mirror of
https://github.com/LongSoft/UEFITool.git
synced 2025-05-09 13:52:01 -04:00

2) Fixed QHexView misalignment in Windows and macOS. 3) Added some more analysis to raw files and sections: raw files can (or can not) contain sections, raw sections can contain NVAR storage or PE/TE. 4) Improved CPU base address detection and propagation. 5) Improved FIT recognition. 7) ME region not displayed if it is in unknown format, fixed this because we still want to operate with it. 8) Small changes to Flash Descriptor parsing to get more cases for valid "Intel image". To get rid of cases when "Intel image" is already in tree but with parse error because of which "UEFI image" appears. 9) Added parsing of individual UEFI-files (these can be trimmed from UEFI-volume), displaying it as "UEFI volume part". 10) Added possibility to view/save contents of elements "Free volume space", "Free space" and such, because these can be non-empty. 11) Added info about blocks number and block size (with preliminary and stupid validity check) to volume info. 12) Added storage in settings of the following paths: open image file, save image file, open GUIDs file. 13) Added last opened files list. 14) Added permanent opened file name string to the end of the status bar. 15) Added opened file changes tracking: if the file was modified in other program while it is opened in UEFITool, there are 3 ways to act: a) ignore changes (but mark file path displayed in the status bar with italic font); b) ask user to reopen or ignore (if ignore, mark as in a); c) auto reopen changed file in UEFITool. If changes were in some way ignored, file path displayed in the right of the status bar will be marked with italic font and then become clickable: on click request to reopen appears again. 16) Switched to offset/size instead of byte array storing in each tree item. 17) For clarity - added icons to key tree items (compressed and with contents, contents now must be in root item only). 18) For usability - added expanding tree on open image (to depth level 1) and by menu command (expand all).
1716 lines
80 KiB
C++
1716 lines
80 KiB
C++
/* nvramparser.cpp
|
|
|
|
Copyright (c) 2016, Nikolaj Schlej. All rights reserved.
|
|
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php.
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
*/
|
|
|
|
#ifdef U_ENABLE_NVRAM_PARSING_SUPPORT
|
|
#include <map>
|
|
|
|
#include "nvramparser.h"
|
|
#include "parsingdata.h"
|
|
#include "ustring.h"
|
|
#include "utility.h"
|
|
#include "nvram.h"
|
|
#include "ffs.h"
|
|
#include "intel_microcode.h"
|
|
|
|
#include "umemstream.h"
|
|
#include "kaitai/kaitaistream.h"
|
|
#include "generated/ami_nvar.h"
|
|
#include "generated/apple_sysf.h"
|
|
#include "generated/edk2_vss.h"
|
|
#include "generated/edk2_vss2.h"
|
|
#include "generated/edk2_ftw.h"
|
|
#include "generated/insyde_fdc.h"
|
|
#include "generated/ms_slic_pubkey.h"
|
|
#include "generated/ms_slic_marker.h"
|
|
#include "generated/phoenix_flm.h"
|
|
#include "generated/phoenix_evsa.h"
|
|
|
|
#ifndef MIN
|
|
#define MIN(x, y) (((x) < (y)) ? (x) : (y))
|
|
#endif
|
|
|
|
USTATUS NvramParser::parseNvarStore(const UModelIndex & index, const bool probe)
|
|
{
|
|
// Sanity check
|
|
if (!index.isValid())
|
|
return U_INVALID_PARAMETER;
|
|
|
|
UByteArray nvar = model->body(index);
|
|
|
|
// Nothing to parse in an empty store
|
|
if (nvar.isEmpty())
|
|
return probe ? U_STORES_NOT_FOUND : U_SUCCESS;
|
|
|
|
// Obtain required fields from parsing data
|
|
UINT8 emptyByte = 0xFF;
|
|
if (model->hasEmptyParsingData(index) == false) {
|
|
UByteArray data = model->parsingData(index);
|
|
const VOLUME_PARSING_DATA* pdata = (const VOLUME_PARSING_DATA*)data.constData();
|
|
emptyByte = pdata->emptyByte;
|
|
}
|
|
|
|
try {
|
|
const UINT32 localOffset = (UINT32)model->headerSize(index);
|
|
umemstream is(nvar.constData(), nvar.size());
|
|
kaitai::kstream ks(&is);
|
|
ami_nvar_t parsed(&ks);
|
|
|
|
UINT16 guidsInStore = 0;
|
|
UINT32 currentEntryIndex = 0;
|
|
for (const auto & entry : *parsed.entries()) {
|
|
UINT8 subtype = Subtypes::FullNvarEntry;
|
|
UString name;
|
|
UString text;
|
|
UString info;
|
|
UString guid;
|
|
|
|
// This is a terminating entry, needs special processing
|
|
if (entry->_is_null_signature_rest()) {
|
|
UINT32 guidAreaSize = guidsInStore * sizeof(EFI_GUID);
|
|
UINT32 unparsedSize = (UINT32)nvar.size() - entry->offset() - guidAreaSize;
|
|
|
|
// Check if the data left is a free space or a padding
|
|
UByteArray padding = nvar.mid(entry->offset(), unparsedSize);
|
|
|
|
// Get info
|
|
UString info = usprintf("Full size: %Xh (%u)", (UINT32)padding.size(), (UINT32)padding.size());
|
|
|
|
auto c = checkSingle(padding, (unsigned char)emptyByte);
|
|
if (c == emptyByte && padding.size() == unparsedSize) { // Free space
|
|
if (probe && nvar.size() == unparsedSize)
|
|
return U_STORES_NOT_FOUND;
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + entry->offset(), Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, padding.size(), 0,
|
|
Fixed, index);
|
|
}
|
|
else {
|
|
// Nothing is parsed yet, but the file is not empty
|
|
if (entry->offset() == 0) {
|
|
if (!probe)
|
|
msg(usprintf("%s: file can't be parsed as NVAR variable store", __FUNCTION__), index);
|
|
return U_INVALID_FILE;
|
|
}
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + entry->offset(), Types::Padding, getPaddingType(padding),
|
|
UString("Padding"), UString(), info,
|
|
0, padding.size(), 0,
|
|
Fixed, index);
|
|
}
|
|
|
|
// Add GUID store area
|
|
if (guidAreaSize > nvar.size())
|
|
guidAreaSize = nvar.size();
|
|
// Get info
|
|
name = UString("GUID store");
|
|
info = usprintf("Full size: %Xh (%u)\nGUIDs in store: %u",
|
|
guidAreaSize, guidAreaSize,
|
|
guidsInStore);
|
|
// Add tree item
|
|
model->addItem(
|
|
(UINT32)(localOffset + entry->offset() + padding.size()), Types::NvarGuidStore, 0,
|
|
name, UString(), info,
|
|
0, guidAreaSize, 0,
|
|
Fixed, index);
|
|
|
|
return U_SUCCESS;
|
|
}
|
|
|
|
// This is a normal entry
|
|
const auto entry_body = entry->body();
|
|
|
|
// Set default next to predefined last value
|
|
NVAR_ENTRY_PARSING_DATA pdata = {};
|
|
pdata.emptyByte = emptyByte;
|
|
pdata.next = 0xFFFFFF;
|
|
pdata.isValid = TRUE;
|
|
|
|
// Check for invalid entry
|
|
if (!entry->attributes()->valid()) {
|
|
subtype = Subtypes::InvalidNvarEntry;
|
|
name = UString("Invalid");
|
|
pdata.isValid = FALSE;
|
|
goto processing_done;
|
|
}
|
|
|
|
// Check for link entry
|
|
if (entry->next() != 0xFFFFFF) {
|
|
subtype = Subtypes::LinkNvarEntry;
|
|
pdata.next = (UINT32)entry->next();
|
|
}
|
|
|
|
// Check for data-only entry (nameless and GUIDless entry or link)
|
|
if (entry->attributes()->data_only()) {
|
|
// Search backwards for a previous entry with a link to this variable
|
|
UModelIndex prevEntryIndex;
|
|
if (currentEntryIndex > 0) {
|
|
for (UINT32 i = currentEntryIndex - 1; i > 0; i--) {
|
|
const auto & previousEntry = parsed.entries()->at(i);
|
|
|
|
if (previousEntry == entry)
|
|
break;
|
|
|
|
