]> git.proxmox.com Git - mirror_edk2.git/commitdiff
MdeModulePkg/SecurityStubDxe: Report failure if image is load earlier
authorRuiyu Ni <ruiyu.ni@intel.com>
Tue, 1 Nov 2016 08:42:21 +0000 (16:42 +0800)
committerRuiyu Ni <ruiyu.ni@intel.com>
Thu, 10 Nov 2016 07:58:00 +0000 (15:58 +0800)
The 3rd party image should be loaded after EndOfDxe event signal and
DxeSmmReadyToLock protocol installation. But non-SMM platform doesn't
published DxeSmmReadyToLock protocol.
So the SecurityStubDxe can only depend on EndOfDxe event.

This patch enhances the SecurityStubDxe to listen on
DxeSmmReadyToLock protocol installation and if any 3rd party image
is loaded before DxeSmmReadyToLock, it reports failure.

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Reviewed-by: Sunny Wang <sunnywang@hpe.com>
MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.c
MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.h
MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf

index ca45d567bd1cc2f44d28b416d3b4042a61ba353f..7135a9d87cc0d26f9a722d3b6828669b5c81c974 100644 (file)
@@ -30,6 +30,7 @@ typedef struct {
   DEFERRED_3RD_PARTY_IMAGE_INFO     *ImageInfo;    ///< deferred 3rd party image item\r
 } DEFERRED_3RD_PARTY_IMAGE_TABLE;\r
 \r
+BOOLEAN                          mImageLoadedAfterEndOfDxe   = FALSE;\r
 BOOLEAN                          mEndOfDxe                   = FALSE;\r
 DEFERRED_3RD_PARTY_IMAGE_TABLE   mDeferred3rdPartyImage = {\r
   0,       // Deferred image count\r
@@ -256,6 +257,53 @@ EndOfDxe (
   mEndOfDxe = TRUE;\r
 }\r
 \r
+/**\r
+  Event notification for gEfiDxeSmmReadyToLockProtocolGuid event.\r
+\r
+  This function reports failure if any deferred image is loaded before\r
+  this callback.\r
+  Platform should publish ReadyToLock protocol immediately after signaling\r
+  of the End of DXE Event.\r
+\r
+  @param  Event                 The Event that is being processed, not used.\r
+  @param  Context               Event Context, not used.\r
+\r
+**/\r
+VOID\r
+EFIAPI\r
+DxeSmmReadyToLock (\r
+  IN EFI_EVENT  Event,\r
+  IN VOID       *Context\r
+  )\r
+{\r
+  EFI_STATUS                Status;\r
+  VOID                      *Interface;\r
+\r
+  Status = gBS->LocateProtocol (&gEfiDxeSmmReadyToLockProtocolGuid, NULL, &Interface);\r
+  if (EFI_ERROR (Status)) {\r
+    return;\r
+  }\r
+\r
+  gBS->CloseEvent (Event);\r
+\r
+  if (mImageLoadedAfterEndOfDxe) {\r
+    //\r
+    // Platform should not dispatch the 3rd party images after signaling EndOfDxe event\r
+    // but before publishing DxeSmmReadyToLock protocol.\r
+    //\r
+    DEBUG ((\r
+      DEBUG_ERROR,\r
+      "[Security] 3rd party images must be dispatched after DxeSmmReadyToLock Protocol installation!\n"\r
+      ));\r
+    REPORT_STATUS_CODE (\r
+      EFI_ERROR_CODE | EFI_ERROR_UNRECOVERED,\r
+      (EFI_SOFTWARE_DXE_BS_DRIVER | EFI_SW_EC_ILLEGAL_SOFTWARE_STATE)\r
+      );\r
+    ASSERT (FALSE);\r
+    CpuDeadLoop ();\r
+  }\r
+}\r
+\r
 /**\r
   Defer the 3rd party image load and installs Deferred Image Load Protocol.\r
 \r
@@ -303,6 +351,7 @@ Defer3rdPartyImageLoad (
     );\r
 \r
   if (mEndOfDxe) {\r
+    mImageLoadedAfterEndOfDxe = TRUE;\r
     //\r
     // The image might be first time loaded after EndOfDxe,\r
     // So ImageInfo can be NULL.\r
@@ -334,6 +383,7 @@ Defer3rdPartyImageLoadInitialize (
   EFI_STATUS                           Status;\r
   EFI_HANDLE                           Handle;\r
   EFI_EVENT                            Event;\r
+  VOID                                 *Registration;\r
 \r
   Handle = NULL;\r
   Status = gBS->InstallMultipleProtocolInterfaces (\r
@@ -353,4 +403,12 @@ Defer3rdPartyImageLoadInitialize (
                   &Event\r
                   );\r
   ASSERT_EFI_ERROR (Status);\r
+\r
+  EfiCreateProtocolNotifyEvent (\r
+    &gEfiDxeSmmReadyToLockProtocolGuid,\r
+    TPL_CALLBACK,\r
+    DxeSmmReadyToLock,\r
+    NULL,\r
+    &Registration\r
+    );\r
 }\r
index 3fab2582a787d976d210f77741cfbc5c151b8c1d..75553bad3bd875405f2c521a008f4fc2b99028b2 100644 (file)
@@ -15,16 +15,19 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 #ifndef _DEFER_3RD_PARTY_IMAGE_LOAD_H_\r
 #define _DEFER_3RD_PARTY_IMAGE_LOAD_H_\r
 \r
-#include <Uefi.h>\r
+#include <PiDxe.h>\r
 #include <Guid/EventGroup.h>\r
 #include <Protocol/DeferredImageLoad.h>\r
 #include <Protocol/FirmwareVolume2.h>\r
+#include <Protocol/DxeSmmReadyToLock.h>\r
 \r
 #include <Library/UefiBootServicesTableLib.h>\r
 #include <Library/BaseMemoryLib.h>\r
 #include <Library/MemoryAllocationLib.h>\r
 #include <Library/DevicePathLib.h>\r
 #include <Library/DebugLib.h>\r
+#include <Library/UefiLib.h>\r
+#include <Library/ReportStatusCodeLib.h>\r
 \r
 /**\r
   Returns information about a deferred image.\r
index be6ce6c98962b70e86c83dd7e90dda465c006448..7f8f6cbb6274c6f08b1afe6664b81706caf23f5f 100644 (file)
@@ -41,6 +41,8 @@
   UefiBootServicesTableLib\r
   DebugLib\r
   SecurityManagementLib\r
+  ReportStatusCodeLib\r
+  UefiLib\r
 \r
 [Guids]\r
   gEfiEndOfDxeEventGroupGuid                    ## CONSUMES ## Event\r
@@ -49,6 +51,7 @@
   gEfiSecurityArchProtocolGuid                  ## PRODUCES\r
   gEfiSecurity2ArchProtocolGuid                 ## PRODUCES\r
   gEfiDeferredImageLoadProtocolGuid             ## PRODUCES\r
+  gEfiDxeSmmReadyToLockProtocolGuid             ## CONSUMES\r
 \r
 [Depex]\r
   TRUE\r