summaryrefslogtreecommitdiffstats
path: root/meta-efi-secure-boot/recipes-bsp/grub/grub-efi/0005-efi-chainloader-use-shim-to-load-and-verify-an-image.patch
blob: d91e921054b99e329d3da751d9abd62e925f2797 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
From f922ac74714d01972a3c291e15f0c316b67e40eb Mon Sep 17 00:00:00 2001
From: Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
Date: Fri, 27 Mar 2015 08:26:08 -0700
Subject: [PATCH 5/7] efi: chainloader: use shim to load and verify an image

Upstream-Status: Inappropriate [embedded specific]

The grub chainloader module uses the UEFI LoadImage service
to load a chainloaded binary. However, if such binary is not
signed by the UEFI certification authority, LoadImage will fail.
Under shim, we can use Machine-Owned Keys (MOKs) to verify an
image. Thus, in case LoadImage fails due to a security violation
we rely on the shim verification service. If successful, the
image is parsed and loaded.

Signed-off-by: Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
---
 grub-core/loader/efi/chainloader.c | 49 +++++++++++++++++++++++++++++++-------
 1 file changed, 40 insertions(+), 9 deletions(-)

diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
index 1f8f061..e988945 100644
--- a/grub-core/loader/efi/chainloader.c
+++ b/grub-core/loader/efi/chainloader.c
@@ -739,6 +739,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)),
   char *filename;
   void *boot_image = 0;
   grub_efi_handle_t dev_handle = 0;
+  struct grub_shim_pe_coff_loader_image_context context;
 
   if (argc == 0)
     return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
@@ -870,23 +871,53 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)),
   if (status != GRUB_EFI_SUCCESS)
     {
       if (status == GRUB_EFI_OUT_OF_RESOURCES)
-	grub_error (GRUB_ERR_OUT_OF_MEMORY, "out of resources");
+        {
+	  grub_error (GRUB_ERR_OUT_OF_MEMORY, "out of resources");
+	  goto fail;
+        }
+      /* try with shim */
+      else if (status == GRUB_EFI_SECURITY_VIOLATION)
+        {
+	  status = grub_shim_load_image (address, size, &context);
+	  if (status != GRUB_EFI_SUCCESS)
+	    {
+	      grub_error (GRUB_ERR_BAD_OS, "shim cannot load image");
+	      goto fail;
+	    }
+	}
       else
-	grub_error (GRUB_ERR_BAD_OS, "cannot load image");
-
-      goto fail;
+	{
+	  grub_error (GRUB_ERR_BAD_OS, "cannot load image");
+	  goto fail;
+	}
     }
 
-  /* LoadImage does not set a device handler when the image is
-     loaded from memory, so it is necessary to set it explicitly here.
-     This is a mess.  */
-  loaded_image = grub_efi_get_loaded_image (image_handle);
+  /* if we use shim, the UEFI load_image failed, thus, we borrow
+   * grub_efi_image_handle and restore it later
+   */
+  if (shim_used)
+    /* if we use shim, the UEFI load_image failed, thus, we borrow
+       grub_efi_image_handle and restore it later */
+    loaded_image = grub_efi_get_loaded_image (grub_efi_image_handle);
+  else
+    /* LoadImage does not set a device handler when the image is
+       loaded from memory, so it is necessary to set it explicitly here.
+       This is a mess.  */
+    loaded_image = grub_efi_get_loaded_image (image_handle);
+
   if (! loaded_image)
     {
       grub_error (GRUB_ERR_BAD_OS, "no loaded image available");
       goto fail;
     }
-  loaded_image->device_handle = dev_handle;
+  if (shim_used)
+    {
+      grub_memcpy(&shim_li_bak, loaded_image, sizeof(shim_li_bak));
+      loaded_image->image_base = (void *)shim_buffer;
+      loaded_image->image_size = context.image_size;
+    }
+  else
+    loaded_image->device_handle = dev_handle;
 
   if (argc > 1)
     {
-- 
1.9.1