Hardened extended firmware interface framework

9 downloads 131458 Views 2MB Size Report
Mar 26, 2002 - ee app 10a Ion e or Comp 6 e Seam 15 01y' from accessing ...... of the invention, the digital signature is based on the public key infrastructure.
US007127579B2

(12)

(54)

(75)

United States Patent

(10) Patent N0.:

Zimmer et a].

(45) Date of Patent:

HARDENED EXTENDED FIRMWARE

6,389,540 B1 *

US 7,127,579 B2 Oct. 24, 2006

5/2002 Schei?er et a1. ............ .. 726/21

INTERFACE FRAMEWORK

6,978,018 B1* 2002/0099952 A1 *

12/2005 Zimmer .......... .. 7/2002 Lambert et a1. ..

Inventors: Vincent . Malhk J. 'Zimmer, Bulusu’Federal Olympla’ Way, ' WA WA

2005/0114639 A1* 1(7); 5/2005 Zimmer gran ew e a . . 2005/0160281 A1*

(73) Assignee: Ente; Corporation, Santa Clara, CA

7/2005

380/30 713/200

712/244

Thibadeau ................ .. 713/189

* Cited by examiner

US

Primary ExamineriMatthew Kim (*)

Notice:

Subject to any disclaimer, the term of this

ASSiSlanl EXIIMI'HEI’AChaSB W. Peers

patent is extended or adjusted under 35 U.S.C. 154(b) by 814 days.

(74) Attorney, Agent, or FirmiBlakely, SOkOlO?‘, Taylor & Zafman LLP

(21) Appl. No.: 10/107,882 (22)

Filed:

(57)

Mar. 26, 2002

ABSTRACT

A method of system for hardening a ?rmware environment. A trusted core framework of ?rmware components are

(65)

Prior Publication Data Us 2003/0188173 A1

'

(51) (52)

Int CL G06F 12/00 U 5 Cl ' '

segregated from initially non-trustworthy extended ?rmware

Oct 2 2003

components such that the trusted core components are executed in a P rivile g ed P rocessor mode, while the extended ?rmware components are executed in a non-privileged pro cessor mode. An authentication of each extended ?rmware component is made to determine whether it is secure or



(200601) 711/163_ 713/2 713/156

' """" """""""

_



’_

f

non-secure. Through a memory code fault mechanism,

memory accesses made by the extended ?rmware compo



’ 714/38’

nlents are trapped, and 1a1 deitiergninlaltion (iisbmadie to wl?etl?er t e memory accesses s on e a owe ase on w et er

(58) Fleld of Cl;l:il/gfgt_l0;l 5541/13’ 713/189’ 2 193_ 7’14/25 3’6 3é_ 765/55f

the extended ?rmware component is secure or non-secure and whether the requested memory page was allocated by

380/2 ’ 72 6 f1 6 21 2’2 25 2;‘ 26 4 5’

the trusted core or a secure extended ?rmware component.

,

S

,

1. t.

?l ti

ee app 10a Ion

(56)

’,





’1 t ’

’ h’h. t’

e or Comp 6 e Seam

’ ’

This segregation scheme prevents non-trusted ?rmware

15 01y‘

from accessing privileged memory, thereby preventing

References Cited

rogue, errant, or malicious ?rmware from damaging the trusted core framework.

US. PATENT DOCUMENTS 5,421,006 A *

5/1995

32 Claims, 8 Drawing Sheets

Jablon et a1. ............... .. 714/36

NON-PRIVILEGED

TRUSTED) MEMORY

EXECUTABLE IMAGE

(DRV 1)

copy

EXECUTABLE IMAGE

(PEIM B) [FINDFD] EXECUTABLE IMAGE

(PEIM A) HEADER 1

1 ‘

:|

Pr0t0o0l|n1erface1 Functionl Pointer I}

"

=

|

: l

: HANDLE : ,

152A

FunctionZPointer '

Flag

Dev1'ce1 Speci?c Context

GUIDAJn1erface1 1---

GUIDE

“new”.

0

sumo Gum -

--

1 4

~ 1---

FuncllnnA Pointer

l‘

Fun01|0n5 Palmer 5

1

,

'

FunetionBPulnler 1

GUIDZ Interfaces 0 Gum

L154 ,

Protocol InterfaceZ '

Dewar:1 tseiem?c e / HANDLERS

1

\15s \160152 f

.

Protocol lnterfaoe4 FunclionB Pointer FunctionQ Pointer

FAU LT HANDLER

Device4 Spec/‘?e

EFI CORE FRAMEWORK

17B |

|

:

CORE FRAMEWORK

Context

METADATA

____________________ ,j______.

150Af

%

TRUSTED

[:1

UNTRUSTED

U.S. Patent

Oct. 24, 2006

Sheet 1 0f 8

FDO (BFD)

0>