From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web10.8773.1683076880469676227 for ; Tue, 02 May 2023 18:21:20 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=oDXCghDq; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683076880; x=1714612880; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=PRgMCJmg3woYDQAVgJ2RpgIiGABl29GW/z3QG91Kv7s=; b=oDXCghDqels+P9xLkOmjpjI5nO14YxtdkMlJbczJg4mzlJsFN9jzD3RM o5cs5IYDFtDK6JRi72tKNKkQMertDIU5DvqylGDlqxtdrlazKAEIf72VG FSGGuAu0ddwrduDGtuW5mHlaFPG1fePG4JRAZn8DcGaWXFFnFpfwZ5n5T uXutRAZ0HKzpPULFQPiDE8Xni4sIdL8WvF0kgSbzIlgH6TAZbmFcRmqF2 sVXPgUIwuQDn9t+avR3bY186P/Uni10yr3OnIJH9fMtnQW5MZrZcgAnPn aRS4/jLAncyo8Ry0zvZ4UgrcFsf2eHb5fPxpIuYW5GYsA0VYN0D+gcMND w==; X-IronPort-AV: E=McAfee;i="6600,9927,10698"; a="346023375" X-IronPort-AV: E=Sophos;i="5.99,245,1677571200"; d="scan'208";a="346023375" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 May 2023 18:21:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10698"; a="1026304683" X-IronPort-AV: E=Sophos;i="5.99,245,1677571200"; d="scan'208";a="1026304683" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmsmga005.fm.intel.com with ESMTP; 02 May 2023 18:21:12 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 2 May 2023 18:21:11 -0700 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Tue, 2 May 2023 18:21:11 -0700 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.168) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Tue, 2 May 2023 18:21:11 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UtxWCK54TmxwjNakXQ3EmY7j43BgHqiY+0kBAYDoBq1BXQrxshvg12IYwxbbDwNfmTKX3UO4Xxt3gAf4255nqearykF5lbjrmw+xOdPRoW0abNbYq8P8z8i8jqIzp7bwk0+mBaSNxTyFu8tHPTey2CnIvZwoUytlpklvI19i8oz4J6ilO5UJ7qZlSzkUsyUMDqKkvF25j4B7W+Vf3DfxK1pgmjY8U6z4QbhWp/SoVl4Owzg2FOuyAuTRQqmOwJOFZrLjY3ZFQlr6rzNTX3r4wQ3BbgY8wZmYPQy+8axrgoBEGYqHdpjlt4gq/o73/LqFbkEe94/YzM8LkkUKkPwZxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wCqkOyJY9Bug6xREwFfZF3CtAAsHkb/hWUIrupSeNKg=; b=W9CXG1qs11iPFPJYLWr6oqDll0FHtKRAPN2pIIBxataIMhPuWi6GOjd6+Pzc6qvH6Tu1PlbrFfWigfnkg8DrRdsoWw89V3O3HGzFa4gElB6zMhbodkG70gJfhq7pGJNjJaz7k08vRNe5s4OQ26TbL+CZGWz43asXqjZBORuzyIF/5NDDN0G14Mxymgkf+QG3HV1KJ9Yw+yPwOfcaLTVHbrDyG9fkk4CNykg2ycxsScjPbtzdLA6O2X2CLE7A2hQgeZWcaFWhXoxvVVVJ+seZr5GaMz+q/RHuFdURGAon8WjhlWfBHwSohPUBwAjLTW/nZKwDvYYqZbbffXRil4DIpw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by PH7PR11MB6770.namprd11.prod.outlook.com (2603:10b6:510:1b4::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6340.31; Wed, 3 May 2023 01:21:04 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::48e9:aeb0:c365:388]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::48e9:aeb0:c365:388%6]) with mapi id 15.20.6340.031; Wed, 3 May 2023 01:21:03 +0000 From: "Yao, Jiewen" To: "Liu, Linus" , "devel@edk2.groups.io" CC: FST-FIR-PRC , FST FIR Server , "Chu, Maggie" Subject: Re: [PATCH] Securitypkg/hddpassword: Update HddPasswordDxeInit to use Variable Policy Thread-Topic: [PATCH] Securitypkg/hddpassword: Update HddPasswordDxeInit to use Variable Policy Thread-Index: AQHZbFwCEyp1DQojiUOhgZhU7VP89a9HSFQQgACNz0CAAAvGMA== Date: Wed, 3 May 2023 01:21:03 +0000 Message-ID: References: <20230411095524.1668-1-linus.liu@intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|PH7PR11MB6770:EE_ x-ms-office365-filtering-correlation-id: 40d63211-8c15-4372-9086-08db4b74a9ae x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(39860400002)(376002)(136003)(346002)(396003)(366004)(451199021)(52536014)(41300700001)(5660300002)(15650500001)(83380400001)(122000001)(2906002)(8676002)(8936002)(316002)(966005)(38100700002)(64756008)(66556008)(66446008)(66476007)(4326008)(76116006)(33656002)(54906003)(86362001)(82960400001)(7696005)(71200400001)(478600001)(6506007)(38070700005)(186003)(110136005)(9686003)(66946007)(55016003)(107886003)(53546011);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?mWUWYTz7QRA8LtBUYx16C0h3bmFXaelyobcX4zSNk7DEgRrx8B+k9D8W4usd?= =?us-ascii?Q?IjlGoCmUkOG7nDf9sQ+7/UyPj78wOPjE/NnPZc3tTyhrY+YdaLFBLkCksSmv?= =?us-ascii?Q?YKIf5kPeWDP/p33VP7hhPSezk8dZlrX9G5mt/fpbml9Kz9mkCb/gV776JtUc?= =?us-ascii?Q?1/Nbg8rIclXVBGn5S8f7VbYReFCN9J4M8fOGKmjcZsvLhWwNMyLxXuW/1QLB?= =?us-ascii?Q?juFWroan01XAX0xT1j7pdJmcaESzG72IxT6dTDu/DSUubf8H71txtoj5apAZ?= =?us-ascii?Q?AjtvSSuP52PgBexDPcmUPy1v6lvCXPikxF/2lHvKn4aYVJQzisNp16oSSmBm?= =?us-ascii?Q?jj3Vw/9RJ6q2Qk+cablRgYWLapWmtiiSe4etAqUQjAVxBlhiR3HEyERDH2Ba?= =?us-ascii?Q?PsP2abEsxfpemSLAfOriy+ImOYmefWmoBx63L3zWU12sw3NZETmJxuWcJoJX?= =?us-ascii?Q?gyVDkRWpkvHuAveAKJkwoXkDJkftWGaIopzM3vLx3rOPf+cIJZk7EC/k6qok?= =?us-ascii?Q?+7UE5Mo+g8FCgGH5QqbigP1hf0CD9GrxxqJf3lvtUUCj+lOwDxFIlmFgSv3C?= =?us-ascii?Q?rFxNJaHYKOya9Atr8cXtMDKKIy9HkkvZNZ8qHgcpQTRf5BLWmVwEb2QtD8xV?= =?us-ascii?Q?M7wecm3fNALGPzMEZlGZe8ROAtSBBDvBY9mIgs13wzslyhV6SH/8nuEJz3Bf?= =?us-ascii?Q?DDvrU9HmbMCKBH8AbwVNhGLfnrvSokjVRaRej3IfcpPr0rSgIqZhJl2YeOAy?= =?us-ascii?Q?opo5cXV/W5IJ/Vx250+b1KI605aVtqyQA27e2qbSjOQx+5qhzggvmlCzYf8r?= =?us-ascii?Q?LmdsgzyWCYTRc7oQ4KQgG0Qt2HjSW5+qNUyT+BGpTgNVBeKfTDXk5M+f+TwL?= =?us-ascii?Q?1rBee7a8/3qRuWlZ+jJTZcyq4czZaXlMT1/ldN+/zSp/tTDTI1UVT2KOHmg4?= =?us-ascii?Q?gMpbO8rnHyvXAqLk3eBCOVUwq2r+iE9jgyBEs80ufRu7WeYhs5+qig3tiAOX?= =?us-ascii?Q?66TM7al2DoNUppYxdI7AygIWwy7Kjblz80b3DrUG/fvXEo5/OnMeA8jVLkfm?= =?us-ascii?Q?VbW2sBq3Aw2ZCWNugakHBcZqZG0Tl2IqWLSUe0rRAqKiMysJrVx8SczrXa1H?= =?us-ascii?Q?tNpbA7c0ED3XkEhcZXGBBmaUBrT2n+SXBzfEzKByNvp4pdW71piruEnBKSDb?= =?us-ascii?Q?pg5MowzVrnWW6BTdDFOYgjAODad6s29czrbn/IaKLZifpYNd07OuGHeox0vf?= =?us-ascii?Q?iTuJKInan6M3zOBv/Ep53vl2rzUBRb40cvDEvYd5pHaCCvr934yIlrHiQY8K?= =?us-ascii?Q?HcbyX0oMcxCUZhkXLvROog/BmVsoKrYxCOPIX3bhp4PYWwMiHJ9zd8pGEJ1K?= =?us-ascii?Q?OfctuBqpiZx4XkC4S+j14l/wLTldUhY38ckb34yMYQV6IBv75SHHefBZfA2b?= =?us-ascii?Q?/iXwjr763ut9Qh25QSKgS+rRTKDm67wSLFl2BuxIVjK5Tg0OmoywqT3WIJq4?= =?us-ascii?Q?qkbRQzbdnLE2kM8VlXOOFYTn+rq9Ni+B6i7jLBI4Em/bVb2KVe16ed4J7Z7q?= =?us-ascii?Q?gWLqLufjH1iFERXgfBQ=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 40d63211-8c15-4372-9086-08db4b74a9ae X-MS-Exchange-CrossTenant-originalarrivaltime: 03 May 2023 01:21:03.8033 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: s57SqH9kz/H4YrHgljsrxUQ1Pmikp3Yo8Yu9QtDMoCW8j3hkEdiQyKqMpcJbPnWX1Pz92hjUd4+sSrIpI94jgw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6770 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable That only proves that you did change the interface. But that cannot prove y= ou change it right. Have you done any function test? For example: 1) The HDD password feature still works? 