From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) by mx.groups.io with SMTP id smtpd.web11.2169.1657078731449893289 for ; Tue, 05 Jul 2022 20:38:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=TC/fCYQh; spf=pass (domain: gmail.com, ip: 209.85.210.179, mailfrom: kuqin12@gmail.com) Received: by mail-pf1-f179.google.com with SMTP id n12so13301247pfq.0 for ; Tue, 05 Jul 2022 20:38:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=PTyFUYEOAD0YEDcRRBIqSKuqYvCMa+UHHmB9+Z49+QQ=; b=TC/fCYQhyVtt2V4AD0XGhbeviRokyJN/4fFRUIDtqVRmq1iFfmCyPPQSn1cIijQkE/ rRMC7kcwq2TYRohW4B7FTh+GO0FaZTd0HQ48CcdbI05ZuSHIIpl6XbGZQNcTQGFliMhd tF63EVxYV5EkKj2RW5+ETMoc5U47hLaQeWZ0xrOl8qnQACihDriOBMHNhPOSnFp6/KVa +93Zo/1wqyjUQXAFYG0GFgNmaHqAlYJSH7jA0hckc4jiW+urPQtl94KdOTESqzhIajTW x4uAQRKqRqShDFfTq3ORb0V2396hJ9t+3zAX+WkKX0Zd8B+R0JdMFZ+6BVHr1NKrNqx9 eIAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=PTyFUYEOAD0YEDcRRBIqSKuqYvCMa+UHHmB9+Z49+QQ=; b=wkA7cWorhNTG4trRzQWfmh5dJVyFWZj86BA/Tw69ENRDOpFeZxtunOPBNH97iwkTpC qyYhbPgTUJgkAy1ilqh7jwlO28T2QdTwNsw/zRA+RT3XKw7iuN9gwuONl664y3WByR46 NyQ/GVvYp2JbnsLtBX246kAEHL0jfB0ET6bLAmTdHr3z5nYO+3dULKN9Dd47FzVVl/pH QtKuwV2NYwQAVB40ltibVAQQlooV7jgnPNKX6W0jmFc0o9Yms9abTYWy9djKssN4E3zC SWTsRSg9gts4XpGkFjE3dIAqNsriA2M9gIgR+JHGjRLUB8ntFhdbisLxiPgfXCuNFWIO Nklw== X-Gm-Message-State: AJIora8IFiq27Dyh/6lf9/7ZnxgzyVMoJoDmzlJZ03sBIwUD3bY/m6MT hw1qok9LgvBxUIucvUDtY0dUxS6bEAU= X-Google-Smtp-Source: AGRyM1tGkqlDKFthq+EdOexG6r7CcldoYL70HR0f829MgPCfHW/B+uFQYkkybd1MAGdT/NdwyhvkZw== X-Received: by 2002:aa7:8390:0:b0:528:5e9:9d31 with SMTP id u16-20020aa78390000000b0052805e99d31mr35938917pfm.30.1657078730816; Tue, 05 Jul 2022 20:38:50 -0700 (PDT) Return-Path: Received: from localhost.localdomain ([192.182.149.255]) by smtp.gmail.com with ESMTPSA id a140-20020a621a92000000b005289fbef7c4sm864251pfa.140.2022.07.05.20.38.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Jul 2022 20:38:50 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Qi Zhang , Rahul Kumar Subject: [edk2-staging][PATCH v1 7/7] SecurityPkg: SubClassTpm: Updated default value Date: Tue, 5 Jul 2022 20:38:18 -0700 Message-Id: <20220706033818.1493-8-kuqin12@gmail.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20220706033818.1493-1-kuqin12@gmail.com> References: <20220706033818.1493-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3966 This change updated the default value of TPM device subclass PCD to `0x010E0000` in order to match the definition of EFI_PERIPHERAL_TPM from PI specification. Cc: Jiewen Yao Cc: Jian J Wang Cc: Qi Zhang Cc: Rahul Kumar Signed-off-by: Kun Qin --- SecurityPkg/SecurityPkg.dec | 6 +++--- SecurityPkg/SecurityPkg.uni | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index 0ee75efc1a97..cc93ebb54f99 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -310,10 +310,10 @@ [PcdsFixedAtBuild, PcdsPatchableInModule] gEfiSecurityPkgTokenSpaceGuid.PcdTpmPlatformClass|0|UINT8|0x00000006 ## Progress Code for TPM device subclass definitions.

- # EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000D0000) = 0x010D0000
+ # EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000E0000) = 0x010E0000
# @Prompt Status Code for TPM device definitions - # @ValidList 0x80000003 | 0x010D0000 - gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|UINT32|0x00000007 + # @ValidList 0x80000003 | 0x010E0000 + gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010E0000|UINT32|0x00000007 ## Defines the IO port used to trigger a software System Management Interrupt (SMI).

# Used as the SMI Command IO port by security functionality that triggers a software SMI such diff --git a/SecurityPkg/SecurityPkg.uni b/SecurityPkg/SecurityPkg.uni index 68587304d779..6c28b8021333 100644 --- a/SecurityPkg/SecurityPkg.uni +++ b/SecurityPkg/SecurityPkg.uni @@ -169,7 +169,7 @@ #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_PROMPT #language en-US "Status Code for TPM device definitions" #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_HELP #language en-US "Progress Code for TPM device subclass definitions.

\n" - "EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000D0000) = 0x010D0000
" + "EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000E0000) = 0x010E0000
" #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdRsa2048Sha256PublicKeyBuffer_PROMPT #language en-US "One or more SHA 256 Hashes of RSA 2048 bit public keys used to verify Recovery and Capsule Update images" -- 2.35.1.windows.2