From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.64]) by mx.groups.io with SMTP id smtpd.web10.5634.1622795759969767346 for ; Fri, 04 Jun 2021 01:36:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=fNkWSJSN; spf=pass (domain: arm.com, ip: 40.107.21.64, mailfrom: sunny.wang@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pilrZKlql4aAKQR18PMQfnS8CvDCCZirn1Sv/ugJVIA=; b=fNkWSJSNUvzx7ryTRcPXGnhsk1xXnG8e07kOY2QwQ/FsSv9Fwn/0ej0nNekrKfIV+sRZGdhdrJBZ9P/lTm7dp5/Ee9ZaTt0wwcVrht0NluITm/avxueTStJKVXWJj6PNZETl6DKx8DTn3fTGzEEH9GGj/uzgJEKgvenaYL6b6+c= Received: from DU2PR04CA0283.eurprd04.prod.outlook.com (2603:10a6:10:28c::18) by DB8PR08MB5116.eurprd08.prod.outlook.com (2603:10a6:10:e5::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.24; Fri, 4 Jun 2021 08:35:56 +0000 Received: from DB5EUR03FT049.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:28c:cafe::86) by DU2PR04CA0283.outlook.office365.com (2603:10a6:10:28c::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.20 via Frontend Transport; Fri, 4 Jun 2021 08:35:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT049.mail.protection.outlook.com (10.152.20.191) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.21 via Frontend Transport; Fri, 4 Jun 2021 08:35:56 +0000 Received: ("Tessian outbound f02dc08cb398:v93"); Fri, 04 Jun 2021 08:35:56 +0000 X-CR-MTA-TID: 64aa7808 Received: from 4aafaa99e833.3 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 3849394A-9FC9-48C5-BFC0-CE00A9A271EC.1; Fri, 04 Jun 2021 08:35:51 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4aafaa99e833.3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 04 Jun 2021 08:35:51 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YUO7cfySTC/qMZNPBB/nodnmZ6LsbXznP5BylOG8C7kcMA/8ui087SGxE1ea7MAGubGzlw9NQkoWEmFZpW2Wx+pAj356KaydsmgF484ddxdqXlcEnWue5eY6pExBN60Mzj+jq9bok8KB4le58jQOsIQ8vjL7wJ6USDhHgxhF1M+8pgc7LNs3hmJwIW8mgWhNwu6o3uIUltLRbXrTVpdEmGCNpe95VHpYok7Olo9GYsf2DTd8rXgUtAWvi8l86VV75LWBsJUvxFlmTFmwvdZwRpbkzUHxD/C82zSWeskuCqakoblJxGSohXKFW3wDiVWSAeXWgP9BkCwn9seQZ7yiyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pilrZKlql4aAKQR18PMQfnS8CvDCCZirn1Sv/ugJVIA=; b=TcbVRlsiJfGNucS9Eh+/vcXE2BUjQZtjLxjKELukfBfQpk1KIlSbTkXvEbok2+7ijgseu/537+Qi0Y886KE2Swa84A0gHDobQftxt7LmBFwWTHGF1OKC6s41C/fk7uGLyLgdy1kAHbFghmrxgjxytmygVETliuY+UjAT67oMt4LOUP8UxBmbpcL9eBAEz2Obw5Ntgdlxv0R6onvWBigY0Nkx7YMXTs7tWYUzzzm3+AYRw3Km8E6/V75+d2Bi9Ks3L1hk/6HSKYVuBlD85kLgOxc/wrN3wss50+o/NGo7634XsLFNuKXAoBqsRHwKRTGrbrjPw5lgst0FxktC7muk2A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pilrZKlql4aAKQR18PMQfnS8CvDCCZirn1Sv/ugJVIA=; b=fNkWSJSNUvzx7ryTRcPXGnhsk1xXnG8e07kOY2QwQ/FsSv9Fwn/0ej0nNekrKfIV+sRZGdhdrJBZ9P/lTm7dp5/Ee9ZaTt0wwcVrht0NluITm/avxueTStJKVXWJj6PNZETl6DKx8DTn3fTGzEEH9GGj/uzgJEKgvenaYL6b6+c= Received: from DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) by DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.24; Fri, 4 Jun 2021 08:35:42 +0000 Received: from DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::9154:9191:b8a3:388c]) by DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::9154:9191:b8a3:388c%7]) with mapi id 15.20.4195.024; Fri, 4 Jun 2021 08:35:42 +0000 From: "Sunny Wang" To: Grzegorz Bernacki , "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Samer El-Haj-Mahmoud , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Sunny Wang Subject: Re: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default Secure Boot variables initialization Thread-Topic: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default Secure Boot variables initialization Thread-Index: AQHXVufdaUZg1sSHyE65GQ/3hfuwVasDir5w Date: Fri, 4 Jun 2021 08:35:42 +0000 Message-ID: References: <20210601131229.630611-1-gjb@semihalf.com> <20210601131229.630611-2-gjb@semihalf.com> In-Reply-To: <20210601131229.630611-2-gjb@semihalf.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ts-tracking-id: 9A2C81235E72C841BA3ACB87AF56AF1C.0 x-checkrecipientchecked: true Authentication-Results-Original: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; x-originating-ip: [36.226.217.156] x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: eaeba143-e43b-4051-8b2d-08d92733c5d7 x-ms-traffictypediagnostic: DB8PR08MB3993:|DB8PR08MB5116: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:506;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB8PR08MB3993.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(366004)(6506007)(8676002)(7696005)(71200400001)(2906002)(7416002)(5660300002)(186003)(122000001)(4326008)(33656002)(110136005)(66446008)(19627235002)(86362001)(66476007)(66556008)(9686003)(8936002)(55016002)(66946007)(54906003)(498600001)(64756008)(52536014)(38100700002)(26005)(83380400001)(76116006);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?CL1K4eIq4wXUaTtEE58n2WKyXbmy+E8sA2IVn1neeVzmQDpyvG/lSkk5FGpp?= =?us-ascii?Q?NKmJkm5FA0xTwHcub0gIjMA6hRqEi5rxd/HxfNL4lkg4k+n7e5dRH/0NqtsV?= =?us-ascii?Q?y+nlC2a7Pup0hPgJB/j+RyYvPZLBNyRWiK2sfovm5Xl+1Y7Cy6YxIQIu1h+I?= =?us-ascii?Q?coX67xFJWxt49cL7pHhYYsnkDi8kgvBIJEP47+anC9JOGw2nVPM7+6lwGxeJ?= =?us-ascii?Q?S7UNONTuDEJH9aMr78pYk8Wn33swDjcRnfQzze6lLI0H38Q99nlOa5yf47an?= =?us-ascii?Q?I93IUuje3M2uaCESMOwRUC1nG4lPQOEdM13PvqGkHZx3wx2+SQObr7d5dMTD?= =?us-ascii?Q?mXbS8mMdYJwoJKhoHLPDTNR9+Ome7kT8HLAdUwzMjUqp9m1oDCeRk2/poGB+?= =?us-ascii?Q?k49WVQP6ic5o1c/7+GLwlBeFWmtj7SBdu7YOiCBSUvjsuOhY+YvxLcS21L6m?= =?us-ascii?Q?Vnzp/BZLjmTWFenzfrWtpYKrxSYq1m8hnERkqHzAAjkS1I6xPRtj6HhFDJlk?= =?us-ascii?Q?jyJemJMfOhE4gYOgDKsy+0WitebZ/uoDrShVX2N5WBzTMG23g3jVMk1kRNEk?= =?us-ascii?Q?8xfpeDS+hcUTjlVzQdD9MCkfZ9oEeUME/FLHHGJpLuRHcqWt7NHn9Jg1GaYK?= =?us-ascii?Q?Fj3oA9dDWU9gerWNJkx4R8SkwxtyGTYMjpwts+X05i0WXBUYdllSWAjZxJnZ?= =?us-ascii?Q?zGeRx2U+A4R6h0yWlCgHI5H/0cBmGu6aao4pPRNqHkUmym2yti+jrnMkcXHQ?= =?us-ascii?Q?2xZKkEgeI3gCehuQSgP18CMqmjKbW8Xon1VmCxoZMhpiN5YDFvEeMyfC1Xt5?= =?us-ascii?Q?zaQqmCEmj2BZWfciT/Wol+h3XvosQ42NEgoTS01sHK889FupSjxgLUQ6r4+N?= =?us-ascii?Q?CF2PLpBRPsCqHgK94BfiO3QfFtZVAfMng79HmEwPbGPb8iipjxPkLl+wnfQ+?= =?us-ascii?Q?lDi0JNyhVzbhpH82ryx1xTS+8AiN2Ru//mLDK778PSSM1nAKP9RrqVJFBvQE?= =?us-ascii?Q?Za5qW4JAHBvsVZ/H9/n0qmvtxq2BD8n0daj/niK4j9K0ZSl0OZTzZWSlhBcC?= =?us-ascii?Q?nectDSNRB5cDsK9ZHeN849rOJZf6/5tyW5gWhjYvJrMj9XHbd19VOWCyzz5e?= =?us-ascii?Q?yPzqsqju1dOJm8D3N6oEZOD7dycP9Cav/uSojJwAUXtd1CitRpLxjVt2teet?= =?us-ascii?Q?85+9/C3/EBOHglYFzGLd1qFsgILLGI2FCe1iSaWGJqAsGyjjvBB/NPZciwPr?= =?us-ascii?Q?48Uvp4H6RegCZ6bnmSHu2KQZyTDSjzPmYrscdFI2fDiPBdWnFmBoiu7QpkIF?= =?us-ascii?Q?M6Ox2Yjck9ARuFde08BQFbxl?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB3993 Original-Authentication-Results: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; Return-Path: Sunny.Wang@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT049.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 37cc5b14-4e8b-4781-2298-08d92733bd70 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(376002)(39860400002)(346002)(396003)(136003)(36840700001)(46966006)(4326008)(81166007)(83380400001)(82740400003)(82310400003)(33656002)(356005)(52536014)(478600001)(5660300002)(26005)(186003)(2906002)(336012)(70206006)(70586007)(9686003)(110136005)(54906003)(316002)(53546011)(7696005)(6506007)(8936002)(8676002)(19627235002)(55016002)(86362001)(47076005)(36860700001);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jun 2021 08:35:56.5548 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: eaeba143-e43b-4051-8b2d-08d92733c5d7 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT049.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5116 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Internally reviewed this patch before sending the edk2 mailing list and it = looks good to me. Reviewed-by: Sunny Wang Sent: Tuesday, June 1, 2021 9:12 PM To: devel@edk2.groups.io Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud ; Sunny Wang ; mw@semihalf.co= m; upstream@semihalf.com; jiewen.yao@intel.com; jian.j.wang@intel.com; min.= m.xu@intel.com; lersek@redhat.com; Grzegorz Bernacki Subject: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default Sec= ure Boot variables initialization This commit allows to initialize Secure Boot default key and databases from data embedded in firmware binary. Signed-off-by: Grzegorz Bernacki --- Platform/RaspberryPi/RPi4/RPi4.dsc | 5 ++++- Platform/RaspberryPi/RPi4/RPi4.fdf | 2 ++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/Platform/RaspberryPi/RPi4/RPi4.dsc b/Platform/RaspberryPi/RPi4= /RPi4.dsc index d8c6fdd4bd..1fb4df0b81 100644 --- a/Platform/RaspberryPi/RPi4/RPi4.dsc +++ b/Platform/RaspberryPi/RPi4/RPi4.dsc @@ -164,7 +164,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasure= mentLib.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf - + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf # re-use the UserPhysicalPresent() dummy implementation from the ovmf tr= ee PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f !else @@ -217,6 +217,7 @@ MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf ShellLib|ShellPkg/Library/UefiShellLib/UefiShellLib.inf + ShellCEntryLib|ShellPkg/Library/UefiShellCEntryLib/UefiShellCEntryLib.in= f FileHandleLib|MdePkg/Library/UefiFileHandleLib/UefiFileHandleLib.inf [LibraryClasses.common.UEFI_DRIVER] @@ -612,6 +613,8 @@ NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificatio= nLib.inf } SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf + SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.inf + SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootDef= aultKeysDxe.inf !else MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf !endif diff --git a/Platform/RaspberryPi/RPi4/RPi4.fdf b/Platform/RaspberryPi/RPi4= /RPi4.fdf index 1e13909a57..0e43d24c7a 100644 --- a/Platform/RaspberryPi/RPi4/RPi4.fdf +++ b/Platform/RaspberryPi/RPi4/RPi4.fdf @@ -189,7 +189,9 @@ READ_LOCK_STATUS =3D TRUE INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.i= nf INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE +!include SecurityPkg/SecureBootDefaultKeys.fdf.inc INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConf= igDxe.inf + INF SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBoo= tDefaultKeysDxe.inf !endif INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRu= ntimeDxe.inf INF EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf -- 2.25.1 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.