriverFvImage = (UINT8 *)*DriverFvImage + FileHeaderSize;
|
|
*DriverFvImageSize = *DriverFvImageSize - FileHeaderSize;
|
|
|
|
return Result;
|
|
}
|
|
|
|
/**
|
|
Extract the config image from an authenticated image.
|
|
|
|
@param[in] AuthenticatedImage The authenticated capsule image.
|
|
@param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
|
|
@param[out] ConfigImage The config image.
|
|
@param[out] ConfigImageSize The size of the config image in bytes.
|
|
|
|
@retval TRUE The config image is extracted.
|
|
@retval FALSE The config image is not extracted.
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
ExtractConfigImage (
|
|
IN VOID *AuthenticatedImage,
|
|
IN UINTN AuthenticatedImageSize,
|
|
OUT VOID **ConfigImage,
|
|
OUT UINTN *ConfigImageSize
|
|
)
|
|
{
|
|
BOOLEAN Result;
|
|
UINT32 FileHeaderSize;
|
|
|
|
*ConfigImage = NULL;
|
|
*ConfigImageSize = 0;
|
|
|
|
Result = GetFfsByName(AuthenticatedImage, AuthenticatedImageSize, &gEdkiiSystemFmpCapsuleConfigFileGuid, EFI_FV_FILETYPE_RAW, ConfigImage, ConfigImageSize);
|
|
if (!Result) {
|
|
return FALSE;
|
|
}
|
|
|
|
if (IS_FFS_FILE2(*ConfigImage)) {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER2);
|
|
} else {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER);
|
|
}
|
|
*ConfigImage = (UINT8 *)*ConfigImage + FileHeaderSize;
|
|
*ConfigImageSize = *ConfigImageSize - FileHeaderSize;
|
|
|
|
return Result;
|
|
}
|
|
|
|
/**
|
|
Extract the authenticated image from an FMP capsule image.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
|
|
@param[in] Image The FMP capsule image, including EFI_FIRMWARE_IMAGE_AUTHENTICATION.
|
|
@param[in] ImageSize The size of FMP capsule image in bytes.
|
|
@param[out] LastAttemptStatus The last attempt status, which will be recorded in ESRT and FMP EFI_FIRMWARE_IMAGE_DESCRIPTOR.
|
|
@param[out] AuthenticatedImage The authenticated capsule image, excluding EFI_FIRMWARE_IMAGE_AUTHENTICATION.
|
|
@param[out] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
|
|
|
|
@retval TRUE The authenticated image is extracted.
|
|
@retval FALSE The authenticated image is not extracted.
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
ExtractAuthenticatedImage (
|
|
IN VOID *Image,
|
|
IN UINTN ImageSize,
|
|
OUT UINT32 *LastAttemptStatus,
|
|
OUT VOID **AuthenticatedImage,
|
|
OUT UINTN *AuthenticatedImageSize
|
|
)
|
|
{
|
|
EFI_FIRMWARE_IMAGE_AUTHENTICATION *ImageAuth;
|
|
EFI_STATUS Status;
|
|
GUID *CertType;
|
|
VOID *PublicKeyData;
|
|
UINTN PublicKeyDataLength;
|
|
|
|
DEBUG((DEBUG_INFO, "ExtractAuthenticatedImage - Image: 0x%08x - 0x%08x\n", (UINTN)Image, (UINTN)ImageSize));
|
|
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INVALID_FORMAT;
|
|
if ((Image == NULL) || (ImageSize == 0)) {
|
|
return FALSE;
|
|
}
|
|
|
|
ImageAuth = (EFI_FIRMWARE_IMAGE_AUTHENTICATION *)Image;
|
|
if (ImageSize < sizeof(EFI_FIRMWARE_IMAGE_AUTHENTICATION)) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - ImageSize too small\n"));
|
|
return FALSE;
|
|
}
|
|
if (ImageAuth->AuthInfo.Hdr.dwLength <= OFFSET_OF(WIN_CERTIFICATE_UEFI_GUID, CertData)) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - dwLength too small\n"));
|
|
return FALSE;
|
|
}
|
|
if ((UINTN) ImageAuth->AuthInfo.Hdr.dwLength > MAX_UINTN - sizeof(UINT64)) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - dwLength too big\n"));
|
|
return FALSE;
|
|
}
|
|
if (ImageSize <= sizeof(ImageAuth->MonotonicCount) + ImageAuth->AuthInfo.Hdr.dwLength) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - ImageSize too small\n"));
|
|
return FALSE;
|
|
}
|
|
if (ImageAuth->AuthInfo.Hdr.wRevision != 0x0200) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - wRevision: 0x%02x, expect - 0x%02x\n", (UINTN)ImageAuth->AuthInfo.Hdr.wRevision, (UINTN)0x0200));
|
|
return FALSE;
|
|
}
|
|
if (ImageAuth->AuthInfo.Hdr.wCertificateType != WIN_CERT_TYPE_EFI_GUID) {
|
|
DEBUG((DEBUG_ERROR, "ExtractAuthenticatedImage - wCertificateType: 0x%02x, expect - 0x%02x\n", (UINTN)ImageAuth->AuthInfo.Hdr.wCertificateType, (UINTN)WIN_CERT_TYPE_EFI_GUID));
|
|
return FALSE;
|
|
}
|
|
|
|
CertType = &ImageAuth->AuthInfo.CertType;
|
|
DEBUG((DEBUG_INFO, "ExtractAuthenticatedImage - CertType: %g\n", CertType));
|
|
|
|
if (CompareGuid(&gEfiCertPkcs7Guid, CertType)) {
|
|
PublicKeyData = PcdGetPtr(PcdPkcs7CertBuffer);
|
|
PublicKeyDataLength = PcdGetSize(PcdPkcs7CertBuffer);
|
|
} else if (CompareGuid(&gEfiCertTypeRsa2048Sha256Guid, CertType)) {
|
|
PublicKeyData = PcdGetPtr(PcdRsa2048Sha256PublicKeyBuffer);
|
|
PublicKeyDataLength = PcdGetSize(PcdRsa2048Sha256PublicKeyBuffer);
|
|
} else {
|
|
return FALSE;
|
|
}
|
|
ASSERT (PublicKeyData != NULL);
|
|
ASSERT (PublicKeyDataLength != 0);
|
|
|
|
Status = AuthenticateFmpImage(
|
|
ImageAuth,
|
|
ImageSize,
|
|
PublicKeyData,
|
|
PublicKeyDataLength
|
|
);
|
|
switch (Status) {
|
|
case RETURN_SUCCESS:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_SUCCESS;
|
|
break;
|
|
case RETURN_SECURITY_VIOLATION:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_AUTH_ERROR;
|
|
break;
|
|
case RETURN_INVALID_PARAMETER:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INVALID_FORMAT;
|
|
break;
|
|
case RETURN_UNSUPPORTED:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INVALID_FORMAT;
|
|
break;
|
|
case RETURN_OUT_OF_RESOURCES:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INSUFFICIENT_RESOURCES;
|
|
break;
|
|
default:
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_UNSUCCESSFUL;
|
|
break;
|
|
}
|
|
if (EFI_ERROR(Status)) {
|
|
return FALSE;
|
|
}
|
|
|
|
if (AuthenticatedImage != NULL) {
|
|
*AuthenticatedImage = (UINT8 *)ImageAuth + ImageAuth->AuthInfo.Hdr.dwLength + sizeof(ImageAuth->MonotonicCount);
|
|
}
|
|
if (AuthenticatedImageSize != NULL) {
|
|
*AuthenticatedImageSize = ImageSize - ImageAuth->AuthInfo.Hdr.dwLength - sizeof(ImageAuth->MonotonicCount);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Extract ImageFmpInfo from system firmware.
|
|
|
|
@param[in] SystemFirmwareImage The System Firmware image.
|
|
@param[in] SystemFirmwareImageSize The size of the System Firmware image in bytes.
|
|
@param[out] ImageFmpInfo The ImageFmpInfo.
|
|
@param[out] ImageFmpInfoSize The size of the ImageFmpInfo in bytes.
|
|
|
|
@retval TRUE The ImageFmpInfo is extracted.
|
|
@retval FALSE The ImageFmpInfo is not extracted.