2) The variable is really locked? > -----Original Message----- > From: Liu, Linus > Sent: Wednesday, May 3, 2023 8:40 AM > To: Yao, Jiewen ; devel@edk2.groups.io > Cc: FST-FIR-PRC ; FST FIR Server > ; Chu, Maggie > Subject: RE: [PATCH] Securitypkg/hddpassword: Update HddPasswordDxeInit > to use Variable Policy >=20 > Hi Jiewen > I add this patch into MTLS platform and collect the log. > The below is before adding patch and after adding patch. There is no warr= ing > message. >=20 >=20 > Before >=20 > InstallProtocolInterface: 09576E91-6D3F-11D2-8E39-00A0C969723B > 67E4C490 > InstallProtocolInterface: 330D4706-F2A0-4E4F-A369-B66FA8D54385 > 68180030 > !!! DEPRECATED INTERFACE !!! VariableLockRequestToLock() will go away > soon! > !!! DEPRECATED INTERFACE !!! Please move to use Variable Policy! > !!! DEPRECATED INTERFACE !!! Variable: 737CDED7-448B-4801-B57D- > B19483EC606F HddPassword > HddPasswordDxeInit(): Lock HddPassword variable (Success) >=20 >=20 > After >=20 > InstallProtocolInterface: 09576E91-6D3F-11D2-8E39-00A0C969723B > 67EA1370 > InstallProtocolInterface: 330D4706-F2A0-4E4F-A369-B66FA8D54385 > 68153DB0 > HddPasswordDxeInit(): Lock HddPassword variable (Success) >=20 >=20 > Thanks >=20 >=20 >=20 > -----Original Message----- > From: Yao, Jiewen > Sent: Wednesday, May 3, 2023 12:11 AM > To: Liu, Linus ; devel@edk2.groups.io > Cc: FST-FIR-PRC ; FST FIR Server > ; Chu, Maggie > Subject: RE: [PATCH] Securitypkg/hddpassword: Update HddPasswordDxeInit > to use Variable Policy >=20 > Thanks. The patch loos good to me. >=20 > Would you please share with us, how you validate the patch? >=20 >=20 >=20 > > -----Original Message----- > > From: Liu, Linus > > Sent: Tuesday, April 11, 2023 5:55 PM > > To: devel@edk2.groups.io > > Cc: Yao, Jiewen ; FST-FIR-PRC > prc@intel.com>; FST FIR Server ; Chu, Maggie > > > > Subject: [PATCH] Securitypkg/hddpassword: Update HddPasswordDxeInit > to > > use Variable Policy > > > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4408 > > > > Change-Id: I3c4b466ef318766d6d70c9f73e36b94b5f10832c > > Cc: Jiewen Yao > > Cc: FST-FIR-PRC > > Cc: FST FIR Server C > > Cc: Maggie Chu > > Signed-off-by: Linus Liu > > --- > > SecurityPkg/HddPassword/HddPasswordDxe.c | 16 +++++++++++----- > > SecurityPkg/HddPassword/HddPasswordDxe.h | 1 - > > SecurityPkg/HddPassword/HddPasswordDxe.inf | 3 ++- > > SecurityPkg/SecurityPkg.dsc | 1 + > > 4 files changed, 14 insertions(+), 7 deletions(-) > > > > diff --git a/SecurityPkg/HddPassword/HddPasswordDxe.c > > b/SecurityPkg/HddPassword/HddPasswordDxe.c > > index a1a63b67a4..c20fdbe83f 100644 > > --- a/SecurityPkg/HddPassword/HddPasswordDxe.c > > +++ b/SecurityPkg/HddPassword/HddPasswordDxe.c > > @@ -9,6 +9,7 @@ > > **/ > > > > > > > > #include "HddPasswordDxe.h" > > > > +#include > > > > > > > > EFI_GUID mHddPasswordVendorGuid =3D > > HDD_PASSWORD_CONFIG_GUID; > > > > CHAR16 mHddPasswordVendorStorageName[] =3D > > L"HDD_PASSWORD_CONFIG"; > > > > @@ -2822,7 +2823,7 @@ HddPasswordDxeInit ( > > HDD_PASSWORD_DXE_PRIVATE_DATA *Private; > > > > VOID *Registration; > > > > EFI_EVENT EndOfDxeEvent; > > > > - EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; > > > > + EDKII_VARIABLE_POLICY_PROTOCOL *VariablePolicy; > > > > > > > > Private =3D NULL; > > > > > > > > @@ -2858,12 +2859,17 @@ HddPasswordDxeInit ( > > // > > > > // Make HDD_PASSWORD_VARIABLE_NAME variable read-only. > > > > // > > > > - Status =3D gBS->LocateProtocol (&gEdkiiVariableLockProtocolGuid, > > NULL, (VOID **)&VariableLock); > > > > + Status =3D gBS->LocateProtocol (&gEdkiiVariablePolicyProtocolGuid, > > + NULL, > > (VOID **)&VariablePolicy); > > > > if (!EFI_ERROR (Status)) { > > > > - Status =3D VariableLock->RequestToLock ( > > > > - VariableLock, > > > > + Status =3D RegisterBasicVariablePolicy ( > > > > + VariablePolicy, > > > > + &mHddPasswordVendorGuid, > > > > HDD_PASSWORD_VARIABLE_NAME, > > > > - &mHddPasswordVendorGuid > > > > + VARIABLE_POLICY_NO_MIN_SIZE, > > > > + VARIABLE_POLICY_NO_MAX_SIZE, > > > > + VARIABLE_POLICY_NO_MUST_ATTR, > > > > + VARIABLE_POLICY_NO_CANT_ATTR, > > > > + VARIABLE_POLICY_TYPE_LOCK_NOW > > > > ); > > > > DEBUG ((DEBUG_INFO, "%a(): Lock %s variable (%r)\n", > > __FUNCTION__, HDD_PASSWORD_VARIABLE_NAME, Status)); > > > > ASSERT_EFI_ERROR (Status); > > > > diff --git a/SecurityPkg/HddPassword/HddPasswordDxe.h > > b/SecurityPkg/HddPassword/HddPasswordDxe.h > > index 231533e737..049a208794 100644 > > --- a/SecurityPkg/HddPassword/HddPasswordDxe.h > > +++ b/SecurityPkg/HddPassword/HddPasswordDxe.h > > @@ -17,7 +17,6 @@ > > #include > > > > #include > > > > #include > > > > -#include > > > > > > > > #include > > > > #include > > > > diff --git a/SecurityPkg/HddPassword/HddPasswordDxe.inf > > b/SecurityPkg/HddPassword/HddPasswordDxe.inf > > index 06e8755ffc..2c0ebbcc78 100644 > > --- a/SecurityPkg/HddPassword/HddPasswordDxe.inf > > +++ b/SecurityPkg/HddPassword/HddPasswordDxe.inf > > @@ -50,6 +50,7 @@ > > PrintLib > > > > UefiLib > > > > LockBoxLib > > > > + VariablePolicyHelperLib > > > > S3BootScriptLib > > > > PciLib > > > > BaseCryptLib > > > > @@ -63,7 +64,7 @@ > > gEfiHiiConfigAccessProtocolGuid ## PRODUCES > > > > gEfiAtaPassThruProtocolGuid ## CONSUMES > > > > gEfiPciIoProtocolGuid ## CONSUMES > > > > - gEdkiiVariableLockProtocolGuid ## CONSUMES > > > > + gEdkiiVariablePolicyProtocolGuid ## CONSUMES > > > > > > > > [Pcd] > > > > gEfiSecurityPkgTokenSpaceGuid.PcdSkipHddPasswordPrompt ## > CONSUMES > > > > diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc > > index 3bad5375c0..3c62205162 100644 > > --- a/SecurityPkg/SecurityPkg.dsc > > +++ b/SecurityPkg/SecurityPkg.dsc > > @@ -74,6 +74,7 @@ > > > > PlatformPKProtectionLib|SecurityPkg/Library/PlatformPKProtectionLibVar > > PlatformPKProtectionLib|Po > > licy/PlatformPKProtectionLibVarPolicy.inf > > > > > > SecureBootVariableProvisionLib|SecurityPkg/Library/SecureBootVariableP > > SecureBootVariableProvisionLib|ro > > visionLib/SecureBootVariableProvisionLib.inf > > > > TdxLib|MdePkg/Library/TdxLib/TdxLib.inf > > > > + > > VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/V > > VariablePolicyHelperLib|ar > > iablePolicyHelperLib.inf > > > > > > > > [LibraryClasses.ARM, LibraryClasses.AARCH64] > > > > # > > > > -- > > 2.33.1.windows.1