public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
* [Patch 0/2] Consume New SmmIoLib.
@ 2017-05-03  3:31 Eric Dong
  2017-05-03  3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong
  2017-05-03  3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong
  0 siblings, 2 replies; 5+ messages in thread
From: Eric Dong @ 2017-05-03  3:31 UTC (permalink / raw)
  To: edk2-devel

After MdePkg add new SmmIoLib, update OpalPasswordSmm driver to
consume it.

Eric Dong (2):
  SecurityPkg OpalPasswordSmm: Consume SmmIoLib.
  SecurityPkg: Consume SmmIoLib.

 SecurityPkg/SecurityPkg.dsc                        |  1 +
 .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c        | 30 +------------
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c     | 51 ----------------------
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h     |  3 +-
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf   |  2 +-
 5 files changed, 4 insertions(+), 83 deletions(-)

-- 
2.7.0.windows.1



^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib.
  2017-05-03  3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong
@ 2017-05-03  3:31 ` Eric Dong
  2017-05-03 14:19   ` Yao, Jiewen
  2017-05-03  3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong
  1 sibling, 1 reply; 5+ messages in thread
From: Eric Dong @ 2017-05-03  3:31 UTC (permalink / raw)
  To: edk2-devel; +Cc: Jiewen Yao

Update code to consume SmmIoLib to check Mmio validation.

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Eric Dong <eric.dong@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
---
 .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c        | 30 +------------
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c     | 51 ----------------------
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h     |  3 +-
 .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf   |  2 +-
 4 files changed, 3 insertions(+), 83 deletions(-)

diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
index 33f77bd..e38acfd 100644
--- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
+++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
@@ -1023,34 +1023,6 @@ GetAhciBarSize (
 }
 
 /**
-  This function check if the memory region is in GCD MMIO region.
-
-  @param Addr  The memory region start address to be checked.
-  @param Size  The memory region length to be checked.
-
-  @retval TRUE  This memory region is in GCD MMIO region.
-  @retval FALSE This memory region is not in GCD MMIO region.
-**/
-BOOLEAN
-EFIAPI
-OpalIsValidMmioSpace (
-  IN  EFI_PHYSICAL_ADDRESS       Addr,
-  IN  UINTN                      Size
-  )
-{
-  UINTN                           Index;
-  EFI_GCD_MEMORY_SPACE_DESCRIPTOR *Desc;
-
-  for (Index = 0; Index < mNumberOfDescriptors; Index ++) {
-    Desc = &mGcdMemSpace[Index];
-    if ((Desc->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) && (Addr >= Desc->BaseAddress) && ((Addr + Size) <= (Desc->BaseAddress + Desc->Length))) {
-      return TRUE;
-    }
-  }
-
-  return FALSE;
-}
-/**
   Get AHCI mode base address registers' Value.
 
   @param[in] Bus         The bus number of ata host controller.
@@ -1083,7 +1055,7 @@ GetAhciBaseAddress (
   //
   // Check if the AHCI Bar region is in SMRAM to avoid malicious attack by modifying MMIO Bar to point to SMRAM.
   //
-  if (!OpalIsValidMmioSpace ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size)) {
+  if (!SmmIsMmioValid ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size, NULL)) {
     return EFI_UNSUPPORTED;
   }
 
diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
index 2f2a1d9..0ea92b1 100644
--- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
+++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
@@ -61,9 +61,6 @@ VOID                 *mBuffer = NULL; // DMA can not read/write Data to smram, s
 // NVME
 NVME_CONTEXT         mNvmeContext;
 
-EFI_GCD_MEMORY_SPACE_DESCRIPTOR   *mGcdMemSpace        = NULL;
-UINTN                             mNumberOfDescriptors = 0;
-
 /**
   Add new bridge node or nvme device info to the device list.
 
