From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=192.55.52.151; helo=mga17.intel.com; envelope-from=chao.b.zhang@intel.com; receiver=edk2-devel@lists.01.org Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id EC4A42215BDBF for ; Mon, 29 Jan 2018 17:11:52 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Jan 2018 17:17:25 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,433,1511856000"; d="scan'208";a="15372165" Received: from czhan46-mobl1.ccr.corp.intel.com ([10.239.192.111]) by fmsmga002.fm.intel.com with ESMTP; 29 Jan 2018 17:17:24 -0800 From: "Zhang, Chao B" To: edk2-devel@lists.01.org Cc: Yao Jiewen , Long Qin , Chao Zhang Date: Tue, 30 Jan 2018 09:17:22 +0800 Message-Id: <20180130011722.25888-1-chao.b.zhang@intel.com> X-Mailer: git-send-email 2.11.0.windows.1 Subject: [PATCH] SecurityPkg: Disable TPM interrupt in DEC X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jan 2018 01:11:53 -0000 Disable TPM interrupt support in DEC Cc: Yao Jiewen Cc: Long Qin Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Chao Zhang --- SecurityPkg/SecurityPkg.dec | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index d2741f6..983fb0e 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -453,12 +453,12 @@ ## Indicate current TPM2 Interrupt Number reported by _CRS control method.

# TPM2 Interrupt feature is disabled If the pcd is set to 0.
# @Prompt Current TPM2 Interrupt Number - gEfiSecurityPkgTokenSpaceGuid.PcdTpm2CurrentIrqNum|0x0C|UINT32|0x0001001C + gEfiSecurityPkgTokenSpaceGuid.PcdTpm2CurrentIrqNum|0x00|UINT32|0x0001001C ## Indicate platform possible TPM2 Interrupt Number reported by _PRS control method.

# Possible TPM2 Interrupt Number Buffer will not be reported if TPM2 Interrupt feature is disabled.
# @Prompt Possible TPM2 Interrupt Number buffer - gEfiSecurityPkgTokenSpaceGuid.PcdTpm2PossibleIrqNumBuf|{0x0C, 0x00, 0x00, 0x00}|VOID*|0x0001001D + gEfiSecurityPkgTokenSpaceGuid.PcdTpm2PossibleIrqNumBuf|{0x00, 0x00, 0x00, 0x00}|VOID*|0x0001001D [PcdsDynamic, PcdsDynamicEx] -- 1.9.5.msysgit.1