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
ExtractSystemFirmwareImageFmpInfo (
|
|
IN VOID *SystemFirmwareImage,
|
|
IN UINTN SystemFirmwareImageSize,
|
|
OUT EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR **ImageFmpInfo,
|
|
OUT UINTN *ImageFmpInfoSize
|
|
)
|
|
{
|
|
BOOLEAN Result;
|
|
UINT32 SectionHeaderSize;
|
|
UINT32 FileHeaderSize;
|
|
|
|
*ImageFmpInfo = NULL;
|
|
*ImageFmpInfoSize = 0;
|
|
|
|
Result = GetFfsByName(SystemFirmwareImage, SystemFirmwareImageSize, &gEdkiiSystemFirmwareImageDescriptorFileGuid, EFI_FV_FILETYPE_ALL, (VOID **)ImageFmpInfo, ImageFmpInfoSize);
|
|
if (!Result) {
|
|
return FALSE;
|
|
}
|
|
if (IS_FFS_FILE2 (*ImageFmpInfo)) {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER2);
|
|
} else {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER);
|
|
}
|
|
*ImageFmpInfo = (VOID *)((UINT8 *)*ImageFmpInfo + FileHeaderSize);
|
|
*ImageFmpInfoSize = *ImageFmpInfoSize - FileHeaderSize;
|
|
|
|
Result = GetSectionByType(*ImageFmpInfo, (UINT32)*ImageFmpInfoSize, EFI_SECTION_RAW, 0, (VOID **)ImageFmpInfo, ImageFmpInfoSize);
|
|
if (!Result) {
|
|
return FALSE;
|
|
}
|
|
if (IS_SECTION2(*ImageFmpInfo)) {
|
|
SectionHeaderSize = sizeof(EFI_RAW_SECTION2);
|
|
} else {
|
|
SectionHeaderSize = sizeof(EFI_RAW_SECTION);
|
|
}
|
|
*ImageFmpInfo = (VOID *)((UINT8 *)*ImageFmpInfo + SectionHeaderSize);
|
|
*ImageFmpInfoSize = *ImageFmpInfoSize - SectionHeaderSize;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Extract the System Firmware image from an authenticated image.
|
|
|
|
@param[in] AuthenticatedImage The authenticated capsule image.
|
|
@param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
|
|
@param[out] SystemFirmwareImage The System Firmware image.
|
|
@param[out] SystemFirmwareImageSize The size of the System Firmware image in bytes.
|
|
|
|
@retval TRUE The System Firmware image is extracted.
|
|
@retval FALSE The System Firmware image is not extracted.
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
ExtractSystemFirmwareImage (
|
|
IN VOID *AuthenticatedImage,
|
|
IN UINTN AuthenticatedImageSize,
|
|
OUT VOID **SystemFirmwareImage,
|
|
OUT UINTN *SystemFirmwareImageSize
|
|
)
|
|
{
|
|
BOOLEAN Result;
|
|
UINT32 FileHeaderSize;
|
|
|
|
*SystemFirmwareImage = NULL;
|
|
*SystemFirmwareImageSize = 0;
|
|
|
|
Result = GetFfsByName(AuthenticatedImage, AuthenticatedImageSize, &mEdkiiSystemFirmwareFileGuid, EFI_FV_FILETYPE_RAW, SystemFirmwareImage, SystemFirmwareImageSize);
|
|
if (!Result) {
|
|
// no nested FV, just return all data.
|
|
*SystemFirmwareImage = AuthenticatedImage;
|
|
*SystemFirmwareImageSize = AuthenticatedImageSize;
|
|
|
|
return TRUE;
|
|
}
|
|
if (IS_FFS_FILE2 (*SystemFirmwareImage)) {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER2);
|
|
} else {
|
|
FileHeaderSize = sizeof(EFI_FFS_FILE_HEADER);
|
|
}
|
|
*SystemFirmwareImage = (UINT8 *)*SystemFirmwareImage + FileHeaderSize;
|
|
*SystemFirmwareImageSize = *SystemFirmwareImageSize - FileHeaderSize;
|
|
|
|
return Result;
|
|
}
|
|
|
|
/**
|
|
Authenticated system firmware FMP capsule image.
|
|
|
|
Caution: This function may receive untrusted input.
|
|
|
|
@param[in] Image The FMP capsule image, including EFI_FIRMWARE_IMAGE_AUTHENTICATION.
|
|
@param[in] ImageSize The size of FMP capsule image in bytes.
|
|
@param[in] ForceVersionMatch TRUE: The version of capsule must be as same as the version of current image.
|
|
FALSE: The version of capsule must be as same as greater than the lowest
|
|
supported version of current image.
|
|
@param[out] LastAttemptVersion The last attempt version, which will be recorded in ESRT and FMP EFI_FIRMWARE_IMAGE_DESCRIPTOR.
|
|
@param[out] LastAttemptStatus The last attempt status, which will be recorded in ESRT and FMP EFI_FIRMWARE_IMAGE_DESCRIPTOR.
|
|
@param[out] AuthenticatedImage The authenticated capsule image, excluding EFI_FIRMWARE_IMAGE_AUTHENTICATION.
|
|
@param[out] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
|
|
|
|
@retval TRUE Authentication passes and the authenticated image is extracted.
