From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web09.2824.1657084769181830831 for ; Tue, 05 Jul 2022 22:19:29 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=lFXngchX; spf=pass (domain: intel.com, ip: 134.134.136.31, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1657084769; x=1688620769; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=qY3feQoYA1B/cgPj39zT/IZ1LY5fMVJQNb++wUHZHjM=; b=lFXngchX7jYGkR2GHgtYkXeVd3L9QSKZWIXVoPjJ1dSsPy4khd6O6ey+ h43fw5AKCmmYXiCUIqgtwk/QMaWrCiIdc2yXWf84nmpNBbk823VXir+2Z anjn/9hVZ7IB5/ei00pIuh9zQ9xTTtLicG5k+n/4vqlWlUKanZ9MRIuUt WGCNl0S8UA/Y7lCWIMz1qiH779C9lGPivph5IUeIE5M+0WT+owQj3TzW1 7U4tcoVe68b+ysvm6b/JBT8Zo3i4nn1RivTz1DEdqtYMJeop3bnJy6gR3 IsaFfnx9HCnQ0wn/f3CluQUHlFmN7dJhyEeVCACx8sdpu5na/nCtVL1yV g==; X-IronPort-AV: E=McAfee;i="6400,9594,10399"; a="345330644" X-IronPort-AV: E=Sophos;i="5.92,248,1650956400"; d="scan'208";a="345330644" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2022 22:19:28 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.92,248,1650956400"; d="scan'208";a="567917851" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orsmga006.jf.intel.com with ESMTP; 05 Jul 2022 22:19:27 -0700 Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Tue, 5 Jul 2022 22:19:27 -0700 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27 via Frontend Transport; Tue, 5 Jul 2022 22:19:27 -0700 Received: from NAM02-BN1-obe.outbound.protection.outlook.com (104.47.51.41) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.27; Tue, 5 Jul 2022 22:19:25 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dxhtNXiMc6WascPpDP71tD46NDS2S6E8+TZFTCmr+rbvvHxrPV5PIWl5fgVkGuj97lWOn9Bajhusg0WN0smPkq5X3TEdMWqMoNvZBS1Sx1VsRl8gtdvCPILMpY9C/Yj6VYbX7cio5uVAy/7oyq73ZdA0NBTa1T5WA5CjXSvyY3BmMP78CvElvKvPPQVvbu/R2HEV5SXMK82Oe463rnQSeP7M88IVERnOipMtpkc2UlQXdAR0Au3YDkofW9jsFmESQFEK9IuV46c8K0xhF52DvsXJzRsmhBY0dEjRinQQUy2qlWOg5ASXjPNsYHXYSQYa2px4YauJsUhuEjZzLWicLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xNFcFtq3y0Nh5pPbGvWxa/qxqW9rL1a7W21ZCAUcyCs=; b=MD5YeKnP4sitM6Cs4aRBeP1pB9BEalpaqja6DQwAlBdMxmOMk6066Oyw8NiE76F1QgSW5HY4813doUg3OeNCS6ff7hyIx16K/B+Fa3KtCEKTUbAIkLvqNXMiwDgBggo4sa+w+mjaarKUWfF6k4+B5fdvUoWvzgNF1ywqR1OUG4RmCD0R+f6RBoSxw/YPXMP4+7RFcQ8tS5YB8isB/Ko2sGMkVaYhK8ZMi+XfODuuuCmvaIYbxzPXT6mEOcOHwWbtXENDZKe6iv6JAcNuLtD1zmxl1qSJGdkgE2NHvZKq4653GuPiEpZzz2SF8g+Eq8tVOT7U9pF+yRVYM0D3FHZQMA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by BN6PR11MB1521.namprd11.prod.outlook.com (2603:10b6:405:e::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Wed, 6 Jul 2022 05:19:23 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::21c8:d7ec:9943:9d06]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::21c8:d7ec:9943:9d06%5]) with mapi id 15.20.5395.020; Wed, 6 Jul 2022 05:19:22 +0000 From: "Yao, Jiewen" To: "devel@edk2.groups.io" , "kuqin12@gmail.com" CC: "Wang, Jian J" , "Xu, Min M" , Sean Brogan , Ard Biesheuvel , "Justen, Jordan L" , Gerd Hoffmann , Rebecca Cran , "Peter Grehan" , "Boeuf, Sebastien" , Andrew Fish , "Ni, Ray" Subject: Re: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries Thread-Topic: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries Thread-Index: AQHYjNyzIFQ35Tef+0qjlhJe43wcfa1w1WJw Date: Wed, 6 Jul 2022 05:19:22 +0000 Message-ID: References: <20220630235341.1746-1-kuqin12@gmail.com> In-Reply-To: <20220630235341.1746-1-kuqin12@gmail.