fix Fix CVE-2019-11098
Signed-off-by: chenhuiying <chenhuiying4@huawei.com>
This commit is contained in:
parent
3af2a142f4
commit
70a7906583
119
0027-UefiCpuPkg-Correct-some-typos.patch
Normal file
119
0027-UefiCpuPkg-Correct-some-typos.patch
Normal file
@ -0,0 +1,119 @@
|
|||||||
|
From 92c19c68cb8f3f5313ff886c664b9286fb50632d Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Tue, 7 Jul 2020 15:46:45 +0800
|
||||||
|
Subject: [PATCH] UefiCpuPkg: Correct some typos.
|
||||||
|
|
||||||
|
Correct some typos.
|
||||||
|
|
||||||
|
Cc: Eric Dong <eric.dong@intel.com>
|
||||||
|
Cc: Ray Ni <ray.ni@intel.com>
|
||||||
|
Cc: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.h | 2 +-
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuPaging.c | 4 ++--
|
||||||
|
.../Library/CpuExceptionHandlerLib/CpuExceptionCommon.h | 4 ++--
|
||||||
|
.../CpuExceptionHandlerLib/Ia32/ArchExceptionHandler.c | 4 ++--
|
||||||
|
.../Library/CpuExceptionHandlerLib/SecPeiCpuException.c | 2 +-
|
||||||
|
.../Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c | 4 ++--
|
||||||
|
6 files changed, 10 insertions(+), 10 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.h b/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
index 309478cbe1..6a481a84dc 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
@@ -424,7 +424,7 @@ InitializeCpuMpWorker (
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
- Enabl/setup stack guard for each processor if PcdCpuStackGuard is set to TRUE.
|
||||||
|
+ Enable/setup stack guard for each processor if PcdCpuStackGuard is set to TRUE.
|
||||||
|
|
||||||
|
Doing this in the memory-discovered callback is to make sure the Stack Guard
|
||||||
|
feature to cover as most PEI code as possible.
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuPaging.c b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
index 8ab7dfcce3..50ad4277af 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
@@ -153,7 +153,7 @@ GetPhysicalAddressWidth (
|
||||||
|
Get the type of top level page table.
|
||||||
|
|
||||||
|
@retval Page512G PML4 paging.
|
||||||
|
- @retval Page1G PAE paing.
|
||||||
|
+ @retval Page1G PAE paging.
|
||||||
|
|
||||||
|
**/
|
||||||
|
PAGE_ATTRIBUTE
|
||||||
|
@@ -583,7 +583,7 @@ SetupStackGuardPage (
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
- Enabl/setup stack guard for each processor if PcdCpuStackGuard is set to TRUE.
|
||||||
|
+ Enable/setup stack guard for each processor if PcdCpuStackGuard is set to TRUE.
|
||||||
|
|
||||||
|
Doing this in the memory-discovered callback is to make sure the Stack Guard
|
||||||
|
feature to cover as most PEI code as possible.
|
||||||
|
diff --git a/UefiCpuPkg/Library/CpuExceptionHandlerLib/CpuExceptionCommon.h b/UefiCpuPkg/Library/CpuExceptionHandlerLib/CpuExceptionCommon.h
|
||||||
|
index 805dd9cbb4..0544d6dba6 100644
|
||||||
|
--- a/UefiCpuPkg/Library/CpuExceptionHandlerLib/CpuExceptionCommon.h
|
||||||
|
+++ b/UefiCpuPkg/Library/CpuExceptionHandlerLib/CpuExceptionCommon.h
|
||||||
|
@@ -90,8 +90,8 @@ AsmGetTemplateAddressMap (
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
ArchUpdateIdtEntry (
|
||||||
|
- IN IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
- IN UINTN InterruptHandler
|
||||||
|
+ OUT IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
+ IN UINTN InterruptHandler
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
diff --git a/UefiCpuPkg/Library/CpuExceptionHandlerLib/Ia32/ArchExceptionHandler.c b/UefiCpuPkg/Library/CpuExceptionHandlerLib/Ia32/ArchExceptionHandler.c
|
||||||
|
index 1aafb7dac1..903449e0da 100644
|
||||||
|
--- a/UefiCpuPkg/Library/CpuExceptionHandlerLib/Ia32/ArchExceptionHandler.c
|
||||||
|
+++ b/UefiCpuPkg/Library/CpuExceptionHandlerLib/Ia32/ArchExceptionHandler.c
|
||||||
|
@@ -18,8 +18,8 @@
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
ArchUpdateIdtEntry (
|
||||||
|
- IN IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
- IN UINTN InterruptHandler
|
||||||
|
+ OUT IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
+ IN UINTN InterruptHandler
|
||||||
|
)
|
||||||
|
{
|
||||||
|
IdtEntry->Bits.OffsetLow = (UINT16)(UINTN)InterruptHandler;
|
||||||
|
diff --git a/UefiCpuPkg/Library/CpuExceptionHandlerLib/SecPeiCpuException.c b/UefiCpuPkg/Library/CpuExceptionHandlerLib/SecPeiCpuException.c
|
||||||
|
index 20148db74c..d4ae153c57 100644
|
||||||
|
--- a/UefiCpuPkg/Library/CpuExceptionHandlerLib/SecPeiCpuException.c
|
||||||
|
+++ b/UefiCpuPkg/Library/CpuExceptionHandlerLib/SecPeiCpuException.c
|
||||||
|
@@ -87,7 +87,7 @@ InitializeCpuExceptionHandlers (
|
||||||
|
IdtEntryCount = (IdtDescriptor.Limit + 1) / sizeof (IA32_IDT_GATE_DESCRIPTOR);
|
||||||
|
if (IdtEntryCount > CPU_EXCEPTION_NUM) {
|
||||||
|
//
|
||||||
|
- // CPU exeption library only setup CPU_EXCEPTION_NUM exception handler at most
|
||||||
|
+ // CPU exception library only setup CPU_EXCEPTION_NUM exception handler at most
|
||||||
|
//
|
||||||
|
IdtEntryCount = CPU_EXCEPTION_NUM;
|
||||||
|
}
|
||||||
|
diff --git a/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c b/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
|
||||||
|
index 894c1cfb75..d3da16e4df 100644
|
||||||
|
--- a/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
|
||||||
|
+++ b/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
|
||||||
|
@@ -17,8 +17,8 @@
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
ArchUpdateIdtEntry (
|
||||||
|
- IN IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
- IN UINTN InterruptHandler
|
||||||
|
+ OUT IA32_IDT_GATE_DESCRIPTOR *IdtEntry,
|
||||||
|
+ IN UINTN InterruptHandler
|
||||||
|
)
|
||||||
|
{
|
||||||
|
IdtEntry->Bits.OffsetLow = (UINT16)(UINTN)InterruptHandler;
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
857
0028-UefiCpuPkg-SecMigrationPei-Add-initial-PEIM-CVE-2019.patch
Normal file
857
0028-UefiCpuPkg-SecMigrationPei-Add-initial-PEIM-CVE-2019.patch
Normal file
@ -0,0 +1,857 @@
|
|||||||
|
From 479613bd06546e30652354d5dd76ee7b377fb92c Mon Sep 17 00:00:00 2001
|
||||||
|
From: Michael Kubacki <michael.a.kubacki@intel.com>
|
||||||
|
Date: Sun, 21 Apr 2019 14:21:55 -0700
|
||||||
|
Subject: [PATCH] UefiCpuPkg/SecMigrationPei: Add initial PEIM (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
Adds a PEIM that republishes structures produced in SEC. This
|
||||||
|
is done because SEC modules may not be shadowed in some platforms
|
||||||
|
due to space constraints or special alignment requirements. The
|
||||||
|
SecMigrationPei module locates interfaces that may be published in
|
||||||
|
SEC and reinstalls the interface with permanent memory addresses.
|
||||||
|
|
||||||
|
This is important if pre-memory address access is forbidden after
|
||||||
|
memory initialization and data such as a PPI descriptor, PPI GUID,
|
||||||
|
or PPI inteface reside in pre-memory.
|
||||||
|
|
||||||
|
Cc: Eric Dong <eric.dong@intel.com>
|
||||||
|
Cc: Ray Ni <ray.ni@intel.com>
|
||||||
|
Cc: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Cc: Debkumar De <debkumar.de@intel.com>
|
||||||
|
Cc: Harry Han <harry.han@intel.com>
|
||||||
|
Cc: Catharine West <catharine.west@intel.com>
|
||||||
|
Signed-off-by: Michael Kubacki <michael.a.kubacki@intel.com>
|
||||||
|
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
UefiCpuPkg/Include/Ppi/RepublishSecPpi.h | 54 +++
|
||||||
|
UefiCpuPkg/SecCore/SecCore.inf | 2 +
|
||||||
|
UefiCpuPkg/SecCore/SecMain.c | 26 +-
|
||||||
|
UefiCpuPkg/SecCore/SecMain.h | 1 +
|
||||||
|
UefiCpuPkg/SecMigrationPei/SecMigrationPei.c | 385 ++++++++++++++++++
|
||||||
|
UefiCpuPkg/SecMigrationPei/SecMigrationPei.h | 158 +++++++
|
||||||
|
.../SecMigrationPei/SecMigrationPei.inf | 68 ++++
|
||||||
|
.../SecMigrationPei/SecMigrationPei.uni | 13 +
|
||||||
|
UefiCpuPkg/UefiCpuPkg.dec | 3 +
|
||||||
|
UefiCpuPkg/UefiCpuPkg.dsc | 1 +
|
||||||
|
10 files changed, 709 insertions(+), 2 deletions(-)
|
||||||
|
create mode 100644 UefiCpuPkg/Include/Ppi/RepublishSecPpi.h
|
||||||
|
create mode 100644 UefiCpuPkg/SecMigrationPei/SecMigrationPei.c
|
||||||
|
create mode 100644 UefiCpuPkg/SecMigrationPei/SecMigrationPei.h
|
||||||
|
create mode 100644 UefiCpuPkg/SecMigrationPei/SecMigrationPei.inf
|
||||||
|
create mode 100644 UefiCpuPkg/SecMigrationPei/SecMigrationPei.uni
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/Include/Ppi/RepublishSecPpi.h b/UefiCpuPkg/Include/Ppi/RepublishSecPpi.h
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..ea865acbb5
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/UefiCpuPkg/Include/Ppi/RepublishSecPpi.h
|
||||||
|
@@ -0,0 +1,54 @@
|
||||||
|
+/** @file
|
||||||
|
+ This file declares Sec Platform Information PPI.
|
||||||
|
+
|
||||||
|
+ This service is the primary handoff state into the PEI Foundation.
|
||||||
|
+ The Security (SEC) component creates the early, transitory memory
|
||||||
|
+ environment and also encapsulates knowledge of at least the
|
||||||
|
+ location of the Boot Firmware Volume (BFV).
|
||||||
|
+
|
||||||
|
+ Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+
|
||||||
|
+ @par Revision Reference:
|
||||||
|
+ This PPI is introduced in PI Version 1.0.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+
|
||||||
|
+#ifndef __REPUBLISH_SEC_PPI_H__
|
||||||
|
+#define __REPUBLISH_SEC_PPI_H__
|
||||||
|
+
|
||||||
|
+#include <Pi/PiPeiCis.h>
|
||||||
|
+
|
||||||
|
+#define REPUBLISH_SEC_PPI_PPI_GUID \
|
||||||
|
+ { \
|
||||||
|
+ 0x27a71b1e, 0x73ee, 0x43d6, { 0xac, 0xe3, 0x52, 0x1a, 0x2d, 0xc5, 0xd0, 0x92 } \
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+typedef struct _REPUBLISH_SEC_PPI_PPI REPUBLISH_SEC_PPI_PPI;
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface re-installs PPIs installed in SecCore from a post-memory PEIM.
|
||||||
|
+
|
||||||
|
+ This is to allow a platform that may not support relocation of SecCore to update the PPI instance to a post-memory
|
||||||
|
+ copy from a PEIM that has been shadowed to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The SecCore PPIs were re-installed successfully.