|
|
@retval FALSE Authentication fails and the authenticated image is not extracted.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
CapsuleAuthenticateSystemFirmware (
|
|
IN VOID *Image,
|
|
IN UINTN ImageSize,
|
|
IN BOOLEAN ForceVersionMatch,
|
|
OUT UINT32 *LastAttemptVersion,
|
|
OUT UINT32 *LastAttemptStatus,
|
|
OUT VOID **AuthenticatedImage,
|
|
OUT UINTN *AuthenticatedImageSize
|
|
)
|
|
{
|
|
BOOLEAN Result;
|
|
EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR *ImageFmpInfo;
|
|
UINTN ImageFmpInfoSize;
|
|
EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR *CurrentImageFmpInfo;
|
|
UINTN CurrentImageFmpInfoSize;
|
|
VOID *SystemFirmwareImage;
|
|
UINTN SystemFirmwareImageSize;
|
|
|
|
*LastAttemptVersion = 0;
|
|
|
|
//
|
|
// NOTE: This function need run in an isolated environment.
|
|
// Do not touch FMP protocol and its private structure.
|
|
//
|
|
if (mImageFmpInfo == NULL) {
|
|
DEBUG((DEBUG_INFO, "ImageFmpInfo is not set\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
|
|
Result = ExtractAuthenticatedImage((VOID *)Image, ImageSize, LastAttemptStatus, AuthenticatedImage, AuthenticatedImageSize);
|
|
if (!Result) {
|
|
DEBUG((DEBUG_INFO, "ExtractAuthenticatedImage - fail\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
|
|
DEBUG((DEBUG_INFO, "AuthenticatedImage - 0x%x - 0x%x\n", *AuthenticatedImage, *AuthenticatedImageSize));
|
|
|
|
Result = ExtractSystemFirmwareImage(*AuthenticatedImage, *AuthenticatedImageSize, &SystemFirmwareImage, &SystemFirmwareImageSize);
|
|
if (!Result) {
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INVALID_FORMAT;
|
|
DEBUG((DEBUG_INFO, "ExtractSystemFirmwareImage - fail\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
DEBUG((DEBUG_INFO, "SystemFirmwareImage - 0x%x - 0x%x\n", SystemFirmwareImage, SystemFirmwareImageSize));
|
|
|
|
Result = ExtractSystemFirmwareImageFmpInfo(SystemFirmwareImage, SystemFirmwareImageSize, &ImageFmpInfo, &ImageFmpInfoSize);
|
|
if (!Result) {
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INVALID_FORMAT;
|
|
DEBUG((DEBUG_INFO, "ExtractSystemFirmwareImageFmpInfo - fail\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
|
|
*LastAttemptVersion = ImageFmpInfo->Version;
|
|
DEBUG((DEBUG_INFO, "ImageFmpInfo - 0x%x - 0x%x\n", ImageFmpInfo, ImageFmpInfoSize));
|
|
DEBUG((DEBUG_INFO, "NewImage Version - 0x%x\n", ImageFmpInfo->Version));
|
|
DEBUG((DEBUG_INFO, "NewImage LowestSupportedImageVersion - 0x%x\n", ImageFmpInfo->LowestSupportedImageVersion));
|
|
|
|
CurrentImageFmpInfo = mImageFmpInfo;
|
|
CurrentImageFmpInfoSize = mImageFmpInfoSize;
|
|
|
|
DEBUG((DEBUG_INFO, "ImageFmpInfo - 0x%x - 0x%x\n", CurrentImageFmpInfo, CurrentImageFmpInfoSize));
|
|
DEBUG((DEBUG_INFO, "Current Version - 0x%x\n", CurrentImageFmpInfo->Version));
|
|
DEBUG((DEBUG_INFO, "Current LowestSupportedImageVersion - 0x%x\n", CurrentImageFmpInfo->LowestSupportedImageVersion));
|
|
|
|
if (ForceVersionMatch) {
|
|
if (CurrentImageFmpInfo->Version != ImageFmpInfo->Version) {
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INCORRECT_VERSION;
|
|
DEBUG((DEBUG_INFO, "ForceVersionMatch check - fail\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
} else {
|
|
if (ImageFmpInfo->Version < CurrentImageFmpInfo->LowestSupportedImageVersion) {
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_ERROR_INCORRECT_VERSION;
|
|
DEBUG((DEBUG_INFO, "LowestSupportedImageVersion check - fail\n"));
|
|
return EFI_SECURITY_VIOLATION;
|
|
}
|
|
}
|
|
|
|
*LastAttemptStatus = LAST_ATTEMPT_STATUS_SUCCESS;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
PcdCallBack gets the real set PCD value
|
|
|
|
@param[in] CallBackGuid The PCD token GUID being set.
|
|
@param[in] CallBackToken The PCD token number being set.
|
|
@param[in, out] TokenData A pointer to the token data being set.
|
|
@param[in] TokenDataSize The size, in bytes, of the data being set.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
EdkiiSystemCapsuleLibPcdCallBack (
|
|
IN CONST GUID *CallBackGuid, OPTIONAL
|
|
IN UINTN CallBackToken,
|
|
IN OUT VOID *TokenData,
|
|
IN UINTN TokenDataSize
|
|
)
|
|
{
|
|
if (CompareGuid (CallBackGuid, &gEfiSignedCapsulePkgTokenSpaceGuid) &&
|
|
CallBackToken == PcdToken (PcdEdkiiSystemFirmwareImageDescriptor)) {
|
|
mImageFmpInfoSize = TokenDataSize;
|
|
mImageFmpInfo = AllocateCopyPool (mImageFmpInfoSize, TokenData);
|
|
ASSERT(mImageFmpInfo != NULL);
|
|
//
|
|
// Cancel Callback after get the real set value
|
|
//
|
|
LibPcdCancelCallback (
|
|
&gEfiSignedCapsulePkgTokenSpaceGuid,
|
|
PcdToken (PcdEdkiiSystemFirmwareImageDescriptor),
|
|
EdkiiSystemCapsuleLibPcdCallBack
|
|
);
|
|
}
|
|
|
|
if (CompareGuid (CallBackGuid, &gEfiSignedCapsulePkgTokenSpaceGuid) &&
|
|
CallBackToken == PcdToken (PcdEdkiiSystemFirmwareFileGuid)) {
|
|
CopyGuid(&mEdkiiSystemFirmwareFileGuid, TokenData);
|
|
//
|
|
// Cancel Callback after get the real set value
|
|
//
|
|
LibPcdCancelCallback (
|
|
&gEfiSignedCapsulePkgTokenSpaceGuid,
|
|
PcdToken (PcdEdkiiSystemFirmwareFileGuid),
|
|
EdkiiSystemCapsuleLibPcdCallBack
|
|
);
|
|
}
|
|
}
|
|
|
|
/**
|
|
The constructor function.
|
|
|
|
@retval EFI_SUCCESS The constructor successfully .
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EdkiiSystemCapsuleLibConstructor (
|
|
VOID
|
|
)
|
|
{
|
|
mImageFmpInfoSize = PcdGetSize(PcdEdkiiSystemFirmwareImageDescriptor);
|
|
mImageFmpInfo = PcdGetPtr(PcdEdkiiSystemFirmwareImageDescriptor);
|
|
//
|
|
// Verify Firmware Image Descriptor first
|
|
//
|
|
if (mImageFmpInfoSize < sizeof (EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR) ||
|
|
mImageFmpInfo->Signature != EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR_SIGNATURE) {
|
|
//
|
|
// SystemFirmwareImageDescriptor is not set.
|
|
// Register PCD set callback to hook PCD value set.
|
|
//
|
|
mImageFmpInfo = NULL;
|
|
mImageFmpInfoSize = 0;
|
|
LibPcdCallbackOnSet (
|
|
&gEfiSignedCapsulePkgTokenSpaceGuid,
|
|
PcdToken (PcdEdkiiSystemFirmwareImageDescriptor),
|
|
EdkiiSystemCapsuleLibPcdCallBack
|
|
);
|
|
} else {
|
|
mImageFmpInfo = AllocateCopyPool (mImageFmpInfoSize, mImageFmpInfo);
|
|
ASSERT(mImageFmpInfo != NULL);
|
|
}
|
|
|
|
CopyGuid(&mEdkiiSystemFirmwareFileGuid, PcdGetPtr(PcdEdkiiSystemFirmwareFileGuid));
|
|
//
|
|
// Verify GUID value first
|
|
//
|
|
if (CompareGuid (&mEdkiiSystemFirmwareFileGuid, &gZeroGuid)) {
|
|
LibPcdCallbackOnSet (
|
|
&gEfiSignedCapsulePkgTokenSpaceGuid,
|
|
PcdToken (PcdEdkiiSystemFirmwareFileGuid),
|
|
EdkiiSystemCapsuleLibPcdCallBack
|
|
);
|
|
}
|
|
return EFI_SUCCESS;
|
|
}
|