if ((UINT32)previousEntry->next() + (UINT32)previousEntry->offset() == (UINT32)entry->offset()) { // Previous link is present and valid
|
|
prevEntryIndex = index.model()->index(i, 0, index);
|
|
// Make sure that we are linking to a valid entry
|
|
NVAR_ENTRY_PARSING_DATA pd = readUnaligned((NVAR_ENTRY_PARSING_DATA*)model->parsingData(prevEntryIndex).constData());
|
|
if (!pd.isValid) {
|
|
prevEntryIndex = UModelIndex();
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
// Check if the link is valid
|
|
if (prevEntryIndex.isValid()) {
|
|
// Use the name and text of the previous entry
|
|
name = model->name(prevEntryIndex);
|
|
text = model->text(prevEntryIndex);
|
|
|
|
if (entry->next() == 0xFFFFFF)
|
|
subtype = Subtypes::DataNvarEntry;
|
|
}
|
|
else {
|
|
subtype = Subtypes::InvalidLinkNvarEntry;
|
|
name = UString("InvalidLink");
|
|
pdata.isValid = FALSE;
|
|
}
|
|
goto processing_done;
|
|
}
|
|
|
|
// Obtain text
|
|
if (!entry_body->_is_null_ascii_name()) {
|
|
text = entry_body->ascii_name().c_str();
|
|
}
|
|
else if (!entry_body->_is_null_ucs2_name()) {
|
|
UByteArray temp;
|
|
for (const auto & ch : *entry_body->ucs2_name()->ucs2_chars()) {
|
|
temp += UByteArray((const char*)&ch, sizeof(ch));
|
|
}
|
|
text = uFromUcs2(temp.constData());
|
|
}
|
|
|
|
// Obtain GUID
|
|
if (!entry_body->_is_null_guid()) { // GUID is stored in the entry itself
|
|
const EFI_GUID g = readUnaligned((EFI_GUID*)entry_body->guid().c_str());
|
|
name = guidToUString(g);
|
|
guid = guidToUString(g, false);
|
|
}
|
|
else { // GUID is stored in GUID store at the end of the NVAR store
|
|
// Grow the GUID store if needed
|
|
if (guidsInStore < entry_body->guid_index() + 1)
|
|
guidsInStore = entry_body->guid_index() + 1;
|
|
|
|
// The list begins at the end of the store and goes backwards
|
|
const EFI_GUID g = readUnaligned((EFI_GUID*)(nvar.constData() + nvar.size()) - (entry_body->guid_index() + 1));
|
|
name = guidToUString(g);
|
|
guid = guidToUString(g, false);
|
|
}
|
|
|
|
processing_done:
|
|
// This feels hacky, but I haven't found a way to ask Kaitai for raw bytes
|
|
UINT32 headerSize = sizeof(NVAR_ENTRY_HEADER) + entry_body->data_start_offset();
|
|
UByteArray nvarData = nvar.mid(entry->offset(), headerSize + entry_body->data_size())
|
|
+ nvar.mid(entry->end_offset() - entry_body->extended_header_size(), entry_body->extended_header_size());
|
|
|
|
// Add GUID info for valid entries
|
|
if (!guid.isEmpty())
|
|
info += UString("Variable GUID: ") + guid + "\n";
|
|
|
|
// Add GUID index information
|
|
if (!entry_body->_is_null_guid_index())
|
|
info += usprintf("GUID index: %u\n", entry_body->guid_index());
|
|
|
|
// Add header, body and extended data info
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nTail size: %Xh (%u)",
|
|
entry->size(), entry->size(),
|
|
headerSize, headerSize,
|
|
entry_body->data_size(), entry_body->data_size(),
|
|
entry_body->extended_header_size(), entry_body->extended_header_size());
|
|
|
|
// Add attributes info
|
|
const NVAR_ENTRY_HEADER entryHeader = readUnaligned((NVAR_ENTRY_HEADER*)nvarData.constData());
|
|
info += usprintf("\nAttributes: %02Xh", entryHeader.Attributes);
|
|
|
|
// Translate attributes to text
|
|
if (entryHeader.Attributes != 0x00 && entryHeader.Attributes != 0xFF)
|
|
info += UString(" (") + nvarAttributesToUString(entryHeader.Attributes) + UString(")");
|
|
|
|
// Add next node info
|
|
if (entry->next() != 0xFFFFFF)
|
|
info += usprintf("\nNext node at offset: %Xh", localOffset + entry->offset() + (UINT32)entry->next());
|
|
|
|
// Add extended header info
|
|
if (entry_body->extended_header_size() > 0) {
|
|
info += usprintf("\nExtended header size: %Xh (%u)",
|
|
entry_body->extended_header_size(), entry_body->extended_header_size());
|
|
|
|
const UINT8 extendedAttributes = *(nvar.constData() + entry->end_offset() - entry_body->extended_header_size());//tail.constData();
|
|
info += usprintf("\nExtended attributes: %02Xh (", extendedAttributes) + nvarExtendedAttributesToUString(extendedAttributes) + UString(")");
|
|
|
|
// Add checksum
|
|
if (!entry_body->_is_null_extended_header_checksum()) {
|
|
UINT8 calculatedChecksum = 0;
|
|
|
|
// Include entry body
|
|
UINT8* start = (UINT8*)nvarData.constData();
|
|
for (UINT8* p = start; p < start + headerSize + entry_body->data_size(); p++) {
|
|
calculatedChecksum += *p;
|
|
}
|
|
// Include entry size and flags
|
|
start = (UINT8*)&entryHeader.Size;
|
|
for (UINT8*p = start; p < start + sizeof(UINT16); p++) {
|
|
calculatedChecksum += *p;
|
|
}
|
|
// Include entry attributes
|
|
calculatedChecksum += entryHeader.Attributes;
|
|
info += usprintf("\nChecksum: %02Xh, ", entry_body->extended_header_checksum())
|
|
+ (calculatedChecksum ? usprintf(", invalid, should be %02Xh", 0x100 - calculatedChecksum) : UString(", valid"));
|
|
}
|
|
|
|
// Add timestamp
|
|
if (!entry_body->_is_null_extended_header_timestamp())
|
|
info += usprintf("\nTimestamp: %" PRIX64 "h", entry_body->extended_header_timestamp());
|
|
|
|
// Add hash
|
|
if (!entry_body->_is_null_extended_header_hash()) {
|
|
UByteArray hash = UByteArray(entry_body->extended_header_hash().c_str(), entry_body->extended_header_hash().size());
|
|
info += UString("\nHash: ") + UString(hash.toHex().constData());
|
|
}
|
|
}
|
|
|
|
// Add tree item
|
|
UModelIndex varIndex = model->addItem(
|
|
localOffset + entry->offset(), Types::NvarEntry, subtype,
|
|
name, text, info,
|
|
headerSize, entry_body->data_size(), entry_body->extended_header_size(),
|
|
Fixed, index);
|
|
currentEntryIndex++;
|
|
|
|
// Set parsing data
|
|
model->setParsingData(varIndex, UByteArray((const char*)&pdata, sizeof(pdata)));
|
|
|
|
// Try parsing the entry data as NVAR storage if it begins with NVAR signature
|
|
if ((subtype == Subtypes::DataNvarEntry || subtype == Subtypes::FullNvarEntry)
|
|
&& entry_body->data_size() >= 4 && readUnaligned((const UINT32*)(nvarData.constData() + headerSize)) == NVRAM_NVAR_ENTRY_SIGNATURE)
|
|
(void)parseNvarStore(varIndex);
|
|
}
|
|
}
|
|
catch (...) {
|
|
if (!probe)
|
|
msg(usprintf("%s: unable to parse AMI NVAR storage", __FUNCTION__), index);
|
|
return U_INVALID_STORE;
|
|
}
|
|
|
|
return U_SUCCESS;
|
|
}
|
|
|
|
USTATUS NvramParser::parseNvramVolumeBody(const UModelIndex& index, const UINT32 fdcStoreSizeOverride)
|
|
{
|
|
// Sanity check
|
|
if (!index.isValid())
|
|
return U_INVALID_PARAMETER;
|
|
|
|
// Obtain required fields from parsing data
|
|
UINT8 emptyByte = 0xFF;
|
|
if (model->hasEmptyParsingData(index) == false) {
|
|
UByteArray data = model->parsingData(index);
|
|
const VOLUME_PARSING_DATA* pdata = (const VOLUME_PARSING_DATA*)data.constData();
|
|
emptyByte = pdata->emptyByte;
|
|
}
|
|
|
|
// Get local offset
|
|
const UINT32 localOffset = (UINT32)model->headerSize(index);
|
|
|
|
// Get item data
|
|
UByteArray volumeBody = model->body(index);
|
|
const UINT32 volumeBodySize = (UINT32)volumeBody.size();
|
|
|
|
// Iterate over all bytes inside the volume body, trying to parse every next byte offset by one of the known parsers
|
|
UByteArray outerPadding;
|
|
UINT32 previousStoreEndOffset = 0;
|
|
for (UINT32 storeOffset = 0;
|
|
storeOffset < volumeBodySize;
|
|
storeOffset++) {
|
|
UString name, text, info;
|
|
UINT32 headerSize, bodySize;
|
|
|
|
// VSS
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(VSS_VARIABLE_STORE_HEADER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_vss;
|
|
}
|
|
|
|
// Perform initial sanity check
|
|
const VSS_VARIABLE_STORE_HEADER* storeHeader = (const VSS_VARIABLE_STORE_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if ((storeHeader->Signature != NVRAM_VSS_STORE_SIGNATURE
|
|
&& storeHeader->Signature != NVRAM_APPLE_SVS_STORE_SIGNATURE
|
|
&& storeHeader->Signature != NVRAM_APPLE_NSS_STORE_SIGNATURE)
|
|
|| storeHeader->Format != NVRAM_VSS_VARIABLE_STORE_FORMATTED) {
|
|
// No need to parse further, not a VSS store
|
|
goto not_vss;
|
|
}
|
|
UINT32 storeSize = MIN(volumeBodySize - storeOffset, storeHeader->Size); //TODO: consider this check to become hard bail as it was before
|
|
|
|
// This copy is required for possible FDC workaround
|
|
UByteArray vss = volumeBody.mid(storeOffset, storeSize);
|
|
|
|
// Check if we are here to parse a special case of FDC store with size override
|
|
UINT32 originalStoreSize = 0;
|
|
bool fdcHeaderSizeOverrideRequired = (fdcStoreSizeOverride > 0 && storeHeader->Signature == NVRAM_VSS_STORE_SIGNATURE && storeHeader->Size == 0xFFFFFFFF);
|
|
if (fdcHeaderSizeOverrideRequired) {
|
|
VSS_VARIABLE_STORE_HEADER* vssHeader = (VSS_VARIABLE_STORE_HEADER*)vss.data();
|
|
originalStoreSize = vssHeader->Size;
|
|
vssHeader->Size = fdcStoreSizeOverride;
|
|
}
|
|
|
|
// Try parsing VSS store candidate
|
|
umemstream is(vss.constData(), vss.size());
|
|
kaitai::kstream ks(&is);
|
|
edk2_vss_t parsed(&ks);
|
|
|
|
// Restore original store size, if needed
|
|
if (fdcHeaderSizeOverrideRequired) {
|
|
VSS_VARIABLE_STORE_HEADER* vssHeader = (VSS_VARIABLE_STORE_HEADER*)vss.data();
|
|
vssHeader->Size = originalStoreSize;
|
|
}
|
|
|
|
// VSS store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
UString info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = parsed.len_vss_store_header();
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Add info
|
|
if (parsed.signature() == NVRAM_APPLE_SVS_STORE_SIGNATURE) {
|
|
name = UString("Apple SVS store");
|
|
}
|
|
else if (parsed.signature() == NVRAM_APPLE_NSS_STORE_SIGNATURE) {
|
|
name = UString("Apple NSS store");
|
|
}
|
|
else {
|
|
name = UString("VSS store");
|
|
}
|
|
|
|
info = usprintf("Signature: %Xh (", parsed.signature()) + fourCC(parsed.signature()) + UString(")\n");
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nFormat: %02Xh\nState: %02Xh\nReserved: %02Xh\nReserved1: %04Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.format(),
|
|
parsed.state(),
|
|
parsed.reserved(),
|
|
parsed.reserved1());
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::VssStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Add variables
|
|
UINT32 entryOffset = parsed.len_vss_store_header();
|
|
for (const auto& variable : *parsed.body()->variables()) {
|
|
UINT8 subtype;
|
|
|
|
// This is the terminating entry, needs special processing
|
|
if (variable->_is_null_signature_last()) {
|
|
// Add free space or padding after all variables, if needed
|
|
if (entryOffset < storeSize) {
|
|
UByteArray freeSpace = vss.mid(entryOffset, storeSize - entryOffset);
|
|
// Add info
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)freeSpace.size(), (UINT32)freeSpace.size());
|
|
|
|
// Check that remaining unparsed bytes are actually empty
|
|
auto c = checkSingle(freeSpace, (unsigned char)emptyByte);
|
|
if (c == emptyByte) { // Free space
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
else {
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::Padding, getPaddingType(freeSpace),
|
|
UString("Padding"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
// This is a normal entry
|
|
UINT32 variableSize;
|
|
if (variable->is_intel_legacy()) { // Intel legacy
|
|
subtype = Subtypes::IntelVssEntry;
|
|
// Needs some additional parsing of variable->intel_legacy_data to separate the name from the value
|
|
text = uFromUcs2(variable->intel_legacy_data().c_str());
|
|
UINT32 textLengthInBytes = (UINT32)text.length() * 2 + 2;
|
|
headerSize = variable->len_intel_legacy_header() + textLengthInBytes;
|
|
bodySize = variable->len_total() - headerSize;
|
|
variableSize = headerSize + bodySize;
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
else if (variable->is_auth()) { // Authenticated
|
|
subtype = Subtypes::AuthVssEntry;
|
|
headerSize = variable->len_auth_header() + variable->len_name_auth();
|
|
bodySize = variable->len_data_auth();
|
|
variableSize = headerSize + bodySize;
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
text = uFromUcs2(variable->name_auth().c_str());
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
else if (!variable->_is_null_apple_data_crc32()) { // Apple CRC32
|
|
subtype = Subtypes::AppleVssEntry;
|
|
headerSize = variable->len_apple_header() + variable->len_name();
|
|
bodySize = variable->len_data();
|
|
variableSize = headerSize + bodySize;
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
text = uFromUcs2(variable->name().c_str());
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
else { // Standard
|
|
subtype = Subtypes::StandardVssEntry;
|
|
headerSize = variable->len_standard_header() + variable->len_name();
|
|
bodySize = variable->len_data();
|
|
variableSize = headerSize + bodySize;
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
text = uFromUcs2(variable->name().c_str());
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
|
|
// Override variable type to Invalid, if needed
|
|
if (!variable->is_valid()) {
|
|
subtype = Subtypes::InvalidVssEntry;
|
|
name = UString("Invalid");
|
|
text.clear();
|
|
}
|
|
|
|
const UINT32 variableAttributes = variable->attributes()->non_volatile()
|
|
+ (variable->attributes()->boot_service() << 1)
|
|
+ (variable->attributes()->runtime() << 2)
|
|
+ (variable->attributes()->hw_error_record() << 3)
|
|
+ (variable->attributes()->auth_write() << 4)
|
|
+ (variable->attributes()->time_based_auth() << 5)
|
|
+ (variable->attributes()->append_write() << 6)
|
|
+ (UINT32)(variable->attributes()->reserved() << 7)
|
|
+ (UINT32)(variable->attributes()->apple_data_checksum() << 31);
|
|
|
|
// Add generic info
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nState: %02Xh\nReserved: %02Xh\nAttributes: %08Xh (",
|
|
variableSize, variableSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
variable->state(),
|
|
variable->reserved(),
|
|
variableAttributes) + vssAttributesToUString(variableAttributes) + UString(")");
|
|
|
|
// Add specific info
|
|
if (variable->is_auth()) {
|
|
UINT64 monotonicCounter = (UINT64)variable->len_name() + ((UINT64)variable->len_data() << 32);
|
|
info += usprintf("\nMonotonic counter: %" PRIX64 "h\nTimestamp: ", monotonicCounter) + efiTimeToUString(*(const EFI_TIME*)variable->timestamp().c_str())
|
|
+ usprintf("\nPubKey index: %u", variable->pubkey_index());
|
|
}
|
|
else if (!variable->_is_null_apple_data_crc32()) {
|
|
// Calculate CRC32 of the variable data
|
|
UINT32 calculatedCrc32 = (UINT32)crc32(0, (const UINT8*)(vss.constData() + entryOffset + headerSize), bodySize);
|
|
|
|
info += usprintf("\nData checksum: %08Xh", variable->apple_data_crc32()) +
|
|
(variable->apple_data_crc32() != calculatedCrc32 ? usprintf(", invalid, should be %08Xh", calculatedCrc32) : UString(", valid"));
|
|
}
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::VssEntry, subtype,
|
|
name, text, info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, headerIndex);
|
|
|
|
entryOffset += variableSize;
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_vss:
|
|
// VSS2
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(VSS2_VARIABLE_STORE_HEADER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_vss2;
|
|
}
|
|
|
|
// Perform initial sanity check
|
|
const VSS2_VARIABLE_STORE_HEADER* storeHeader = (const VSS2_VARIABLE_STORE_HEADER*)(volumeBody.constData() + storeOffset);
|
|
UByteArray guid = UByteArray((const char*)&storeHeader->Signature, sizeof(EFI_GUID));
|
|
|
|
if ((guid != NVRAM_VSS2_AUTH_VAR_KEY_DATABASE_GUID
|
|
&& guid != NVRAM_VSS2_STORE_GUID
|
|
&& guid != NVRAM_FDC_STORE_GUID)
|
|
|| storeHeader->Format != NVRAM_VSS_VARIABLE_STORE_FORMATTED) {
|
|
// No need to parse further, not a VSS2 store
|
|
goto not_vss2;
|
|
}
|
|
UINT32 storeSize = MIN(volumeBodySize - storeOffset, storeHeader->Size);
|
|
|
|
// This copy is required for possible FDC workaround
|
|
UByteArray vss2 = volumeBody.mid(storeOffset, storeSize);
|
|
|
|
// Check if we are here to parse a special case of FDC store with size override
|
|
UINT32 originalStoreSize = 0;
|
|
bool fdcHeaderSizeOverrideRequired = (fdcStoreSizeOverride > 0 && guid == NVRAM_FDC_STORE_GUID && storeHeader->Size == 0xFFFFFFFF);
|
|
if (fdcHeaderSizeOverrideRequired) {
|
|
VSS2_VARIABLE_STORE_HEADER* vss2Header = (VSS2_VARIABLE_STORE_HEADER*)vss2.data();
|
|
originalStoreSize = vss2Header->Size;
|
|
vss2Header->Size = fdcStoreSizeOverride;
|
|
}
|
|
|
|
// Try parsing VSS store candidate
|
|
umemstream is(vss2.constData(), vss2.size());
|
|
kaitai::kstream ks(&is);
|
|
edk2_vss2_t parsed(&ks);
|
|
|
|
// Restore original store size, if needed
|
|
if (fdcHeaderSizeOverrideRequired) {
|
|
VSS2_VARIABLE_STORE_HEADER* vss2Header = (VSS2_VARIABLE_STORE_HEADER*)vss2.data();
|
|
vss2Header->Size = originalStoreSize;
|
|
}
|
|
|
|
// VSS2 store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = parsed.len_vss2_store_header();
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Add info
|
|
name = UString("VSS2 store");
|
|
if (guid == NVRAM_VSS2_AUTH_VAR_KEY_DATABASE_GUID) {
|
|
info = UString("Signature: AAF32C78-947B-439A-A180-2E144EC37792\n");
|
|
}
|
|
else if (guid == NVRAM_FDC_STORE_GUID) {
|
|
info = UString("Signature: DDCF3616-3275-4164-98B6-FE85707FFE7D\n");
|
|
}
|
|
else {
|
|
info = UString("Signature: DDCF3617-3275-4164-98B6-FE85707FFE7D\n");
|
|
}
|
|
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nFormat: %02Xh\nState: %02Xh\nReserved: %02Xh\nReserved1: %04Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.format(),
|
|
parsed.state(),
|
|
parsed.reserved(),
|
|
parsed.reserved1());
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::Vss2Store, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Add variables
|
|
UINT32 entryOffset = parsed.len_vss2_store_header();
|
|
for (const auto& variable : *parsed.body()->variables()) {
|
|
UINT8 subtype;
|
|
|
|
// This is the terminating entry, needs special processing
|
|
if (variable->_is_null_signature_last()) {
|
|
// Add free space or padding after all variables, if needed
|
|
if (entryOffset < storeSize) {
|
|
UByteArray freeSpace = vss2.mid(entryOffset, storeSize - entryOffset);
|
|
// Add info
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)freeSpace.size(), (UINT32)freeSpace.size());
|
|
|
|
// Check that remaining unparsed bytes are actually empty
|
|
auto c = checkSingle(freeSpace, (unsigned char)emptyByte);
|
|
if (c == emptyByte) { // Free space
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
else {
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::Padding, getPaddingType(freeSpace),
|
|
UString("Padding"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
// This is a normal entry
|
|
UINT32 variableSize;
|
|
UINT32 alignmentSize;
|
|
if (variable->is_auth()) { // Authenticated
|
|
subtype = Subtypes::AuthVssEntry;
|
|
headerSize = variable->len_auth_header() + variable->len_name_auth();
|
|
bodySize = variable->len_data_auth();
|
|
variableSize = headerSize + bodySize;
|
|
alignmentSize = variable->len_alignment_padding_auth();
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
text = uFromUcs2(variable->name_auth().c_str());
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
else { // Standard
|
|
subtype = Subtypes::StandardVssEntry;
|
|
headerSize = variable->len_standard_header() + variable->len_name();
|
|
bodySize = variable->len_data();
|
|
variableSize = headerSize + bodySize;
|
|
alignmentSize = variable->len_alignment_padding();
|
|
const EFI_GUID variableGuid = readUnaligned((const EFI_GUID*)(variable->vendor_guid().c_str()));
|
|
name = guidToUString(variableGuid);
|
|
text = uFromUcs2(variable->name().c_str());
|
|
info = UString("Variable GUID: ") + guidToUString(variableGuid, false) + "\n";
|
|
}
|
|
|
|
// Override variable type to Invalid if needed
|
|
if (!variable->is_valid()) {
|
|
subtype = Subtypes::InvalidVssEntry;
|
|
name = UString("Invalid");
|
|
text.clear();
|
|
}
|
|
|
|
const UINT32 variableAttributes = variable->attributes()->non_volatile()
|
|
+ (variable->attributes()->boot_service() << 1)
|
|
+ (variable->attributes()->runtime() << 2)
|
|
+ (variable->attributes()->hw_error_record() << 3)
|
|
+ (variable->attributes()->auth_write() << 4)
|
|
+ (variable->attributes()->time_based_auth() << 5)
|
|
+ (variable->attributes()->append_write() << 6)
|
|
+ (UINT32)(variable->attributes()->reserved() << 7);
|
|
|
|
// Add generic info
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nState: %02Xh\nReserved: %02Xh\nAttributes: %08Xh (",
|
|
variableSize, variableSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
variable->state(),
|
|
variable->reserved(),
|
|
variableAttributes) + vssAttributesToUString(variableAttributes) + UString(")");
|
|
|
|
// Add specific info
|
|
if (variable->is_auth()) {
|
|
UINT64 monotonicCounter = (UINT64)variable->len_name() + ((UINT64)variable->len_data() << 32);
|
|
info += usprintf("\nMonotonic counter: %" PRIX64 "h\nTimestamp: ", monotonicCounter) + efiTimeToUString(*(const EFI_TIME*)variable->timestamp().c_str())
|
|
+ usprintf("\nPubKey index: %u", variable->pubkey_index());
|
|
}
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::VssEntry, subtype,
|
|
name, text, info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, headerIndex);
|
|
|
|
entryOffset += (variableSize + alignmentSize);
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_vss2:
|
|
// Do not try any other parsers if we are here for FDC store parsing
|
|
if (fdcStoreSizeOverride != 0) {
|
|
continue;
|
|
}
|
|
|
|
// FTW
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_ftw;
|
|
}
|
|
// Perform initial sanity check
|
|
const EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32* storeHeader = (const EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32*)(volumeBody.constData() + storeOffset);
|
|
UByteArray guid = UByteArray((const char*)&storeHeader->Signature, sizeof(EFI_GUID));
|
|
if (guid != NVRAM_MAIN_STORE_VOLUME_GUID
|
|
&& guid != EDKII_WORKING_BLOCK_SIGNATURE_GUID
|
|
&& guid != VSS2_WORKING_BLOCK_SIGNATURE_GUID) {
|
|
// No need to parse further, not a FTW store
|
|
goto not_ftw;
|
|
}
|
|
// Determine store size
|
|
UINT32 storeSize;
|
|
if (storeHeader->WriteQueueSize % 0x10 == 4) {
|
|
storeSize = sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32) + storeHeader->WriteQueueSize;
|
|
}
|
|
else if (storeHeader->WriteQueueSize % 0x10 == 0) {
|
|
const EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64* storeHeader64 = (const EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64*)(volumeBody.constData() + storeOffset);
|
|
storeSize = (UINT32)(sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64) + storeHeader64->WriteQueueSize);
|
|
}
|
|
else {
|
|
// No need to parse further, unknown FTW store size
|
|
msg(usprintf("%s: can not determine FTW store size for candidate at base %08Xh", __FUNCTION__, model->base(index) + localOffset + storeOffset), index);
|
|
goto not_ftw;
|
|
}
|
|
storeSize = MIN(volumeBodySize - storeOffset, storeSize);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
edk2_ftw_t parsed(&ks);
|
|
|
|
// Construct header and calculate header checksum
|
|
UINT32 calculatedCrc;
|
|
UByteArray crcHeader = volumeBody.mid(storeOffset, std::max(
|
|
sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32), sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64)));
|
|
if (parsed._is_null_len_write_queue_64()) {
|
|
headerSize = sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32);
|
|
|
|
|
|
// Check block header checksum
|
|
EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32* crcFtwBlockHeader = (EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER32*)crcHeader.data();
|
|
crcFtwBlockHeader->Crc = emptyByte ? 0xFFFFFFFF : 0;
|
|
crcFtwBlockHeader->State = emptyByte ? 0xFF : 0;
|
|
calculatedCrc = (UINT32)crc32(0, (const UINT8*)crcFtwBlockHeader, (UINT32)headerSize);
|
|
}
|
|
else {
|
|
headerSize = sizeof(EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64);
|
|
|
|
// Check block header checksum
|
|
EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64* crcFtwBlockHeader = (EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER64*)crcHeader.data();
|
|
crcFtwBlockHeader->Crc = emptyByte ? 0xFFFFFFFF : 0;
|
|
crcFtwBlockHeader->State = emptyByte ? 0xFF : 0;
|
|
calculatedCrc = (UINT32)crc32(0, (const UINT8*)crcFtwBlockHeader, (UINT32)headerSize);
|
|
}
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// FTW store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
UString info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Add info
|
|
name = UString("FTW store");
|
|
info = UString("Signature: ") + guidToUString(*(const EFI_GUID*)guid.constData(), false);
|
|
info += usprintf("\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nState: %02Xh\nHeader CRC32: %08Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.state(),
|
|
parsed.crc()) + (parsed.crc() != calculatedCrc ? usprintf(", invalid, should be %08Xh", calculatedCrc) : UString(", valid"));
|
|
|
|
// Add header tree item
|
|
model->addItem(
|
|
localOffset + storeOffset, Types::FtwStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_ftw:
|
|
// Insyde FDC
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(INSYDE_FDC_STORE_HEADER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_fdc;
|
|
}
|
|
// Perform initial sanity check
|
|
const INSYDE_FDC_STORE_HEADER* storeHeader = (const INSYDE_FDC_STORE_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->Signature != INSYDE_FDC_STORE_SIGNATURE) {
|
|
// No need to parse further, not a FDC store
|
|
goto not_fdc;
|
|
}
|
|
UINT32 storeSize = MIN(volumeBodySize - storeOffset, storeHeader->Size);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
insyde_fdc_t parsed(&ks);
|
|
|
|
// Insyde FDC store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
UString info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = sizeof(INSYDE_FDC_STORE_HEADER);
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Add info
|
|
name = UString("Insyde FDC store");
|
|
info = usprintf("Signature: _FDC\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize);
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::FdcStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Parse FDC body as normal VSS/VSS2 storage with size override
|
|
parseNvramVolumeBody(headerIndex, bodySize);
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_fdc:
|
|
// Apple SysF
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(APPLE_SYSF_STORE_HEADER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_sysf;
|
|
}
|
|
// Perform initial sanity check
|
|
const APPLE_SYSF_STORE_HEADER* storeHeader = (const APPLE_SYSF_STORE_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->Signature != NVRAM_APPLE_SYSF_STORE_SIGNATURE
|
|
&& storeHeader->Signature != NVRAM_APPLE_DIAG_STORE_SIGNATURE) {
|
|
// No need to parse further, not a SysF/Diag store
|
|
goto not_sysf;
|
|
}
|
|
UINT32 storeSize = MIN(volumeBodySize - storeOffset, storeHeader->Size);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
apple_sysf_t parsed(&ks);
|
|
|
|
// Apple SysF/Diag store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = sizeof(APPLE_SYSF_STORE_HEADER);
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Check store checksum
|
|
UINT32 calculatedCrc = (UINT32)crc32(0, (const UINT8*)(volumeBody.constData() + storeOffset), storeSize - sizeof(UINT32));
|
|
|
|
// Add info
|
|
if (storeHeader->Signature == NVRAM_APPLE_SYSF_STORE_SIGNATURE) {
|
|
name = UString("Apple SysF store");
|
|
info = UString("Signature: Fsys\n");
|
|
}
|
|
else {
|
|
name = UString("Apple Diag store");
|
|
info = UString("Signature: Gaid\n");
|
|
}
|
|
info += usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nUnknown: %02Xh\nUnknown1: %08Xh\nCRC32: %08Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.unknown(),
|
|
parsed.unknown1(),
|
|
parsed.crc()) + (parsed.crc() != calculatedCrc ? usprintf(", invalid, should be %08Xh", calculatedCrc) : UString(", valid"));
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::SysFStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Add variables
|
|
UINT32 entryOffset = sizeof(APPLE_SYSF_STORE_HEADER);
|
|
for (const auto& variable : *parsed.body()->variables()) {
|
|
UINT8 subtype;
|
|
|
|
if (variable->invalid_flag()) {
|
|
subtype = Subtypes::InvalidSysFEntry;
|
|
name = UString("Invalid");
|
|
}
|
|
else {
|
|
subtype = Subtypes::NormalSysFEntry;
|
|
name = usprintf("%s", variable->name().c_str());
|
|
}
|
|
|
|
if (variable->len_name() == 3 && variable->name() == "EOF") {
|
|
headerSize = 4;
|
|
///??? Where is the body?
|
|
}
|
|
else {
|
|
headerSize = sizeof(UINT8) + (UINT32)variable->len_name() + sizeof(UINT16);
|
|
bodySize = (UINT32)variable->len_data();
|
|
}
|
|
// Add generic info
|
|
UINT32 variableSize = headerSize + bodySize;
|
|
info = usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\n",
|
|
variableSize, variableSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize);
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::SysFEntry, subtype,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, headerIndex);
|
|
|
|
entryOffset += variableSize;
|
|
}
|
|
|
|
// Add free space or padding after all variables, if needed
|
|
if (entryOffset < storeSize) {
|
|
UByteArray freeSpace = volumeBody.mid(storeOffset + entryOffset, storeSize - entryOffset);
|
|
// Add info
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)freeSpace.size(), (UINT32)freeSpace.size());
|
|
|
|
// Check that remaining unparsed bytes are actually zeroes
|
|
auto c = checkSingle(freeSpace.left(freeSpace.size() - 4), 0); // Free space, 4 last bytes are always CRC32
|
|
if (c == 0) {
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
else {
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::Padding, getPaddingType(freeSpace),
|
|
UString("Padding"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_sysf:
|
|
// Phoenix Flash Map
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(PHOENIX_FLASH_MAP_HEADER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_flm;
|
|
}
|
|
// Perform initial sanity check
|
|
const PHOENIX_FLASH_MAP_HEADER* storeHeader = (const PHOENIX_FLASH_MAP_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (UByteArray((const char*)storeHeader->Signature, NVRAM_PHOENIX_FLASH_MAP_SIGNATURE_LENGTH) != NVRAM_PHOENIX_FLASH_MAP_SIGNATURE
|
|
|| storeHeader->NumEntries > NVRAM_PHOENIX_FLASH_MAP_MAX_ENTRIES) {
|
|
// No need to parse further, not a Phoenix Flash Map
|
|
goto not_flm;
|
|
}
|
|
UINT32 storeSize = sizeof(PHOENIX_FLASH_MAP_HEADER) + storeHeader->NumEntries * sizeof(PHOENIX_FLASH_MAP_ENTRY);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
phoenix_flm_t parsed(&ks);
|
|
|
|
// Phoenix FlashMap store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Construct header and body
|
|
headerSize = sizeof(PHOENIX_FLASH_MAP_HEADER); ///??? was erroneous "header = volumeBody.left(storeOffset + sizeof(PHOENIX_FLASH_MAP_HEADER))" in original
|
|
bodySize = storeSize - headerSize;
|
|
// Add info
|
|
name = UString("Phoenix SCT flash map");
|
|
info = usprintf("Signature: _FLASH_MAP\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nEntries: %u\nReserved: %08Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.num_entries(),
|
|
parsed.reserved());
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::PhoenixFlashMapStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Add entries
|
|
UINT32 entryOffset = sizeof(PHOENIX_FLASH_MAP_HEADER);
|
|
for (const auto& entry : *parsed.entries()) {
|
|
UINT8 subtype;
|
|
|
|
if (entry->data_type() == NVRAM_PHOENIX_FLASH_MAP_ENTRY_DATA_TYPE_VOLUME) {
|
|
subtype = Subtypes::VolumeFlashMapEntry;
|
|
}
|
|
else if (entry->data_type() == NVRAM_PHOENIX_FLASH_MAP_ENTRY_DATA_TYPE_DATA_BLOCK) {
|
|
subtype = Subtypes::DataFlashMapEntry;
|
|
}
|
|
else {
|
|
subtype = Subtypes::UnknownFlashMapEntry;
|
|
}
|
|
|
|
const EFI_GUID guid = readUnaligned((const EFI_GUID*)entry->guid().c_str());
|
|
name = guidToUString(guid);
|
|
text = phoenixFlashMapGuidToUString(guid);
|
|
headerSize = sizeof(PHOENIX_FLASH_MAP_ENTRY);
|
|
|
|
// Add info
|
|
UINT32 entrySize = headerSize;
|
|
info = usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: 0h (0)\nData type: %04Xh\nEntry type: %04Xh\nSize: %08Xh\nOffset: %08Xh\nPhysical address: %" PRIX64 "h",
|
|
entrySize, entrySize,
|
|
headerSize, headerSize,
|
|
entry->data_type(),
|
|
entry->entry_type(),
|
|
entry->size(),
|
|
entry->offset(),
|
|
entry->physical_address());
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::PhoenixFlashMapEntry, subtype,
|
|
name, text, info,
|
|
headerSize, 0, 0,
|
|
Fixed, headerIndex);
|
|
|
|
entryOffset += entrySize;
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_flm:
|
|
// Phoenix EVSA store
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(EVSA_STORE_ENTRY)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_evsa;
|
|
}
|
|
// Perform initial sanity check
|
|
const EVSA_STORE_ENTRY* storeHeader = (const EVSA_STORE_ENTRY*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->Signature != NVRAM_EVSA_STORE_SIGNATURE
|
|
|| storeHeader->Header.Type != NVRAM_EVSA_ENTRY_TYPE_STORE
|
|
|| storeHeader->Header.Size != sizeof(EVSA_STORE_ENTRY)) {
|
|
// No need to parse further, not a EVSA store
|
|
goto not_evsa;
|
|
}
|
|
UINT32 storeSize = MIN(volumeBodySize - storeOffset, storeHeader->StoreSize);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
phoenix_evsa_t parsed(&ks);
|
|
|
|
// Phoenix EVSA store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = sizeof(EVSA_STORE_ENTRY);
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Calculate header checksum
|
|
UINT8 calculated = calculateChecksum8(((const UINT8*)storeHeader) + 2, storeHeader->Header.Size - 2);
|
|
|
|
// Add info
|
|
name = UString("Phoenix EVSA store");
|
|
info = usprintf("Signature: EVSA\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nAttributes: %08Xh\nReserved: %08Xh\nChecksum: %02Xh",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
parsed.attributes(),
|
|
parsed.reserved(),
|
|
parsed.checksum())
|
|
+ (parsed.checksum() != calculated ? usprintf(", invalid, should be %02Xh", calculated) : UString(", valid"));
|
|
|
|
// Add header tree item
|
|
UModelIndex headerIndex = model->addItem(
|
|
localOffset + storeOffset, Types::EvsaStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
// Add entries
|
|
std::map<UINT16, EFI_GUID> guidMap;
|
|
std::map<UINT16, UString> nameMap;
|
|
UINT32 entryOffset = parsed.len_evsa_store_header();
|
|
for (const auto& entry : *parsed.body()->entries()) {
|
|
UINT8 subtype;
|
|
UINT32 entrySize;
|
|
|
|
// This is the terminating entry, needs special processing
|
|
if (entry->_is_null_checksum()) {
|
|
// Add free space or padding after all variables, if needed
|
|
if (entryOffset < storeSize) {
|
|
UByteArray freeSpace = volumeBody.mid(storeOffset + entryOffset, storeSize - entryOffset);
|
|
// Add info
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)freeSpace.size(), (UINT32)freeSpace.size());
|
|
|
|
// Check that remaining unparsed bytes are actually empty
|
|
auto c = checkSingle(freeSpace, (unsigned char)emptyByte);
|
|
if (c == emptyByte) { // Free space
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
else {
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::Padding, getPaddingType(freeSpace),
|
|
UString("Padding"), UString(), info,
|
|
0, freeSpace.size(), 0,
|
|
Fixed, headerIndex);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
const EVSA_ENTRY_HEADER* entryHeader = (const EVSA_ENTRY_HEADER*)(volumeBody.constData() + storeOffset + entryOffset);
|
|
calculated = calculateChecksum8(((const UINT8*)entryHeader) + 2, entryHeader->Size - 2);
|
|
|
|
// GUID entry
|
|
if (entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_GUID1 || entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_GUID2) {
|
|
const phoenix_evsa_t::evsa_guid_t* guidEntry = (const phoenix_evsa_t::evsa_guid_t*)(entry->body());
|
|
headerSize = sizeof(EVSA_GUID_ENTRY);
|
|
bodySize = entry->len_evsa_entry() - headerSize;
|
|
entrySize = headerSize + bodySize;
|
|
EFI_GUID guid = *(const EFI_GUID*)(guidEntry->guid().c_str());
|
|
name = guidToUString(guid);
|
|
info = UString("GUID: ") + guidToUString(guid, false)
|
|
+ usprintf("\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nType: %02Xh\nChecksum: %02Xh",
|
|
entrySize, entrySize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
entry->entry_type(),
|
|
entry->checksum())
|
|
+ (entry->checksum() != calculated ? usprintf(", invalid, should be %02Xh", calculated) : UString(", valid"))
|
|
+ usprintf("\nGuidId: %04Xh", guidEntry->guid_id());
|
|
subtype = Subtypes::GuidEvsaEntry;
|
|
guidMap.insert(std::pair<UINT16, EFI_GUID>(guidEntry->guid_id(), guid));
|
|
}
|
|
// Name entry
|
|
else if (entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_NAME1 || entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_NAME2) {
|
|
const phoenix_evsa_t::evsa_name_t* nameEntry = (const phoenix_evsa_t::evsa_name_t*)(entry->body());
|
|
headerSize = sizeof(EVSA_NAME_ENTRY);
|
|
bodySize = entry->len_evsa_entry() - headerSize;
|
|
entrySize = headerSize + bodySize;
|
|
name = uFromUcs2(volumeBody.constData() + storeOffset + entryOffset + headerSize);
|
|
info = UString("Name: ") + name
|
|
+ usprintf("\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nType: %02Xh\nChecksum: %02Xh",
|
|
entrySize, entrySize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
entry->entry_type(),
|
|
entry->checksum())
|
|
+ (entry->checksum() != calculated ? usprintf(", invalid, should be %02Xh", calculated) : UString(", valid"))
|
|
+ usprintf("\nVarId: %04Xh", nameEntry->var_id());
|
|
subtype = Subtypes::NameEvsaEntry;
|
|
nameMap.insert(std::pair<UINT16, UString>(nameEntry->var_id(), name));
|
|
}
|
|
// Data entry
|
|
else if (entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_DATA1
|
|
|| entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_DATA2
|
|
|| entry->entry_type() == NVRAM_EVSA_ENTRY_TYPE_DATA_INVALID) {
|
|
phoenix_evsa_t::evsa_data_t* dataEntry = (phoenix_evsa_t::evsa_data_t*)(entry->body());
|
|
if (dataEntry->_is_null_len_data_ext()) {
|
|
headerSize = sizeof(EVSA_DATA_ENTRY);
|
|
bodySize = entry->len_evsa_entry() - headerSize;
|
|
}
|
|
else {
|
|
headerSize = sizeof(EVSA_DATA_ENTRY_EXTENDED);
|
|
bodySize = dataEntry->len_data_ext();
|
|
}
|
|
entrySize = headerSize + bodySize;
|
|
name = UString("Data");
|
|
subtype = Subtypes::DataEvsaEntry;
|
|
|
|
const UINT32 attributes = dataEntry->attributes()->non_volatile()
|
|
+ (dataEntry->attributes()->boot_service() << 1)
|
|
+ (dataEntry->attributes()->runtime() << 2)
|
|
+ (dataEntry->attributes()->hw_error_record() << 3)
|
|
+ (dataEntry->attributes()->auth_write() << 4)
|
|
+ (dataEntry->attributes()->time_based_auth() << 5)
|
|
+ (dataEntry->attributes()->append_write() << 6)
|
|
+ (UINT32)(dataEntry->attributes()->reserved() << 7)
|
|
+ (dataEntry->attributes()->extended_header() << 28)
|
|
+ (UINT32)(dataEntry->attributes()->reserved1() << 29);
|
|
|
|
info = usprintf("Full size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)\nType: %02Xh\nChecksum: %02Xh",
|
|
entrySize, entrySize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize,
|
|
entry->entry_type(),
|
|
entry->checksum())
|
|
+ (entry->checksum() != calculated ? usprintf(", invalid, should be %02Xh", calculated) : UString(", valid"))
|
|
+ usprintf("\nVarId: %04Xh\nGuidId: %04Xh\nAttributes: %08Xh (",
|
|
dataEntry->var_id(),
|
|
dataEntry->guid_id(),
|
|
attributes)
|
|
+ evsaAttributesToUString(attributes) + UString(")");
|
|
}
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
entryOffset, Types::EvsaEntry, subtype,
|
|
name, text, info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, headerIndex);
|
|
|
|
entryOffset += entrySize;
|
|
}
|
|
|
|
// Reparse all data variables to detect invalid ones and assign name and test to valid ones
|
|
for (int i = 0; i < model->rowCount(headerIndex); i++) {
|
|
UModelIndex current = headerIndex.model()->index(i, 0, headerIndex);
|
|
|
|
if (model->subtype(current) == Subtypes::DataEvsaEntry) {
|
|
UByteArray header = model->header(current);
|
|
const EVSA_DATA_ENTRY* dataHeader = (const EVSA_DATA_ENTRY*)header.constData();
|
|
UString guid;
|
|
if (guidMap.count(dataHeader->GuidId))
|
|
guid = guidToUString(guidMap[dataHeader->GuidId], false);
|
|
UString name;
|
|
if (nameMap.count(dataHeader->VarId))
|
|
name = nameMap[dataHeader->VarId];
|
|
|
|
// Check for variable validity
|
|
if (guid.isEmpty() && name.isEmpty()) { // Both name and guid aren't found
|
|
model->setSubtype(current, Subtypes::InvalidEvsaEntry);
|
|
model->setName(current, UString("Invalid"));
|
|
model->setText(current, UString());
|
|
msg(usprintf("%s: data variable with invalid GuidId and invalid VarId", __FUNCTION__), current);
|
|
}
|
|
else if (guid.isEmpty()) { // Guid not found
|
|
model->setSubtype(current, Subtypes::InvalidEvsaEntry);
|
|
model->setName(current, UString("Invalid"));
|
|
model->setText(current, UString());
|
|
msg(usprintf("%s: data variable with invalid GuidId", __FUNCTION__), current);
|
|
}
|
|
else if (name.isEmpty()) { // Name not found
|
|
model->setSubtype(current, Subtypes::InvalidEvsaEntry);
|
|
model->setName(current, UString("Invalid"));
|
|
model->setText(current, UString());
|
|
msg(usprintf("%s: data variable with invalid VarId", __FUNCTION__), current);
|
|
}
|
|
else { // Variable is OK, rename it
|
|
if (dataHeader->Header.Type == NVRAM_EVSA_ENTRY_TYPE_DATA_INVALID) {
|
|
model->setSubtype(current, Subtypes::InvalidEvsaEntry);
|
|
model->setName(current, UString("Invalid"));
|
|
model->setText(current, UString());
|
|
}
|
|
else {
|
|
model->setName(current, guid);
|
|
model->setText(current, name);
|
|
model->addInfo(current, UString("GUID: ") + guid + UString("\nName: ") + name + "\n", false);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_evsa:
|
|
// Phoenix CMDB store
|
|
try {
|
|
if (volumeBodySize - storeOffset < NVRAM_PHOENIX_CMDB_SIZE) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_cmdb;
|
|
}
|
|
// Perform initial sanity check
|
|
const PHOENIX_CMDB_HEADER* storeHeader = (const PHOENIX_CMDB_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->Signature != NVRAM_PHOENIX_CMDB_HEADER_SIGNATURE) {
|
|
// No need to parse further, not a Phoenix CMDB store
|
|
goto not_cmdb;
|
|
}
|
|
UINT32 storeSize = NVRAM_PHOENIX_CMDB_SIZE;
|
|
|
|
// CMDB store at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header and body size
|
|
headerSize = storeHeader->TotalSize;
|
|
bodySize = storeSize - headerSize;
|
|
|
|
// Add info
|
|
name = UString("Phoenix CMDB store");
|
|
info = usprintf("Signature: CMDB\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: %Xh (%u)",
|
|
storeSize, storeSize,
|
|
headerSize, headerSize,
|
|
bodySize, bodySize);
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + storeOffset, Types::CmdbStore, 0,
|
|
name, UString(), info,
|
|
headerSize, bodySize, 0,
|
|
Fixed, index);
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_cmdb:
|
|
// SLIC PubKey
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(OEM_ACTIVATION_PUBKEY)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_pubkey;
|
|
}
|
|
// Perform initial sanity check
|
|
const OEM_ACTIVATION_PUBKEY* storeHeader = (const OEM_ACTIVATION_PUBKEY*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->Magic != OEM_ACTIVATION_PUBKEY_MAGIC
|
|
|| storeHeader->Type != OEM_ACTIVATION_PUBKEY_TYPE
|
|
|| storeHeader->Size != sizeof(OEM_ACTIVATION_PUBKEY)) {
|
|
// No need to parse further, not a SLIC PubKey
|
|
goto not_pubkey;
|
|
}
|
|
UINT32 storeSize = sizeof(OEM_ACTIVATION_PUBKEY);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
ms_slic_pubkey_t parsed(&ks);
|
|
|
|
// SLIC PubKey at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header size
|
|
headerSize = storeSize;
|
|
|
|
// Add info
|
|
name = UString("SLIC pubkey");
|
|
info = usprintf("Type: 0h\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: 0h (0)\n"
|
|
"Key type: %02Xh\nVersion: %02Xh\nAlgorithm: %08Xh\nMagic: RSA1\nBit length: %08Xh\nExponent: %08Xh",
|
|
parsed.len_pubkey(), parsed.len_pubkey(),
|
|
parsed.len_pubkey(), parsed.len_pubkey(),
|
|
parsed.key_type(),
|
|
parsed.version(),
|
|
parsed.algorithm(),
|
|
parsed.bit_length(),
|
|
parsed.exponent());
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + storeOffset, Types::SlicData, Subtypes::PubkeySlicData,
|
|
name, UString(), info,
|
|
headerSize, 0, 0,
|
|
Fixed, index);
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_pubkey:
|
|
// SLIC marker
|
|
try {
|
|
if (volumeBodySize - storeOffset < sizeof(OEM_ACTIVATION_MARKER)) {
|
|
// No need to parse further, the rest of the volume is too small
|
|
goto not_marker;
|
|
}
|
|
// Perform initial sanity check
|
|
const OEM_ACTIVATION_MARKER* storeHeader = (const OEM_ACTIVATION_MARKER*)(volumeBody.constData() + storeOffset);
|
|
if (storeHeader->WindowsFlag != OEM_ACTIVATION_MARKER_WINDOWS_FLAG
|
|
|| storeHeader->Type != OEM_ACTIVATION_MARKER_TYPE
|
|
|| storeHeader->Size != sizeof(OEM_ACTIVATION_MARKER)) {
|
|
// No need to parse further, not a SLIC marker
|
|
goto not_marker;
|
|
}
|
|
// Check reserved bytes
|
|
for (UINT8 i = 0; i < sizeof(storeHeader->Reserved); i++) {
|
|
if (storeHeader->Reserved[i] != OEM_ACTIVATION_MARKER_RESERVED_BYTE) {
|
|
// No need to parse further, not a SLIC marker
|
|
goto not_marker;
|
|
}
|
|
}
|
|
UINT32 storeSize = sizeof(OEM_ACTIVATION_MARKER);
|
|
|
|
umemstream is(volumeBody.constData() + storeOffset, storeSize);
|
|
kaitai::kstream ks(&is);
|
|
ms_slic_marker_t parsed(&ks);
|
|
|
|
// SLIC marker at current offset parsed correctly
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Obtain header size
|
|
headerSize = storeSize;
|
|
|
|
// Add info
|
|
name = UString("SLIC marker");
|
|
info = usprintf("Type: 1h\nFull size: %Xh (%u)\nHeader size: %Xh (%u)\nBody size: 0h (0)\n"
|
|
"Version: %08Xh\nOEM ID: %s\nOEM table ID: %s\nWindows flag: WINDOWS \nSLIC version: %08Xh",
|
|
parsed.len_marker(), parsed.len_marker(),
|
|
parsed.len_marker(), parsed.len_marker(),
|
|
parsed.version(),
|
|
parsed.oem_id().c_str(),
|
|
parsed.oem_table_id().c_str(),
|
|
parsed.slic_version());
|
|
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + storeOffset, Types::SlicData, Subtypes::MarkerSlicData,
|
|
name, UString(), info,
|
|
headerSize, 0, 0,
|
|
Fixed, index);
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_marker:
|
|
// Intel uCode
|
|
try {
|
|
// Check data size
|
|
if (volumeBodySize - storeOffset < sizeof(INTEL_MICROCODE_HEADER)) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
const UINT32 currentUint32 = readUnaligned((const UINT32*)(volumeBody.constData() + storeOffset));
|
|
if (currentUint32 != INTEL_MICROCODE_HEADER_VERSION_1) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
// Check microcode header candidate
|
|
const INTEL_MICROCODE_HEADER* ucodeHeader = (const INTEL_MICROCODE_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (FALSE == ffsParser->microcodeHeaderValid(ucodeHeader)) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
// Check candidate size
|
|
if (ucodeHeader->TotalSize == 0) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
// We still have enough data left to fit the whole TotalSize
|
|
UINT32 storeSize = ucodeHeader->TotalSize;
|
|
if (volumeBodySize - storeOffset < storeSize) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
// All checks passed, microcode found
|
|
// Check if we need to add a padding before it
|
|
if (!outerPadding.isEmpty()) {
|
|
info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
outerPadding.clear();
|
|
}
|
|
|
|
// Parse microcode header
|
|
UByteArray ucode = volumeBody.mid(storeOffset);
|
|
UModelIndex ucodeIndex;
|
|
if (U_SUCCESS != ffsParser->parseIntelMicrocodeHeader(ucode, localOffset + storeOffset, index, ucodeIndex)) {
|
|
goto not_ucode;
|
|
}
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_ucode:
|
|
// FFS volume
|
|
try {
|
|
// Check data size
|
|
if (volumeBodySize - storeOffset < sizeof(EFI_FIRMWARE_VOLUME_HEADER)) {
|
|
goto not_ffs_volume;
|
|
}
|
|
|
|
// Check volume header candidate
|
|
const EFI_FIRMWARE_VOLUME_HEADER* volumeHeader = (const EFI_FIRMWARE_VOLUME_HEADER*)(volumeBody.constData() + storeOffset);
|
|
if (volumeHeader->Signature != EFI_FV_SIGNATURE) {
|
|
goto not_ffs_volume;
|
|
}
|
|
|
|
// All checks passed, volume found
|
|
UByteArray volume = volumeBody.mid(storeOffset);
|
|
UModelIndex volumeIndex;
|
|
if (U_SUCCESS != ffsParser->parseVolumeHeader(volume, localOffset + storeOffset, index, volumeIndex)) {
|
|
goto not_ffs_volume;
|
|
}
|
|
|
|
(VOID)ffsParser->parseVolumeBody(volumeIndex);
|
|
UINT32 storeSize = (UINT32)(model->headerSize(volumeIndex) + model->bodySize(volumeIndex));
|
|
|
|
storeOffset += storeSize - 1;
|
|
previousStoreEndOffset = storeOffset + 1;
|
|
continue;
|
|
}
|
|
catch (...) {
|
|
// Parsing failed, try something else
|
|
}
|
|
not_ffs_volume:
|
|
// Padding
|
|
if (storeOffset < volumeBodySize) {
|
|
outerPadding += volumeBody[storeOffset];
|
|
}
|
|
}
|
|
|
|
// Add padding at the very end
|
|
if (!outerPadding.isEmpty()) {
|
|
// Add info
|
|
UString info = usprintf("Full size: %Xh (%u)", (UINT32)outerPadding.size(), (UINT32)outerPadding.size());
|
|
|
|
// Check that remaining unparsed bytes are actually empty
|
|
auto c = checkSingle(outerPadding);
|
|
if (c == emptyByte) {
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::FreeSpace, 0,
|
|
UString("Free space"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
}
|
|
else {
|
|
// Add tree item
|
|
model->addItem(
|
|
localOffset + previousStoreEndOffset, Types::Padding, getPaddingType(outerPadding),
|
|
UString("Padding"), UString(), info,
|
|
0, outerPadding.size(), 0,
|
|
Fixed, index);
|
|
}
|
|
}
|
|
|
|
return U_SUCCESS;
|
|
}
|
|
#endif // U_ENABLE_NVRAM_PARSING_SUPPORT
|