[PATCH 2/2] efi: test/py: authenticate fit capsules

AKASHI Takahiro takahiro.akashi at linaro.org
Wed Jun 1 01:53:30 CEST 2022


On Tue, May 31, 2022 at 09:55:34AM +0200, Vincent Stehl?? wrote:
> Add support for the authentication of UEFI capsules containing FIT images.

Thank you for adding this enhancement.
Sughosh could and should have done it from the beginning.

> The authentication code is moved out of the function handling raw images
> into a new function efi_firmware_capsule_authenticate(). The special case
> for the FMP header coming from edk2 tools is preserved. There is no
> functional change for capsules containing raw images.
> 
> The python test for signed capsules with raw images is renamed with no
> functional change and a new test is added for signed capsules containing
> FIT images.
> 
> This can be tested with sandbox64_defconfig or sandbox_flattree_defconfig,
> plus CONFIG_EFI_CAPSULE_AUTHENTICATE=y.

I hope that the 'capsule authentication' tests, either FIT or raw, be
run in CI loop even if we need end up adding new sandbox config files.

-Takahiro Akashi


> Signed-off-by: Vincent Stehlé <vincent.stehle at arm.com>
> Cc: Heinrich Schuchardt <xypron.glpk at gmx.de>
> ---
>  lib/efi_loader/efi_firmware.c                 | 115 +++++++++++-------
>  test/py/tests/test_efi_capsule/conftest.py    |  21 +++-
>  ...py => test_capsule_firmware_signed_fit.py} |  41 ++++---
>  ...py => test_capsule_firmware_signed_raw.py} |   6 +-
>  4 files changed, 117 insertions(+), 66 deletions(-)
>  copy test/py/tests/test_efi_capsule/{test_capsule_firmware_signed.py => test_capsule_firmware_signed_fit.py} (89%)
>  rename test/py/tests/test_efi_capsule/{test_capsule_firmware_signed.py => test_capsule_firmware_signed_raw.py} (98%)
> 
> diff --git a/lib/efi_loader/efi_firmware.c b/lib/efi_loader/efi_firmware.c
> index fe4e084106d..cbe29e90789 100644
> --- a/lib/efi_loader/efi_firmware.c
> +++ b/lib/efi_loader/efi_firmware.c
> @@ -178,6 +178,70 @@ static efi_status_t efi_fill_image_desc_array(
>  	return EFI_SUCCESS;
>  }
>  
> +/**
> + * efi_firmware_capsule_authenticate - authenticate the capsule if enabled
> + * @p_image:		Pointer to new image
> + * @p_image_size:	Pointer to size of new image
> + *
> + * Authenticate the capsule if authentication is enabled.
> + * The image pointer and the image size are updated in case of success.
> + *
> + * Return:		status code
> + */
> +static
> +efi_status_t efi_firmware_capsule_authenticate(const void **p_image,
> +					       efi_uintn_t *p_image_size)
> +{
> +	const void *image = *p_image;
> +	efi_uintn_t image_size = *p_image_size;
> +	u32 fmp_hdr_signature;
> +	struct fmp_payload_header *header;
> +	void *capsule_payload;
> +	efi_status_t status;
> +	efi_uintn_t capsule_payload_size;
> +
> +	if (IS_ENABLED(CONFIG_EFI_CAPSULE_AUTHENTICATE)) {
> +		capsule_payload = NULL;
> +		capsule_payload_size = 0;
> +		status = efi_capsule_authenticate(image, image_size,
> +						  &capsule_payload,
> +						  &capsule_payload_size);
> +
> +		if (status == EFI_SECURITY_VIOLATION) {
> +			printf("Capsule authentication check failed. Aborting update\n");
> +			return status;
> +		} else if (status != EFI_SUCCESS) {
> +			return status;
> +		}
> +
> +		debug("Capsule authentication successful\n");
> +		image = capsule_payload;
> +		image_size = capsule_payload_size;
> +	} else {
> +		debug("Capsule authentication disabled. ");
> +		debug("Updating capsule without authenticating.\n");
> +	}
> +
> +	fmp_hdr_signature = FMP_PAYLOAD_HDR_SIGNATURE;
> +	header = (void *)image;
> +
> +	if (!memcmp(&header->signature, &fmp_hdr_signature,
> +		    sizeof(fmp_hdr_signature))) {
> +		/*
> +		 * When building the capsule with the scripts in
> +		 * edk2, a FMP header is inserted above the capsule
> +		 * payload. Compensate for this header to get the
> +		 * actual payload that is to be updated.
