public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: "Kinney, Michael D" <michael.d.kinney@intel.com>,
	"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Subject: Re: [Patch] Vlv2TbltDevicePkg: Remove DxeTcg2PhysicalPresenceLibNull
Date: Thu, 22 Mar 2018 00:20:50 +0000	[thread overview]
Message-ID: <74D8A39837DF1E4DA445A8C0B3885C503AB0B3D4@shsmsx102.ccr.corp.intel.com> (raw)
In-Reply-To: <20180321224817.20644-1-michael.d.kinney@intel.com>

Reviewed-by: Jiewen.yao@intel.com

> -----Original Message-----
> From: Kinney, Michael D
> Sent: Thursday, March 22, 2018 6:48 AM
> To: edk2-devel@lists.01.org
> Cc: Kinney, Michael D <michael.d.kinney@intel.com>; Yao, Jiewen
> <jiewen.yao@intel.com>; Guo, Mang <mang.guo@intel.com>
> Subject: [Patch] Vlv2TbltDevicePkg: Remove DxeTcg2PhysicalPresenceLibNull
> 
> From: "Kinney, Michael D" <michael.d.kinney@intel.com>
> 
> https://bugzilla.tianocore.org/show_bug.cgi?id=908
> 
> The following commit that to use Tcg2 instead of TrEE breaks the
> build of Vlv2TbltDevicePkg\Library\DxeTcg2PhysicalPresenceLibNull
> 
> https://github.com/tianocore/edk2/commit/9461604e1490f73fdbcc8e957dbe7
> 5f75c73b027#diff-c85873f3649e35873a11936ace983807
> 
> The correct fix is to remove the DxeTcg2PhysicalPresenceLibNull
> library instance and update library mappings in DSC files.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> C: David Wei <david.wei@intel.com>
> Cc: Mang Guo <mang.guo@intel.com>
> Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
> Contributed-under: TianoCore Contribution Agreement 1.1
> ---
>  .../DxeTcg2PhysicalPresenceLibNull.c               | 242 ---------------------
>  .../DxeTcg2PhysicalPresenceLibNull.inf             |  46 ----
>  Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc            |   4 +-
>  Vlv2TbltDevicePkg/PlatformPkgIA32.dsc              |   4 +-
>  Vlv2TbltDevicePkg/PlatformPkgX64.dsc               |   4 +-
>  5 files changed, 3 insertions(+), 297 deletions(-)
>  delete mode 100644
> Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPre
> senceLibNull.c
>  delete mode 100644
> Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPre
> senceLibNull.inf
> 
> diff --git
> a/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.c
> b/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.c
> deleted file mode 100644
> index 96fad05527..0000000000
> ---
> a/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.c
> +++ /dev/null
> @@ -1,242 +0,0 @@
> -/** @file
> -  Execute pending TPM2 requests from OS or BIOS.
> -
> -  Caution: This module requires additional review when modified.
> -  This driver will have external input - variable.
> -  This external input must be validated carefully to avoid security issue.
> -
> -  Tcg2ExecutePendingTpmRequest() will receive untrusted input and do
> validation.
> -
> -Copyright (c) 2013 - 2015, Intel Corporation. All rights reserved.<BR>
> -This program and the accompanying materials
> -are licensed and made available under the terms and conditions of the BSD
> License
> -which accompanies this distribution.  The full text of the license may be found
> at
> -http://opensource.org/licenses/bsd-license.php
> -
> -THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
> -WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS
> OR IMPLIED.
> -
> -**/
> -
> -#include <PiDxe.h>
> -
> -#include <Protocol/Tcg2Protocol.h>
> -#include <Protocol/VariableLock.h>
> -#include <Library/DebugLib.h>
> -#include <Library/BaseMemoryLib.h>
> -#include <Library/UefiRuntimeServicesTableLib.h>
> -#include <Library/UefiDriverEntryPoint.h>
> -#include <Library/UefiBootServicesTableLib.h>
> -#include <Library/UefiLib.h>
> -#include <Library/MemoryAllocationLib.h>
> -#include <Library/PrintLib.h>
> -#include <Library/HiiLib.h>
> -#include <Guid/EventGroup.h>
> -#include <Guid/Tcg2PhysicalPresenceData.h>
> -#include <Library/Tpm2CommandLib.h>
> -#include <Library/Tcg2PpVendorLib.h>
> -
> -
> -/**
> -  Get string by string id from HII Interface.
> -
> -  @param[in] Id          String ID.
> -
> -  @retval    CHAR16 *    String from ID.
