From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id B8F4381D8F for ; Tue, 8 Nov 2016 04:29:33 -0800 (PST) Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga105.fm.intel.com with ESMTP; 08 Nov 2016 04:29:36 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.31,462,1473145200"; d="scan'208";a="188977111" Received: from ray-dev.ccr.corp.intel.com ([10.239.9.25]) by fmsmga004.fm.intel.com with ESMTP; 08 Nov 2016 04:29:35 -0800 From: Ruiyu Ni To: edk2-devel@lists.01.org Cc: Jiewen Yao Date: Tue, 8 Nov 2016 20:29:23 +0800 Message-Id: <20161108122928.53984-5-ruiyu.ni@intel.com> X-Mailer: git-send-email 2.9.0.windows.1 In-Reply-To: <20161108122928.53984-1-ruiyu.ni@intel.com> References: <20161108122928.53984-1-ruiyu.ni@intel.com> Subject: [PATCH v2 4/9] MdeModulePkg/SecurityStubDxe: Report failure if image is load earlier X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Nov 2016 12:29:33 -0000 The 3rd party image should be loaded after EndOfDxe event signal and DxeSmmReadyToLock protocol installation. But non-SMM platform doesn't published DxeSmmReadyToLock protocol. So the SecurityStubDxe can only depend on EndOfDxe event. This patch enhances the SecurityStubDxe to listen on DxeSmmReadyToLock protocol installation and if any 3rd party image is loaded before DxeSmmReadyToLock, it reports failure. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Ruiyu Ni Cc: Jiewen Yao --- .../SecurityStubDxe/Defer3rdPartyImageLoad.c | 58 ++++++++++++++++++++++ .../SecurityStubDxe/Defer3rdPartyImageLoad.h | 5 +- .../Universal/SecurityStubDxe/SecurityStubDxe.inf | 3 ++ 3 files changed, 65 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.c b/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.c index ca45d56..7135a9d 100644 --- a/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.c +++ b/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.c @@ -30,6 +30,7 @@ typedef struct { DEFERRED_3RD_PARTY_IMAGE_INFO *ImageInfo; ///< deferred 3rd party image item } DEFERRED_3RD_PARTY_IMAGE_TABLE; +BOOLEAN mImageLoadedAfterEndOfDxe = FALSE; BOOLEAN mEndOfDxe = FALSE; DEFERRED_3RD_PARTY_IMAGE_TABLE mDeferred3rdPartyImage = { 0, // Deferred image count @@ -257,6 +258,53 @@ EndOfDxe ( } /** + Event notification for gEfiDxeSmmReadyToLockProtocolGuid event. + + This function reports failure if any deferred image is loaded before + this callback. + Platform should publish ReadyToLock protocol immediately after signaling + of the End of DXE Event. + + @param Event The Event that is being processed, not used. + @param Context Event Context, not used. + +**/ +VOID +EFIAPI +DxeSmmReadyToLock ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + EFI_STATUS Status; + VOID *Interface; + + Status = gBS->LocateProtocol (&gEfiDxeSmmReadyToLockProtocolGuid, NULL, &Interface); + if (EFI_ERROR (Status)) { + return; + } + + gBS->CloseEvent (Event); + + if (mImageLoadedAfterEndOfDxe) { + // + // Platform should not dispatch the 3rd party images after signaling EndOfDxe event + // but before publishing DxeSmmReadyToLock protocol. + // + DEBUG (( + DEBUG_ERROR, + "[Security] 3rd party images must be dispatched after DxeSmmReadyToLock Protocol installation!\n" + )); + REPORT_STATUS_CODE ( + EFI_ERROR_CODE | EFI_ERROR_UNRECOVERED, + (EFI_SOFTWARE_DXE_BS_DRIVER | EFI_SW_EC_ILLEGAL_SOFTWARE_STATE) + ); + ASSERT (FALSE); + CpuDeadLoop (); + } +} + +/** Defer the 3rd party image load and installs Deferred Image Load Protocol. @param[in] File This is a pointer to the device path of the file that @@ -303,6 +351,7 @@ Defer3rdPartyImageLoad ( ); if (mEndOfDxe) { + mImageLoadedAfterEndOfDxe = TRUE; // // The image might be first time loaded after EndOfDxe, // So ImageInfo can be NULL. @@ -334,6 +383,7 @@ Defer3rdPartyImageLoadInitialize ( EFI_STATUS Status; EFI_HANDLE Handle; EFI_EVENT Event; + VOID *Registration; Handle = NULL; Status = gBS->InstallMultipleProtocolInterfaces ( @@ -353,4 +403,12 @@ Defer3rdPartyImageLoadInitialize ( &Event ); ASSERT_EFI_ERROR (Status); + + EfiCreateProtocolNotifyEvent ( + &gEfiDxeSmmReadyToLockProtocolGuid, + TPL_CALLBACK, + DxeSmmReadyToLock, + NULL, + &Registration + ); } diff --git a/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.h b/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.h index 3fab258..75553ba 100644 --- a/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.h +++ b/MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.h @@ -15,16 +15,19 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. #ifndef _DEFER_3RD_PARTY_IMAGE_LOAD_H_ #define _DEFER_3RD_PARTY_IMAGE_LOAD_H_ -#include +#include #include #include #include +#include #include #include #include #include #include +#include +#include /** Returns information about a deferred image. diff --git a/MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf b/MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf index be6ce6c..7f8f6cb 100644 --- a/MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf +++ b/MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf @@ -41,6 +41,8 @@ [LibraryClasses] UefiBootServicesTableLib DebugLib SecurityManagementLib + ReportStatusCodeLib + UefiLib [Guids] gEfiEndOfDxeEventGroupGuid ## CONSUMES ## Event @@ -49,6 +51,7 @@ [Protocols] gEfiSecurityArchProtocolGuid ## PRODUCES gEfiSecurity2ArchProtocolGuid ## PRODUCES gEfiDeferredImageLoadProtocolGuid ## PRODUCES + gEfiDxeSmmReadyToLockProtocolGuid ## CONSUMES [Depex] TRUE -- 2.9.0.windows.1