> +		 */
> +		image += header->header_size;
> +		image_size -= header->header_size;
> +	}
> +
> +	*p_image = image;
> +	*p_image_size = image_size;
> +	return EFI_SUCCESS;
> +}
> +
>  #ifdef CONFIG_EFI_CAPSULE_FIRMWARE_FIT
>  /*
>   * This FIRMWARE_MANAGEMENT_PROTOCOL driver provides a firmware update
> @@ -266,12 +330,18 @@ efi_status_t EFIAPI efi_firmware_fit_set_image(
>  	efi_status_t (*progress)(efi_uintn_t completion),
>  	u16 **abort_reason)
>  {
> +	efi_status_t status;
> +
>  	EFI_ENTRY("%p %d %p %zu %p %p %p\n", this, image_index, image,
>  		  image_size, vendor_code, progress, abort_reason);
>  
>  	if (!image || image_index != 1)
>  		return EFI_EXIT(EFI_INVALID_PARAMETER);
>  
> +	status = efi_firmware_capsule_authenticate(&image, &image_size);
> +	if (status != EFI_SUCCESS)
> +		return EFI_EXIT(status);
> +
>  	if (fit_update(image))
>  		return EFI_EXIT(EFI_DEVICE_ERROR);
>  
> @@ -372,11 +442,7 @@ efi_status_t EFIAPI efi_firmware_raw_set_image(
>  	efi_status_t (*progress)(efi_uintn_t completion),
>  	u16 **abort_reason)
>  {
> -	u32 fmp_hdr_signature;
> -	struct fmp_payload_header *header;
> -	void *capsule_payload;
>  	efi_status_t status;
> -	efi_uintn_t capsule_payload_size;
>  
>  	EFI_ENTRY("%p %d %p %zu %p %p %p\n", this, image_index, image,
>  		  image_size, vendor_code, progress, abort_reason);
> @@ -384,44 +450,9 @@ efi_status_t EFIAPI efi_firmware_raw_set_image(
>  	if (!image)
>  		return EFI_EXIT(EFI_INVALID_PARAMETER);
>  
> -	/* Authenticate the capsule if authentication enabled */
> -	if (IS_ENABLED(CONFIG_EFI_CAPSULE_AUTHENTICATE)) {
> -		capsule_payload = NULL;
> -		capsule_payload_size = 0;
> -		status = efi_capsule_authenticate(image, image_size,
> -						  &capsule_payload,
> -						  &capsule_payload_size);
> -
> -		if (status == EFI_SECURITY_VIOLATION) {
> -			printf("Capsule authentication check failed. Aborting update\n");
> -			return EFI_EXIT(status);
> -		} else if (status != EFI_SUCCESS) {
> -			return EFI_EXIT(status);
> -		}
> -
> -		debug("Capsule authentication successfull\n");
> -		image = capsule_payload;
> -		image_size = capsule_payload_size;
> -	} else {
> -		debug("Capsule authentication disabled. ");
> -		debug("Updating capsule without authenticating.\n");
> -	}
> -
> -	fmp_hdr_signature = FMP_PAYLOAD_HDR_SIGNATURE;
> -	header = (void *)image;
> -
> -	if (!memcmp(&header->signature, &fmp_hdr_signature,
> -		    sizeof(fmp_hdr_signature))) {
> -		/*
> -		 * When building the capsule with the scripts in
> -		 * edk2, a FMP header is inserted above the capsule
> -		 * payload. Compensate for this header to get the
> -		 * actual payload that is to be updated.
> -		 */
> -		image += header->header_size;
> -		image_size -= header->header_size;
> -
> -	}
> +	status = efi_firmware_capsule_authenticate(&image, &image_size);
> +	if (status != EFI_SUCCESS)
> +		return EFI_EXIT(status);
>  
>  	if (dfu_write_by_alt(image_index - 1, (void *)image, image_size,
>  			     NULL, NULL))
> diff --git a/test/py/tests/test_efi_capsule/conftest.py b/test/py/tests/test_efi_capsule/conftest.py
> index 5a8826a5a6b..4879f2b5c24 100644
> --- a/test/py/tests/test_efi_capsule/conftest.py
> +++ b/test/py/tests/test_efi_capsule/conftest.py
> @@ -97,7 +97,7 @@ def efi_capsule_data(request, u_boot_config):
>                     shell=True)
>  
>          if capsule_auth_enabled:
> -            # firmware signed with proper key
> +            # raw firmware signed with proper key
>              check_call('cd %s; '
>                         '%s/tools/mkeficapsule --index 1 --monotonic-count 1 '
>                              '--private-key SIGNER.key --certificate SIGNER.crt '
> @@ -105,7 +105,7 @@ def efi_capsule_data(request, u_boot_config):
>                              'u-boot.bin.new Test11'
>                         % (data_dir, u_boot_config.build_dir),
>                         shell=True)
> -            # firmware signed with *mal* key
> +            # raw firmware signed with *mal* key
>              check_call('cd %s; '
>                         '%s/tools/mkeficapsule --index 1 --monotonic-count 1 '
>                              '--private-key SIGNER2.key '
> @@ -114,6 +114,23 @@ def efi_capsule_data(request, u_boot_config):
>                              'u-boot.bin.new Test12'
>                         % (data_dir, u_boot_config.build_dir),
>                         shell=True)
> +            # FIT firmware signed with proper key
> +            check_call('cd %s; '
> +                       '%s/tools/mkeficapsule --index 1 --monotonic-count 1 '
> +                            '--private-key SIGNER.key --certificate SIGNER.crt '
> +                            '--guid 3673B45D-6A7C-46F3-9E60-ADABB03F7937 '
> +                            'uboot_bin_env.itb Test13'
> +                       % (data_dir, u_boot_config.build_dir),
> +                       shell=True)
> +            # FIT firmware signed with *mal* key
> +            check_call('cd %s; '
> +                       '%s/tools/mkeficapsule --index 1 --monotonic-count 1 '
> +                            '--private-key SIGNER2.key '
> +                            '--certificate SIGNER2.crt '
> +                            '--guid 3673B45D-6A7C-46F3-9E60-ADABB03F7937 '
> +                            'uboot_bin_env.itb Test14'
> +                       % (data_dir, u_boot_config.build_dir),
> +                       shell=True)
>  
>          # Create a disk image with EFI system partition
>          check_call('virt-make-fs --partition=gpt --size=+1M --type=vfat %s %s' %
> diff --git a/test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py b/test/py/tests/test_efi_capsule/test_capsule_firmware_signed_fit.py
> similarity index 89%
> copy from test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py
> copy to test/py/tests/test_efi_capsule/test_capsule_firmware_signed_fit.py
> index a0b6a1ac86f..4400b8f1368 100644
> --- a/test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py
> +++ b/test/py/tests/test_efi_capsule/test_capsule_firmware_signed_fit.py
> @@ -1,19 +1,22 @@
>  # SPDX-License-Identifier:      GPL-2.0+
>  # Copyright (c) 2021, Linaro Limited
> -# Author: AKASHI Takahiro <takahiro.akashi at linaro.org>
> +# Copyright (c) 2022, Arm Limited
> +# Author: AKASHI Takahiro <takahiro.akashi at linaro.org>,
> +#         adapted to FIT images by Vincent Stehlé <vincent.stehle at arm.com>
>  #
> -# U-Boot UEFI: Firmware Update (Signed capsule) Test
> +# U-Boot UEFI: Firmware Update (Signed capsule with FIT images) Test
>  
>  """
>  This test verifies capsule-on-disk firmware update
> -with signed capsule files
> +with signed capsule files containing FIT images
>  """
>  
>  import pytest
>  from capsule_defs import CAPSULE_DATA_DIR, CAPSULE_INSTALL_DIR
>  
> - at pytest.mark.boardspec('sandbox')
> - at pytest.mark.buildconfigspec('efi_capsule_firmware_raw')
> + at pytest.mark.boardspec('sandbox64')
> + at pytest.mark.boardspec('sandbox_flattree')
> + at pytest.mark.buildconfigspec('efi_capsule_firmware_fit')
>  @pytest.mark.buildconfigspec('efi_capsule_authenticate')
>  @pytest.mark.buildconfigspec('dfu')
>  @pytest.mark.buildconfigspec('dfu_sf')
> @@ -23,11 +26,11 @@ from capsule_defs import CAPSULE_DATA_DIR, CAPSULE_INSTALL_DIR
>  @pytest.mark.buildconfigspec('cmd_nvedit_efi')
>  @pytest.mark.buildconfigspec('cmd_sf')
>  @pytest.mark.slow
> -class TestEfiCapsuleFirmwareSigned(object):
> +class TestEfiCapsuleFirmwareSignedFit(object):
>      def test_efi_capsule_auth1(
>              self, u_boot_config, u_boot_console, efi_capsule_data):
>          """
> -        Test Case 1 - Update U-Boot on SPI Flash, raw image format
> +        Test Case 1 - Update U-Boot on SPI Flash, FIT image format
>                        0x100000-0x150000: U-Boot binary (but dummy)
>  
>                        If the capsule is properly signed, the authentication
> @@ -57,11 +60,11 @@ class TestEfiCapsuleFirmwareSigned(object):
>  
>              # place a capsule file
>              output = u_boot_console.run_command_list([
> -                'fatload host 0:1 4000000 %s/Test11' % CAPSULE_DATA_DIR,
> -                'fatwrite host 0:1 4000000 %s/Test11 $filesize'
> +                'fatload host 0:1 4000000 %s/Test13' % CAPSULE_DATA_DIR,
> +                'fatwrite host 0:1 4000000 %s/Test13 $filesize'
>                          % CAPSULE_INSTALL_DIR,
>                  'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -            assert 'Test11' in ''.join(output)
> +            assert 'Test13' in ''.join(output)
>  
>          # reboot
>          mnt_point = u_boot_config.persistent_data_dir + '/test_efi_capsule'
> @@ -81,7 +84,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>                              '0x50000;u-boot-env raw 0x150000 0x200000"',
>                      'host bind 0 %s' % disk_img,
>                      'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -                assert 'Test11' in ''.join(output)
> +                assert 'Test13' in ''.join(output)
>  
>                  # need to run uefi command to initiate capsule handling
>                  output = u_boot_console.run_command(
> @@ -90,7 +93,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>              output = u_boot_console.run_command_list([
>                  'host bind 0 %s' % disk_img,
>                  'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -            assert 'Test11' not in ''.join(output)
> +            assert 'Test13' not in ''.join(output)
>  
>              output = u_boot_console.run_command_list([
>                  'sf probe 0:0',
> @@ -101,7 +104,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>      def test_efi_capsule_auth2(
>              self, u_boot_config, u_boot_console, efi_capsule_data):
>          """
> -        Test Case 2 - Update U-Boot on SPI Flash, raw image format
> +        Test Case 2 - Update U-Boot on SPI Flash, FIT image format
>                        0x100000-0x150000: U-Boot binary (but dummy)
>  
>                        If the capsule is signed but with an invalid key,
> @@ -132,11 +135,11 @@ class TestEfiCapsuleFirmwareSigned(object):
>  
>              # place a capsule file
>              output = u_boot_console.run_command_list([
> -                'fatload host 0:1 4000000 %s/Test12' % CAPSULE_DATA_DIR,
> -                'fatwrite host 0:1 4000000 %s/Test12 $filesize'
> +                'fatload host 0:1 4000000 %s/Test14' % CAPSULE_DATA_DIR,
> +                'fatwrite host 0:1 4000000 %s/Test14 $filesize'
>                                  % CAPSULE_INSTALL_DIR,
>                  'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -            assert 'Test12' in ''.join(output)
> +            assert 'Test14' in ''.join(output)
>  
>          # reboot
>          mnt_point = u_boot_config.persistent_data_dir + '/test_efi_capsule'
> @@ -156,7 +159,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>                          '0x50000;u-boot-env raw 0x150000 0x200000"',
>                      'host bind 0 %s' % disk_img,
>                      'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -                assert 'Test12' in ''.join(output)
> +                assert 'Test14' in ''.join(output)
>  
>                  # need to run uefi command to initiate capsule handling
>                  output = u_boot_console.run_command(
> @@ -166,7 +169,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>              output = u_boot_console.run_command_list([
>                  'host bind 0 %s' % disk_img,
>                  'fatls host 0:1 %s' % CAPSULE_INSTALL_DIR])
> -            assert 'Test12' not in ''.join(output)
> +            assert 'Test14' not in ''.join(output)
>  
>              # TODO: check CapsuleStatus in CapsuleXXXX
>  
> @@ -179,7 +182,7 @@ class TestEfiCapsuleFirmwareSigned(object):
>      def test_efi_capsule_auth3(
>              self, u_boot_config, u_boot_console, efi_capsule_data):
>          """
> -        Test Case 3 - Update U-Boot on SPI Flash, raw image format
> +        Test Case 3 - Update U-Boot on SPI Flash, FIT image format
>                        0x100000-0x150000: U-Boot binary (but dummy)
>  
>                        If the capsule is not signed, the authentication
> diff --git a/test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py b/test/py/tests/test_efi_capsule/test_capsule_firmware_signed_raw.py
> similarity index 98%
> rename from test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py
> rename to test/py/tests/test_efi_capsule/test_capsule_firmware_signed_raw.py
> index a0b6a1ac86f..8201a544e0c 100644
> --- a/test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py
> +++ b/test/py/tests/test_efi_capsule/test_capsule_firmware_signed_raw.py
> @@ -2,11 +2,11 @@
>  # Copyright (c) 2021, Linaro Limited
>  # Author: AKASHI Takahiro <takahiro.akashi at linaro.org>
>  #
> -# U-Boot UEFI: Firmware Update (Signed capsule) Test
> +# U-Boot UEFI: Firmware Update (Signed capsule with raw images) Test
>  
>  """
>  This test verifies capsule-on-disk firmware update
> -with signed capsule files
> +with signed capsule files containing raw images
>  """
>  
>  import pytest
> @@ -23,7 +23,7 @@ from capsule_defs import CAPSULE_DATA_DIR, CAPSULE_INSTALL_DIR
>  @pytest.mark.buildconfigspec('cmd_nvedit_efi')
>  @pytest.mark.buildconfigspec('cmd_sf')
>  @pytest.mark.slow
> -class TestEfiCapsuleFirmwareSigned(object):
> +class TestEfiCapsuleFirmwareSignedRaw(object):
>      def test_efi_capsule_auth1(
>              self, u_boot_config, u_boot_console, efi_capsule_data):
>          """
> -- 
> 2.35.1
> 


More information about the U-Boot mailing list