> -  @retval    NULL        If error occurs.
> -
> -**/
> -CHAR16 *
> -Tcg2PhysicalPresenceGetStringById (
> -  IN  EFI_STRING_ID   Id
> -  )
> -{
> -  return NULL;
> -}
> -
> -/**
> -  Send ClearControl and Clear command to TPM.
> -
> -  @param[in]  PlatformAuth      platform auth value. NULL means no
> platform auth change.
> -
> -  @retval EFI_SUCCESS           Operation completed successfully.
> -  @retval EFI_TIMEOUT           The register can't run into the expected
> status in time.
> -  @retval EFI_BUFFER_TOO_SMALL  Response data buffer is too small.
> -  @retval EFI_DEVICE_ERROR      Unexpected device behavior.
> -
> -**/
> -EFI_STATUS
> -EFIAPI
> -TpmCommandClear (
> -  IN TPM2B_AUTH                *PlatformAuth  OPTIONAL
> -  )
> -{
> -  return EFI_SUCCESS;
> -}
> -
> -/**
> -  Execute physical presence operation requested by the OS.
> -
> -  @param[in]      PlatformAuth        platform auth value. NULL means
> no platform auth change.
> -  @param[in]      CommandCode         Physical presence operation
> value.
> -  @param[in, out] PpiFlags            The physical presence interface flags.
> -
> -  @retval TREE_PP_OPERATION_RESPONSE_BIOS_FAILURE  Unknown
> physical presence operation.
> -  @retval TREE_PP_OPERATION_RESPONSE_BIOS_FAILURE  Error occurred
> during sending command to TPM or
> -                                                   receiving response
> from TPM.
> -  @retval Others                                   Return code from
> the TPM device after command execution.
> -**/
> -UINT32
> -Tcg2ExecutePhysicalPresence (
> -  IN      TPM2B_AUTH                       *PlatformAuth,
> OPTIONAL
> -  IN      UINT32                           CommandCode,
> -  IN OUT  EFI_TREE_PHYSICAL_PRESENCE_FLAGS *PpiFlags
> -  )
> -{
> -  return 0;
> -}
> -
> -
> -/**
> -  Read the specified key for user confirmation.
> -
> -  @param[in]  CautionKey  If true,  F12 is used as confirm key;
> -                          If false, F10 is used as confirm key.
> -
> -  @retval     TRUE        User confirmed the changes by input.
> -  @retval     FALSE       User discarded the changes.
> -**/
> -BOOLEAN
> -Tcg2ReadUserKey (
> -  IN     BOOLEAN                    CautionKey
> -  )
> -{
> -  return FALSE;
> -}
> -
> -/**
> -  The constructor function register UNI strings into imageHandle.
> -
> -  It will ASSERT() if that operation fails and it will always return EFI_SUCCESS.
> -
> -  @param  ImageHandle   The firmware allocated handle for the EFI image.
> -  @param  SystemTable   A pointer to the EFI System Table.
> -
> -  @retval EFI_SUCCESS   The constructor successfully added string package.
> -  @retval Other value   The constructor can't add string package.
> -**/
> -EFI_STATUS
> -EFIAPI
> -Tcg2PhysicalPresenceLibConstructor (
> -  IN EFI_HANDLE        ImageHandle,
> -  IN EFI_SYSTEM_TABLE  *SystemTable
> -  )
> -{
> -  return EFI_SUCCESS;
> -}
> -
> -/**
> -  Display the confirm text and get user confirmation.
> -
> -  @param[in] TpmPpCommand  The requested TPM physical presence
> command.
> -
> -  @retval    TRUE          The user has confirmed the changes.
> -  @retval    FALSE         The user doesn't confirm the changes.
> -**/
> -BOOLEAN
> -Tcg2UserConfirm (
> -  IN      UINT32                    TpmPpCommand
> -  )
> -{
> -  return FALSE;
> -}
> -
> -/**
> -  Check if there is a valid physical presence command request. Also updates
> parameter value
> -  to whether the requested physical presence command already confirmed by
> user
> -
> -   @param[in]  TcgPpData                 EFI Tcg2 Physical Presence
> request data.
> -   @param[in]  Flags                     The physical presence interface
> flags.
> -   @param[out] RequestConfirmed            If the physical presence
> operation command required user confirm from UI.
> -                                             True, it indicates the
> command doesn't require user confirm, or already confirmed
> -                                                   in last boot cycle by
> user.
> -                                             False, it indicates the
> command need user confirm from UI.
> -
> -   @retval  TRUE        Physical Presence operation command is valid.
> -   @retval  FALSE       Physical Presence operation command is invalid.
> -
> -**/
> -BOOLEAN
> -Tcg2HaveValidTpmRequest  (
> -  IN      EFI_TREE_PHYSICAL_PRESENCE       *TcgPpData,
> -  IN      EFI_TREE_PHYSICAL_PRESENCE_FLAGS Flags,
> -  OUT     BOOLEAN                          *RequestConfirmed
> -  )
> -{
> -  return TRUE;
> -}
> -
> -
> -/**
> -  Check and execute the requested physical presence command.
> -
> -  Caution: This function may receive untrusted input.
> -  TcgPpData variable is external input, so this function will validate
> -  its data structure to be valid value.
> -
> -  @param[in] PlatformAuth         platform auth value. NULL means no
> platform auth change.
> -  @param[in] TcgPpData            Point to the physical presence NV
> variable.
> -  @param[in] Flags                The physical presence interface flags.
> -**/
> -VOID
> -Tcg2ExecutePendingTpmRequest (
> -  IN      TPM2B_AUTH                       *PlatformAuth,
> OPTIONAL
> -  IN      EFI_TREE_PHYSICAL_PRESENCE       *TcgPpData,
> -  IN      EFI_TREE_PHYSICAL_PRESENCE_FLAGS Flags
> -  )
> -{
> -  return;
> -}
> -
> -/**
> -  Check and execute the pending TPM request.
> -
> -  The TPM request may come from OS or BIOS. This API will display request
> information and wait
> -  for user confirmation if TPM request exists. The TPM request will be sent to
> TPM device after
> -  the TPM request is confirmed, and one or more reset may be required to
> make TPM request to
> -  take effect.
> -
> -  This API should be invoked after console in and console out are all ready as
> they are required
> -  to display request information and get user input to confirm the request.
> -
> -  @param[in]  PlatformAuth                   platform auth value. NULL
> means no platform auth change.
> -**/
> -VOID
> -EFIAPI
> -Tcg2PhysicalPresenceLibProcessRequest (
> -  IN      TPM2B_AUTH                     *PlatformAuth  OPTIONAL
> -  )
> -{
> -  return;
> -}
> -
> -/**
> -  Check if the pending TPM request needs user input to confirm.
> -
> -  The TPM request may come from OS. This API will check if TPM request exists
> and need user
> -  input to confirmation.
> -
> -  @retval    TRUE        TPM needs input to confirm user physical
> presence.
> -  @retval    FALSE       TPM doesn't need input to confirm user physical
> presence.
> -
> -**/
> -BOOLEAN
> -EFIAPI
> -Tcg2PhysicalPresenceLibNeedUserConfirm(
> -  VOID
> -  )
> -{
> -
> -  return FALSE;
> -}
> -
> diff --git
> a/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.inf
> b/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.inf
> deleted file mode 100644
> index b67fd13893..0000000000
> ---
> a/Vlv2TbltDevicePkg/Library/DxeTcg2PhysicalPresenceLibNull/DxeTcg2PhysicalP
> resenceLibNull.inf
> +++ /dev/null
> @@ -1,46 +0,0 @@
> -## @file
> -# Null instance of DxeTcg2PhysicalPresenceLib
> -#
> -#  Copyright (c) 2010 - 2015, Intel Corporation. All rights reserved.<BR>
> -#
> -# This program and the accompanying materials are licensed and made available
> under
> -# the terms and conditions of the BSD License that accompanies this
> distribution.
> -# The full text of the license may be found at
> -# http://opensource.org/licenses/bsd-license.php.
> -#
> -# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS"
> BASIS,
> -# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS
> OR IMPLIED.
> -#
> -#
> -#
> -
> -[Defines]
> -  INF_VERSION                    = 0x00010005
> -  BASE_NAME                      = DxeTcg2PhysicalPresenceLib
> -  FILE_GUID                      =
> B41B3DB3-ACC5-4fcd-9992-891F3F9C0DA5
> -  MODULE_TYPE                    = DXE_DRIVER
> -  VERSION_STRING                 = 1.0
> -  LIBRARY_CLASS                  = Tcg2PhysicalPresenceLib|DXE_DRIVER
> DXE_RUNTIME_DRIVER DXE_SAL_DRIVER UEFI_APPLICATION UEFI_DRIVER
> -
> -#
> -# The following information is for reference only and not required by the build
> tools.
> -#
> -#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
> -#
> -
> -[Sources]
> -  DxeTcg2PhysicalPresenceLibNull.c
> -
> -[Packages]
> -  MdePkg/MdePkg.dec
> -  MdeModulePkg/MdeModulePkg.dec
> -  SecurityPkg/SecurityPkg.dec
> -
> -[LibraryClasses]
> -
> -
> -[Protocols]
> -
> -
> -[Guids]
> -
> diff --git a/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc
> b/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc
> index 682e090a99..dc2c5b63e9 100644
> --- a/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc
> +++ b/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc
> @@ -292,9 +292,7 @@ [LibraryClasses.common]
>  !endif
> 
> TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMe
> asurementLib.inf
> 
> Tcg2PhysicalPresenceLib|SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeT
> cg2PhysicalPresenceLib.inf
> -!if $(FTPM_ENABLE) == TRUE
> 
> Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibN
> ull.inf
> -!endif
> 
> 
> 
> Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.i
> nf
> @@ -1201,7 +1199,7 @@ [Components.X64]
>      !if $(FTPM_ENABLE) == TRUE
> 
> Tpm2DeviceLib|Vlv2TbltDevicePkg/Library/Tpm2DeviceLibSeCDxe/Tpm2DeviceL
> ibSeC.inf
>      !else
> -
> Tcg2PhysicalPresenceLib|$(PLATFORM_PACKAGE)/Library/DxeTcg2PhysicalPrese
> nceLibNull/DxeTcg2PhysicalPresenceLibNull.inf
> +
> Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
>      !endif
>    }
> 
> diff --git a/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc
> b/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc
> index baba5e2055..35a51944f3 100644
> --- a/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc
> +++ b/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc
> @@ -292,9 +292,7 @@ [LibraryClasses.common]
>  !endif
> 
> TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMe
> asurementLib.inf
> 
> Tcg2PhysicalPresenceLib|SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeT
> cg2PhysicalPresenceLib.inf
> -!if $(FTPM_ENABLE) == TRUE
> 
> Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibN
> ull.inf
> -!endif
> 
> 
> 
> Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.i
> nf
> @@ -1189,7 +1187,7 @@ [Components.IA32]
>      !if $(FTPM_ENABLE) == TRUE
> 
> Tpm2DeviceLib|Vlv2TbltDevicePkg/Library/Tpm2DeviceLibSeCDxe/Tpm2DeviceL
> ibSeC.inf
>      !else
> -
> Tcg2PhysicalPresenceLib|$(PLATFORM_PACKAGE)/Library/DxeTcg2PhysicalPrese
> nceLibNull/DxeTcg2PhysicalPresenceLibNull.inf
> +
> Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
>      !endif
>    }
> 
> diff --git a/Vlv2TbltDevicePkg/PlatformPkgX64.dsc
> b/Vlv2TbltDevicePkg/PlatformPkgX64.dsc
> index 1f0be98944..5fab75c31e 100644
> --- a/Vlv2TbltDevicePkg/PlatformPkgX64.dsc
> +++ b/Vlv2TbltDevicePkg/PlatformPkgX64.dsc
> @@ -292,9 +292,7 @@ [LibraryClasses.common]
>  !endif
> 
> TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMe
> asurementLib.inf
> 
> Tcg2PhysicalPresenceLib|SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeT
> cg2PhysicalPresenceLib.inf
> -!if $(FTPM_ENABLE) == TRUE
> 
> Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibN
> ull.inf
> -!endif
> 
> 
> 
> Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.i
> nf
> @@ -1201,7 +1199,7 @@ [Components.X64]
>      !if $(FTPM_ENABLE) == TRUE
> 
> Tpm2DeviceLib|Vlv2TbltDevicePkg/Library/Tpm2DeviceLibSeCDxe/Tpm2DeviceL
> ibSeC.inf
>      !else
> -
> Tcg2PhysicalPresenceLib|$(PLATFORM_PACKAGE)/Library/DxeTcg2PhysicalPrese
> nceLibNull/DxeTcg2PhysicalPresenceLibNull.inf
> +
> Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
>      !endif
>    }
> 
> --
> 2.14.2.windows.3



  reply	other threads:[~2018-03-22  0:14 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-03-21 22:48 [Patch] Vlv2TbltDevicePkg: Remove DxeTcg2PhysicalPresenceLibNull Michael D Kinney
2018-03-22  0:20 ` Yao, Jiewen [this message]
2018-03-22  9:16 ` Wei, David

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=74D8A39837DF1E4DA445A8C0B3885C503AB0B3D4@shsmsx102.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox