[PATCH] efi_loader: factor out the common code from efi_transfer_secure_state()

Heinrich Schuchardt xypron.debian at gmx.de
Fri May 1 08:22:04 CEST 2020


On 4/21/20 2:39 AM, AKASHI Takahiro wrote:
> efi_set_secure_stat() provides the common code for each stat transition
> caused by efi_transfer_secure_state().
>
> Signed-off-by: AKASHI Takahiro <takahiro.akashi at linaro.org>
> Suggested-by: Heinrich Schuchardt <xypron.glpk at gmx.de>
> ---
>  lib/efi_loader/efi_variable.c | 194 +++++++++++-----------------------
>  1 file changed, 64 insertions(+), 130 deletions(-)
>
> diff --git a/lib/efi_loader/efi_variable.c b/lib/efi_loader/efi_variable.c
> index 0c6d1deb58eb..c275684278a1 100644
> --- a/lib/efi_loader/efi_variable.c
> +++ b/lib/efi_loader/efi_variable.c
> @@ -176,6 +176,59 @@ static efi_status_t efi_set_variable_internal(u16 *variable_name,
>  					      const void *data,
>  					      bool ro_check);
>
> +/**
> + * efi_set_secure_state - modify secure boot state variables
> + * @sec_boot:		value of SecureBoot
> + * @setup_mode:		value of SetupMode
> + * @audit_mode:		value of AuditMode
> + * @deployed_mode:	value of DeployedMode
> + *
> + * Modify secure boot stat-related variables as indicated.
> + *
> + * Return:	EFI_SUCCESS on success, status code (negative) on error

According to the UEFI spec:

EFI_STATUS Type UINTN

So the return value cannot be negative. I will adjust the text when merging.

Otherwise:

Reviewed-by: Heinrich Schuchardt <xypron.glpk at gmx.de>

> + */
> +static efi_status_t efi_set_secure_state(int sec_boot, int setup_mode,
> +					 int audit_mode, int deployed_mode)
> +{
> +	u32 attributes;
> +	efi_status_t ret;
> +
> +	attributes = EFI_VARIABLE_BOOTSERVICE_ACCESS |
> +		     EFI_VARIABLE_RUNTIME_ACCESS |
> +		     READ_ONLY;
> +	ret = efi_set_variable_internal(L"SecureBoot",
> +					&efi_global_variable_guid,
> +					attributes,
> +					sizeof(sec_boot), &sec_boot,
> +					false);
> +	if (ret != EFI_SUCCESS)
> +		goto err;
> +
> +	ret = efi_set_variable_internal(L"SetupMode",
> +					&efi_global_variable_guid,
> +					attributes,
> +					sizeof(setup_mode), &setup_mode,
> +					false);
> +	if (ret != EFI_SUCCESS)
> +		goto err;
> +
> +	ret = efi_set_variable_internal(L"AuditMode",
> +					&efi_global_variable_guid,
> +					attributes,
> +					sizeof(audit_mode), &audit_mode,
> +					false);
> +	if (ret != EFI_SUCCESS)
> +		goto err;
> +
> +	ret = efi_set_variable_internal(L"DeployedMode",
> +					&efi_global_variable_guid,
> +					attributes,
> +					sizeof(deployed_mode), &deployed_mode,
> +					false);
> +err:
> +	return ret;
> +}
> +
>  /**
>   * efi_transfer_secure_state - handle a secure boot state transition
>   * @mode:	new state
> @@ -188,157 +241,38 @@ static efi_status_t efi_set_variable_internal(u16 *variable_name,
>   */
>  static efi_status_t efi_transfer_secure_state(enum efi_secure_mode mode)
>  {
> -	u32 attributes;
> -	u8 val;
>  	efi_status_t ret;
>
> -	debug("Secure state from %d to %d\n", efi_secure_mode, mode);
> +	debug("Switching secure state from %d to %d\n", efi_secure_mode, mode);
>
> -	attributes = EFI_VARIABLE_BOOTSERVICE_ACCESS |
> -		     EFI_VARIABLE_RUNTIME_ACCESS;
>  	if (mode == EFI_MODE_DEPLOYED) {
> -		val = 1;
> -		ret = efi_set_variable_internal(L"SecureBoot",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"SetupMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"AuditMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 1;
> -		ret = efi_set_variable_internal(L"DeployedMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> +		ret = efi_set_secure_state(1, 0, 0, 1);
>  		if (ret != EFI_SUCCESS)
>  			goto err;
>
>  		efi_secure_boot = true;
>  	} else if (mode == EFI_MODE_AUDIT) {
> -		ret = efi_set_variable_internal(L"PK",
> -						&efi_global_variable_guid,
> -						attributes,
> -						0, NULL,
> -						false);
> +		ret = efi_set_variable_internal(
> +					L"PK", &efi_global_variable_guid,
> +					EFI_VARIABLE_BOOTSERVICE_ACCESS |
> +					EFI_VARIABLE_RUNTIME_ACCESS,
> +					0, NULL, false);
>  		if (ret != EFI_SUCCESS)
>  			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"SecureBoot",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 1;
> -		ret = efi_set_variable_internal(L"SetupMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 1;
> -		ret = efi_set_variable_internal(L"AuditMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"DeployedMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> +
> +		ret = efi_set_secure_state(0, 1, 1, 0);
>  		if (ret != EFI_SUCCESS)
>  			goto err;
>
>  		efi_secure_boot = true;
>  	} else if (mode == EFI_MODE_USER) {
> -		val = 1;
> -		ret = efi_set_variable_internal(L"SecureBoot",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"SetupMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"AuditMode",
> -						&efi_global_variable_guid,
> -						attributes,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"DeployedMode",
> -						&efi_global_variable_guid,
> -						attributes,
> -						sizeof(val), &val,
> -						false);
> +		ret = efi_set_secure_state(1, 0, 0, 0);
>  		if (ret != EFI_SUCCESS)
>  			goto err;
>
>  		efi_secure_boot = true;
>  	} else if (mode == EFI_MODE_SETUP) {
> -		val = 0;
> -		ret = efi_set_variable_internal(L"SecureBoot",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 1;
> -		ret = efi_set_variable_internal(L"SetupMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"AuditMode",
> -						&efi_global_variable_guid,
> -						attributes,
> -						sizeof(val), &val,
> -						false);
> -		if (ret != EFI_SUCCESS)
> -			goto err;
> -		val = 0;
> -		ret = efi_set_variable_internal(L"DeployedMode",
> -						&efi_global_variable_guid,
> -						attributes | READ_ONLY,
> -						sizeof(val), &val,
> -						false);
> +		ret = efi_set_secure_state(0, 1, 0, 0);
>  		if (ret != EFI_SUCCESS)
>  			goto err;
>  	} else {
>



More information about the U-Boot mailing list