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.6.500.17 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 5ab53365-c5cd-4a79-7c36-08da5f0f1645 x-ms-traffictypediagnostic: BN6PR11MB1521:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230016)(396003)(346002)(376002)(39860400002)(366004)(136003)(26005)(7696005)(6506007)(9686003)(186003)(38070700005)(83380400001)(107886003)(478600001)(53546011)(122000001)(38100700002)(2906002)(82960400001)(33656002)(55016003)(966005)(4326008)(8676002)(64756008)(66446008)(66476007)(66556008)(66946007)(76116006)(54906003)(86362001)(41300700001)(8936002)(52536014)(5660300002)(19627235002)(71200400001)(316002)(110136005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?LVUfAM7yTBdRt9cUSbBS3ZNeJOGK2/QGcf9PM/mmgND+0kwQO5pJbifmmGrF?= =?us-ascii?Q?JCnQLPEz4gjh+GlBs5IaICMKBlMsAO8eb/7+NWrN4WIMmcqQ7pP/zxTzcQOg?= =?us-ascii?Q?x/K0oTNf1oAiOFwvMfIIu7B94W+85N4LBxJx5cgiVTG2LMqEkigutVVA3v6H?= =?us-ascii?Q?K0VgnzuyAVl5aYRqHaxZZzbMjhxl1SAoj8Fd+yhBZo1CZX4C+HjjZ0HacgIe?= =?us-ascii?Q?/tCQ8KjwooeKCflQ7I8RhAd5oJ/wAcV5gfrZdO4u88LDQwX8MBP/yy0FfV/t?= =?us-ascii?Q?yJtzY4USS0xXnZ4eR+ODuycOzhpxryb9XZyh1GgIL9CjDHZQpBWrdE/MrY+U?= =?us-ascii?Q?tQQ2nh/SdvOgZMbiXhZuwnzBYqQ2eUosyjp6sOagTNPR2nu3XNaU8DaZWriN?= =?us-ascii?Q?QsqB+llKABSP7k3Nyq9WirKKQNDDFHs5PJXMHR7A8wrgwYYowOhwkanGAzj4?= =?us-ascii?Q?7VvrPveTaj2GD8j0xhaVp4n/n6WiC+dpViXUocZzqT+qHXtSUXmQttXlevMI?= =?us-ascii?Q?WdusB/XFw2iiZFDmUR8hL2b9vL7oqR7YWZqWggG+7kKiIXz2w7h4qvJYBMgg?= =?us-ascii?Q?UNRN6pNhiatSTX9EGd6VvhWoD2/xRebAznqLpeR9Fy3n4G6mT4YFgOFChZbK?= =?us-ascii?Q?ZqAyH/58dbNGdSaqK01nlt6dc5D4229gw1uPNRH9nl3SmwF/lC8RTpp/gY1f?= =?us-ascii?Q?Fc6I+4lCvOTbPYbWSE6x3Vhm1Le1VwQlbnx3I+WZ5O8Bxug6VqecXQhpGMEj?= =?us-ascii?Q?RrGADfCuTur1cDdc1ITHkco15JCqCO7hxDR/wyf1+Ih8u+jbGAS43q8NMivv?= =?us-ascii?Q?TsLAG1bIHr4z8wa4093+Xydv8/qkL0Gch8m++5y45jNmpr1taCUhKMEM/8SJ?= =?us-ascii?Q?oGAHNfyYdHxkYfngpWYtXdax4MqWxgnbbfsYOSLlaK2pBO+QWLzKjfJXa21X?= =?us-ascii?Q?TaWRSdnZltWGlrkyzkbOPjUVuQtz1flB1xl6PuZpCzz3KbX0SNgd1LbifR//?= =?us-ascii?Q?tlSmASGZYwfC9Yp0Ocwzz7wNEImrscz/kCFGJPDQtt+cUkkRt9jQgR/zkdFt?= =?us-ascii?Q?2lBuPLXMy2pyHSGKIXJmIVg+NkHTrWSbXPv3Ema1sU3F22WcSxU0rpNNBxFf?= =?us-ascii?Q?n3EfBsLYPLdelE2TeaeupeFKtE/u1J3HomX2FOegweWhKqjjB9GQ3ClWxh1U?= =?us-ascii?Q?oczqPTcdgz5P4UjpN4RsNm9px7F3vcnQXd1Kcx/RKHHlWmn4f2wie7EDlz9c?= =?us-ascii?Q?xBveI8q3hxHfmUBvO78wVUCL41mtWt5ytEvG5dcAzl9tpFqr66izPe7pIUVE?= =?us-ascii?Q?VISLtjQrSwZubO54Ac/+8AWUU8eFcjuFzf5g7nfUXZRr6iMedPgfDpE2csKd?= =?us-ascii?Q?AAiMRC3oAv49EnEoFMIX8XrNhYArEdovtCDoEZJtecTFZJc4XWf8zTTP2gDC?= =?us-ascii?Q?3dY6EBK7JZtGDOhMNutk3JgJ4vKnJewpzzNTqMYP85NDBjpl6UIAfwS8Ti3N?= =?us-ascii?Q?bnVW6sRPUyC7pz86PSjIBOr8/ipKD4zbPiaNbJCmfzA29e064exIcDGk8iml?= =?us-ascii?Q?1QU5/cbPkGmqs2kYim3N2BZAs0IwJTsfaBsGPooZ?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5ab53365-c5cd-4a79-7c36-08da5f0f1645 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jul 2022 05:19:22.8522 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: qa6bDXTKfAEpMm+aA4Vc2kLphb9zdFBSRIX6YjdkIUgXtqxUs/2MFguZ3zOv7JD4FAIQ4LCYibgPrTcDcnpOcw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1521 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi I am going to merge this. However, I realize that my mailbox filtered patch= 6/11 and 10/11. So I am going to merge the one in https://github.com/kuqin12/edk2/tree/secu= re_boot_enhance_v3=20 Please double confirm: 1) the latest one 256220d82191effae32d91897ab0f65a4fa0641b is identical to = the one you submitted to EDKII mailing list. 2) the latest one passed the EDKII CI. Once you confirm above, I will start merging process. Thank you Yao Jiewen > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Kun Qin > Sent: Friday, July 1, 2022 7:54 AM > To: devel@edk2.groups.io > Cc: Yao, Jiewen ; Wang, Jian J ; > Xu, Min M ; Sean Brogan ; > Ard Biesheuvel ; Justen, Jordan L > ; Gerd Hoffmann ; Rebecca > Cran ; Peter Grehan ; Boeuf, > Sebastien ; Andrew Fish ; Ni, > Ray > Subject: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libra= ries >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3909 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3910 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3911 >=20 > This is a follow-up of a previously submitted patch series based on top > of master branch: https://edk2.groups.io/g/devel/message/90491. >=20 > The main changes between v2 and v3 patches are: > - Added reviewed-by and acked-by tags collected from previous iteration > - Updated default timestamp for default secure boot variable enrollment >=20 > The updated changes are verified on QEMU based Q35 virtual platform as > well as proprietary physical platforms. >=20 > Patch v3 branch: > https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3 >=20 > Cc: Jiewen Yao > Cc: Jian J Wang > Cc: Min Xu > Cc: Sean Brogan > Cc: Ard Biesheuvel > Cc: Jordan Justen > Cc: Gerd Hoffmann > Cc: Rebecca Cran > Cc: Peter Grehan > Cc: Sebastien Boeuf > Cc: Andrew Fish > Cc: Ray Ni >=20 > Kun Qin (8): > SecurityPkg: UefiSecureBoot: Definitions of cert and payload > structures > SecurityPkg: PlatformPKProtectionLib: Added PK protection interface > SecurityPkg: SecureBootVariableLib: Updated time based payload creator > SecurityPkg: SecureBootVariableProvisionLib: Updated implementation > SecurityPkg: Secure Boot Drivers: Added common header files > SecurityPkg: SecureBootConfigDxe: Updated invocation pattern > OvmfPkg: Pipeline: Resolve SecureBootVariableLib dependency > EmulatorPkg: Pipeline: Resolve SecureBootVariableLib dependency >=20 > kuqin (3): > SecurityPkg: SecureBootVariableLib: Updated signature list creator > SecurityPkg: SecureBootVariableLib: Added newly supported interfaces > SecurityPkg: SecureBootVariableLib: Added unit tests >=20 > SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c > | 1 + >=20 > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtection= Lib > VarPolicy.c | 51 + > SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.c > | 485 ++++- >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtecti= o > nLib.c | 36 + > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c > | 201 ++ >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeService= s > TableLib.c | 13 + >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibU= nit > Test.c | 2037 ++++++++++++++++++++ >=20 > SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariableProv= isi > onLib.c | 145 +- >=20 > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigIm > pl.c | 128 +- >=20 > SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootDefa > ultKeysDxe.c | 1 + > EmulatorPkg/EmulatorPkg.dsc = | 1 + > OvmfPkg/Bhyve/BhyveX64.dsc = | 1 + > OvmfPkg/CloudHv/CloudHvX64.dsc = | 1 + > OvmfPkg/IntelTdx/IntelTdxX64.dsc = | 1 + > OvmfPkg/OvmfPkgIa32.dsc = | 1 + > OvmfPkg/OvmfPkgIa32X64.dsc = | 1 + > OvmfPkg/OvmfPkgX64.dsc = | 1 + > SecurityPkg/Include/Library/PlatformPKProtectionLib.h = | > 31 + > SecurityPkg/Include/Library/SecureBootVariableLib.h = | > 103 +- > SecurityPkg/Include/UefiSecureBoot.h = | 94 + >=20 > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtection= Lib > VarPolicy.inf | 36 + > SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.inf > | 14 +- >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtecti= o > nLib.inf | 33 + > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf > | 45 + >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeService= s > TableLib.inf | 25 + >=20 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibU= nit > Test.inf | 36 + > SecurityPkg/SecurityPkg.ci.yaml = | 11 + > SecurityPkg/SecurityPkg.dec = | 5 + > SecurityPkg/SecurityPkg.dsc = | 2 + > SecurityPkg/Test/SecurityPkgHostTest.dsc = | 38 + >=20 > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx > e.inf | 1 + > 31 files changed, 3467 insertions(+), 112 deletions(-) > create mode 100644 > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtection= Lib > VarPolicy.c > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtecti= o > nLib.c > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeService= s > TableLib.c > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibU= nit > Test.c > create mode 100644 SecurityPkg/Include/Library/PlatformPKProtectionLib.h > create mode 100644 SecurityPkg/Include/UefiSecureBoot.h > create mode 100644 > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtection= Lib > VarPolicy.inf > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtecti= o > nLib.inf > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeService= s > TableLib.inf > create mode 100644 > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibU= nit > Test.inf > create mode 100644 SecurityPkg/Test/SecurityPkgHostTest.dsc >=20 > -- > 2.36.0.windows.1 >=20 >=20 >=20 >=20 >=20