From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pj1-f50.google.com (mail-pj1-f50.google.com [209.85.216.50]) by mx.groups.io with SMTP id smtpd.web11.3134.1657765672912952377 for ; Wed, 13 Jul 2022 19:27:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=i7zrhGz9; spf=pass (domain: gmail.com, ip: 209.85.216.50, mailfrom: kuqin12@gmail.com) Received: by mail-pj1-f50.google.com with SMTP id x18-20020a17090a8a9200b001ef83b332f5so6845171pjn.0 for ; Wed, 13 Jul 2022 19:27:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=XfdRvfvp71jPvGhJfX5oqq8Q4VOCaKa866x2PoKOc/w=; b=i7zrhGz9S655ugBNMwLol5DEWmz7CGPdl7LmQZD/YhPaZl52f2H+uS5RoUJ4vh3KoY CY0GVAmWZBwpgkIyBYYltcTmbqjSO7sZM3avQ6DDHtwlqtaFXH4dIu0AHyIpqXN+NrI6 RFQUvMyKoxnPWzPBi8ObQQfalzE5BOb5iV6GO/sENQuRfOnCAM0IwX5OLG4X7Yz7yaDI C90iV/XrAh+mWBSVQxYB8cC2N9gSFKukAdknZcCF5/syV36xKrbmnghLm3IntinPOJ0S qoE15g2nTZR9TRyPvynwQjrBEmZ4+54KeYiR5WhRe7QyO/vjeZFcNN6+gIygO8AiUThF dkRA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=XfdRvfvp71jPvGhJfX5oqq8Q4VOCaKa866x2PoKOc/w=; b=bNV1RAaEg+gqoz3MY7xn6YFnkUviqavPp8UKUYokFU7/e1cKAcwBEPW3b72ne9NzxW OcM1g6dDB+ZBhJmM++nKzPZrRHMdNFjjxhiWB7pCC+Uk++5wZBVHxAWmtte0vhuXxc2f jw+UwS1hCbM7tv2bVjIHH5hv588tObWqJSSNQ6fB6TU3k4aB5NevtXYAo+VgII8HKXAS 9R0YleBv1m6egWEHTQGw4qfGx40V6r8vjiYSrdcE8Bp7i1y06JDzwhymSCkmHWYlnh+4 bQJJ2WDmzXsv+2ajcCCCwMa0j2pN3I7JfLDHZ7f4ZYMiA/lDzZruNJ7oneUbsKnrIzi0 SOfQ== X-Gm-Message-State: AJIora+wVxE4BUJkiXiHS/hdoD7LyX86q10FIaeYOwkUlm0u39DY4kCD ZiO9EogL/3X0lt43aOzrIgJJkk6Jb7A= X-Google-Smtp-Source: AGRyM1uxGwB/Slsw6Y5ey/FsoVaE9lDbBavS7MDNjOlHdqgrNkU6+LUT5ISijBc7mYv3HlmVS+MMig== X-Received: by 2002:a17:903:2301:b0:16c:4c65:18b9 with SMTP id d1-20020a170903230100b0016c4c6518b9mr6301794plh.46.1657765673618; Wed, 13 Jul 2022 19:27:53 -0700 (PDT) Return-Path: Received: from localhost.localdomain ([192.182.149.255]) by smtp.gmail.com with ESMTPSA id t68-20020a625f47000000b0052aaf7fdf2esm244014pfb.137.2022.07.13.19.27.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Jul 2022 19:27:53 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Qi Zhang , Rahul Kumar Subject: [edk2-staging][PATCH v2 3/3] SecurityPkg: SubClassTpm: Updated default value Date: Wed, 13 Jul 2022 19:27:38 -0700 Message-Id: <20220714022738.110-4-kuqin12@gmail.com> X-Mailer: git-send-email 2.37.0.windows.1 In-Reply-To: <20220714022738.110-1-kuqin12@gmail.com> References: <20220714022738.110-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3966 This change updated the default value of TPM device subclass PCD to `0x010E0000` in order to match the definition of EFI_PERIPHERAL_TPM from PI specification. Cc: Jiewen Yao Cc: Jian J Wang Cc: Qi Zhang Cc: Rahul Kumar Signed-off-by: Kun Qin --- Notes: v2: - No change SecurityPkg/SecurityPkg.dec | 6 +++--- SecurityPkg/SecurityPkg.uni | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index 7ecf9565d98c..49fc030e2da3 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -315,10 +315,10 @@ [PcdsFixedAtBuild, PcdsPatchableInModule] gEfiSecurityPkgTokenSpaceGuid.PcdTpmPlatformClass|0|UINT8|0x00000006 ## Progress Code for TPM device subclass definitions.

- # EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000D0000) = 0x010D0000
+ # EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000E0000) = 0x010E0000
# @Prompt Status Code for TPM device definitions - # @ValidList 0x80000003 | 0x010D0000 - gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|UINT32|0x00000007 + # @ValidList 0x80000003 | 0x010E0000 + gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010E0000|UINT32|0x00000007 ## Defines the IO port used to trigger a software System Management Interrupt (SMI).

# Used as the SMI Command IO port by security functionality that triggers a software SMI such diff --git a/SecurityPkg/SecurityPkg.uni b/SecurityPkg/SecurityPkg.uni index 68587304d779..6c28b8021333 100644 --- a/SecurityPkg/SecurityPkg.uni +++ b/SecurityPkg/SecurityPkg.uni @@ -169,7 +169,7 @@ #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_PROMPT #language en-US "Status Code for TPM device definitions" #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_HELP #language en-US "Progress Code for TPM device subclass definitions.

\n" - "EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000D0000) = 0x010D0000
" + "EFI_PERIPHERAL_TPM = (EFI_PERIPHERAL | 0x000E0000) = 0x010E0000
" #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdRsa2048Sha256PublicKeyBuffer_PROMPT #language en-US "One or more SHA 256 Hashes of RSA 2048 bit public keys used to verify Recovery and Capsule Update images" -- 2.37.0.windows.1