From: Liming Gao Date: Tue, 28 Nov 2017 03:26:34 +0000 (+0800) Subject: SignedCapsulePkg: Update EdkiiSystemCapsuleLib to check PCD value X-Git-Tag: edk2-stable201903~2912 X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=commitdiff_plain;h=01ee04c4d33ae4e982079445dd2cb53633b91d47;hp=f01629596986d50038a8dbbd4471d034cbc01234 SignedCapsulePkg: Update EdkiiSystemCapsuleLib to check PCD value If PCD value is not set, register PcdCallBack to hook PCD value set Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao Cc: Jiewen Yao Reviewed-by: Jiewen Yao --- diff --git a/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.c b/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.c index 62be8eb229..876d2257b3 100644 --- a/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.c +++ b/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.c @@ -29,6 +29,7 @@ #include #include #include +#include #include #include #include @@ -600,6 +601,10 @@ CapsuleAuthenticateSystemFirmware ( // NOTE: This function need run in an isolated environment. // Do not touch FMP protocol and its private structure. // + if (mImageFmpInfo == NULL) { + DEBUG((DEBUG_INFO, "ImageFmpInfo is not set\n")); + return EFI_SECURITY_VIOLATION; + } Result = ExtractAuthenticatedImage((VOID *)Image, ImageSize, LastAttemptStatus, AuthenticatedImage, AuthenticatedImageSize); if (!Result) { @@ -654,6 +659,53 @@ CapsuleAuthenticateSystemFirmware ( return EFI_SUCCESS; } +/** + PcdCallBack gets the real set PCD value + + @param[in] CallBackGuid The PCD token GUID being set. + @param[in] CallBackToken The PCD token number being set. + @param[in, out] TokenData A pointer to the token data being set. + @param[in] TokenDataSize The size, in bytes, of the data being set. + +**/ +VOID +EFIAPI +EdkiiSystemCapsuleLibPcdCallBack ( + IN CONST GUID *CallBackGuid, OPTIONAL + IN UINTN CallBackToken, + IN OUT VOID *TokenData, + IN UINTN TokenDataSize + ) +{ + if (CompareGuid (CallBackGuid, &gEfiSignedCapsulePkgTokenSpaceGuid) && + CallBackToken == PcdToken (PcdEdkiiSystemFirmwareImageDescriptor)) { + mImageFmpInfoSize = TokenDataSize; + mImageFmpInfo = AllocateCopyPool (mImageFmpInfoSize, TokenData); + ASSERT(mImageFmpInfo != NULL); + // + // Cancel Callback after get the real set value + // + LibPcdCancelCallback ( + &gEfiSignedCapsulePkgTokenSpaceGuid, + PcdToken (PcdEdkiiSystemFirmwareImageDescriptor), + EdkiiSystemCapsuleLibPcdCallBack + ); + } + + if (CompareGuid (CallBackGuid, &gEfiSignedCapsulePkgTokenSpaceGuid) && + CallBackToken == PcdToken (PcdEdkiiSystemFirmwareFileGuid)) { + CopyGuid(&mEdkiiSystemFirmwareFileGuid, TokenData); + // + // Cancel Callback after get the real set value + // + LibPcdCancelCallback ( + &gEfiSignedCapsulePkgTokenSpaceGuid, + PcdToken (PcdEdkiiSystemFirmwareFileGuid), + EdkiiSystemCapsuleLibPcdCallBack + ); + } +} + /** The constructor function. @@ -666,8 +718,38 @@ EdkiiSystemCapsuleLibConstructor ( ) { mImageFmpInfoSize = PcdGetSize(PcdEdkiiSystemFirmwareImageDescriptor); - mImageFmpInfo = AllocateCopyPool (mImageFmpInfoSize, PcdGetPtr(PcdEdkiiSystemFirmwareImageDescriptor)); - ASSERT(mImageFmpInfo != NULL); + mImageFmpInfo = PcdGetPtr(PcdEdkiiSystemFirmwareImageDescriptor); + // + // Verify Firmware Image Descriptor first + // + if (mImageFmpInfoSize < sizeof (EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR) || + mImageFmpInfo->Signature != EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRIPTOR_SIGNATURE) { + // + // SystemFirmwareImageDescriptor is not set. + // Register PCD set callback to hook PCD value set. + // + mImageFmpInfo = NULL; + mImageFmpInfoSize = 0; + LibPcdCallbackOnSet ( + &gEfiSignedCapsulePkgTokenSpaceGuid, + PcdToken (PcdEdkiiSystemFirmwareImageDescriptor), + EdkiiSystemCapsuleLibPcdCallBack + ); + } else { + mImageFmpInfo = AllocateCopyPool (mImageFmpInfoSize, mImageFmpInfo); + ASSERT(mImageFmpInfo != NULL); + } + CopyGuid(&mEdkiiSystemFirmwareFileGuid, PcdGetPtr(PcdEdkiiSystemFirmwareFileGuid)); + // + // Verify GUID value first + // + if (CompareGuid (&mEdkiiSystemFirmwareFileGuid, &gZeroGuid)) { + LibPcdCallbackOnSet ( + &gEfiSignedCapsulePkgTokenSpaceGuid, + PcdToken (PcdEdkiiSystemFirmwareFileGuid), + EdkiiSystemCapsuleLibPcdCallBack + ); + } return EFI_SUCCESS; } diff --git a/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.inf b/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.inf index a21e75c979..a721619a67 100644 --- a/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.inf +++ b/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/EdkiiSystemCapsuleLib.inf @@ -43,6 +43,7 @@ BaseLib BaseMemoryLib DebugLib + PcdLib MemoryAllocationLib FmpAuthenticationLib @@ -58,4 +59,6 @@ gEdkiiSystemFmpCapsuleDriverFvFileGuid ## SOMETIMES_CONSUMES ## GUID gEfiCertPkcs7Guid ## SOMETIMES_CONSUMES ## GUID gEfiCertTypeRsa2048Sha256Guid ## SOMETIMES_CONSUMES ## GUID + gEfiSignedCapsulePkgTokenSpaceGuid ## SOMETIMES_CONSUMES ## GUID + gZeroGuid ## SOMETIMES_CONSUMES ## GUID