Pull request for UEFI sub-system for efi-2020-10-rc3

Bugs in the UEFI sub-system are fixed:
 
 * use the optional data of the BootXXXX variables as load options
 * simplify function public_key_verify_signature()
 * amend a copyright notice
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEEbcT5xx8ppvoGt20zxIHbvCwFGsQFAl8yF3EACgkQxIHbvCwF
 GsQk/g/8DiMTlXzOuTN1NQuogXUNdrnZ/6KAhBVGBc7EZRUAjfgJ/k2MunPEytYd
 OHFuuZqhJV7VDgdRDIYfsDhPvamQgZGtjplcYXZ8FWtGhoPX1BgdOe+be6nUg3NU
 5XXPaG3AbYHoO1AY33he2nkaA454Van/8prC60AzLD3E9phq1cnvdeBKo/e02EOd
 XpbtI64K1F/jrQIYTeuRr08tFSqRTM69WVVvbwUjds2qJZ1q/7f6T2NqFfuAQJah
 ZzkrHD6z9xIVBvrnk3wAwuBuB6c2lposkL1K2jrYsoVBzK5LX2JPLYqdGWz60eNk
 RBQb2WP9DjFSOKZZq6t8zNi0UWwR4JdcLZuP1X9ItHtUoZMA8TRirxcMPeXBjIl/
 WwAPAPlqzUeD8CFoE33/+gIICMUe0uj6BzORAVliJ7QsEE4f81WRrN7NmOAvKoYM
 NJ2DKBcLW0fuE5IS9cp1J8WmjW3GvHP3XIBBSH4by4H0zcmCCLUkRqMV+IhAa2Bm
 neugwYrIgHSLwfVjyGSFA0vWjXjIfP+1T3Qy61pDVgqAJG2YYqJ03s6GQ2Y7E20r
 TFvwlxiKM/JuzZUjqQF+lNwHvL878IVzcPl/YKP7nCuIEO99jdduw/uMXeXvhqtt
 nv4pR2WH2ZWIkCm8tGJX7LbzSjSNSnaV4eYnv4Ni++4V4FifaFY=
 =gMCK
 -----END PGP SIGNATURE-----

Merge tag 'efi-2020-10-rc3' of https://gitlab.denx.de/u-boot/custodians/u-boot-efi

Pull request for UEFI sub-system for efi-2020-10-rc3

Bugs in the UEFI sub-system are fixed:

* use the optional data of the BootXXXX variables as load options
* simplify function public_key_verify_signature()
* amend a copyright notice
This commit is contained in:
Tom Rini 2020-08-11 08:56:52 -04:00
commit b298720900
6 changed files with 97 additions and 62 deletions

View file

@ -31,55 +31,37 @@ static struct efi_device_path *bootefi_image_path;
static struct efi_device_path *bootefi_device_path; static struct efi_device_path *bootefi_device_path;
/** /**
* Set the load options of an image from an environment variable. * efi_env_set_load_options() - set load options from environment variable
* *
* @handle: the image handle * @handle: the image handle
* @env_var: name of the environment variable * @env_var: name of the environment variable
* @load_options: pointer to load options (output) * @load_options: pointer to load options (output)
* Return: status code * Return: status code
*/ */
static efi_status_t set_load_options(efi_handle_t handle, const char *env_var, static efi_status_t efi_env_set_load_options(efi_handle_t handle,
u16 **load_options) const char *env_var,
u16 **load_options)
{ {
struct efi_loaded_image *loaded_image_info;
size_t size;
const char *env = env_get(env_var); const char *env = env_get(env_var);
size_t size;
u16 *pos; u16 *pos;
efi_status_t ret; efi_status_t ret;
*load_options = NULL; *load_options = NULL;
ret = EFI_CALL(systab.boottime->open_protocol(
handle,
&efi_guid_loaded_image,
(void **)&loaded_image_info,
efi_root, NULL,
EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL));
if (ret != EFI_SUCCESS)
return EFI_INVALID_PARAMETER;
loaded_image_info->load_options = NULL;
loaded_image_info->load_options_size = 0;
if (!env) if (!env)
goto out; return EFI_SUCCESS;
size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
size = utf8_utf16_strlen(env) + 1; pos = calloc(size, 1);
loaded_image_info->load_options = calloc(size, sizeof(u16)); if (!pos)
if (!loaded_image_info->load_options) {
log_err("ERROR: Out of memory\n");
EFI_CALL(systab.boottime->close_protocol(handle,
&efi_guid_loaded_image,
efi_root, NULL));
return EFI_OUT_OF_RESOURCES; return EFI_OUT_OF_RESOURCES;
}
pos = loaded_image_info->load_options;
*load_options = pos; *load_options = pos;
utf8_utf16_strcpy(&pos, env); utf8_utf16_strcpy(&pos, env);
loaded_image_info->load_options_size = size * 2; ret = efi_set_load_options(handle, size, *load_options);
if (ret != EFI_SUCCESS) {
out: free(*load_options);
return EFI_CALL(systab.boottime->close_protocol(handle, *load_options = NULL;
&efi_guid_loaded_image, }
efi_root, NULL)); return ret;
} }
#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) #if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
@ -328,17 +310,11 @@ efi_status_t efi_install_fdt(void *fdt)
* Load the EFI binary into a newly assigned memory unwinding the relocation * Load the EFI binary into a newly assigned memory unwinding the relocation
* information, install the loaded image protocol, and call the binary. * information, install the loaded image protocol, and call the binary.
*/ */
static efi_status_t do_bootefi_exec(efi_handle_t handle) static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
{ {
efi_status_t ret; efi_status_t ret;
efi_uintn_t exit_data_size = 0; efi_uintn_t exit_data_size = 0;
u16 *exit_data = NULL; u16 *exit_data = NULL;
u16 *load_options;
/* Transfer environment variable as load options */
ret = set_load_options(handle, "bootargs", &load_options);
if (ret != EFI_SUCCESS)
return ret;
/* Call our payload! */ /* Call our payload! */
ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data)); ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
@ -367,14 +343,15 @@ static int do_efibootmgr(void)
{ {
efi_handle_t handle; efi_handle_t handle;
efi_status_t ret; efi_status_t ret;
void *load_options;
ret = efi_bootmgr_load(&handle); ret = efi_bootmgr_load(&handle, &load_options);
if (ret != EFI_SUCCESS) { if (ret != EFI_SUCCESS) {
log_notice("EFI boot manager: Cannot load any image\n"); log_notice("EFI boot manager: Cannot load any image\n");
return CMD_RET_FAILURE; return CMD_RET_FAILURE;
} }
ret = do_bootefi_exec(handle); ret = do_bootefi_exec(handle, load_options);
if (ret != EFI_SUCCESS) if (ret != EFI_SUCCESS)
return CMD_RET_FAILURE; return CMD_RET_FAILURE;
@ -485,7 +462,14 @@ efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
if (ret != EFI_SUCCESS) if (ret != EFI_SUCCESS)
goto out; goto out;
ret = do_bootefi_exec(handle); u16 *load_options;
/* Transfer environment variable as load options */
ret = efi_env_set_load_options(handle, "bootargs", &load_options);
if (ret != EFI_SUCCESS)
goto out;
ret = do_bootefi_exec(handle, load_options);
out: out:
efi_delete_handle(mem_handle); efi_delete_handle(mem_handle);
@ -509,8 +493,9 @@ static efi_status_t bootefi_run_prepare(const char *load_options_path,
return ret; return ret;
/* Transfer environment variable as load options */ /* Transfer environment variable as load options */
return set_load_options((efi_handle_t)*image_objp, load_options_path, return efi_env_set_load_options((efi_handle_t)*image_objp,
&load_options); load_options_path,
&load_options);
} }
/** /**

View file

@ -1126,8 +1126,9 @@ static int do_efi_test_bootmgr(struct cmd_tbl *cmdtp, int flag,
efi_uintn_t exit_data_size = 0; efi_uintn_t exit_data_size = 0;
u16 *exit_data = NULL; u16 *exit_data = NULL;
efi_status_t ret; efi_status_t ret;
void *load_options;
ret = efi_bootmgr_load(&image); ret = efi_bootmgr_load(&image, &load_options);
printf("efi_bootmgr_load() returned: %ld\n", ret & ~EFI_ERROR_MASK); printf("efi_bootmgr_load() returned: %ld\n", ret & ~EFI_ERROR_MASK);
/* We call efi_start_image() even if error for test purpose. */ /* We call efi_start_image() even if error for test purpose. */
@ -1138,6 +1139,7 @@ static int do_efi_test_bootmgr(struct cmd_tbl *cmdtp, int flag,
efi_restore_gd(); efi_restore_gd();
free(load_options);
return CMD_RET_SUCCESS; return CMD_RET_SUCCESS;
} }

View file

@ -717,7 +717,10 @@ struct efi_load_option {
efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data,
efi_uintn_t *size); efi_uintn_t *size);
unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data);
efi_status_t efi_bootmgr_load(efi_handle_t *handle); efi_status_t efi_set_load_options(efi_handle_t handle,
efi_uintn_t load_options_size,
void *load_options);
efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options);
/** /**
* efi_image_regions - A list of memory regions * efi_image_regions - A list of memory regions

View file

@ -97,7 +97,6 @@ int public_key_verify_signature(const struct public_key *pkey,
const struct public_key_signature *sig) const struct public_key_signature *sig)
{ {
struct image_sign_info info; struct image_sign_info info;
struct image_region region;
int ret; int ret;
pr_devel("==>%s()\n", __func__); pr_devel("==>%s()\n", __func__);
@ -137,9 +136,6 @@ int public_key_verify_signature(const struct public_key *pkey,
info.key = pkey->key; info.key = pkey->key;
info.keylen = pkey->keylen; info.keylen = pkey->keylen;
region.data = sig->digest;
region.size = sig->digest_size;
if (rsa_verify_with_pkey(&info, sig->digest, sig->s, sig->s_size)) if (rsa_verify_with_pkey(&info, sig->digest, sig->s, sig->s_size))
ret = -EKEYREJECTED; ret = -EKEYREJECTED;
else else

View file

@ -30,6 +30,38 @@ static const struct efi_runtime_services *rs;
* should do normal or recovery boot. * should do normal or recovery boot.
*/ */
/**
* efi_set_load_options() - set the load options of a loaded image
*
* @handle: the image handle
* @load_options_size: size of load options
* @load_options: pointer to load options
* Return: status code
*/
efi_status_t efi_set_load_options(efi_handle_t handle,
efi_uintn_t load_options_size,
void *load_options)
{
struct efi_loaded_image *loaded_image_info;
efi_status_t ret;
ret = EFI_CALL(systab.boottime->open_protocol(
handle,
&efi_guid_loaded_image,
(void **)&loaded_image_info,
efi_root, NULL,
EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL));
if (ret != EFI_SUCCESS)
return EFI_INVALID_PARAMETER;
loaded_image_info->load_options = load_options;
loaded_image_info->load_options_size = load_options_size;
return EFI_CALL(systab.boottime->close_protocol(handle,
&efi_guid_loaded_image,
efi_root, NULL));
}
/** /**
* efi_deserialize_load_option() - parse serialized data * efi_deserialize_load_option() - parse serialized data
@ -174,11 +206,13 @@ static void *get_var(u16 *name, const efi_guid_t *vendor,
* if successful. This checks that the EFI_LOAD_OPTION is active (enabled) * if successful. This checks that the EFI_LOAD_OPTION is active (enabled)
* and that the specified file to boot exists. * and that the specified file to boot exists.
* *
* @n: number of the boot option, e.g. 0x0a13 for Boot0A13 * @n: number of the boot option, e.g. 0x0a13 for Boot0A13
* @handle: on return handle for the newly installed image * @handle: on return handle for the newly installed image
* Return: status code * @load_options: load options set on the loaded image protocol
* Return: status code
*/ */
static efi_status_t try_load_entry(u16 n, efi_handle_t *handle) static efi_status_t try_load_entry(u16 n, efi_handle_t *handle,
void **load_options)
{ {
struct efi_load_option lo; struct efi_load_option lo;
u16 varname[] = L"Boot0000"; u16 varname[] = L"Boot0000";
@ -218,10 +252,9 @@ static efi_status_t try_load_entry(u16 n, efi_handle_t *handle)
attributes = EFI_VARIABLE_BOOTSERVICE_ACCESS | attributes = EFI_VARIABLE_BOOTSERVICE_ACCESS |
EFI_VARIABLE_RUNTIME_ACCESS; EFI_VARIABLE_RUNTIME_ACCESS;
size = sizeof(n);
ret = efi_set_variable_int(L"BootCurrent", ret = efi_set_variable_int(L"BootCurrent",
&efi_global_variable_guid, &efi_global_variable_guid,
attributes, size, &n, false); attributes, sizeof(n), &n, false);
if (ret != EFI_SUCCESS) { if (ret != EFI_SUCCESS) {
if (EFI_CALL(efi_unload_image(*handle)) if (EFI_CALL(efi_unload_image(*handle))
!= EFI_SUCCESS) != EFI_SUCCESS)
@ -234,6 +267,19 @@ static efi_status_t try_load_entry(u16 n, efi_handle_t *handle)
ret = EFI_LOAD_ERROR; ret = EFI_LOAD_ERROR;
} }
/* Set load options */
if (size) {
*load_options = malloc(size);
if (!*load_options) {
ret = EFI_OUT_OF_RESOURCES;
goto error;
}
memcpy(*load_options, lo.optional_data, size);
ret = efi_set_load_options(*handle, size, *load_options);
} else {
load_options = NULL;
}
error: error:
free(load_option); free(load_option);
@ -247,10 +293,11 @@ error:
* EFI variable, the available load-options, finding and returning * EFI variable, the available load-options, finding and returning
* the first one that can be loaded successfully. * the first one that can be loaded successfully.
* *
* @handle: on return handle for the newly installed image * @handle: on return handle for the newly installed image
* Return: status code * @load_options: load options set on the loaded image protocol
* Return: status code
*/ */
efi_status_t efi_bootmgr_load(efi_handle_t *handle) efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options)
{ {
u16 bootnext, *bootorder; u16 bootnext, *bootorder;
efi_uintn_t size; efi_uintn_t size;
@ -278,7 +325,8 @@ efi_status_t efi_bootmgr_load(efi_handle_t *handle)
/* load BootNext */ /* load BootNext */
if (ret == EFI_SUCCESS) { if (ret == EFI_SUCCESS) {
if (size == sizeof(u16)) { if (size == sizeof(u16)) {
ret = try_load_entry(bootnext, handle); ret = try_load_entry(bootnext, handle,
load_options);
if (ret == EFI_SUCCESS) if (ret == EFI_SUCCESS)
return ret; return ret;
log_warning( log_warning(
@ -301,7 +349,7 @@ efi_status_t efi_bootmgr_load(efi_handle_t *handle)
for (i = 0; i < num; i++) { for (i = 0; i < num; i++) {
log_debug("%s trying to load Boot%04X\n", __func__, log_debug("%s trying to load Boot%04X\n", __func__,
bootorder[i]); bootorder[i]);
ret = try_load_entry(bootorder[i], handle); ret = try_load_entry(bootorder[i], handle, load_options);
if (ret == EFI_SUCCESS) if (ret == EFI_SUCCESS)
break; break;
} }

View file

@ -3,6 +3,7 @@
* UEFI runtime variable services * UEFI runtime variable services
* *
* Copyright (c) 2020, Heinrich Schuchardt <xypron.glpk@gmx.de> * Copyright (c) 2020, Heinrich Schuchardt <xypron.glpk@gmx.de>
* Copyright (c) 2020 Linaro Limited, Author: AKASHI Takahiro
*/ */
#include <common.h> #include <common.h>