|
||||||
|
+ @retval Others An error occurred re-installing the SecCore PPIs.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+typedef
|
||||||
|
+EFI_STATUS
|
||||||
|
+(EFIAPI *REPUBLISH_SEC_PPI_REPUBLISH_SEC_PPIS)(
|
||||||
|
+ VOID
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+///
|
||||||
|
+/// Republish SEC PPIs
|
||||||
|
+///
|
||||||
|
+struct _REPUBLISH_SEC_PPI_PPI {
|
||||||
|
+ REPUBLISH_SEC_PPI_REPUBLISH_SEC_PPIS RepublishSecPpis;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+extern EFI_GUID gRepublishSecPpiPpiGuid;
|
||||||
|
+
|
||||||
|
+#endif
|
||||||
|
diff --git a/UefiCpuPkg/SecCore/SecCore.inf b/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
index 0562820c95..545781d6b4 100644
|
||||||
|
--- a/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
+++ b/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
@@ -68,6 +68,8 @@
|
||||||
|
## SOMETIMES_CONSUMES
|
||||||
|
gPeiSecPerformancePpiGuid
|
||||||
|
gEfiPeiCoreFvLocationPpiGuid
|
||||||
|
+ ## CONSUMES
|
||||||
|
+ gRepublishSecPpiPpiGuid
|
||||||
|
|
||||||
|
[Guids]
|
||||||
|
## SOMETIMES_PRODUCES ## HOB
|
||||||
|
diff --git a/UefiCpuPkg/SecCore/SecMain.c b/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
index 5d5e7f17dc..155be49a60 100644
|
||||||
|
--- a/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
+++ b/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
@@ -370,13 +370,35 @@ SecTemporaryRamDone (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
- BOOLEAN State;
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ EFI_STATUS Status2;
|
||||||
|
+ UINTN Index;
|
||||||
|
+ BOOLEAN State;
|
||||||
|
+ EFI_PEI_PPI_DESCRIPTOR *PeiPpiDescriptor;
|
||||||
|
+ REPUBLISH_SEC_PPI_PPI *RepublishSecPpiPpi;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Republish Sec Platform Information(2) PPI
|
||||||
|
//
|
||||||
|
RepublishSecPlatformInformationPpi ();
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Re-install SEC PPIs using a PEIM produced service if published
|
||||||
|
+ //
|
||||||
|
+ for (Index = 0, Status = EFI_SUCCESS; Status == EFI_SUCCESS; Index++) {
|
||||||
|
+ Status = PeiServicesLocatePpi (
|
||||||
|
+ &gRepublishSecPpiPpiGuid,
|
||||||
|
+ Index,
|
||||||
|
+ &PeiPpiDescriptor,
|
||||||
|
+ (VOID **) &RepublishSecPpiPpi
|
||||||
|
+ );
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ DEBUG ((DEBUG_INFO, "Calling RepublishSecPpi instance %d.\n", Index));
|
||||||
|
+ Status2 = RepublishSecPpiPpi->RepublishSecPpis ();
|
||||||
|
+ ASSERT_EFI_ERROR (Status2);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
//
|
||||||
|
// Migrate DebugAgentContext.
|
||||||
|
//
|
||||||
|
@@ -385,7 +407,7 @@ SecTemporaryRamDone (
|
||||||
|
//
|
||||||
|
// Disable interrupts and save current interrupt state
|
||||||
|
//
|
||||||
|
- State = SaveAndDisableInterrupts();
|
||||||
|
+ State = SaveAndDisableInterrupts ();
|
||||||
|
|
||||||
|
//
|
||||||
|
// Disable Temporary RAM after Stack and Heap have been migrated at this point.
|
||||||
|
diff --git a/UefiCpuPkg/SecCore/SecMain.h b/UefiCpuPkg/SecCore/SecMain.h
|
||||||
|
index e8c05d7136..e20bcf8653 100644
|
||||||
|
--- a/UefiCpuPkg/SecCore/SecMain.h
|
||||||
|
+++ b/UefiCpuPkg/SecCore/SecMain.h
|
||||||
|
@@ -15,6 +15,7 @@
|
||||||
|
#include <Ppi/TemporaryRamDone.h>
|
||||||
|
#include <Ppi/SecPerformance.h>
|
||||||
|
#include <Ppi/PeiCoreFvLocation.h>
|
||||||
|
+#include <Ppi/RepublishSecPpi.h>
|
||||||
|
|
||||||
|
#include <Guid/FirmwarePerformance.h>
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/SecMigrationPei/SecMigrationPei.c b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.c
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..4813a06f13
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.c
|
||||||
|
@@ -0,0 +1,385 @@
|
||||||
|
+/** @file
|
||||||
|
+ Migrates SEC structures after permanent memory is installed.
|
||||||
|
+
|
||||||
|
+ Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+
|
||||||
|
+#include <Base.h>
|
||||||
|
+
|
||||||
|
+#include <Library/BaseLib.h>
|
||||||
|
+#include <Library/BaseMemoryLib.h>
|
||||||
|
+#include <Library/DebugLib.h>
|
||||||
|
+#include <Library/HobLib.h>
|
||||||
|
+#include <Library/MemoryAllocationLib.h>
|
||||||
|
+#include <Library/PeiServicesLib.h>
|
||||||
|
+#include <Library/PeiServicesTablePointerLib.h>
|
||||||
|
+
|
||||||
|
+#include "SecMigrationPei.h"
|
||||||
|
+
|
||||||
|
+STATIC REPUBLISH_SEC_PPI_PPI mEdkiiRepublishSecPpiPpi = {
|
||||||
|
+ RepublishSecPpis
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_SEC_PLATFORM_INFORMATION_PPI mSecPlatformInformationPostMemoryPpi = {
|
||||||
|
+ SecPlatformInformationPostMemory
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_TEMPORARY_RAM_DONE_PPI mSecTemporaryRamDonePostMemoryPpi = {
|
||||||
|
+ SecTemporaryRamDonePostMemory
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_TEMPORARY_RAM_SUPPORT_PPI mSecTemporaryRamSupportPostMemoryPpi = {
|
||||||
|
+ SecTemporaryRamSupportPostMemory
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED PEI_SEC_PERFORMANCE_PPI mSecPerformancePpi = {
|
||||||
|
+ GetPerformancePostMemory
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+STATIC EFI_PEI_PPI_DESCRIPTOR mEdkiiRepublishSecPpiDescriptor = {
|
||||||
|
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||||
|
+ &gRepublishSecPpiPpiGuid,
|
||||||
|
+ &mEdkiiRepublishSecPpiPpi
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_PPI_DESCRIPTOR mSecPlatformInformationPostMemoryDescriptor = {
|
||||||
|
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||||
|
+ &gEfiSecPlatformInformationPpiGuid,
|
||||||
|
+ &mSecPlatformInformationPostMemoryPpi
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_PPI_DESCRIPTOR mSecTemporaryRamDonePostMemoryDescriptor = {
|
||||||
|
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||||
|
+ &gEfiTemporaryRamDonePpiGuid,
|
||||||
|
+ &mSecTemporaryRamDonePostMemoryPpi
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_PPI_DESCRIPTOR mSecTemporaryRamSupportPostMemoryDescriptor = {
|
||||||
|
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||||
|
+ &gEfiTemporaryRamSupportPpiGuid,
|
||||||
|
+ &mSecTemporaryRamSupportPostMemoryPpi
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+GLOBAL_REMOVE_IF_UNREFERENCED EFI_PEI_PPI_DESCRIPTOR mSecPerformancePpiDescriptor = {
|
||||||
|
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
|
||||||
|
+ &gPeiSecPerformancePpiGuid,
|
||||||
|
+ &mSecPerformancePpi
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ Disables the use of Temporary RAM.
|
||||||
|
+
|
||||||
|
+ If present, this service is invoked by the PEI Foundation after
|
||||||
|
+ the EFI_PEI_PERMANANT_MEMORY_INSTALLED_PPI is installed.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS Dummy function, alway return this value.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecTemporaryRamDonePostMemory (
|
||||||
|
+ VOID
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ //
|
||||||
|
+ // Temporary RAM Done is already done in post-memory
|
||||||
|
+ // install a stub function that is located in permanent memory
|
||||||
|
+ //
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This service of the EFI_PEI_TEMPORARY_RAM_SUPPORT_PPI that migrates temporary RAM into
|
||||||
|
+ permanent memory.
|
||||||
|
+
|
||||||
|
+ @param PeiServices Pointer to the PEI Services Table.
|
||||||
|
+ @param TemporaryMemoryBase Source Address in temporary memory from which the SEC or PEIM will copy the
|
||||||
|
+ Temporary RAM contents.
|
||||||
|
+ @param PermanentMemoryBase Destination Address in permanent memory into which the SEC or PEIM will copy the
|
||||||
|
+ Temporary RAM contents.
|
||||||
|
+ @param CopySize Amount of memory to migrate from temporary to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The data was successfully returned.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER PermanentMemoryBase + CopySize > TemporaryMemoryBase when
|
||||||
|
+ TemporaryMemoryBase > PermanentMemoryBase.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecTemporaryRamSupportPostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,
|
||||||
|
+ IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,
|
||||||
|
+ IN UINTN CopySize
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ //
|
||||||
|
+ // Temporary RAM Support is already done in post-memory
|
||||||
|
+ // install a stub function that is located in permanent memory
|
||||||
|
+ //
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface conveys performance information out of the Security (SEC) phase into PEI.
|
||||||
|
+
|
||||||
|
+ This service is published by the SEC phase. The SEC phase handoff has an optional
|
||||||
|
+ EFI_PEI_PPI_DESCRIPTOR list as its final argument when control is passed from SEC into the
|
||||||
|
+ PEI Foundation. As such, if the platform supports collecting performance data in SEC,
|
||||||
|
+ this information is encapsulated into the data structure abstracted by this service.
|
||||||
|
+ This information is collected for the boot-strap processor (BSP) on IA-32.
|
||||||
|
+
|
||||||
|
+ @param[in] PeiServices The pointer to the PEI Services Table.
|
||||||
|
+ @param[in] This The pointer to this instance of the PEI_SEC_PERFORMANCE_PPI.
|
||||||
|
+ @param[out] Performance The pointer to performance data collected in SEC phase.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The performance data was successfully returned.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER The This or Performance is NULL.
|
||||||
|
+ @retval EFI_NOT_FOUND Can't found the HOB created by the SecMigrationPei component.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+GetPerformancePostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN PEI_SEC_PERFORMANCE_PPI *This,
|
||||||
|
+ OUT FIRMWARE_SEC_PERFORMANCE *Performance
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ SEC_PLATFORM_INFORMATION_CONTEXT_HOB *SecPlatformInformationContexHob;
|
||||||
|
+
|
||||||
|
+ if (This == NULL || Performance == NULL) {
|
||||||
|
+ return EFI_INVALID_PARAMETER;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ SecPlatformInformationContexHob = GetFirstGuidHob (&gEfiCallerIdGuid);
|
||||||
|
+ if (SecPlatformInformationContexHob == NULL) {
|
||||||
|
+ return EFI_NOT_FOUND;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ Performance->ResetEnd = SecPlatformInformationContexHob->FirmwareSecPerformance.ResetEnd;
|
||||||
|
+
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface conveys state information out of the Security (SEC) phase into PEI.
|
||||||
|
+
|
||||||
|
+ @param[in] PeiServices Pointer to the PEI Services Table.
|
||||||
|
+ @param[in,out] StructureSize Pointer to the variable describing size of the input buffer.
|
||||||
|
+ @param[out] PlatformInformationRecord Pointer to the EFI_SEC_PLATFORM_INFORMATION_RECORD.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The data was successfully returned.
|
||||||
|
+ @retval EFI_NOT_FOUND Can't found the HOB created by SecMigrationPei component.
|
||||||
|
+ @retval EFI_BUFFER_TOO_SMALL The size of buffer pointed by StructureSize is too small and will return
|
||||||
|
+ the minimal required size in the buffer pointed by StructureSize.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER The StructureSize is NULL or PlatformInformationRecord is NULL.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecPlatformInformationPostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN OUT UINT64 *StructureSize,
|
||||||
|
+ OUT EFI_SEC_PLATFORM_INFORMATION_RECORD *PlatformInformationRecord
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ SEC_PLATFORM_INFORMATION_CONTEXT_HOB *SecPlatformInformationContexHob;
|
||||||
|
+
|
||||||
|
+ if (StructureSize == NULL) {
|
||||||
|
+ return EFI_INVALID_PARAMETER;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ SecPlatformInformationContexHob = GetFirstGuidHob (&gEfiCallerIdGuid);
|
||||||
|
+ if (SecPlatformInformationContexHob == NULL) {
|
||||||
|
+ return EFI_NOT_FOUND;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (*StructureSize < SecPlatformInformationContexHob->Context.StructureSize) {
|
||||||
|
+ *StructureSize = SecPlatformInformationContexHob->Context.StructureSize;
|
||||||
|
+ return EFI_BUFFER_TOO_SMALL;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (PlatformInformationRecord == NULL) {
|
||||||
|
+ return EFI_INVALID_PARAMETER;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ *StructureSize = SecPlatformInformationContexHob->Context.StructureSize;
|
||||||
|
+ CopyMem (
|
||||||
|
+ (VOID *) PlatformInformationRecord,
|
||||||
|
+ (VOID *) SecPlatformInformationContexHob->Context.PlatformInformationRecord,
|
||||||
|
+ (UINTN) SecPlatformInformationContexHob->Context.StructureSize
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface re-installs PPIs installed in SecCore from a post-memory PEIM.
|
||||||
|
+
|
||||||
|
+ This is to allow a platform that may not support relocation of SecCore to update the PPI instance to a post-memory
|
||||||
|
+ copy from a PEIM that has been shadowed to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The SecCore PPIs were re-installed successfully.
|
||||||
|
+ @retval Others An error occurred re-installing the SecCore PPIs.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+RepublishSecPpis (
|
||||||
|
+ VOID
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ EFI_PEI_PPI_DESCRIPTOR *PeiPpiDescriptor;
|
||||||
|
+ VOID *PeiPpi;
|
||||||
|
+ SEC_PLATFORM_INFORMATION_CONTEXT_HOB *SecPlatformInformationContextHob;
|
||||||
|
+ EFI_SEC_PLATFORM_INFORMATION_RECORD *SecPlatformInformationPtr;
|
||||||
|
+ UINT64 SecStructureSize;
|
||||||
|
+
|
||||||
|
+ SecPlatformInformationPtr = NULL;
|
||||||
|
+ SecStructureSize = 0;
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesLocatePpi (
|
||||||
|
+ &gEfiTemporaryRamDonePpiGuid,
|
||||||
|
+ 0,
|
||||||
|
+ &PeiPpiDescriptor,
|
||||||
|
+ (VOID **) &PeiPpi
|
||||||
|
+ );
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = PeiServicesReInstallPpi (
|
||||||
|
+ PeiPpiDescriptor,
|
||||||
|
+ &mSecTemporaryRamDonePostMemoryDescriptor
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesLocatePpi (
|
||||||
|
+ &gEfiTemporaryRamSupportPpiGuid,
|
||||||
|
+ 0,
|
||||||
|
+ &PeiPpiDescriptor,
|
||||||
|
+ (VOID **) &PeiPpi
|
||||||
|
+ );
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = PeiServicesReInstallPpi (
|
||||||
|
+ PeiPpiDescriptor,
|
||||||
|
+ &mSecTemporaryRamSupportPostMemoryDescriptor
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesCreateHob (
|
||||||
|
+ EFI_HOB_TYPE_GUID_EXTENSION,
|
||||||
|
+ sizeof (SEC_PLATFORM_INFORMATION_CONTEXT_HOB),
|
||||||
|
+ (VOID **) &SecPlatformInformationContextHob
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ if (EFI_ERROR (Status)) {
|
||||||
|
+ DEBUG ((DEBUG_ERROR, "SecPlatformInformation Context HOB could not be created.\n"));
|
||||||
|
+ return Status;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ SecPlatformInformationContextHob->Header.Name = gEfiCallerIdGuid;
|
||||||
|
+ SecPlatformInformationContextHob->Revision = 1;
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesLocatePpi (
|
||||||
|
+ &gPeiSecPerformancePpiGuid,
|
||||||
|
+ 0,
|
||||||
|
+ &PeiPpiDescriptor,
|
||||||
|
+ (VOID **) &PeiPpi
|
||||||
|
+ );
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = ((PEI_SEC_PERFORMANCE_PPI *) PeiPpi)->GetPerformance (
|
||||||
|
+ GetPeiServicesTablePointer (),
|
||||||
|
+ (PEI_SEC_PERFORMANCE_PPI *) PeiPpi,
|
||||||
|
+ &SecPlatformInformationContextHob->FirmwareSecPerformance
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = PeiServicesReInstallPpi (
|
||||||
|
+ PeiPpiDescriptor,
|
||||||
|
+ &mSecPerformancePpiDescriptor
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesLocatePpi (
|
||||||
|
+ &gEfiSecPlatformInformationPpiGuid,
|
||||||
|
+ 0,
|
||||||
|
+ &PeiPpiDescriptor,
|
||||||
|
+ (VOID **) &PeiPpi
|
||||||
|
+ );
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = ((EFI_SEC_PLATFORM_INFORMATION_PPI *) PeiPpi)->PlatformInformation (
|
||||||
|
+ GetPeiServicesTablePointer (),
|
||||||
|
+ &SecStructureSize,
|
||||||
|
+ SecPlatformInformationPtr
|
||||||
|
+ );
|
||||||
|
+ ASSERT (Status == EFI_BUFFER_TOO_SMALL);
|
||||||
|
+ if (Status != EFI_BUFFER_TOO_SMALL) {
|
||||||
|
+ return EFI_NOT_FOUND;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ ZeroMem ((VOID *) &(SecPlatformInformationContextHob->Context), sizeof (SEC_PLATFORM_INFORMATION_CONTEXT));
|
||||||
|
+ SecPlatformInformationContextHob->Context.PlatformInformationRecord = AllocatePool ((UINTN) SecStructureSize);
|
||||||
|
+ ASSERT (SecPlatformInformationContextHob->Context.PlatformInformationRecord != NULL);
|
||||||
|
+ if (SecPlatformInformationContextHob->Context.PlatformInformationRecord == NULL) {
|
||||||
|
+ return EFI_OUT_OF_RESOURCES;
|
||||||
|
+ }
|
||||||
|
+ SecPlatformInformationContextHob->Context.StructureSize = SecStructureSize;
|
||||||
|
+
|
||||||
|
+ Status = ((EFI_SEC_PLATFORM_INFORMATION_PPI *) PeiPpi)->PlatformInformation (
|
||||||
|
+ GetPeiServicesTablePointer (),
|
||||||
|
+ &(SecPlatformInformationContextHob->Context.StructureSize),
|
||||||
|
+ SecPlatformInformationContextHob->Context.PlatformInformationRecord
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ if (!EFI_ERROR (Status)) {
|
||||||
|
+ Status = PeiServicesReInstallPpi (
|
||||||
|
+ PeiPpiDescriptor,
|
||||||
|
+ &mSecPlatformInformationPostMemoryDescriptor
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This function is the entry point which installs an instance of REPUBLISH_SEC_PPI_PPI.
|
||||||
|
+
|
||||||
|
+ It install the RepublishSecPpi depent on PcdMigrateTemporaryRamFirmwareVolumes, install
|
||||||
|
+ the PPI when the PcdMigrateTemporaryRamFirmwareVolumes enabled.
|
||||||
|
+
|
||||||
|
+ @param[in] FileHandle Pointer to image file handle.
|
||||||
|
+ @param[in] PeiServices Pointer to PEI Services Table
|
||||||
|
+
|
||||||
|
+ @retval EFI_ABORTED Disable evacuate temporary memory feature by disable
|
||||||
|
+ PcdMigrateTemporaryRamFirmwareVolumes.
|
||||||
|
+ @retval EFI_SUCCESS An instance of REPUBLISH_SEC_PPI_PPI was installed successfully.
|
||||||
|
+ @retval Others An error occurred installing and instance of REPUBLISH_SEC_PPI_PPI.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecMigrationPeiInitialize (
|
||||||
|
+ IN EFI_PEI_FILE_HANDLE FileHandle,
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+
|
||||||
|
+ Status = EFI_ABORTED;
|
||||||
|
+
|
||||||
|
+ if (PcdGetBool (PcdMigrateTemporaryRamFirmwareVolumes)) {
|
||||||
|
+ Status = PeiServicesInstallPpi (&mEdkiiRepublishSecPpiDescriptor);
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ return Status;
|
||||||
|
+}
|
||||||
|
diff --git a/UefiCpuPkg/SecMigrationPei/SecMigrationPei.h b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.h
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..2d28490d9e
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.h
|
||||||
|
@@ -0,0 +1,158 @@
|
||||||
|
+/** @file
|
||||||
|
+ Migrates SEC structures after permanent memory is installed.
|
||||||
|
+
|
||||||
|
+ Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+
|
||||||
|
+#ifndef __SEC_MIGRATION_H__
|
||||||
|
+#define __SEC_MIGRATION_H__
|
||||||
|
+
|
||||||
|
+#include <Base.h>
|
||||||
|
+
|
||||||
|
+#include <Pi/PiPeiCis.h>
|
||||||
|
+#include <Ppi/RepublishSecPpi.h>
|
||||||
|
+#include <Ppi/SecPerformance.h>
|
||||||
|
+#include <Ppi/SecPlatformInformation.h>
|
||||||
|
+#include <Ppi/SecPlatformInformation2.h>
|
||||||
|
+#include <Ppi/TemporaryRamDone.h>
|
||||||
|
+#include <Ppi/TemporaryRamSupport.h>
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface conveys state information out of the Security (SEC) phase into PEI.
|
||||||
|
+
|
||||||
|
+ @param[in] PeiServices Pointer to the PEI Services Table.
|
||||||
|
+ @param[in,out] StructureSize Pointer to the variable describing size of the input buffer.
|
||||||
|
+ @param[out] PlatformInformationRecord Pointer to the EFI_SEC_PLATFORM_INFORMATION_RECORD.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The data was successfully returned.
|
||||||
|
+ @retval EFI_NOT_FOUND Can't found the HOB created by SecMigrationPei component.
|
||||||
|
+ @retval EFI_BUFFER_TOO_SMALL The size of buffer pointed by StructureSize is too small and will return
|
||||||
|
+ the minimal required size in the buffer pointed by StructureSize.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER The StructureSize is NULL or PlatformInformationRecord is NULL.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecPlatformInformationPostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN OUT UINT64 *StructureSize,
|
||||||
|
+ OUT EFI_SEC_PLATFORM_INFORMATION_RECORD *PlatformInformationRecord
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ Re-installs the SEC Platform Information PPIs to implementation in this module to support post-memory.
|
||||||
|
+
|
||||||
|
+ @param[in] PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation.
|
||||||
|
+ @param[in] NotifyDescriptor Address of the notification descriptor data structure.
|
||||||
|
+ @param[in] Ppi Address of the PPI that was installed.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The SEC Platform Information PPI could not be re-installed.
|
||||||
|
+ @return Others An error occurred during PPI re-install.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecPlatformInformationPpiNotifyCallback (
|
||||||
|
+ IN EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,
|
||||||
|
+ IN VOID *Ppi
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface re-installs PPIs installed in SecCore from a post-memory PEIM.
|
||||||
|
+
|
||||||
|
+ This is to allow a platform that may not support relocation of SecCore to update the PPI instance to a post-memory
|
||||||
|
+ copy from a PEIM that has been shadowed to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The SecCore PPIs were re-installed successfully.
|
||||||
|
+ @retval Others An error occurred re-installing the SecCore PPIs.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+RepublishSecPpis (
|
||||||
|
+ VOID
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ Disables the use of Temporary RAM.
|
||||||
|
+
|
||||||
|
+ If present, this service is invoked by the PEI Foundation after
|
||||||
|
+ the EFI_PEI_PERMANANT_MEMORY_INSTALLED_PPI is installed.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS Dummy function, alway return this value.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecTemporaryRamDonePostMemory (
|
||||||
|
+ VOID
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This service of the EFI_PEI_TEMPORARY_RAM_SUPPORT_PPI that migrates temporary RAM into
|
||||||
|
+ permanent memory.
|
||||||
|
+
|
||||||
|
+ @param PeiServices Pointer to the PEI Services Table.
|
||||||
|
+ @param TemporaryMemoryBase Source Address in temporary memory from which the SEC or PEIM will copy the
|
||||||
|
+ Temporary RAM contents.
|
||||||
|
+ @param PermanentMemoryBase Destination Address in permanent memory into which the SEC or PEIM will copy the
|
||||||
|
+ Temporary RAM contents.
|
||||||
|
+ @param CopySize Amount of memory to migrate from temporary to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The data was successfully returned.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER PermanentMemoryBase + CopySize > TemporaryMemoryBase when
|
||||||
|
+ TemporaryMemoryBase > PermanentMemoryBase.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+SecTemporaryRamSupportPostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,
|
||||||
|
+ IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,
|
||||||
|
+ IN UINTN CopySize
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+/**
|
||||||
|
+ This interface conveys performance information out of the Security (SEC) phase into PEI.
|
||||||
|
+
|
||||||
|
+ This service is published by the SEC phase. The SEC phase handoff has an optional
|
||||||
|
+ EFI_PEI_PPI_DESCRIPTOR list as its final argument when control is passed from SEC into the
|
||||||
|
+ PEI Foundation. As such, if the platform supports collecting performance data in SEC,
|
||||||
|
+ this information is encapsulated into the data structure abstracted by this service.
|
||||||
|
+ This information is collected for the boot-strap processor (BSP) on IA-32.
|
||||||
|
+
|
||||||
|
+ @param[in] PeiServices The pointer to the PEI Services Table.
|
||||||
|
+ @param[in] This The pointer to this instance of the PEI_SEC_PERFORMANCE_PPI.
|
||||||
|
+ @param[out] Performance The pointer to performance data collected in SEC phase.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The performance data was successfully returned.
|
||||||
|
+ @retval EFI_INVALID_PARAMETER The This or Performance is NULL.
|
||||||
|
+ @retval EFI_NOT_FOUND Can't found the HOB created by the SecMigrationPei component.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+EFIAPI
|
||||||
|
+GetPerformancePostMemory (
|
||||||
|
+ IN CONST EFI_PEI_SERVICES **PeiServices,
|
||||||
|
+ IN PEI_SEC_PERFORMANCE_PPI *This,
|
||||||
|
+ OUT FIRMWARE_SEC_PERFORMANCE *Performance
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
+typedef struct {
|
||||||
|
+ UINT64 StructureSize;
|
||||||
|
+ EFI_SEC_PLATFORM_INFORMATION_RECORD *PlatformInformationRecord;
|
||||||
|
+} SEC_PLATFORM_INFORMATION_CONTEXT;
|
||||||
|
+
|
||||||
|
+typedef struct {
|
||||||
|
+ EFI_HOB_GUID_TYPE Header;
|
||||||
|
+ UINT8 Revision;
|
||||||
|
+ UINT8 Reserved[3];
|
||||||
|
+ FIRMWARE_SEC_PERFORMANCE FirmwareSecPerformance;
|
||||||
|
+ SEC_PLATFORM_INFORMATION_CONTEXT Context;
|
||||||
|
+} SEC_PLATFORM_INFORMATION_CONTEXT_HOB;
|
||||||
|
+
|
||||||
|
+#endif
|
||||||
|
diff --git a/UefiCpuPkg/SecMigrationPei/SecMigrationPei.inf b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.inf
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..384d6a96f6
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.inf
|
||||||
|
@@ -0,0 +1,68 @@
|
||||||
|
+## @file
|
||||||
|
+# Migrates SEC structures after permanent memory is installed.
|
||||||
|
+#
|
||||||
|
+# Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+#
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+[Defines]
|
||||||
|
+ INF_VERSION = 0x00010005
|
||||||
|
+ BASE_NAME = SecMigrationPei
|
||||||
|
+ MODULE_UNI_FILE = SecMigrationPei.uni
|
||||||
|
+ FILE_GUID = 58B35361-8922-41BC-B313-EF7ED9ADFDF7
|
||||||
|
+ MODULE_TYPE = PEIM
|
||||||
|
+ VERSION_STRING = 1.0
|
||||||
|
+ ENTRY_POINT = SecMigrationPeiInitialize
|
||||||
|
+
|
||||||
|
+#
|
||||||
|
+# The following information is for reference only and not required by the build tools.
|
||||||
|
+#
|
||||||
|
+# VALID_ARCHITECTURES = IA32 X64 EBC
|
||||||
|
+#
|
||||||
|
+
|
||||||
|
+[Sources]
|
||||||
|
+ SecMigrationPei.c
|
||||||
|
+ SecMigrationPei.h
|
||||||
|
+
|
||||||
|
+[Packages]
|
||||||
|
+ MdePkg/MdePkg.dec
|
||||||
|
+ MdeModulePkg/MdeModulePkg.dec
|
||||||
|
+ UefiCpuPkg/UefiCpuPkg.dec
|
||||||
|
+
|
||||||
|
+[LibraryClasses]
|
||||||
|
+ BaseLib
|
||||||
|
+ BaseMemoryLib
|
||||||
|
+ DebugLib
|
||||||
|
+ HobLib
|
||||||
|
+ MemoryAllocationLib
|
||||||
|
+ PeimEntryPoint
|
||||||
|
+ PeiServicesLib
|
||||||
|
+ PeiServicesTablePointerLib
|
||||||
|
+
|
||||||
|
+[Ppis]
|
||||||
|
+ ## PRODUCES
|
||||||
|
+ gRepublishSecPpiPpiGuid
|
||||||
|
+
|
||||||
|
+ ## SOMETIMES_PRODUCES
|
||||||
|
+ gEfiTemporaryRamDonePpiGuid
|
||||||
|
+
|
||||||
|
+ ## SOMETIME_PRODUCES
|
||||||
|
+ gEfiTemporaryRamSupportPpiGuid
|
||||||
|
+
|
||||||
|
+ ## SOMETIMES_PRODUCES
|
||||||
|
+ gPeiSecPerformancePpiGuid
|
||||||
|
+
|
||||||
|
+ ## SOMETIMES_CONSUMES
|
||||||
|
+ ## PRODUCES
|
||||||
|
+ gEfiSecPlatformInformationPpiGuid
|
||||||
|
+
|
||||||
|
+ ## SOMETIMES_CONSUMES
|
||||||
|
+ ## SOMETIMES_PRODUCES
|
||||||
|
+ gEfiSecPlatformInformation2PpiGuid
|
||||||
|
+
|
||||||
|
+[Pcd]
|
||||||
|
+ gEfiMdeModulePkgTokenSpaceGuid.PcdMigrateTemporaryRamFirmwareVolumes ## CONSUMES
|
||||||
|
+
|
||||||
|
+[Depex]
|
||||||
|
+ TRUE
|
||||||
|
diff --git a/UefiCpuPkg/SecMigrationPei/SecMigrationPei.uni b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.uni
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..62c2064ba2
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/UefiCpuPkg/SecMigrationPei/SecMigrationPei.uni
|
||||||
|
@@ -0,0 +1,13 @@
|
||||||
|
+// /** @file
|
||||||
|
+// Migrates SEC structures after permanent memory is installed.
|
||||||
|
+//
|
||||||
|
+// Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+// SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+//
|
||||||
|
+// **/
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+#string STR_MODULE_ABSTRACT #language en-US "Migrates SEC structures after permanent memory is installed"
|
||||||
|
+
|
||||||
|
+#string STR_MODULE_DESCRIPTION #language en-US "Migrates SEC structures after permanent memory is installed."
|
||||||
|
+
|
||||||
|
diff --git a/UefiCpuPkg/UefiCpuPkg.dec b/UefiCpuPkg/UefiCpuPkg.dec
|
||||||
|
index 762badf5d2..8b2e03d49d 100644
|
||||||
|
--- a/UefiCpuPkg/UefiCpuPkg.dec
|
||||||
|
+++ b/UefiCpuPkg/UefiCpuPkg.dec
|
||||||
|
@@ -84,6 +84,9 @@
|
||||||
|
## Include/Ppi/ShadowMicrocode.h
|
||||||
|
gEdkiiPeiShadowMicrocodePpiGuid = { 0x430f6965, 0x9a69, 0x41c5, { 0x93, 0xed, 0x8b, 0xf0, 0x64, 0x35, 0xc1, 0xc6 }}
|
||||||
|
|
||||||
|
+ ## Include/Ppi/RepublishSecPpi.h
|
||||||
|
+ gRepublishSecPpiPpiGuid = { 0x27a71b1e, 0x73ee, 0x43d6, { 0xac, 0xe3, 0x52, 0x1a, 0x2d, 0xc5, 0xd0, 0x92 }}
|
||||||
|
+
|
||||||
|
[PcdsFeatureFlag]
|
||||||
|
## Indicates if SMM Profile will be enabled.
|
||||||
|
# If enabled, instruction executions in and data accesses to memory outside of SMRAM will be logged.
|
||||||
|
diff --git a/UefiCpuPkg/UefiCpuPkg.dsc b/UefiCpuPkg/UefiCpuPkg.dsc
|
||||||
|
index afa3041282..964720048d 100644
|
||||||
|
--- a/UefiCpuPkg/UefiCpuPkg.dsc
|
||||||
|
+++ b/UefiCpuPkg/UefiCpuPkg.dsc
|
||||||
|
@@ -146,6 +146,7 @@
|
||||||
|
UefiCpuPkg/PiSmmCommunication/PiSmmCommunicationPei.inf
|
||||||
|
UefiCpuPkg/PiSmmCommunication/PiSmmCommunicationSmm.inf
|
||||||
|
UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
+ UefiCpuPkg/SecMigrationPei/SecMigrationPei.inf
|
||||||
|
UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
|
||||||
|
UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf {
|
||||||
|
<Defines>
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
1339
0029-MdeModulePkg-PeiCore-Enable-T-RAM-evacuation-in-PeiC.patch
Normal file
1339
0029-MdeModulePkg-PeiCore-Enable-T-RAM-evacuation-in-PeiC.patch
Normal file
File diff suppressed because it is too large
Load Diff
117
0030-SecurityPkg-Tcg2Pei-Use-Migrated-FV-Info-Hob-for-cal.patch
Normal file
117
0030-SecurityPkg-Tcg2Pei-Use-Migrated-FV-Info-Hob-for-cal.patch
Normal file
@ -0,0 +1,117 @@
|
|||||||
|
From 012809cdca4b876e675cbd181fee213133858a5e Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Mon, 29 Jun 2020 14:50:21 +0800
|
||||||
|
Subject: [PATCH] SecurityPkg/Tcg2Pei: Use Migrated FV Info Hob for calculating
|
||||||
|
hash (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
When we allocate pool to save rebased the PEIMs, the address will change
|
||||||
|
randomly, therefore the hash will change and result PCR0 change as well.
|
||||||
|
To avoid this, we save the raw PEIMs and use it to calculate hash.
|
||||||
|
The Tcg2Pei calculate the hash and it use the Migrated FV Info.
|
||||||
|
|
||||||
|
Cc: Jiewen Yao <jiewen.yao@intel.com>
|
||||||
|
Cc: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Cc: Chao Zhang <chao.b.zhang@intel.com>
|
||||||
|
Cc: Qi Zhang <qi1.zhang@intel.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Reviewed-by: Qi Zhang <qi1.zhang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c | 31 ++++++++++++++++++++++++++---
|
||||||
|
SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf | 1 +
|
||||||
|
2 files changed, 29 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
|
||||||
|
index 4852d86..651a60c 100644
|
||||||
|
--- a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
|
||||||
|
+++ b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
|
||||||
|
@@ -21,6 +21,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
#include <Guid/TcgEventHob.h>
|
||||||
|
#include <Guid/MeasuredFvHob.h>
|
||||||
|
#include <Guid/TpmInstance.h>
|
||||||
|
+#include <Guid/MigratedFvInfo.h>
|
||||||
|
|
||||||
|
#include <Library/DebugLib.h>
|
||||||
|
#include <Library/BaseMemoryLib.h>
|
||||||
|
@@ -536,6 +537,10 @@ MeasureFvImage (
|
||||||
|
EDKII_PEI_FIRMWARE_VOLUME_INFO_PREHASHED_FV_PPI *PrehashedFvPpi;
|
||||||
|
HASH_INFO *PreHashInfo;
|
||||||
|
UINT32 HashAlgoMask;
|
||||||
|
+ EFI_PHYSICAL_ADDRESS FvOrgBase;
|
||||||
|
+ EFI_PHYSICAL_ADDRESS FvDataBase;
|
||||||
|
+ EFI_PEI_HOB_POINTERS Hob;
|
||||||
|
+ EDKII_MIGRATED_FV_INFO *MigratedFvInfo;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check Excluded FV list
|
||||||
|
@@ -621,6 +626,26 @@ MeasureFvImage (
|
||||||
|
Instance++;
|
||||||
|
} while (!EFI_ERROR(Status));
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Search the matched migration FV info
|
||||||
|
+ //
|
||||||
|
+ FvOrgBase = FvBase;
|
||||||
|
+ FvDataBase = FvBase;
|
||||||
|
+ Hob.Raw = GetFirstGuidHob (&gEdkiiMigratedFvInfoGuid);
|
||||||
|
+ while (Hob.Raw != NULL) {
|
||||||
|
+ MigratedFvInfo = GET_GUID_HOB_DATA (Hob);
|
||||||
|
+ if ((MigratedFvInfo->FvNewBase == (UINT32) FvBase) && (MigratedFvInfo->FvLength == (UINT32) FvLength)) {
|
||||||
|
+ //
|
||||||
|
+ // Found the migrated FV info
|
||||||
|
+ //
|
||||||
|
+ FvOrgBase = (EFI_PHYSICAL_ADDRESS) (UINTN) MigratedFvInfo->FvOrgBase;
|
||||||
|
+ FvDataBase = (EFI_PHYSICAL_ADDRESS) (UINTN) MigratedFvInfo->FvDataBase;
|
||||||
|
+ break;
|
||||||
|
+ }
|
||||||
|
+ Hob.Raw = GET_NEXT_HOB (Hob);
|
||||||
|
+ Hob.Raw = GetNextGuidHob (&gEdkiiMigratedFvInfoGuid, Hob.Raw);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
//
|
||||||
|
// Init the log event for FV measurement
|
||||||
|
//
|
||||||
|
@@ -631,13 +656,13 @@ MeasureFvImage (
|
||||||
|
if (FvName != NULL) {
|
||||||
|
AsciiSPrint ((CHAR8 *)FvBlob2.BlobDescription, sizeof(FvBlob2.BlobDescription), "Fv(%g)", FvName);
|
||||||
|
}
|
||||||
|
- FvBlob2.BlobBase = FvBase;
|
||||||
|
+ FvBlob2.BlobBase = FvOrgBase;
|
||||||
|
FvBlob2.BlobLength = FvLength;
|
||||||
|
TcgEventHdr.EventType = EV_EFI_PLATFORM_FIRMWARE_BLOB2;
|
||||||
|
TcgEventHdr.EventSize = sizeof (FvBlob2);
|
||||||
|
EventData = &FvBlob2;
|
||||||
|
} else {
|
||||||
|
- FvBlob.BlobBase = FvBase;
|
||||||
|
+ FvBlob.BlobBase = FvOrgBase;
|
||||||
|
FvBlob.BlobLength = FvLength;
|
||||||
|
TcgEventHdr.PCRIndex = 0;
|
||||||
|
TcgEventHdr.EventType = EV_EFI_PLATFORM_FIRMWARE_BLOB;
|
||||||
|
@@ -672,7 +697,7 @@ MeasureFvImage (
|
||||||
|
//
|
||||||
|
Status = HashLogExtendEvent (
|
||||||
|
0,
|
||||||
|
- (UINT8*) (UINTN) FvBase, // HashData
|
||||||
|
+ (UINT8*) (UINTN) FvDataBase, // HashData
|
||||||
|
(UINTN) FvLength, // HashDataLen
|
||||||
|
&TcgEventHdr, // EventHdr
|
||||||
|
EventData // EventData
|
||||||
|
diff --git a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
index 3d361e8..367df21 100644
|
||||||
|
--- a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
+++ b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
@@ -63,6 +63,7 @@
|
||||||
|
gTcgEvent2EntryHobGuid ## PRODUCES ## HOB
|
||||||
|
gEfiTpmDeviceInstanceNoneGuid ## SOMETIMES_PRODUCES ## GUID # TPM device identifier
|
||||||
|
gEfiTpmDeviceInstanceTpm12Guid ## SOMETIMES_PRODUCES ## GUID # TPM device identifier
|
||||||
|
+ gEdkiiMigratedFvInfoGuid ## SOMETIMES_CONSUMES ## HOB
|
||||||
|
|
||||||
|
[Ppis]
|
||||||
|
gEfiPeiFirmwareVolumeInfoPpiGuid ## SOMETIMES_CONSUMES ## NOTIFY
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
@ -0,0 +1,74 @@
|
|||||||
|
From 1facb8fdef6389f390b66da6d8304f54cc93104a Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Wed, 8 Jul 2020 09:33:46 +0800
|
||||||
|
Subject: [PATCH] MdeModulePkg: Add new PCD to control the evacuate temporary
|
||||||
|
memory feature (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
The security researcher found that we can get control after NEM disable.
|
||||||
|
|
||||||
|
The reason is that the flash content reside in NEM at startup and the
|
||||||
|
code will get the content from flash directly after disable NEM.
|
||||||
|
|
||||||
|
To avoid this vulnerability, the feature will copy the PEIMs from
|
||||||
|
temporary memory to permanent memory and only execute the code in
|
||||||
|
permanent memory.
|
||||||
|
|
||||||
|
The vulnerability is exist in physical platform and haven't report in
|
||||||
|
virtual platform, so the virtual can disable the feature currently.
|
||||||
|
|
||||||
|
When enable the PcdMigrateTemporaryRamFirmwareVolumes, always shadow
|
||||||
|
all PEIMs no matter the condition of PcdShadowPeimOnBoot or
|
||||||
|
PcdShadowPeimOnS3Boot.
|
||||||
|
|
||||||
|
Cc: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Cc: Hao A Wu <hao.a.wu@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
---
|
||||||
|
MdeModulePkg/MdeModulePkg.dec | 9 +++++++++
|
||||||
|
MdeModulePkg/MdeModulePkg.uni | 6 ++++++
|
||||||
|
2 files changed, 15 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
index 843e963ad3..45874e9c82 100644
|
||||||
|
--- a/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
+++ b/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
@@ -1220,6 +1220,15 @@
|
||||||
|
# @Prompt Shadow Peim and PeiCore on boot
|
||||||
|
gEfiMdeModulePkgTokenSpaceGuid.PcdShadowPeimOnBoot|TRUE|BOOLEAN|0x30001029
|
||||||
|
|
||||||
|
+ ## Enable the feature that evacuate temporary memory to permanent memory or not<BR><BR>
|
||||||
|
+ # Set FALSE as default, if the developer need this feature to avoid this vulnerability, please
|
||||||
|
+ # enable it to shadow all PEIMs no matter the behavior controled by PcdShadowPeimOnBoot or
|
||||||
|
+ # PcdShadowPeimOnS3Boot<BR>
|
||||||
|
+ # TRUE - Evacuate temporary memory, the actions include copy memory, convert PPI pointers and so on.<BR>
|
||||||
|
+ # FALSE - Do nothing, for example, no copy memory, no convert PPI pointers and so on.<BR>
|
||||||
|
+ # @Prompt Evacuate temporary memory to permanent memory
|
||||||
|
+ gEfiMdeModulePkgTokenSpaceGuid.PcdMigrateTemporaryRamFirmwareVolumes|FALSE|BOOLEAN|0x3000102A
|
||||||
|
+
|
||||||
|
## The mask is used to control memory profile behavior.<BR><BR>
|
||||||
|
# BIT0 - Enable UEFI memory profile.<BR>
|
||||||
|
# BIT1 - Enable SMRAM profile.<BR>
|
||||||
|
diff --git a/MdeModulePkg/MdeModulePkg.uni b/MdeModulePkg/MdeModulePkg.uni
|
||||||
|
index 2007e0596c..5235dee561 100644
|
||||||
|
--- a/MdeModulePkg/MdeModulePkg.uni
|
||||||
|
+++ b/MdeModulePkg/MdeModulePkg.uni
|
||||||
|
@@ -214,6 +214,12 @@
|
||||||
|
"TRUE - Shadow PEIM on S3 boot path after memory is ready.<BR>\n"
|
||||||
|
"FALSE - Not shadow PEIM on S3 boot path after memory is ready.<BR>"
|
||||||
|
|
||||||
|
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_HELP #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not.<BR><BR>\n"
|
||||||
|
+ "It will allocate page to save the temporary PEIMs resided in NEM(or CAR) to the permanent memory and change all pointers pointed to the NEM(or CAR) to permanent memory.<BR><BR>\n"
|
||||||
|
+ "After then, there are no pointer pointed to NEM(or CAR) and TOCTOU volnerability can be avoid.<BR><BR>\n"
|
||||||
|
+
|
||||||
|
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_PROMPT #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not"
|
||||||
|
+
|
||||||
|
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_PROMPT #language en-US "Default OEM ID for ACPI table creation"
|
||||||
|
|
||||||
|
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_HELP #language en-US "Default OEM ID for ACPI table creation, its length must be 0x6 bytes to follow ACPI specification."
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
170
0032-MdeModulePkg-Core-Create-Migrated-FV-Info-Hob-for-ca.patch
Normal file
170
0032-MdeModulePkg-Core-Create-Migrated-FV-Info-Hob-for-ca.patch
Normal file
@ -0,0 +1,170 @@
|
|||||||
|
From 4b68cef04c70d8fd8a9bf745fc649c84d67531e8 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Mon, 29 Jun 2020 13:52:02 +0800
|
||||||
|
Subject: [PATCH] MdeModulePkg/Core: Create Migrated FV Info Hob for
|
||||||
|
calculating hash (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
When we allocate pool to save the rebased PEIMs, the address will change
|
||||||
|
randomly, therefore the hash will change and result PCR0 change as well.
|
||||||
|
To avoid this, we save the raw PEIMs and use it to calculate hash.
|
||||||
|
|
||||||
|
The MigratedFvInfo HOB will never produce when
|
||||||
|
PcdMigrateTemporaryRamFirmwareVolumes is FALSE, because the PCD control
|
||||||
|
the total feature.
|
||||||
|
|
||||||
|
Cc: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Cc: Hao A Wu <hao.a.wu@intel.com>
|
||||||
|
Cc: Dandan Bi <dandan.bi@intel.com>
|
||||||
|
Cc: Liming Gao <liming.gao@intel.com>
|
||||||
|
Cc: Debkumar De <debkumar.de@intel.com>
|
||||||
|
Cc: Harry Han <harry.han@intel.com>
|
||||||
|
Cc: Catharine West <catharine.west@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c | 28 +++++++++++++++++++
|
||||||
|
MdeModulePkg/Core/Pei/PeiMain.h | 1 +
|
||||||
|
MdeModulePkg/Core/Pei/PeiMain.inf | 1 +
|
||||||
|
MdeModulePkg/Include/Guid/MigratedFvInfo.h | 22 +++++++++++++++
|
||||||
|
MdeModulePkg/MdeModulePkg.dec | 3 ++
|
||||||
|
5 files changed, 55 insertions(+)
|
||||||
|
create mode 100644 MdeModulePkg/Include/Guid/MigratedFvInfo.h
|
||||||
|
|
||||||
|
diff --git a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c b/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c
|
||||||
|
index 5bc0f8674d..b9a279ec73 100644
|
||||||
|
--- a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c
|
||||||
|
+++ b/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c
|
||||||
|
@@ -1234,10 +1234,12 @@ EvacuateTempRam (
|
||||||
|
EFI_FIRMWARE_VOLUME_HEADER *FvHeader;
|
||||||
|
EFI_FIRMWARE_VOLUME_HEADER *ChildFvHeader;
|
||||||
|
EFI_FIRMWARE_VOLUME_HEADER *MigratedFvHeader;
|
||||||
|
+ EFI_FIRMWARE_VOLUME_HEADER *RawDataFvHeader;
|
||||||
|
EFI_FIRMWARE_VOLUME_HEADER *MigratedChildFvHeader;
|
||||||
|
|
||||||
|
PEI_CORE_FV_HANDLE PeiCoreFvHandle;
|
||||||
|
EFI_PEI_CORE_FV_LOCATION_PPI *PeiCoreFvLocationPpi;
|
||||||
|
+ EDKII_MIGRATED_FV_INFO MigratedFvInfo;
|
||||||
|
|
||||||
|
ASSERT (Private->PeiMemoryInstalled);
|
||||||
|
|
||||||
|
@@ -1274,6 +1276,9 @@ EvacuateTempRam (
|
||||||
|
(((EFI_PHYSICAL_ADDRESS)(UINTN) FvHeader + (FvHeader->FvLength - 1)) < Private->FreePhysicalMemoryTop)
|
||||||
|
)
|
||||||
|
) {
|
||||||
|
+ //
|
||||||
|
+ // Allocate page to save the rebased PEIMs, the PEIMs will get dispatched later.
|
||||||
|
+ //
|
||||||
|
Status = PeiServicesAllocatePages (
|
||||||
|
EfiBootServicesCode,
|
||||||
|
EFI_SIZE_TO_PAGES ((UINTN) FvHeader->FvLength),
|
||||||
|
@@ -1281,6 +1286,17 @@ EvacuateTempRam (
|
||||||
|
);
|
||||||
|
ASSERT_EFI_ERROR (Status);
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Allocate pool to save the raw PEIMs, which is used to keep consistent context across
|
||||||
|
+ // multiple boot and PCR0 will keep the same no matter if the address of allocated page is changed.
|
||||||
|
+ //
|
||||||
|
+ Status = PeiServicesAllocatePages (
|
||||||
|
+ EfiBootServicesCode,
|
||||||
|
+ EFI_SIZE_TO_PAGES ((UINTN) FvHeader->FvLength),
|
||||||
|
+ (EFI_PHYSICAL_ADDRESS *) &RawDataFvHeader
|
||||||
|
+ );
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+
|
||||||
|
DEBUG ((
|
||||||
|
DEBUG_VERBOSE,
|
||||||
|
" Migrating FV[%d] from 0x%08X to 0x%08X\n",
|
||||||
|
@@ -1289,7 +1305,19 @@ EvacuateTempRam (
|
||||||
|
(UINTN) MigratedFvHeader
|
||||||
|
));
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Copy the context to the rebased pages and raw pages, and create hob to save the
|
||||||
|
+ // information. The MigratedFvInfo HOB will never be produced when
|
||||||
|
+ // PcdMigrateTemporaryRamFirmwareVolumes is FALSE, because the PCD control the
|
||||||
|
+ // feature.
|
||||||
|
+ //
|
||||||
|
CopyMem (MigratedFvHeader, FvHeader, (UINTN) FvHeader->FvLength);
|
||||||
|
+ CopyMem (RawDataFvHeader, MigratedFvHeader, (UINTN) FvHeader->FvLength);
|
||||||
|
+ MigratedFvInfo.FvOrgBase = (UINT32) (UINTN) FvHeader;
|
||||||
|
+ MigratedFvInfo.FvNewBase = (UINT32) (UINTN) MigratedFvHeader;
|
||||||
|
+ MigratedFvInfo.FvDataBase = (UINT32) (UINTN) RawDataFvHeader;
|
||||||
|
+ MigratedFvInfo.FvLength = (UINT32) (UINTN) FvHeader->FvLength;
|
||||||
|
+ BuildGuidDataHob (&gEdkiiMigratedFvInfoGuid, &MigratedFvInfo, sizeof (MigratedFvInfo));
|
||||||
|
|
||||||
|
//
|
||||||
|
// Migrate any children for this FV now
|
||||||
|
diff --git a/MdeModulePkg/Core/Pei/PeiMain.h b/MdeModulePkg/Core/Pei/PeiMain.h
|
||||||
|
index 6d95a5d32c..c27e8fc33b 100644
|
||||||
|
--- a/MdeModulePkg/Core/Pei/PeiMain.h
|
||||||
|
+++ b/MdeModulePkg/Core/Pei/PeiMain.h
|
||||||
|
@@ -44,6 +44,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
#include <Guid/FirmwareFileSystem2.h>
|
||||||
|
#include <Guid/FirmwareFileSystem3.h>
|
||||||
|
#include <Guid/AprioriFileName.h>
|
||||||
|
+#include <Guid/MigratedFvInfo.h>
|
||||||
|
|
||||||
|
///
|
||||||
|
/// It is an FFS type extension used for PeiFindFileEx. It indicates current
|
||||||
|
diff --git a/MdeModulePkg/Core/Pei/PeiMain.inf b/MdeModulePkg/Core/Pei/PeiMain.inf
|
||||||
|
index 5b36d516b3..0cf357371a 100644
|
||||||
|
--- a/MdeModulePkg/Core/Pei/PeiMain.inf
|
||||||
|
+++ b/MdeModulePkg/Core/Pei/PeiMain.inf
|
||||||
|
@@ -77,6 +77,7 @@
|
||||||
|
## CONSUMES ## GUID # Used to compare with FV's file system GUID and get the FV's file system format
|
||||||
|
gEfiFirmwareFileSystem3Guid
|
||||||
|
gStatusCodeCallbackGuid
|
||||||
|
+ gEdkiiMigratedFvInfoGuid ## SOMETIMES_PRODUCES ## HOB
|
||||||
|
|
||||||
|
[Ppis]
|
||||||
|
gEfiPeiStatusCodePpiGuid ## SOMETIMES_CONSUMES # PeiReportStatusService is not ready if this PPI doesn't exist
|
||||||
|
diff --git a/MdeModulePkg/Include/Guid/MigratedFvInfo.h b/MdeModulePkg/Include/Guid/MigratedFvInfo.h
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..061c17ed0e
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/MdeModulePkg/Include/Guid/MigratedFvInfo.h
|
||||||
|
@@ -0,0 +1,22 @@
|
||||||
|
+/** @file
|
||||||
|
+ Migrated FV information
|
||||||
|
+
|
||||||
|
+Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+
|
||||||
|
+#ifndef __EDKII_MIGRATED_FV_INFO_GUID_H__
|
||||||
|
+#define __EDKII_MIGRATED_FV_INFO_GUID_H__
|
||||||
|
+
|
||||||
|
+typedef struct {
|
||||||
|
+ UINT32 FvOrgBase; // original FV address
|
||||||
|
+ UINT32 FvNewBase; // new FV address
|
||||||
|
+ UINT32 FvDataBase; // original FV data
|
||||||
|
+ UINT32 FvLength; // Fv Length
|
||||||
|
+} EDKII_MIGRATED_FV_INFO;
|
||||||
|
+
|
||||||
|
+extern EFI_GUID gEdkiiMigratedFvInfoGuid;
|
||||||
|
+
|
||||||
|
+#endif // #ifndef __EDKII_MIGRATED_FV_INFO_GUID_H__
|
||||||
|
+
|
||||||
|
diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
index 45874e9c82..d7572eedd1 100644
|
||||||
|
--- a/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
+++ b/MdeModulePkg/MdeModulePkg.dec
|
||||||
|
@@ -389,6 +389,9 @@
|
||||||
|
## GUID indicates the capsule is to store Capsule On Disk file names.
|
||||||
|
gEdkiiCapsuleOnDiskNameGuid = { 0x98c80a4f, 0xe16b, 0x4d11, { 0x93, 0x9a, 0xab, 0xe5, 0x61, 0x26, 0x3, 0x30 } }
|
||||||
|
|
||||||
|
+ ## Include/Guid/MigratedFvInfo.h
|
||||||
|
+ gEdkiiMigratedFvInfoGuid = { 0xc1ab12f7, 0x74aa, 0x408d, { 0xa2, 0xf4, 0xc6, 0xce, 0xfd, 0x17, 0x98, 0x71 } }
|
||||||
|
+
|
||||||
|
[Ppis]
|
||||||
|
## Include/Ppi/AtaController.h
|
||||||
|
gPeiAtaControllerPpiGuid = { 0xa45e60d1, 0xc719, 0x44aa, { 0xb0, 0x7a, 0xaa, 0x77, 0x7f, 0x85, 0x90, 0x6d }}
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
137
0033-UefiCpuPkg-CpuMpPei-Add-GDT-migration-support-CVE-20.patch
Normal file
137
0033-UefiCpuPkg-CpuMpPei-Add-GDT-migration-support-CVE-20.patch
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
From 60b12e69fb1c8c7180fdda92f008248b9ec83db1 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Michael Kubacki <michael.a.kubacki@intel.com>
|
||||||
|
Date: Sun, 14 Apr 2019 11:48:07 +0800
|
||||||
|
Subject: [PATCH] UefiCpuPkg/CpuMpPei: Add GDT migration support
|
||||||
|
(CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
Moves the GDT to permanent memory in a memory discovered
|
||||||
|
callback. This is done to ensure the GDT authenticated in
|
||||||
|
pre-memory is not fetched from outside a verified location
|
||||||
|
after the permanent memory transition.
|
||||||
|
|
||||||
|
Cc: Eric Dong <eric.dong@intel.com>
|
||||||
|
Cc: Ray Ni <ray.ni@intel.com>
|
||||||
|
Cc: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Signed-off-by: Michael Kubacki <michael.a.kubacki@intel.com>
|
||||||
|
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.c | 37 ++++++++++++++++++++++++++++++++
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.h | 12 +++++++++++
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf | 1 +
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuPaging.c | 12 +++++++++--
|
||||||
|
4 files changed, 60 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.c b/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
index 07ccbe7c6a..d07540cf74 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
@@ -429,6 +429,43 @@ GetGdtr (
|
||||||
|
AsmReadGdtr ((IA32_DESCRIPTOR *)Buffer);
|
||||||
|
}
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ Migrates the Global Descriptor Table (GDT) to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The GDT was migrated successfully.
|
||||||
|
+ @retval EFI_OUT_OF_RESOURCES The GDT could not be migrated due to lack of available memory.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+MigrateGdt (
|
||||||
|
+ VOID
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ UINTN GdtBufferSize;
|
||||||
|
+ IA32_DESCRIPTOR Gdtr;
|
||||||
|
+ VOID *GdtBuffer;
|
||||||
|
+
|
||||||
|
+ AsmReadGdtr ((IA32_DESCRIPTOR *) &Gdtr);
|
||||||
|
+ GdtBufferSize = sizeof (IA32_SEGMENT_DESCRIPTOR) -1 + Gdtr.Limit + 1;
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesAllocatePool (
|
||||||
|
+ GdtBufferSize,
|
||||||
|
+ &GdtBuffer
|
||||||
|
+ );
|
||||||
|
+ ASSERT (GdtBuffer != NULL);
|
||||||
|
+ if (EFI_ERROR (Status)) {
|
||||||
|
+ return EFI_OUT_OF_RESOURCES;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ GdtBuffer = ALIGN_POINTER (GdtBuffer, sizeof (IA32_SEGMENT_DESCRIPTOR));
|
||||||
|
+ CopyMem (GdtBuffer, (VOID *) Gdtr.Base, Gdtr.Limit + 1);
|
||||||
|
+ Gdtr.Base = (UINTN) GdtBuffer;
|
||||||
|
+ AsmWriteGdtr (&Gdtr);
|
||||||
|
+
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
Initializes CPU exceptions handlers for the sake of stack switch requirement.
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.h b/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
index 7d5c527d60..309478cbe1 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.h
|
||||||
|
@@ -397,6 +397,18 @@ SecPlatformInformation2 (
|
||||||
|
OUT EFI_SEC_PLATFORM_INFORMATION_RECORD2 *PlatformInformationRecord2
|
||||||
|
);
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ Migrates the Global Descriptor Table (GDT) to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The GDT was migrated successfully.
|
||||||
|
+ @retval EFI_OUT_OF_RESOURCES The GDT could not be migrated due to lack of available memory.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+MigrateGdt (
|
||||||
|
+ VOID
|
||||||
|
+ );
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
Initializes MP and exceptions handlers.
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
index caead3ce34..f4d11b861f 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
@@ -63,6 +63,7 @@
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuStackSwitchExceptionList ## SOMETIMES_CONSUMES
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuKnownGoodStackSize ## SOMETIMES_CONSUMES
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuApStackSize ## SOMETIMES_CONSUMES
|
||||||
|
+ gEfiMdeModulePkgTokenSpaceGuid.PcdMigrateTemporaryRamFirmwareVolumes ## CONSUMES
|
||||||
|
|
||||||
|
[Depex]
|
||||||
|
TRUE
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuPaging.c b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
index a462e7ee1e..3bf0574b34 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
@@ -602,8 +602,16 @@ MemoryDiscoveredPpiNotifyCallback (
|
||||||
|
IN VOID *Ppi
|
||||||
|
)
|
||||||
|
{
|
||||||
|
- EFI_STATUS Status;
|
||||||
|
- BOOLEAN InitStackGuard;
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ BOOLEAN InitStackGuard;
|
||||||
|
+ BOOLEAN InterruptState;
|
||||||
|
+
|
||||||
|
+ if (PcdGetBool (PcdMigrateTemporaryRamFirmwareVolumes)) {
|
||||||
|
+ InterruptState = SaveAndDisableInterrupts ();
|
||||||
|
+ Status = MigrateGdt ();
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ SetInterruptState (InterruptState);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
//
|
||||||
|
// Paging must be setup first. Otherwise the exception TSS setup during MP
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
106
0034-UefiCpuPkg-CpuMpPei-Enable-paging-and-set-NP-flag-to.patch
Normal file
106
0034-UefiCpuPkg-CpuMpPei-Enable-paging-and-set-NP-flag-to.patch
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
From d7c9de51d249ee101b4d90357a4272b36c831047 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Thu, 2 Jul 2020 13:03:34 +0800
|
||||||
|
Subject: [PATCH] UefiCpuPkg/CpuMpPei: Enable paging and set NP flag to avoid
|
||||||
|
TOCTOU (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
To avoid the TOCTOU, enable paging and set Not Present flag so when
|
||||||
|
access any code in the flash range, it will trigger #PF exception.
|
||||||
|
|
||||||
|
Cc: Eric Dong <eric.dong@intel.com>
|
||||||
|
Cc: Ray Ni <ray.ni@intel.com>
|
||||||
|
Cc: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf | 3 +++
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuPaging.c | 32 +++++++++++++++++++++++++++-----
|
||||||
|
2 files changed, 30 insertions(+), 5 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
index f4d11b861f..7e511325d8 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
@@ -46,6 +46,9 @@
|
||||||
|
BaseMemoryLib
|
||||||
|
CpuLib
|
||||||
|
|
||||||
|
+[Guids]
|
||||||
|
+ gEdkiiMigratedFvInfoGuid ## SOMETIMES_CONSUMES ## HOB
|
||||||
|
+
|
||||||
|
[Ppis]
|
||||||
|
gEfiPeiMpServicesPpiGuid ## PRODUCES
|
||||||
|
gEfiSecPlatformInformationPpiGuid ## SOMETIMES_CONSUMES
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuPaging.c b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
index 3bf0574b34..8ab7dfcce3 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
@@ -12,6 +12,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
#include <Library/MemoryAllocationLib.h>
|
||||||
|
#include <Library/CpuLib.h>
|
||||||
|
#include <Library/BaseLib.h>
|
||||||
|
+#include <Guid/MigratedFvInfo.h>
|
||||||
|
|
||||||
|
#include "CpuMpPei.h"
|
||||||
|
|
||||||
|
@@ -602,9 +603,11 @@ MemoryDiscoveredPpiNotifyCallback (
|
||||||
|
IN VOID *Ppi
|
||||||
|
)
|
||||||
|
{
|
||||||
|
- EFI_STATUS Status;
|
||||||
|
- BOOLEAN InitStackGuard;
|
||||||
|
- BOOLEAN InterruptState;
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ BOOLEAN InitStackGuard;
|
||||||
|
+ BOOLEAN InterruptState;
|
||||||
|
+ EDKII_MIGRATED_FV_INFO *MigratedFvInfo;
|
||||||
|
+ EFI_PEI_HOB_POINTERS Hob;
|
||||||
|
|
||||||
|
if (PcdGetBool (PcdMigrateTemporaryRamFirmwareVolumes)) {
|
||||||
|
InterruptState = SaveAndDisableInterrupts ();
|
||||||
|
@@ -619,9 +622,14 @@ MemoryDiscoveredPpiNotifyCallback (
|
||||||
|
// the task switch (for the sake of stack switch).
|
||||||
|
//
|
||||||
|
InitStackGuard = FALSE;
|
||||||
|
- if (IsIa32PaeSupported () && PcdGetBool (PcdCpuStackGuard)) {
|
||||||
|
+ Hob.Raw = NULL;
|
||||||
|
+ if (IsIa32PaeSupported ()) {
|
||||||
|
+ Hob.Raw = GetFirstGuidHob (&gEdkiiMigratedFvInfoGuid);
|
||||||
|
+ InitStackGuard = PcdGetBool (PcdCpuStackGuard);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (InitStackGuard || Hob.Raw != NULL) {
|
||||||
|
EnablePaging ();
|
||||||
|
- InitStackGuard = TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = InitializeCpuMpWorker ((CONST EFI_PEI_SERVICES **)PeiServices);
|
||||||
|
@@ -631,6 +639,20 @@ MemoryDiscoveredPpiNotifyCallback (
|
||||||
|
SetupStackGuardPage ();
|
||||||
|
}
|
||||||
|
|
||||||
|
+ while (Hob.Raw != NULL) {
|
||||||
|
+ MigratedFvInfo = GET_GUID_HOB_DATA (Hob);
|
||||||
|
+
|
||||||
|
+ //
|
||||||
|
+ // Enable #PF exception, so if the code access SPI after disable NEM, it will generate
|
||||||
|
+ // the exception to avoid potential vulnerability.
|
||||||
|
+ //
|
||||||
|
+ ConvertMemoryPageAttributes (MigratedFvInfo->FvOrgBase, MigratedFvInfo->FvLength, 0);
|
||||||
|
+
|
||||||
|
+ Hob.Raw = GET_NEXT_HOB (Hob);
|
||||||
|
+ Hob.Raw = GetNextGuidHob (&gEdkiiMigratedFvInfoGuid, Hob.Raw);
|
||||||
|
+ }
|
||||||
|
+ CpuFlushTlb ();
|
||||||
|
+
|
||||||
|
return Status;
|
||||||
|
}
|
||||||
|
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
105
0035-SecurityPkg-TcgPei-Use-Migrated-FV-Info-Hob-for-calc.patch
Normal file
105
0035-SecurityPkg-TcgPei-Use-Migrated-FV-Info-Hob-for-calc.patch
Normal file
@ -0,0 +1,105 @@
|
|||||||
|
From ffde22468e2f0e93b51f97b801e6c7a181088c61 Mon Sep 17 00:00:00 2001 From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Wed, 8 Jul 2020 16:01:14 +0800
|
||||||
|
Subject: [PATCH] SecurityPkg/TcgPei: Use Migrated FV Info Hob for calculating
|
||||||
|
hash (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
|
||||||
|
When we allocate pool to save rebased the PEIMs, the address will change
|
||||||
|
randomly, therefore the hash will change and result PCR0 change as well.
|
||||||
|
To avoid this, we save the raw PEIMs and use it to calculate hash.
|
||||||
|
The TcgPei calculate the hash and it use the Migrated FV Info.
|
||||||
|
|
||||||
|
Cc: Jiewen Yao <jiewen.yao@intel.com>
|
||||||
|
Cc: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Cc: Chao Zhang <chao.b.zhang@intel.com>
|
||||||
|
Cc: Qi Zhang <qi1.zhang@intel.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
|
||||||
|
Reviewed-by: Qi Zhang <qi1.zhang@intel.com>
|
||||||
|
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
||||||
|
---
|
||||||
|
SecurityPkg/Tcg/TcgPei/TcgPei.c | 29 +++++++++++++++++++++++++++--
|
||||||
|
SecurityPkg/Tcg/TcgPei/TcgPei.inf | 1 +
|
||||||
|
2 files changed, 28 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/SecurityPkg/Tcg/TcgPei/TcgPei.c b/SecurityPkg/Tcg/TcgPei/TcgPei.c
|
||||||
|
index a9a808c..9701bfe 100644
|
||||||
|
--- a/SecurityPkg/Tcg/TcgPei/TcgPei.c
|
||||||
|
+++ b/SecurityPkg/Tcg/TcgPei/TcgPei.c
|
||||||
|
@@ -21,6 +21,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
#include <Guid/TcgEventHob.h>
|
||||||
|
#include <Guid/MeasuredFvHob.h>
|
||||||
|
#include <Guid/TpmInstance.h>
|
||||||
|
+#include <Guid/MigratedFvInfo.h>
|
||||||
|
|
||||||
|
#include <Library/DebugLib.h>
|
||||||
|
#include <Library/BaseMemoryLib.h>
|
||||||
|
@@ -378,6 +379,10 @@ MeasureFvImage (
|
||||||
|
EFI_STATUS Status;
|
||||||
|
EFI_PLATFORM_FIRMWARE_BLOB FvBlob;
|
||||||
|
TCG_PCR_EVENT_HDR TcgEventHdr;
|
||||||
|
+ EFI_PHYSICAL_ADDRESS FvOrgBase;
|
||||||
|
+ EFI_PHYSICAL_ADDRESS FvDataBase;
|
||||||
|
+ EFI_PEI_HOB_POINTERS Hob;
|
||||||
|
+ EDKII_MIGRATED_FV_INFO *MigratedFvInfo;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check if it is in Excluded FV list
|
||||||
|
@@ -401,10 +406,30 @@ MeasureFvImage (
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Search the matched migration FV info
|
||||||
|
+ //
|
||||||
|
+ FvOrgBase = FvBase;
|
||||||
|
+ FvDataBase = FvBase;
|
||||||
|
+ Hob.Raw = GetFirstGuidHob (&gEdkiiMigratedFvInfoGuid);
|
||||||
|
+ while (Hob.Raw != NULL) {
|
||||||
|
+ MigratedFvInfo = GET_GUID_HOB_DATA (Hob);
|
||||||
|
+ if ((MigratedFvInfo->FvNewBase == (UINT32) FvBase) && (MigratedFvInfo->FvLength == (UINT32) FvLength)) {
|
||||||
|
+ //
|
||||||
|
+ // Found the migrated FV info
|
||||||
|
+ //
|
||||||
|
+ FvOrgBase = (EFI_PHYSICAL_ADDRESS) (UINTN) MigratedFvInfo->FvOrgBase;
|
||||||
|
+ FvDataBase = (EFI_PHYSICAL_ADDRESS) (UINTN) MigratedFvInfo->FvDataBase;
|
||||||
|
+ break;
|
||||||
|
+ }
|
||||||
|
+ Hob.Raw = GET_NEXT_HOB (Hob);
|
||||||
|
+ Hob.Raw = GetNextGuidHob (&gEdkiiMigratedFvInfoGuid, Hob.Raw);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
//
|
||||||
|
// Measure and record the FV to the TPM
|
||||||
|
//
|
||||||
|
- FvBlob.BlobBase = FvBase;
|
||||||
|
+ FvBlob.BlobBase = FvOrgBase;
|
||||||
|
FvBlob.BlobLength = FvLength;
|
||||||
|
|
||||||
|
DEBUG ((DEBUG_INFO, "The FV which is measured by TcgPei starts at: 0x%x\n", FvBlob.BlobBase));
|
||||||
|
@@ -416,7 +441,7 @@ MeasureFvImage (
|
||||||
|
|
||||||
|
Status = HashLogExtendEvent (
|
||||||
|
(EFI_PEI_SERVICES **) GetPeiServicesTablePointer(),
|
||||||
|
- (UINT8*) (UINTN) FvBlob.BlobBase,
|
||||||
|
+ (UINT8*) (UINTN) FvDataBase,
|
||||||
|
(UINTN) FvBlob.BlobLength,
|
||||||
|
&TcgEventHdr,
|
||||||
|
(UINT8*) &FvBlob
|
||||||
|
diff --git a/SecurityPkg/Tcg/TcgPei/TcgPei.inf b/SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
index c0bff6e..6d1951f 100644
|
||||||
|
--- a/SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
+++ b/SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
@@ -58,6 +58,7 @@
|
||||||
|
gTpmErrorHobGuid ## SOMETIMES_PRODUCES ## HOB
|
||||||
|
gMeasuredFvHobGuid ## PRODUCES ## HOB
|
||||||
|
gEfiTpmDeviceInstanceTpm12Guid ## PRODUCES ## GUID # TPM device identifier
|
||||||
|
+ gEdkiiMigratedFvInfoGuid ## SOMETIMES_CONSUMES ## HOB
|
||||||
|
|
||||||
|
[Ppis]
|
||||||
|
gPeiLockPhysicalPresencePpiGuid ## SOMETIMES_CONSUMES ## NOTIFY
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
191
0036-UefiCpuPkg-Move-MigrateGdt-from-DiscoverMemory-to-Te.patch
Normal file
191
0036-UefiCpuPkg-Move-MigrateGdt-from-DiscoverMemory-to-Te.patch
Normal file
@ -0,0 +1,191 @@
|
|||||||
|
From f6ec1dd34fb6b9757b5ead465ee2ea20c182b0ac Mon Sep 17 00:00:00 2001
|
||||||
|
From: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Date: Wed, 13 Jan 2021 18:08:09 +0800
|
||||||
|
Subject: [PATCH] UefiCpuPkg: Move MigrateGdt from DiscoverMemory to
|
||||||
|
TempRamDone. (CVE-2019-11098)
|
||||||
|
|
||||||
|
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1614
|
||||||
|
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3160
|
||||||
|
|
||||||
|
The GDT still in flash with commit 60b12e69fb1c8c7180fdda92f008248b9ec83db1
|
||||||
|
after TempRamDone
|
||||||
|
|
||||||
|
So move the action to TempRamDone event to avoid reading GDT from flash.
|
||||||
|
|
||||||
|
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
|
||||||
|
Cc: Eric Dong <eric.dong@intel.com>
|
||||||
|
Cc: Ray Ni <ray.ni@intel.com>
|
||||||
|
Cc: Laszlo Ersek <lersek@redhat.com>
|
||||||
|
Cc: Rahul Kumar <rahul1.kumar@intel.com>
|
||||||
|
Cc: Debkumar De <debkumar.de@intel.com>
|
||||||
|
Cc: Harry Han <harry.han@intel.com>
|
||||||
|
Cc: Catharine West <catharine.west@intel.com>
|
||||||
|
Reviewed-by: Ray Ni <ray.ni@intel.com>
|
||||||
|
---
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.c | 37 --------------------------
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf | 1 -
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuPaging.c | 8 ------
|
||||||
|
UefiCpuPkg/SecCore/SecCore.inf | 1 +
|
||||||
|
UefiCpuPkg/SecCore/SecMain.c | 45 ++++++++++++++++++++++++++++++++
|
||||||
|
5 files changed, 46 insertions(+), 46 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.c b/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
index 40729a09b9..3c1bad6470 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.c
|
||||||
|
@@ -429,43 +429,6 @@ GetGdtr (
|
||||||
|
AsmReadGdtr ((IA32_DESCRIPTOR *)Buffer);
|
||||||
|
}
|
||||||
|
|
||||||
|
-/**
|
||||||
|
- Migrates the Global Descriptor Table (GDT) to permanent memory.
|
||||||
|
-
|
||||||
|
- @retval EFI_SUCCESS The GDT was migrated successfully.
|
||||||
|
- @retval EFI_OUT_OF_RESOURCES The GDT could not be migrated due to lack of available memory.
|
||||||
|
-
|
||||||
|
-**/
|
||||||
|
-EFI_STATUS
|
||||||
|
-MigrateGdt (
|
||||||
|
- VOID
|
||||||
|
- )
|
||||||
|
-{
|
||||||
|
- EFI_STATUS Status;
|
||||||
|
- UINTN GdtBufferSize;
|
||||||
|
- IA32_DESCRIPTOR Gdtr;
|
||||||
|
- VOID *GdtBuffer;
|
||||||
|
-
|
||||||
|
- AsmReadGdtr ((IA32_DESCRIPTOR *) &Gdtr);
|
||||||
|
- GdtBufferSize = sizeof (IA32_SEGMENT_DESCRIPTOR) -1 + Gdtr.Limit + 1;
|
||||||
|
-
|
||||||
|
- Status = PeiServicesAllocatePool (
|
||||||
|
- GdtBufferSize,
|
||||||
|
- &GdtBuffer
|
||||||
|
- );
|
||||||
|
- ASSERT (GdtBuffer != NULL);
|
||||||
|
- if (EFI_ERROR (Status)) {
|
||||||
|
- return EFI_OUT_OF_RESOURCES;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- GdtBuffer = ALIGN_POINTER (GdtBuffer, sizeof (IA32_SEGMENT_DESCRIPTOR));
|
||||||
|
- CopyMem (GdtBuffer, (VOID *) Gdtr.Base, Gdtr.Limit + 1);
|
||||||
|
- Gdtr.Base = (UINTN) GdtBuffer;
|
||||||
|
- AsmWriteGdtr (&Gdtr);
|
||||||
|
-
|
||||||
|
- return EFI_SUCCESS;
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
/**
|
||||||
|
Initializes CPU exceptions handlers for the sake of stack switch requirement.
|
||||||
|
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
index ba829d816e..7444bdb968 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
@@ -67,7 +67,6 @@
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuStackSwitchExceptionList ## SOMETIMES_CONSUMES
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuKnownGoodStackSize ## SOMETIMES_CONSUMES
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdCpuApStackSize ## SOMETIMES_CONSUMES
|
||||||
|
- gEfiMdeModulePkgTokenSpaceGuid.PcdMigrateTemporaryRamFirmwareVolumes ## CONSUMES
|
||||||
|
|
||||||
|
[Depex]
|
||||||
|
TRUE
|
||||||
|
diff --git a/UefiCpuPkg/CpuMpPei/CpuPaging.c b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
index 50ad4277af..3e261d6657 100644
|
||||||
|
--- a/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
+++ b/UefiCpuPkg/CpuMpPei/CpuPaging.c
|
||||||
|
@@ -605,17 +605,9 @@ MemoryDiscoveredPpiNotifyCallback (
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
BOOLEAN InitStackGuard;
|
||||||
|
- BOOLEAN InterruptState;
|
||||||
|
EDKII_MIGRATED_FV_INFO *MigratedFvInfo;
|
||||||
|
EFI_PEI_HOB_POINTERS Hob;
|
||||||
|
|
||||||
|
- if (PcdGetBool (PcdMigrateTemporaryRamFirmwareVolumes)) {
|
||||||
|
- InterruptState = SaveAndDisableInterrupts ();
|
||||||
|
- Status = MigrateGdt ();
|
||||||
|
- ASSERT_EFI_ERROR (Status);
|
||||||
|
- SetInterruptState (InterruptState);
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
//
|
||||||
|
// Paging must be setup first. Otherwise the exception TSS setup during MP
|
||||||
|
// initialization later will not contain paging information and then fail
|
||||||
|
diff --git a/UefiCpuPkg/SecCore/SecCore.inf b/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
index 545781d6b4..ded83beb52 100644
|
||||||
|
--- a/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
+++ b/UefiCpuPkg/SecCore/SecCore.inf
|
||||||
|
@@ -77,6 +77,7 @@
|
||||||
|
|
||||||
|
[Pcd]
|
||||||
|
gUefiCpuPkgTokenSpaceGuid.PcdPeiTemporaryRamStackSize ## CONSUMES
|
||||||
|
+ gEfiMdeModulePkgTokenSpaceGuid.PcdMigrateTemporaryRamFirmwareVolumes ## CONSUMES
|
||||||
|
|
||||||
|
[UserExtensions.TianoCore."ExtraFiles"]
|
||||||
|
SecCoreExtra.uni
|
||||||
|
diff --git a/UefiCpuPkg/SecCore/SecMain.c b/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
index 155be49a60..2416c4ce56 100644
|
||||||
|
--- a/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
+++ b/UefiCpuPkg/SecCore/SecMain.c
|
||||||
|
@@ -35,6 +35,43 @@ EFI_PEI_PPI_DESCRIPTOR mPeiSecPlatformInformationPpi[] = {
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ Migrates the Global Descriptor Table (GDT) to permanent memory.
|
||||||
|
+
|
||||||
|
+ @retval EFI_SUCCESS The GDT was migrated successfully.
|
||||||
|
+ @retval EFI_OUT_OF_RESOURCES The GDT could not be migrated due to lack of available memory.
|
||||||
|
+
|
||||||
|
+**/
|
||||||
|
+EFI_STATUS
|
||||||
|
+MigrateGdt (
|
||||||
|
+ VOID
|
||||||
|
+ )
|
||||||
|
+{
|
||||||
|
+ EFI_STATUS Status;
|
||||||
|
+ UINTN GdtBufferSize;
|
||||||
|
+ IA32_DESCRIPTOR Gdtr;
|
||||||
|
+ VOID *GdtBuffer;
|
||||||
|
+
|
||||||
|
+ AsmReadGdtr ((IA32_DESCRIPTOR *) &Gdtr);
|
||||||
|
+ GdtBufferSize = sizeof (IA32_SEGMENT_DESCRIPTOR) -1 + Gdtr.Limit + 1;
|
||||||
|
+
|
||||||
|
+ Status = PeiServicesAllocatePool (
|
||||||
|
+ GdtBufferSize,
|
||||||
|
+ &GdtBuffer
|
||||||
|
+ );
|
||||||
|
+ ASSERT (GdtBuffer != NULL);
|
||||||
|
+ if (EFI_ERROR (Status)) {
|
||||||
|
+ return EFI_OUT_OF_RESOURCES;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ GdtBuffer = ALIGN_POINTER (GdtBuffer, sizeof (IA32_SEGMENT_DESCRIPTOR));
|
||||||
|
+ CopyMem (GdtBuffer, (VOID *) Gdtr.Base, Gdtr.Limit + 1);
|
||||||
|
+ Gdtr.Base = (UINTN) GdtBuffer;
|
||||||
|
+ AsmWriteGdtr (&Gdtr);
|
||||||
|
+
|
||||||
|
+ return EFI_SUCCESS;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
//
|
||||||
|
// These are IDT entries pointing to 10:FFFFFFE4h.
|
||||||
|
//
|
||||||
|
@@ -409,6 +446,14 @@ SecTemporaryRamDone (
|
||||||
|
//
|
||||||
|
State = SaveAndDisableInterrupts ();
|
||||||
|
|
||||||
|
+ //
|
||||||
|
+ // Migrate GDT before NEM near down
|
||||||
|
+ //
|
||||||
|
+ if (PcdGetBool (PcdMigrateTemporaryRamFirmwareVolumes)) {
|
||||||
|
+ Status = MigrateGdt ();
|
||||||
|
+ ASSERT_EFI_ERROR (Status);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
//
|
||||||
|
// Disable Temporary RAM after Stack and Heap have been migrated at this point.
|
||||||
|
//
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
17
edk2.spec
17
edk2.spec
@ -5,7 +5,7 @@
|
|||||||
|
|
||||||
Name: edk2
|
Name: edk2
|
||||||
Version: %{stable_date}
|
Version: %{stable_date}
|
||||||
Release: 9
|
Release: 10
|
||||||
Summary: EFI Development Kit II
|
Summary: EFI Development Kit II
|
||||||
License: BSD-2-Clause-Patent
|
License: BSD-2-Clause-Patent
|
||||||
URL: https://github.com/tianocore/edk2
|
URL: https://github.com/tianocore/edk2
|
||||||
@ -40,6 +40,16 @@ Patch0025: 0023-SecurityPkg-Tcg-Import-Tcg2PlatformPei-from-edk2-pla.patch
|
|||||||
Patch0026: 0024-SecurityPkg-Tcg-Make-Tcg2PlatformPei-buildable-and-f.patch
|
Patch0026: 0024-SecurityPkg-Tcg-Make-Tcg2PlatformPei-buildable-and-f.patch
|
||||||
Patch0027: 0025-SecurityPkg-Add-references-to-header-and-inf-files-t.patch
|
Patch0027: 0025-SecurityPkg-Add-references-to-header-and-inf-files-t.patch
|
||||||
Patch0028: 0026-CryptoPkg-BaseCryptLib-fix-NULL-dereference-CVE-2019.patch
|
Patch0028: 0026-CryptoPkg-BaseCryptLib-fix-NULL-dereference-CVE-2019.patch
|
||||||
|
Patch0029: 0027-UefiCpuPkg-Correct-some-typos.patch
|
||||||
|
Patch0030: 0028-UefiCpuPkg-SecMigrationPei-Add-initial-PEIM-CVE-2019.patch
|
||||||
|
Patch0031: 0029-MdeModulePkg-PeiCore-Enable-T-RAM-evacuation-in-PeiC.patch
|
||||||
|
Patch0032: 0030-SecurityPkg-Tcg2Pei-Use-Migrated-FV-Info-Hob-for-cal.patch
|
||||||
|
Patch0033: 0031-MdeModulePkg-Add-new-PCD-to-control-the-evacuate-tem.patch
|
||||||
|
Patch0034: 0032-MdeModulePkg-Core-Create-Migrated-FV-Info-Hob-for-ca.patch
|
||||||
|
Patch0035: 0033-UefiCpuPkg-CpuMpPei-Add-GDT-migration-support-CVE-20.patch
|
||||||
|
Patch0036: 0034-UefiCpuPkg-CpuMpPei-Enable-paging-and-set-NP-flag-to.patch
|
||||||
|
Patch0037: 0035-SecurityPkg-TcgPei-Use-Migrated-FV-Info-Hob-for-calc.patch
|
||||||
|
Patch0038: 0036-UefiCpuPkg-Move-MigrateGdt-from-DiscoverMemory-to-Te.patch
|
||||||
|
|
||||||
BuildRequires: acpica-tools gcc gcc-c++ libuuid-devel python3 bc nasm python2
|
BuildRequires: acpica-tools gcc gcc-c++ libuuid-devel python3 bc nasm python2
|
||||||
|
|
||||||
@ -235,8 +245,11 @@ chmod +x %{buildroot}%{_bindir}/Rsa2048Sha256GenerateKeys
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Sep 29 2022 chenhuiying<chenhuiying4@huawei.com> - 202002-10
|
||||||
|
- fix CVE-2019-11098
|
||||||
|
|
||||||
* Thu Sep 29 2022 chenhuiying<chenhuiying4@huawei.com> - 202002-9
|
* Thu Sep 29 2022 chenhuiying<chenhuiying4@huawei.com> - 202002-9
|
||||||
* fix CVE-2019-14584
|
- fix CVE-2019-14584
|
||||||
|
|
||||||
* Fri Jan 28 2022 Jinhua Cao<caojinhua1@huawei.com> - 202002-8
|
* Fri Jan 28 2022 Jinhua Cao<caojinhua1@huawei.com> - 202002-8
|
||||||
- fix CVE-2021-38576
|
- fix CVE-2021-38576
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user