@@ -648,44 +645,6 @@ S3SleepEntryCallBack (
 }
 
 /**
-  OpalPassword Notification for SMM EndOfDxe protocol.
-
-  @param[in] Protocol   Points to the protocol's unique identifier.
-  @param[in] Interface  Points to the interface instance.
-  @param[in] Handle     The handle on which the interface was installed.
-
-  @retval EFI_SUCCESS   Notification runs successfully.
-**/
-EFI_STATUS
-EFIAPI
-OpalPasswordEndOfDxeNotification (
-  IN CONST EFI_GUID  *Protocol,
-  IN VOID            *Interface,
-  IN EFI_HANDLE      Handle
-  )
-{
-  UINTN                            NumberOfDescriptors;
-  EFI_GCD_MEMORY_SPACE_DESCRIPTOR  *MemSpaceMap;
-  EFI_STATUS                       Status;
-
-  Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors, &MemSpaceMap);
-  if (EFI_ERROR (Status)) {
-    return Status;
-  }
-
-  mGcdMemSpace = AllocateCopyPool (NumberOfDescriptors * sizeof (EFI_GCD_MEMORY_SPACE_DESCRIPTOR), MemSpaceMap);
-  if (EFI_ERROR (Status)) {
-    gBS->FreePool (MemSpaceMap);
-    return Status;
-  }
-
-  mNumberOfDescriptors = NumberOfDescriptors;
-  gBS->FreePool (MemSpaceMap);
-
-  return EFI_SUCCESS;
-}
-
-/**
   Main entry for this driver.
 
   @param ImageHandle     Image handle this driver.
@@ -711,7 +670,6 @@ OpalPasswordSmmInit (
   EFI_SMM_VARIABLE_PROTOCOL             *SmmVariable;
   OPAL_EXTRA_INFO_VAR                   OpalExtraInfo;
   UINTN                                 DataSize;
-  EFI_EVENT                             EndOfDxeEvent;
   EFI_PHYSICAL_ADDRESS                  Address;
 
   mBuffer            = NULL;
@@ -820,15 +778,6 @@ OpalPasswordSmmInit (
   //
   mSwSmiValue = (UINT8) Context.SwSmiInputValue;
 
-  //
-  // Create event to record GCD descriptors at end of dxe for judging AHCI/NVMe PCI Bar
-  // is in MMIO space to avoid attack.
-  //
-  Status = gSmst->SmmRegisterProtocolNotify (&gEfiSmmEndOfDxeProtocolGuid, OpalPasswordEndOfDxeNotification, &EndOfDxeEvent);
-  if (EFI_ERROR (Status)) {
-    DEBUG((DEBUG_ERROR, "OpalPasswordSmm: Register SmmEndOfDxe fail, Status: %r\n", Status));
-    goto EXIT;
-  }
   Status = gSmst->SmmLocateProtocol (&gEfiSmmVariableProtocolGuid, NULL, (VOID**)&SmmVariable);
   if (!EFI_ERROR (Status)) {
     DataSize = sizeof (OPAL_EXTRA_INFO_VAR);
diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
index ab31a6b..ce88786 100644
--- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
+++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
@@ -45,6 +45,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 #include <Library/S3BootScriptLib.h>
 #include <Library/DevicePathLib.h>
 #include <Library/DxeServicesTableLib.h>
+#include <Library/SmmIoLib.h>
 
 #include <IndustryStandard/Pci22.h>
 
@@ -70,8 +71,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 
 extern VOID                              *mBuffer;
 
-extern EFI_GCD_MEMORY_SPACE_DESCRIPTOR   *mGcdMemSpace;
-extern UINTN                             mNumberOfDescriptors;
 #pragma pack(1)
 
 typedef struct {
diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
index cab0fd5..c62fa13 100644
--- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
+++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
@@ -58,6 +58,7 @@
   DxeServicesTableLib
   DevicePathLib
   OpalPasswordSupportLib
+  SmmIoLib
 
 [Guids]
   gOpalExtraInfoVariableGuid                    ## CONSUMES ## GUID
@@ -69,7 +70,6 @@
   gEfiSmmSxDispatch2ProtocolGuid                ## CONSUMES
   gEfiSmmVariableProtocolGuid                   ## CONSUMES
   gEfiStorageSecurityCommandProtocolGuid        ## CONSUMES
-  gEfiSmmEndOfDxeProtocolGuid                   ## CONSUMES
 
 [Depex]
   gEfiSmmSwDispatch2ProtocolGuid AND
-- 
2.7.0.windows.1



^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [Patch 2/2] SecurityPkg: Consume SmmIoLib.
  2017-05-03  3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong
  2017-05-03  3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong
@ 2017-05-03  3:31 ` Eric Dong
  2017-05-03 14:20   ` Yao, Jiewen
  1 sibling, 1 reply; 5+ messages in thread
From: Eric Dong @ 2017-05-03  3:31 UTC (permalink / raw)
  To: edk2-devel; +Cc: Jiewen Yao

Update code to consume SmmIoLib to pass build.

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Eric Dong <eric.dong@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
---
 SecurityPkg/SecurityPkg.dsc | 1 +
 1 file changed, 1 insertion(+)

diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc
index dee9241..26bcbda 100644
--- a/SecurityPkg/SecurityPkg.dsc
+++ b/SecurityPkg/SecurityPkg.dsc
@@ -136,6 +136,7 @@
   Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
   Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
   Tcg2PhysicalPresenceLib|SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
+  SmmIoLib|MdePkg/Library/SmmIoLib/SmmIoLib.inf
 
 [PcdsDynamicDefault.common.DEFAULT]
   gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0xb6, 0xe5, 0x01, 0x8b, 0x19, 0x4f, 0xe8, 0x46, 0xab, 0x93, 0x1c, 0x53, 0x67, 0x1b, 0x90, 0xcc}
-- 
2.7.0.windows.1



^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib.
  2017-05-03  3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong
@ 2017-05-03 14:19   ` Yao, Jiewen
  0 siblings, 0 replies; 5+ messages in thread
From: Yao, Jiewen @ 2017-05-03 14:19 UTC (permalink / raw)
  To: Dong, Eric, edk2-devel@lists.01.org

Reviewed-by: Jiewen.yao@intel.com

> -----Original Message-----
> From: Dong, Eric
> Sent: Wednesday, May 3, 2017 11:32 AM
> To: edk2-devel@lists.01.org
> Cc: Yao, Jiewen <jiewen.yao@intel.com>
> Subject: [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib.
> 
> Update code to consume SmmIoLib to check Mmio validation.
> 
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Eric Dong <eric.dong@intel.com>
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> ---
>  .../Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c        | 30 +------------
>  .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c     | 51
> ----------------------
>  .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h     |  3 +-
>  .../Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf   |  2 +-
>  4 files changed, 3 insertions(+), 83 deletions(-)
> 
> diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
> b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
> index 33f77bd..e38acfd 100644
> --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
> +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalAhciMode.c
> @@ -1023,34 +1023,6 @@ GetAhciBarSize (
>  }
> 
>  /**
> -  This function check if the memory region is in GCD MMIO region.
> -
> -  @param Addr  The memory region start address to be checked.
> -  @param Size  The memory region length to be checked.
> -
> -  @retval TRUE  This memory region is in GCD MMIO region.
> -  @retval FALSE This memory region is not in GCD MMIO region.
> -**/
> -BOOLEAN
> -EFIAPI
> -OpalIsValidMmioSpace (
> -  IN  EFI_PHYSICAL_ADDRESS       Addr,
> -  IN  UINTN                      Size
> -  )
> -{
> -  UINTN                           Index;
> -  EFI_GCD_MEMORY_SPACE_DESCRIPTOR *Desc;
> -
> -  for (Index = 0; Index < mNumberOfDescriptors; Index ++) {
> -    Desc = &mGcdMemSpace[Index];
> -    if ((Desc->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) &&
> (Addr >= Desc->BaseAddress) && ((Addr + Size) <= (Desc->BaseAddress +
> Desc->Length))) {
> -      return TRUE;
> -    }
> -  }
> -
> -  return FALSE;
> -}
> -/**
>    Get AHCI mode base address registers' Value.
> 
>    @param[in] Bus         The bus number of ata host controller.
> @@ -1083,7 +1055,7 @@ GetAhciBaseAddress (
>    //
>    // Check if the AHCI Bar region is in SMRAM to avoid malicious attack by
> modifying MMIO Bar to point to SMRAM.
>    //
> -  if (!OpalIsValidMmioSpace ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size)) {
> +  if (!SmmIsMmioValid ((EFI_PHYSICAL_ADDRESS)mAhciBar, Size, NULL)) {
>      return EFI_UNSUPPORTED;
>    }
> 
> diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
> b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
> index 2f2a1d9..0ea92b1 100644
> --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
> +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.c
> @@ -61,9 +61,6 @@ VOID                 *mBuffer = NULL; // DMA can not
> read/write Data to smram, s
>  // NVME
>  NVME_CONTEXT         mNvmeContext;
> 
> -EFI_GCD_MEMORY_SPACE_DESCRIPTOR   *mGcdMemSpace        = NULL;
> -UINTN                             mNumberOfDescriptors = 0;
> -
>  /**
>    Add new bridge node or nvme device info to the device list.
> 
> @@ -648,44 +645,6 @@ S3SleepEntryCallBack (
>  }
> 
>  /**
> -  OpalPassword Notification for SMM EndOfDxe protocol.
> -
> -  @param[in] Protocol   Points to the protocol's unique identifier.
> -  @param[in] Interface  Points to the interface instance.
> -  @param[in] Handle     The handle on which the interface was installed.
> -
> -  @retval EFI_SUCCESS   Notification runs successfully.
> -**/
> -EFI_STATUS
> -EFIAPI
> -OpalPasswordEndOfDxeNotification (
> -  IN CONST EFI_GUID  *Protocol,
> -  IN VOID            *Interface,
> -  IN EFI_HANDLE      Handle
> -  )
> -{
> -  UINTN                            NumberOfDescriptors;
> -  EFI_GCD_MEMORY_SPACE_DESCRIPTOR  *MemSpaceMap;
> -  EFI_STATUS                       Status;
> -
> -  Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors,
> &MemSpaceMap);
> -  if (EFI_ERROR (Status)) {
> -    return Status;
> -  }
> -
> -  mGcdMemSpace = AllocateCopyPool (NumberOfDescriptors * sizeof
> (EFI_GCD_MEMORY_SPACE_DESCRIPTOR), MemSpaceMap);
> -  if (EFI_ERROR (Status)) {
> -    gBS->FreePool (MemSpaceMap);
> -    return Status;
> -  }
> -
> -  mNumberOfDescriptors = NumberOfDescriptors;
> -  gBS->FreePool (MemSpaceMap);
> -
> -  return EFI_SUCCESS;
> -}
> -
> -/**
>    Main entry for this driver.
> 
>    @param ImageHandle     Image handle this driver.
> @@ -711,7 +670,6 @@ OpalPasswordSmmInit (
>    EFI_SMM_VARIABLE_PROTOCOL             *SmmVariable;
>    OPAL_EXTRA_INFO_VAR                   OpalExtraInfo;
>    UINTN                                 DataSize;
> -  EFI_EVENT                             EndOfDxeEvent;
>    EFI_PHYSICAL_ADDRESS                  Address;
> 
>    mBuffer            = NULL;
> @@ -820,15 +778,6 @@ OpalPasswordSmmInit (
>    //
>    mSwSmiValue = (UINT8) Context.SwSmiInputValue;
> 
> -  //
> -  // Create event to record GCD descriptors at end of dxe for judging
> AHCI/NVMe PCI Bar
> -  // is in MMIO space to avoid attack.
> -  //
> -  Status = gSmst->SmmRegisterProtocolNotify
> (&gEfiSmmEndOfDxeProtocolGuid, OpalPasswordEndOfDxeNotification,
> &EndOfDxeEvent);
> -  if (EFI_ERROR (Status)) {
> -    DEBUG((DEBUG_ERROR, "OpalPasswordSmm: Register SmmEndOfDxe fail,
> Status: %r\n", Status));
> -    goto EXIT;
> -  }
>    Status = gSmst->SmmLocateProtocol (&gEfiSmmVariableProtocolGuid, NULL,
> (VOID**)&SmmVariable);
>    if (!EFI_ERROR (Status)) {
>      DataSize = sizeof (OPAL_EXTRA_INFO_VAR);
> diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
> b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
> index ab31a6b..ce88786 100644
> --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
> +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.h
> @@ -45,6 +45,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND,
> EITHER EXPRESS OR IMPLIED.
>  #include <Library/S3BootScriptLib.h>
>  #include <Library/DevicePathLib.h>
>  #include <Library/DxeServicesTableLib.h>
> +#include <Library/SmmIoLib.h>
> 
>  #include <IndustryStandard/Pci22.h>
> 
> @@ -70,8 +71,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND,
> EITHER EXPRESS OR IMPLIED.
> 
>  extern VOID                              *mBuffer;
> 
> -extern EFI_GCD_MEMORY_SPACE_DESCRIPTOR   *mGcdMemSpace;
> -extern UINTN                             mNumberOfDescriptors;
>  #pragma pack(1)
> 
>  typedef struct {
> diff --git a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
> b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
> index cab0fd5..c62fa13 100644
> --- a/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
> +++ b/SecurityPkg/Tcg/Opal/OpalPasswordSmm/OpalPasswordSmm.inf
> @@ -58,6 +58,7 @@
>    DxeServicesTableLib
>    DevicePathLib
>    OpalPasswordSupportLib
> +  SmmIoLib
> 
>  [Guids]
>    gOpalExtraInfoVariableGuid                    ## CONSUMES ## GUID
> @@ -69,7 +70,6 @@
>    gEfiSmmSxDispatch2ProtocolGuid                ## CONSUMES
>    gEfiSmmVariableProtocolGuid                   ## CONSUMES
>    gEfiStorageSecurityCommandProtocolGuid        ## CONSUMES
> -  gEfiSmmEndOfDxeProtocolGuid                   ## CONSUMES
> 
>  [Depex]
>    gEfiSmmSwDispatch2ProtocolGuid AND
> --
> 2.7.0.windows.1



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [Patch 2/2] SecurityPkg: Consume SmmIoLib.
  2017-05-03  3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong
@ 2017-05-03 14:20   ` Yao, Jiewen
  0 siblings, 0 replies; 5+ messages in thread
From: Yao, Jiewen @ 2017-05-03 14:20 UTC (permalink / raw)
  To: Dong, Eric, edk2-devel@lists.01.org

Reviewed-by: Jiewen.yao@intel.com

> -----Original Message-----
> From: Dong, Eric
> Sent: Wednesday, May 3, 2017 11:32 AM
> To: edk2-devel@lists.01.org
> Cc: Yao, Jiewen <jiewen.yao@intel.com>
> Subject: [Patch 2/2] SecurityPkg: Consume SmmIoLib.
> 
> Update code to consume SmmIoLib to pass build.
> 
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Eric Dong <eric.dong@intel.com>
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> ---
>  SecurityPkg/SecurityPkg.dsc | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc
> index dee9241..26bcbda 100644
> --- a/SecurityPkg/SecurityPkg.dsc
> +++ b/SecurityPkg/SecurityPkg.dsc
> @@ -136,6 +136,7 @@
> 
> Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTc
> g.inf
> 
> Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.
> inf
> 
> Tcg2PhysicalPresenceLib|SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/
> SmmTcg2PhysicalPresenceLib.inf
> +  SmmIoLib|MdePkg/Library/SmmIoLib/SmmIoLib.inf
> 
>  [PcdsDynamicDefault.common.DEFAULT]
>    gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0xb6, 0xe5, 0x01,
> 0x8b, 0x19, 0x4f, 0xe8, 0x46, 0xab, 0x93, 0x1c, 0x53, 0x67, 0x1b, 0x90, 0xcc}
> --
> 2.7.0.windows.1



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2017-05-03 14:20 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-05-03  3:31 [Patch 0/2] Consume New SmmIoLib Eric Dong
2017-05-03  3:31 ` [Patch 1/2] SecurityPkg OpalPasswordSmm: Consume SmmIoLib Eric Dong
2017-05-03 14:19   ` Yao, Jiewen
2017-05-03  3:31 ` [Patch 2/2] SecurityPkg: " Eric Dong
2017-05-03 14:20   ` Yao, Jiewen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox