Acidanthera UEFI Development Kit based on EDK II edk2-stable202311
Go to file
Mike Beaton af05a18b4c MdePkg/BaseOverflowLib: Support BASE_ALIGNAS on VS2019
Note: this must be combined with flag /wd4324 added to MSFT:*_CC_FLAGS
to avoid spurious warnings when the macro is working as intended.

Update comment since alignment in all architectures can be used to align
structure member or variable definition.
2024-11-27 12:31:28 +00:00
.azurepipelines .azurepipelines: Fix Python version (to 3.12) 2023-10-31 14:40:50 +00:00
.devcontainer CI: Constructed separate workflows for common, arm, x86 packages and CodeQL. 2024-07-22 13:47:17 +03:00
.github SecurityPkg: Added SecurityPkg to CI. 2024-11-04 20:32:04 +03:00
.mergify .mergify/config.yml: Remove rebase_fallback attribute (deprecated) 2023-02-13 15:58:21 -08:00
.pytool Revert "UnitTestFrameworkPkg/Library/SubhookLib: Removed subhook from submodules." 2024-11-05 13:02:15 +03:00
ArmPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
ArmPlatformPkg MdePkg/UefiImageLib: Support multi-format and multi-source architecture 2024-07-22 13:49:00 +03:00
ArmVirtPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
BaseTools BaseTools/codeql: Update to CodeQL 2.18.1 2024-07-26 11:41:56 +03:00
Conf BaseTools:Delete FrameworkDatabase from BaseTools/Conf 2019-05-09 15:03:30 +08:00
CryptoPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
DynamicTablesPkg Build: Replaced GCC5 toolchain with GCC. 2024-07-22 13:49:00 +03:00
EmbeddedPkg Fixed compilation of all packages tracked by CI after rebasing upon edk2-stable202405 tag. 2024-07-22 13:52:40 +03:00
EmulatorPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
Ext4Pkg CI: Constructed separate workflows for common, arm, x86 packages and CodeQL. 2024-07-22 13:47:17 +03:00
FatPkg FatPkg: Adds support for read-only mode 2024-07-22 13:47:17 +03:00
FmpDevicePkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
IntelFsp2Pkg MdePkg/UefiImageLib: Support multi-format and multi-source architecture 2024-07-22 13:49:00 +03:00
IntelFsp2WrapperPkg Fixed compilation of all packages tracked by CI after rebasing upon edk2-stable202311. 2024-07-22 13:51:38 +03:00
MdeModulePkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
MdePkg MdePkg/BaseOverflowLib: Support BASE_ALIGNAS on VS2019 2024-11-27 12:31:28 +00:00
NetworkPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
OpenCorePkg@6a961f1652 Build: Upgraded OpenCorePkg. 2024-07-22 13:49:01 +03:00
OvmfPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
PcAtChipsetPkg PcAtChipsetPkg/HpetTimerDxe: Fix nested interrupt time accuracy 2024-01-29 19:17:00 +00:00
PrmPkg Build: Replaced GCC5 toolchain with GCC. 2024-07-22 13:49:00 +03:00
RedfishPkg RedfishPkg/BaseUcs2Utf8Lib: Fix out of bounds shift in UTF8ToUCS2Char 2024-07-22 12:45:14 +03:00
SecurityPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
ShellPkg Fixed compilation of all packages tracked by CI after rebasing upon edk2-stable202311. 2024-07-22 13:51:38 +03:00
SignedCapsulePkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
SourceLevelDebugPkg Fixed compilation of all packages tracked by CI after rebasing upon edk2-stable202311. 2024-07-22 13:51:38 +03:00
StandaloneMmPkg MdePkg/UefiImageLib: Support multi-format and multi-source architecture 2024-07-22 13:49:00 +03:00
UefiCpuPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
UefiPayloadPkg IntrinsicLib: Move from CryptoPkg to MdePkg 2024-11-04 20:32:04 +03:00
UnitTestFrameworkPkg UnitTestFrameworkPkg: Use TianoCore mirror of subhook submodule 2024-11-05 13:02:15 +03:00
.editorconfig Add a .editorconfig file to tell editors basic formatting details 2023-09-08 18:56:52 +00:00
.git-blame-ignore-revs .git-blame-ignore-revs: Ignore recent uncrustify commits 2023-11-28 21:11:27 +00:00
.gitignore .gitignore: Add compile_flags.txt 2024-07-22 12:55:02 +03:00
.gitmodules UnitTestFrameworkPkg: Use TianoCore mirror of subhook submodule 2024-11-05 13:02:15 +03:00
.mailmap .mailmap: add entries for Rebecca Cran 2020-09-22 13:53:46 +00:00
CONTRIBUTING.md Add a stub CONTRIBUTING.md pointing to the wiki 2020-08-18 18:07:43 +00:00
License-History.txt edk2: Add License-History.txt 2019-04-09 09:10:18 -07:00
License.txt edk2: Change License.txt from 2-Clause BSD to BSD+Patent 2019-04-09 09:10:18 -07:00
LoaderFlow.png SecurePE: Replaced old PE loader with Secure one. 2024-07-22 13:42:14 +03:00
Maintainers.txt Maintainers.txt: Update my email address 2024-05-02 12:43:50 +00:00
PEvsTE.png Docs: Updated README.md. 2024-07-22 13:49:00 +03:00
README.md README: Updated features' list. 2024-11-04 20:32:04 +03:00
ReadMe.rst UnitTestFrameworkPkg: Use TianoCore mirror of subhook submodule 2024-11-05 13:02:15 +03:00
STATUS.md SecurityPkg: Added SecurityPkg to CI. 2024-11-04 20:32:04 +03:00
docker-compose.yaml CI: Constructed separate workflows for common, arm, x86 packages and CodeQL. 2024-07-22 13:47:17 +03:00
edksetup.bat edksetup.bat: if toolsetup.bat fails, just exit 2023-05-08 19:03:18 +00:00
edksetup.sh Remove bashisms from edksetup.sh and BaseTools/BuildEnv 2023-05-10 12:02:34 +00:00
pip-requirements.txt pip: bump edk2-pytool-extensions from 0.26.4 to 0.27.5 2024-07-26 10:22:47 +03:00

README.md

Acidanthera UEFI Development Kit

AUDK is a fork of EDK II project focused on security.
The main goal of AUDK project is to bring the best practices of secure code development into firmware domain.
These practices include (but are not limited to) static analysis, fuzzing, formal verification,
code hardening through various compiler optimizations and codebase architectural refactoring.

STATUS.md lists current states of the supported packages (toolchains, targets, CI supervision).

Stable branches in AUDK project are constructed by rebasing all the commits in master branch upon EDK II stable tag.
Available stable branches:
audk-stable-202211
audk-stable-202302
audk-stable-202305
audk-stable-202311

Supported features

PE loader designed with formal methods
UEFI Executable File Format
ImageTool
Ext4Pkg, FatPkg: Various improvements based on Sydr fuzzing results
Introduced CpuArchLib to move the CPU Architectural initialization to DxeCore (https://bugzilla.tianocore.org/show_bug.cgi?id=3223)
CI checks not only compilation results of various packages but also boot results of Windows 10 / Linux kernels for OVMF, ArmVirtQemu
Introduced new image protection policy, which forbids loading of unaligned images

PE loader designed with formal methods

This branch demonstrates the integration of a new PE/COFF loader designed with the help of formal methods into the EDK II infrastructure.

Introduction

The PE/COFF loader is one of the central components of the firmware core and its trust base. Every Image which is part of a UEFI system, including platform drivers from the primary firmware storage, Option ROMs from external hardware, and OS loaders from arbitrary storage, is verified and loaded by this library. Clearly it is a key component to ensure platform reliability and software compatibility, and can only be modified with great care. It also is an essential component for security technologies such as Secure Boot and Measured Boot.

image

Unfortunately, over the years, the current solution has been subject to bug reports affecting platform reliability, some of which have been unresolved to date. Please refer to the TianoCore BugZilla and especially discussions on the edk2-devel mailing list for further reading. Due to the incremental changes to the existing solution over the years, the state of a sound solution has been lost, and it has become a maintenance burden that is hard to fix and further advance incrementally. At the same time, the demand on not only tested but proven security has become more important in the recent times.

The usage of formal methods to design the new solution greatly helped restore the state of a truly sound solution, resolving many issues regarding inter-API guarantees and Image format validation. Many new abstractions have been introduced, external code has been centralized, and the overall flexibility has been improved, to hopefully aid developers to extend the codebase more easily in the future. Beyond that, the formal model ensures a high level of confidence that security-wise there have been no regressions, and there might even be potential improvements.

Please also refer to the new work-in-progress documentation available at MdePkg/Library/BasePeCoffLib2/Documentation.md

Further abstraction

The new solution has been implemented as a new library class in MdePkg. PeCoffLib2 features a new API that allows for a more resilient and a more flexible caller design. Most notably, all Image operations have been integrated into the API design rather than the callers accessing the library context and duplicating certain work. PeCoffLib remains intact as deprecated API to support legacy code during the transition period.

To increase platform flexibility, a new layer of abstraction is introduced in the form of the library class UefiImageLib, which can be found at MdePkg/Include/Library/UefiImageLib.h. Currently, it is a subset of the APIs provided by PeCoffLib2 that is expected to be compatible with most other common executable formats, plus a few convenience functions. As part of the proposal, the instance UefiImageLibPeCoff is provided, which is basically a shim for PeCoffLib2. In the future, instances to support other file formats can be introduced without having to integrate them across the entire EDK II tree.

For security and code size optimization reasons, the UefiImageLib design is complicated. To not expose FV-only UEFI image formats via, e.g., DxeCore to untrusted sources, UefiImageLib can be configured to support different UEFI image formats per source.

Issues of the current solution

  • High level of maintenance cost due to convoluted function contracts
  • Error-prone design promoting the introduction of code bugs
  • Multiple real-world bugs affecting reliability, some unaddressed for years
  • A lot of duplicate caller-side code that decreases the flexibility of porting and integration (e.g. Image permissions in PEI)
  • Dependency on Image re-parsing for production code

Benefits of the new solution

  • Fixes all known reported BugZilla tickets on PE/COFF loader reliability
  • Formal methods increase confidence in a high level of reliability and security
  • Improved design eases future maintenance and extension
  • Architecture-independent Image processing (e.g. for emulation)
  • Support for more granular Image section permissions (e.g. read-only)

Benefits of the formal methods involved

  • Complete proof arithmetic cannot overflow (excluding intentional modulo arithmetic)
  • Mostly complete proof memory accesses are safe (requires axioms)
  • Complete proof of Image format compliance verification
  • Complete proof of Image loading
  • Mostly complete proof of Image relocation (final memory state cannot be easily described)

Further notes about the formal approach

  • A snapshot of the new PE/COFF loader code will be provided with annotations and proving results
  • The snapshot will not be current and updating the old code is out of the scope of this project, however the functional changes should be manageable to review
  • We are currently investigating whether deploying the proving environment as a Docker container is feasible
  • There may be aids to compare the updates over the last fully verified state (e.g. stripped versions of the code with diffs)
  • If accepted, the new PE/COFF loader code should be developed further without updating the formal annotations, but with thorough review of important invariants and sufficient documentation

Current progress, future goals, and further notes

  • OVMF boots to Shell with SMM and Secure Boot enabled
  • Linux EmulatorPkg boots
  • Extended support for Image protection has been implemented
  • FFS and DebugTable enhancements have been implemented
  • Not all features have been implemented, e.g. RISC-V support
  • There are unrelated changes present to help testing and validation
  • Specified interfaces need adjustments (e.g. security architectural protocol)
  • Some validation is still absent

BZs fixed by integrating the new PE/COFF loader

BZs easier to address by integrating the new PE/COFF loader

UEFI Executable File Format

The Terse Executable (TE) format is a curious approach to reducing the size of PE files. Essentially, it replaces the multi-layer Portable Executable (PE) image file header with a single, denser image file header.

image

However, the conversion does not fix the internal offsets — this must be done by the image file loading — and it is unlikely to reduce the size of memory page-aligned execute-in-place (XIP) image files. The simpler parsing properties of having only a single, simple image file header are contrasted by the complexity of considering the shift in data offsets and the semantic change to the image address space. For XIP files, the replacement of the PE image file header also shifts the addresses of all image segments. To account for this, EDK IIs PeiCore has a workaround to apply the shift to the load address, so that the image file header is technically misaligned, but the image segments are correctly aligned. This is especially important when enforcing memory permissions during PEI.

We propose a novel executable file format (UEFI Executable File Format, UE), accompanied by a trivial digital signature scheme. (In our repository TE format is completely replaced with UE.) Both help reduce the complexity of parsing and validation, while also encoding metadata much more efficiently than the PE and the TE formats. They are specifically designed for UEFI firmware implementations and are explicitly not optimized for the needs of modern operating systems. Compared to existing alternatives such as ELF and the Mach-O format, the proposed alternative makes extensive use of encoding techniques to impose certain constraints on the metadata, reducing the need for conformance validation.

ImageTool

For compiler toolchain configurations based on GCC and Clang, EDK II generates ELF files in the first step. To convert these into PE files, the TianoCore tool GenFw is used. It converts ELF image file sections to PE image file sections while ignoring ELF image segments. Due to the great flexibility offered by ELF image file sections, conversion is done by using custom static linking scripts to merge ELF image file sections as desired. An undocumented detail of the EDK II build system is that all image files are generated as XIP, regardless of their phase or purpose.

The main architectural flaw of GenFw and other TianoCore tools is code duplication, i.e. instead of using standard library modules of the already existing packages in the repository, necessary source files (or functions) are simply copied into the building directory of those tools.

We addressed that issue in our AUDK project greatly increasing code reuse among BaseTools and, in addition, to make image file conversion easier to maintain, extend, and validate, we have replaced GenFw with ImageTool. ImageTool implements an approach based on an intermediate representation. This allows input and output formats to be processed independently of each other. At the same time, operations such as relocating an image became format-independent, contributing to improved extensibility. Because we designed the intermediate representation to be semi-canonical, we were able to use it to reduce the validation of the output file to parsing the input file and comparing the resulting intermediate representation to the original one.