-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[202405][Rebase&&FF] Everything MS Changes #311
[202405][Rebase&&FF] Everything MS Changes #311
Conversation
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
acc8bc1
to
9ca5e19
Compare
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
f6724b7
to
9c633e5
Compare
3cabe69
to
4e623f3
Compare
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Outdated
Show resolved
Hide resolved
46f0be1
to
f4aab82
Compare
SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.c
Show resolved
Hide resolved
c4e73b0
to
1b08b94
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## release/202405 #311 +/- ##
================================================
Coverage ? 0.54%
================================================
Files ? 147
Lines ? 34764
Branches ? 167
================================================
Hits ? 190
Misses ? 34466
Partials ? 108
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
50acf3d
to
1d47375
Compare
Adds the following: + SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf + SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf + SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf + SecurityPkg/Library/TcgPpVendorLibNull/TcgPpVendorLibNull.inf
Add a debug message to show the TPM2 PCR bank info in Tcg2Dxe. Prints out both the TpmHashalgorithmBitmap and the Pcr banks.
This replaces a assert for a proper runtime check for the status of Tpm2GetCapabilitySupportedAndActivePcrs()
This commit adds support to Tpm2Help.c to query the TPM for supported hash algorithms.
This change describes the interface that should be published by instances of the Tcg2PreUefiEventLogLib. This library can be used to publish TPM EventLog entries for measurements that may have been made prior to driver initialization
Ensures that if SecureBootEnable is found and mPlatformMode is USER_MODE that SecureBootEnable == SECURE_BOOT_MODE_ENABLE.
The code to display the confirmation dialog is moved to a helper function to make the code more readable and maintainable. This is for DxeTcg2PhysicalPresenceLib.
Adds a flag to disable TCG2 flags from bypassing confirmation in production mode.
The TPM2_Startup() function is called in the Tcg2Pei driver to start the TPM. The function is expected to return an error if the TPM is not in the correct state.
Since the commit: "SecurityPkg: Do not allow Flags to bypass confirmation in Production" modified DxeTcg2PhysicalPresenceLib.inf the override in DxeTcg2PhysicalPresenceMinimumLib.inf needs to be updated to reflect the changes.
1d47375
to
b542b90
Compare
@@ -1241,4 +1241,24 @@ Tpm2PcrReadForActiveBank ( | |||
OUT TPML_DIGEST *HashList |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Investigate Tianocore version of the different options for the PCR banks. If rotten throw away otherwise upstream
@@ -46,6 +46,10 @@ SPDX-License-Identifier: BSD-2-Clause-Patent | |||
// MU_CHANGE [BEGIN] - Add the OemTpm2InitLib |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Confirm if we're using the Tianocore edk2 version of this - if so check if it works for us. If upstream is acceptable don't upstream. If we remove this, this is a breaking change in 202405-dev and eventually 202411. If downstream consumers cannot resolve this - they cannot move to 202411.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
MuTcg2Protocol -Audit
@@ -212,6 +212,25 @@ AuthVariableLibInitialize ( | |||
if (!EFI_ERROR (Status)) { | |||
if (mPlatformMode == USER_MODE) { | |||
SecureBootEnable = *(UINT8 *)Data; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
potentially can't upstream - may want to keep as one of our changes
@@ -12,8 +12,18 @@ SPDX-License-Identifier: BSD-2-Clause-Patent | |||
#string TPM_PPI_HEAD_STR #language en-US "A configuration change was requested to allow the Operating System to %s the computer's TPM (Trusted Platform Module) without asking for user confirmation in the future.\n\n" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
look at physical presence spec - this was potentially implemented for tablets. this may require spec change. look for a different commit / or make change that pushes this logic up to allow platforms to make changes. This may need to be a library allowing edk2 to use their own strings and a platform their own
0461663
Description
flow, or firmware?
validation improvement, ...
in build or boot behavior?
a function in a new library class in a pre-existing module, ...
outside direct code modifications (and comments)?
on an a separate Web page, ...
How This Was Tested
Local CI
Integration Instructions
N/A