* [Patch 0/2] Consume New SmmIoLib. @ 2017-05-03 3:31 Eric Dong 2017-05-03 3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong 2017-05-03 3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong 0 siblings, 2 replies; 5+ messages in thread From: Eric Dong @ 2017-05-03 3:31 UTC (permalink / raw) To: edk2-devel After MdePkg add new SmmIoLib, update OpalPasswordSmm driver to consume it. Eric Dong (2): SecurityPkg OpalPasswordSmm: Consume SmmIoLib. SecurityPkg: Consume SmmIoLib. SecurityPkg/SecurityPkg.dsc | 1 + .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c | 30 +------------ .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c | 51 ---------------------- .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h | 3 +- .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf | 2 +- 5 files changed, 4 insertions(+), 83 deletions(-) -- 2.7.0.windows.1 ^ permalink raw reply [flat|nested] 5+ messages in thread
* [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib. 2017-05-03 3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong @ 2017-05-03 3:31 ` Eric Dong 2017-05-03 14:19 ` Yao, Jiewen 2017-05-03 3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong 1 sibling, 1 reply; 5+ messages in thread From: Eric Dong @ 2017-05-03 3:31 UTC (permalink / raw) To: edk2-devel; +Cc: Jiewen Yao Update code to consume SmmIoLib to check Mmio validation. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Eric Dong <eric.dong@intel.com> Cc: Jiewen Yao <jiewen.yao@intel.com> --- .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c | 30 +------------ .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c | 51 ---------------------- .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h | 3 +- .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf | 2 +- 4 files changed, 3 insertions(+), 83 deletions(-) diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c index 33f77bd..e38acfd 100644 --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c @@ -1023,34 +1023,6 @@ GetAhciBarSize ( } /** - This function check if the memory region is in GCD MMIO region. - - @param Addr The memory region start address to be checked. - @param Size The memory region length to be checked. - - @retval TRUE This memory region is in GCD MMIO region. - @retval FALSE This memory region is not in GCD MMIO region. -**/ -BOOLEAN -EFIAPI -OpalIsValidMmioSpace ( - IN EFI_PHYSICAL_ADDRESS Addr, - IN UINTN Size - ) -{ - UINTN Index; - EFI_GCD_MEMORY_SPACE_DESCRIPTOR *Desc; - - for (Index = 0; Index < mNumberOfDescriptors; Index ++) { - Desc = &mGcdMemSpace[Index]; - if ((Desc->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) && (Addr >= Desc->BaseAddress) && ((Addr + Size) <= (Desc->BaseAddress + Desc->Length))) { - return TRUE; - } - } - - return FALSE; -} -/** Get AHCI mode base address registers' Value. @param[in] Bus The bus number of ata host controller. @@ -1083,7 +1055,7 @@ GetAhciBaseAddress ( // // Check if the AHCI Bar region is in SMRAM to avoid malicious attack by modifying MMIO Bar to point to SMRAM. // - if (!OpalIsValidMmioSpace ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size)) { + if (!SmmIsMmioValid ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size, NULL)) { return EFI_UNSUPPORTED; } diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c index 2f2a1d9..0ea92b1 100644 --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c @@ -61,9 +61,6 @@ VOID *mBuffer = NULL; // DMA can not read/write Data to smram, s // NVME NVME_CONTEXT mNvmeContext; -EFI_GCD_MEMORY_SPACE_DESCRIPTOR *mGcdMemSpace = NULL; -UINTN mNumberOfDescriptors = 0; - /** Add new bridge node or nvme device info to the device list. @@ -648,44 +645,6 @@ S3SleepEntryCallBack ( } /** - OpalPassword Notification for SMM EndOfDxe protocol. - - @param[in] Protocol Points to the protocol's unique identifier. - @param[in] Interface Points to the interface instance. - @param[in] Handle The handle on which the interface was installed. - - @retval EFI_SUCCESS Notification runs successfully. -**/ -EFI_STATUS -EFIAPI -OpalPasswordEndOfDxeNotification ( - IN CONST EFI_GUID *Protocol, - IN VOID *Interface, - IN EFI_HANDLE Handle - ) -{ - UINTN NumberOfDescriptors; - EFI_GCD_MEMORY_SPACE_DESCRIPTOR *MemSpaceMap; - EFI_STATUS Status; - - Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors, &MemSpaceMap); - if (EFI_ERROR (Status)) { - return Status; - } - - mGcdMemSpace = AllocateCopyPool (NumberOfDescriptors * sizeof (EFI_GCD_MEMORY_SPACE_DESCRIPTOR), MemSpaceMap); - if (EFI_ERROR (Status)) { - gBS->FreePool (MemSpaceMap); - return Status; - } - - mNumberOfDescriptors = NumberOfDescriptors; - gBS->FreePool (MemSpaceMap); - - return EFI_SUCCESS; -} - -/** Main entry for this driver. @param ImageHandle Image handle this driver. @@ -711,7 +670,6 @@ OpalPasswordSmmInit ( EFI_SMM_VARIABLE_PROTOCOL *SmmVariable; OPAL_EXTRA_INFO_VAR OpalExtraInfo; UINTN DataSize; - EFI_EVENT EndOfDxeEvent; EFI_PHYSICAL_ADDRESS Address; mBuffer = NULL; @@ -820,15 +778,6 @@ OpalPasswordSmmInit ( // mSwSmiValue = (UINT8) Context.SwSmiInputValue; - // - // Create event to record GCD descriptors at end of dxe for judging AHCI/NVMe PCI Bar - // is in MMIO space to avoid attack. - // - Status = gSmst->SmmRegisterProtocolNotify (&gEfiSmmEndOfDxeProtocolGuid, OpalPasswordEndOfDxeNotification, &EndOfDxeEvent); - if (EFI_ERROR (Status)) { - DEBUG((DEBUG_ERROR, "OpalPasswordSmm: Register SmmEndOfDxe fail, Status: %r\n", Status)); - goto EXIT; - } Status = gSmst->SmmLocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, (VOID**)&SmmVariable); if (!EFI_ERROR (Status)) { DataSize = sizeof (OPAL_EXTRA_INFO_VAR); diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h index ab31a6b..ce88786 100644 --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h @@ -45,6 +45,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. #include <Library/S3BootScriptLib.h> #include <Library/DevicePathLib.h> #include <Library/DxeServicesTableLib.h> +#include <Library/SmmIoLib.h> #include <IndustryStandard/Pci22.h> @@ -70,8 +71,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. extern VOID *mBuffer; -extern EFI_GCD_MEMORY_SPACE_DESCRIPTOR *mGcdMemSpace; -extern UINTN mNumberOfDescriptors; #pragma pack(1) typedef struct { diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf index cab0fd5..c62fa13 100644 --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf @@ -58,6 +58,7 @@ DxeServicesTableLib DevicePathLib OpalPasswordSupportLib + SmmIoLib [Guids] gOpalExtraInfoVariableGuid ## CONSUMES ## GUID @@ -69,7 +70,6 @@ gEfiSmmSxDispatch2ProtocolGuid ## CONSUMES gEfiSmmVariableProtocolGuid ## CONSUMES gEfiStorageSecurityCommandProtocolGuid ## CONSUMES - gEfiSmmEndOfDxeProtocolGuid ## CONSUMES [Depex] gEfiSmmSwDispatch2ProtocolGuid AND -- 2.7.0.windows.1 ^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib. 2017-05-03 3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong @ 2017-05-03 14:19 ` Yao, Jiewen 0 siblings, 0 replies; 5+ messages in thread From: Yao, Jiewen @ 2017-05-03 14:19 UTC (permalink / raw) To: Dong, Eric, edk2-devel@lists.01.org Reviewed-by: Jiewen.yao@intel.com > -----Original Message----- > From: Dong, Eric > Sent: Wednesday, May 3, 2017 11:32 AM > To: edk2-devel@lists.01.org > Cc: Yao, Jiewen <jiewen.yao@intel.com> > Subject: [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib. > > Update code to consume SmmIoLib to check Mmio validation. > > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Eric Dong <eric.dong@intel.com> > Cc: Jiewen Yao <jiewen.yao@intel.com> > --- > .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c | 30 +------------ > .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c | 51 > ---------------------- > .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h | 3 +- > .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf | 2 +- > 4 files changed, 3 insertions(+), 83 deletions(-) > > diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c > b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c > index 33f77bd..e38acfd 100644 > --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c > +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c > @@ -1023,34 +1023,6 @@ GetAhciBarSize ( > } > > /** > - This function check if the memory region is in GCD MMIO region. > - > - @param Addr The memory region start address to be checked. > - @param Size The memory region length to be checked. > - > - @retval TRUE This memory region is in GCD MMIO