From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 711B8AC1C02 for ; Tue, 5 Mar 2024 23:36:33 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=EpBVoRv+qiuK2X8wH72/SC39MpecCmx6/HbsgBa5nfE=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20240206; t=1709681791; v=1; b=AzUPDtcTNHu2MQByBz/Ae8HYFBLocdITDpZgsGEdjWqzpDMQhuigAq8cq77FWoLTUkLNCpol TFXHKrNNzZ2MJ5hBG29LLrWWbdVhaI098YT57ogk7qTFaYJiR6gtwCx33hzsPu/AmDgMokxeItR w5J6GwB58A0Vvo4gqkCo8jvDifayFo4d//xRN4mj6fMWJXzJ0T1k5eMLZC9WcDJ2yN3aWtL5Zy4 nXv/V0F7cW06TlASE80qtBLdYBIdpbGQ5GqYuabJR9wkcaCz/us0AcxLQQZUeqhn5wj2S7GOyfX 1A5KhuVZpDDy7e7pgll+Y6FIqP9NdRtlhxm1XupzehsrA== X-Received: by 127.0.0.2 with SMTP id As84YY7687511x67rXkEm2hC; Tue, 05 Mar 2024 15:36:31 -0800 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.3757.1709681790908230302 for ; Tue, 05 Mar 2024 15:36:31 -0800 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 18CA61FB; Tue, 5 Mar 2024 15:37:07 -0800 (PST) X-Received: from beelzebub.ast.arm.com (abhsin07-ThinkStation-P720.austin.arm.com [10.118.30.31]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id EF0893F73F; Tue, 5 Mar 2024 15:36:29 -0800 (PST) From: "Abhimanyu Singh" To: devel@edk2.groups.io Cc: Abhi Singh , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Stuart Yoder , Heinrich Schuchardt Subject: [edk2-devel] [PATCH v4 0/6] EDK2-TEST TCG MOR Tests Date: Tue, 5 Mar 2024 17:36:16 -0600 Message-Id: <20240305233622.747522-1-Abhi.Singh@arm.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,Abhi.Singh@arm.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: Q4siPGnEj1g1UbEs3UX1lz5Ix7686176AA= Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=AzUPDtcT; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=arm.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Updates after feedback from Heinrich -updated deprecated useage of HandleProtocol() to OpenProtocol(). -added checks for unexpected values for Step and CheckpointStep values. -added check if system fails to cold reset, returns EFI_DEVICE_ERROR. -cast Attributes to (UINTN) when passing to RecordAssertion. -ack test is still missing a pattern write to memory and then check for clear upon reset. Patch series: These tests support platform firmware that implement MemoryOverwriteRequestControl & MemoryOverwriteRequestControlLock UEFI variables in accordance with TCG PC Platform Reset Attack Mitigation Specification. The patches are split according to the six sections documented in the SCT spec document referenced below. SCT spec: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4374 BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4419 PR: https://github.com/tianocore/edk2-test/pull/90 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Stuart Yoder Cc: Heinrich Schuchardt Abhi Singh (5): uefi-sct/SctPkg: TCG MOR SetVariable Test uefi-sct/SctPkg: TCG MORLOCK SetVariable Test uefi-sct/SctPkg: TCG MORLOCK Unlocked State Test uefi-sct/SctPkg: TCG MORLOCK Locked No Key State Test uefi-sct/SctPkg: TCG MORLOCK Locked with Key State Test Abhi.Singh (1): uefi-sct/SctPkg: TCG Platform Reset Check Test uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc = | 1 + uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/TCGMemoryOverwriteRequestBBTest.inf | 53 + uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/Guid.h | 271 +++ uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/TCGMemoryOverwriteRequestBBTestMain.h | 137 ++ uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/Guid.c | 127 ++ uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/TCGMemoryOverwriteRequestBBTestFunction.c | 2390 +++++++= +++++++++++++ uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCGMemoryOverwriteRequ= est/BlackBoxTest/TCGMemoryOverwriteRequestBBTestMain.c | 115 + uefi-sct/SctPkg/CommonGenFramework.sh = | 1 + uefi-sct/SctPkg/Config/Data/Category.ini = | 7 + 9 files changed, 3102 insertions(+) create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/TCGMemoryOverwriteRequestBBTest.inf create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/Guid.h create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/TCGMemoryOverwriteRequestBBTestMain.h create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/Guid.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/TCGMemoryOverwriteRequestBBTestFuncti= on.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/TCG= MemoryOverwriteRequest/BlackBoxTest/TCGMemoryOverwriteRequestBBTestMain.c --=20 2.34.1 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#116406): https://edk2.groups.io/g/devel/message/116406 Mute This Topic: https://groups.io/mt/104756647/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-