region. > - @retval FALSE This memory region is not in GCD MMIO region. > -**/ > -BOOLEAN > -EFIAPI > -OpalIsValidMmioSpace ( > - IN EFI_PHYSICAL_ADDRESS Addr, > - IN UINTN Size > - ) > -{ > - UINTN Index; > - EFI_GCD_MEMORY_SPACE_DESCRIPTOR *Desc; > - > - for (Index = 0; Index < mNumberOfDescriptors; Index ++) { > - Desc = &mGcdMemSpace[Index]; > - if ((Desc->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) && > (Addr >= Desc->BaseAddress) && ((Addr + Size) <= (Desc->BaseAddress + > Desc->Length))) { > - return TRUE; > - } > - } > - > - return FALSE; > -} > -/** > Get AHCI mode base address registers' Value. > > @param[in] Bus The bus number of ata host controller. > @@ -1083,7 +1055,7 @@ GetAhciBaseAddress ( > // > // Check if the AHCI Bar region is in SMRAM to avoid malicious attack by > modifying MMIO Bar to point to SMRAM. > // > - if (!OpalIsValidMmioSpace ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size)) { > + if (!SmmIsMmioValid ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size, NULL)) { > return EFI_UNSUPPORTED; > } > > diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c > b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c > index 2f2a1d9..0ea92b1 100644 > --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c > +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c > @@ -61,9 +61,6 @@ VOID *mBuffer = NULL; // DMA can not > read/write Data to smram, s > // NVME > NVME_CONTEXT mNvmeContext; > > -EFI_GCD_MEMORY_SPACE_DESCRIPTOR *mGcdMemSpace = NULL; > -UINTN mNumberOfDescriptors = 0; > - > /** > Add new bridge node or nvme device info to the device list. > > @@ -648,44 +645,6 @@ S3SleepEntryCallBack ( > } > > /** > - OpalPassword Notification for SMM EndOfDxe protocol. > - > - @param[in] Protocol Points to the protocol's unique identifier. > - @param[in] Interface Points to the interface instance. > - @param[in] Handle The handle on which the interface was installed. > - > - @retval EFI_SUCCESS Notification runs successfully. > -**/ > -EFI_STATUS > -EFIAPI > -OpalPasswordEndOfDxeNotification ( > - IN CONST EFI_GUID *Protocol, > - IN VOID *Interface, > - IN EFI_HANDLE Handle > - ) > -{ > - UINTN NumberOfDescriptors; > - EFI_GCD_MEMORY_SPACE_DESCRIPTOR *MemSpaceMap; > - EFI_STATUS Status; > - > - Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors, > &MemSpaceMap); > - if (EFI_ERROR (Status)) { > - return Status; > - } > - > - mGcdMemSpace = AllocateCopyPool (NumberOfDescriptors * sizeof > (EFI_GCD_MEMORY_SPACE_DESCRIPTOR), MemSpaceMap); > - if (EFI_ERROR (Status)) { > - gBS->FreePool (MemSpaceMap); > - return Status; > - } > - > - mNumberOfDescriptors = NumberOfDescriptors; > - gBS->FreePool (MemSpaceMap); > - > - return EFI_SUCCESS; > -} > - > -/** > Main entry for this driver. > > @param ImageHandle Image handle this driver. > @@ -711,7 +670,6 @@ OpalPasswordSmmInit ( > EFI_SMM_VARIABLE_PROTOCOL *SmmVariable; > OPAL_EXTRA_INFO_VAR OpalExtraInfo; > UINTN DataSize; > - EFI_EVENT EndOfDxeEvent; > EFI_PHYSICAL_ADDRESS Address; > > mBuffer = NULL; > @@ -820,15 +778,6 @@ OpalPasswordSmmInit ( > // > mSwSmiValue = (UINT8) Context.SwSmiInputValue; > > - // > - // Create event to record GCD descriptors at end of dxe for judging > AHCI/NVMe PCI Bar > - // is in MMIO space to avoid attack. > - // > - Status = gSmst->SmmRegisterProtocolNotify > (&gEfiSmmEndOfDxeProtocolGuid, OpalPasswordEndOfDxeNotification, > &EndOfDxeEvent); > - if (EFI_ERROR (Status)) { > - DEBUG((DEBUG_ERROR, "OpalPasswordSmm: Register SmmEndOfDxe fail, > Status: %r\n", Status)); > - goto EXIT; > - } > Status = gSmst->SmmLocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, > (VOID**)&SmmVariable); > if (!EFI_ERROR (Status)) { > DataSize = sizeof (OPAL_EXTRA_INFO_VAR); > diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h > b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h > index ab31a6b..ce88786 100644 > --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h > +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h > @@ -45,6 +45,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, > EITHER EXPRESS OR IMPLIED. > #include <Library/S3BootScriptLib.h> > #include <Library/DevicePathLib.h> > #include <Library/DxeServicesTableLib.h> > +#include <Library/SmmIoLib.h> > > #include <IndustryStandard/Pci22.h> > > @@ -70,8 +71,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, > EITHER EXPRESS OR IMPLIED. > > extern VOID *mBuffer; > > -extern EFI_GCD_MEMORY_SPACE_DESCRIPTOR *mGcdMemSpace; > -extern UINTN mNumberOfDescriptors; > #pragma pack(1) > > typedef struct { > diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf > b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf > index cab0fd5..c62fa13 100644 > --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf > +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf > @@ -58,6 +58,7 @@ > DxeServicesTableLib > DevicePathLib > OpalPasswordSupportLib > + SmmIoLib > > [Guids] > gOpalExtraInfoVariableGuid ## CONSUMES ## GUID > @@ -69,7 +70,6 @@ > gEfiSmmSxDispatch2ProtocolGuid ## CONSUMES > gEfiSmmVariableProtocolGuid ## CONSUMES > gEfiStorageSecurityCommandProtocolGuid ## CONSUMES > - gEfiSmmEndOfDxeProtocolGuid ## CONSUMES > > [Depex] > gEfiSmmSwDispatch2ProtocolGuid AND > -- > 2.7.0.windows.1 ^ permalink raw reply [flat|nested] 5+ messages in thread
* [Patch 2/2] SecurityPkg: Consume SmmIoLib. 2017-05-03 3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong 2017-05-03 3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong @ 2017-05-03 3:31 ` Eric Dong 2017-05-03 14:20 ` Yao, Jiewen 1 sibling, 1 reply; 5+ messages in thread From: Eric Dong @ 2017-05-03 3:31 UTC (permalink / raw) To: edk2-devel; +Cc: Jiewen Yao Update code to consume SmmIoLib to pass build. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Eric Dong <eric.dong@intel.com> Cc: Jiewen Yao <jiewen.yao@intel.com> --- SecurityPkg/SecurityPkg.dsc | 1 + 1 file changed, 1 insertion(+) diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc index dee9241..26bcbda 100644 --- a/SecurityPkg/SecurityPkg.dsc +++ b/SecurityPkg/SecurityPkg.dsc @@ -136,6 +136,7 @@ Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf Tcg2PhysicalPresenceLib|SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf + SmmIoLib|MdePkg/Library/SmmIoLib/SmmIoLib.inf [PcdsDynamicDefault.common.DEFAULT] gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0xb6, 0xe5, 0x01, 0x8b, 0x19, 0x4f, 0xe8, 0x46, 0xab, 0x93, 0x1c, 0x53, 0x67, 0x1b, 0x90, 0xcc} -- 2.7.0.windows.1 ^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [Patch 2/2] SecurityPkg: Consume SmmIoLib. 2017-05-03 3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong @ 2017-05-03 14:20 ` Yao, Jiewen 0 siblings, 0 replies; 5+ messages in thread From: Yao, Jiewen @ 2017-05-03 14:20 UTC (permalink / raw) To: Dong, Eric, edk2-devel@lists.01.org Reviewed-by: Jiewen.yao@intel.com > -----Original Message----- > From: Dong, Eric > Sent: Wednesday, May 3, 2017 11:32 AM > To: edk2-devel@lists.01.org > Cc: Yao, Jiewen <jiewen.yao@intel.com> > Subject: [Patch 2/2] SecurityPkg: Consume SmmIoLib. > > Update code to consume SmmIoLib to pass build. > > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Eric Dong <eric.dong@intel.com> > Cc: Jiewen Yao <jiewen.yao@intel.com> > --- > SecurityPkg/SecurityPkg.dsc | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc > index dee9241..26bcbda 100644 > --- a/SecurityPkg/SecurityPkg.dsc > +++ b/SecurityPkg/SecurityPkg.dsc > @@ -136,6 +136,7 @@ > > Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTc > g.inf > > Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2. > inf > > Tcg2PhysicalPresenceLib|SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/ > SmmTcg2PhysicalPresenceLib.inf > + SmmIoLib|MdePkg/Library/SmmIoLib/SmmIoLib.inf > > [PcdsDynamicDefault.common.DEFAULT] > gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0xb6, 0xe5, 0x01, > 0x8b, 0x19, 0x4f, 0xe8, 0x46, 0xab, 0x93, 0x1c, 0x53, 0x67, 0x1b, 0x90, 0xcc} > -- > 2.7.0.windows.1 ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2017-05-03 14:20 UTC | newest] Thread overview: 5+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-05-03 3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong 2017-05-03 3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong 2017-05-03 14:19 ` Yao, Jiewen 2017-05-03 3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong 2017-05-03 14:20 ` Yao, Jiewen
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox