From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.58]) by mx.groups.io with SMTP id smtpd.web12.338.1625769482067330202 for ; Thu, 08 Jul 2021 11:38:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=Afg3wgpa; spf=pass (domain: arm.com, ip: 40.107.8.58, mailfrom: samer.el-haj-mahmoud@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ONP2HqWEvKoX3d7g8tqf15Vl2tZqEApuTwWuTTGi3ZI=; b=Afg3wgpa1A7tSCoFwPm/Uael6yE6l2sq9zK7LN/5L7u0nhvDWXBBHn4nUbPHLPn6AGZ7FQlhRuRqKB+MA6WTjHEhokRL1n7KBbMLGTSx7NYXOoEFTB0S4/co3IGybsLFU7iUdZ8hXjvVUTDrn+rDT74nYtIKPdyilh6w/uPgjzA= Received: from AM5PR0601CA0072.eurprd06.prod.outlook.com (2603:10a6:206::37) by VI1PR08MB3056.eurprd08.prod.outlook.com (2603:10a6:803:3d::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.21; Thu, 8 Jul 2021 18:37:54 +0000 Received: from VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:0:cafe::7) by AM5PR0601CA0072.outlook.office365.com (2603:10a6:206::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.19 via Frontend Transport; Thu, 8 Jul 2021 18:37:54 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT043.mail.protection.outlook.com (10.152.19.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.20 via Frontend Transport; Thu, 8 Jul 2021 18:37:53 +0000 Received: ("Tessian outbound 3852c8eefab6:v98"); Thu, 08 Jul 2021 18:37:53 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 1818e800ffee4034 X-CR-MTA-TID: 64aa7808 Received: from 027c343c972f.3 by 64aa7808-outbound-1.mta.getcheckrecipient.com id D5953627-5248-4CF3-A0C3-AA3D0DF9A0E3.1; Thu, 08 Jul 2021 18:37:47 +0000 Received: from EUR03-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 027c343c972f.3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 08 Jul 2021 18:37:47 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZQtcOEylyfpUJQ2xe/iHL4i0g3zvrLpnJTHWzomWU2AzJ1RVdEjTqxR28ejapB/jnrOj9RFr5vW9VsHFO47y5SrN4MPsyHbRmgHuTLGMt04CkgwIVa/HtAnG6vASZ9GGzD5SwE7shn0pCSsv9fNtShkG04Y4wKWdy5E9sqwOlxrmgISWQiDhb3q926EjD37SZu68rZP6SGuK7TcZhP1hsG6DZidZS1iN1Jqfr0nqjB18MTnnCzrfUmML8ChatiDpDkeTSWpOGvpvDEewWnJM22tX9G2j8f/bowUSRVydS0SmXP/b0uKIeP2EJoaoZlvmA48KSc4mZJde5PZ8rSm5GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ONP2HqWEvKoX3d7g8tqf15Vl2tZqEApuTwWuTTGi3ZI=; b=TxtZyjuHnjBnzO5j3l89MQ9KEClBV1e3chHsz78nbqOrZTs0s8SEpCSVHIOY1WH882VtkUP8PWCCwedmt96xV7cnSWDxLdBXsK3pSFytBKSbieqxK6yr6CoQxiBAEMutCTf2t4Fnjh1JMBBZzXMNcfd7c4FsuKkWmNbTYB9Ys6ZZi7X/rzImGaHmGmrZ5qSt8YQv8EMNN2i5sLcMM53JGBTVDBReOhptoMUkR1XSzNJyF9tTOivUSz5T/41BcIq7yWOseZH6lb37iwE/Tx2DJ4T3YGIO5PK5DO8ShKIJ8jx4hoqX9yDECq7CQL88walt/2+IaQ0Irb9o/OsLLiIWFQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ONP2HqWEvKoX3d7g8tqf15Vl2tZqEApuTwWuTTGi3ZI=; b=Afg3wgpa1A7tSCoFwPm/Uael6yE6l2sq9zK7LN/5L7u0nhvDWXBBHn4nUbPHLPn6AGZ7FQlhRuRqKB+MA6WTjHEhokRL1n7KBbMLGTSx7NYXOoEFTB0S4/co3IGybsLFU7iUdZ8hXjvVUTDrn+rDT74nYtIKPdyilh6w/uPgjzA= Received: from PAXPR08MB6987.eurprd08.prod.outlook.com (2603:10a6:102:1df::15) by PA4PR08MB6207.eurprd08.prod.outlook.com (2603:10a6:102:f2::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.19; Thu, 8 Jul 2021 18:37:46 +0000 Received: from PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::cdae:9f67:6693:49d4]) by PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::cdae:9f67:6693:49d4%8]) with mapi id 15.20.4308.022; Thu, 8 Jul 2021 18:37:46 +0000 From: "Samer El-Haj-Mahmoud" To: Grzegorz Bernacki , "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Sunny Wang , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Samer El-Haj-Mahmoud Subject: Re: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default Secure Boot variables initialization Thread-Topic: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default Secure Boot variables initialization Thread-Index: AQHXVufa/JHBlkP2rkCV5QmwnkEDW6s5os9A Date: Thu, 8 Jul 2021 18:37:46 +0000 Message-ID: References: <20210601131229.630611-1-gjb@semihalf.com> <20210601131229.630611-2-gjb@semihalf.com> In-Reply-To: <20210601131229.630611-2-gjb@semihalf.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Authentication-Results-Original: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: 5a002fd5-c1a4-42ee-b161-08d9423f7f65 x-ms-traffictypediagnostic: PA4PR08MB6207:|VI1PR08MB3056: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:173;OLM:7219; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB6987.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(39840400004)(136003)(366004)(376002)(346002)(186003)(5660300002)(8676002)(83380400001)(9686003)(66446008)(76116006)(478600001)(53546011)(316002)(55016002)(4326008)(52536014)(71200400001)(6506007)(86362001)(7696005)(19627235002)(33656002)(110136005)(54906003)(7416002)(66556008)(2906002)(66476007)(8936002)(38100700002)(66946007)(122000001)(64756008);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?le9Lgf/HtMLafL2q+ubB56TL0BKbYV6A4AermVn2TZbY04POmsqgcTDKCjje?= =?us-ascii?Q?3saS5CygO1BN/qwoiWt7j9jDG1hl2o2in0ZQGSC6aK3C+IXofQFKA0rN2Puf?= =?us-ascii?Q?749ehQvgOnwR+udvsmI8Sf9uBh/4hLQKzKCRk0Xt/kFvmX2M8eBu9HMs90xi?= =?us-ascii?Q?0T/J4XOuzMJ3ChZ3GowUkDxAFoyHSuAcKwl6aklmtbrlt0iVielXnkmaNIno?= =?us-ascii?Q?LibK2Muktnh03JyTp/yxt9cBo9+8Hxi1kt1KXyd+OrhymPUppnNwFjqGUC3N?= =?us-ascii?Q?j7iLBNJzKa3cJ83ivkSxrIYlAmmhsqf0k85Tkrxi19KJ9VVHI94t9HQb9/A6?= =?us-ascii?Q?uYvRIk90DmJWmKkAqxshGCV3bBL4MLeNdPa1JtYAcK2OOohg9aa7u/h0aad1?= =?us-ascii?Q?4IQ3gL++Fxrg67v1SxJ/h0fyh+wFiFYEfuv6pyLevXFkfrN5GH5gMHMKjjA2?= =?us-ascii?Q?SS+EXdPhZTN+cININskl3uIPyyP7/lHi7PtoB4ou33Hb78YgusiBGRlb+haV?= =?us-ascii?Q?OdCe6ezI+DL4A6mgP0nnsTwsIWDenE4MwlWFWxijCXv/JiQYJ98MV/5aY50A?= =?us-ascii?Q?cXNkxFryMoIysFGVM/2BeloLnLSFNrtyHrZQq9BTlYl+InxsZ6d5rx6fcMiC?= =?us-ascii?Q?ySh7uqQB3IgLbtV5h2FYUZ+NgS8oYfqujAjqfWRbiySjbhZQJJJZt7LfcNrx?= =?us-ascii?Q?+by6l5jcIIfjmqTxg8RY+swj88DN+WUO4n41tP+WErGZbO4xQ2nN5MUBXWsk?= =?us-ascii?Q?jeUIGxf2Z6Rfu91HAoEtPUIVhsdC4IvpTtW9yOpy2ALdNsqDHu8PD4xFrBDj?= =?us-ascii?Q?EEqotm6bPHhD7Si1MO5W/WSigW7hLOOhN+BAs3ChVXGkErscgOhnER8N4uqJ?= =?us-ascii?Q?3ExlXjxotZoXQYQjCv6in09v/L3lXay45xDp0SFQat/oz4BclgJR+N2nvmsL?= =?us-ascii?Q?KPNYcREa4Y7xzxeXlmvySZbZT6yOj3YZOq7ZLe/tKcvOA1PV471nve9wcSOr?= =?us-ascii?Q?Sn+VNnyDj7apePpJwdvz1VFCxnZNqhk6nIAwfMLkC2Zmt7SHyDoZuIX+hCWo?= =?us-ascii?Q?xV4OnxgEX7OLgJtkObNQHO6CUbLZce3gfFqJDrNoLZnyfqzYgGKL4PrVNqv5?= =?us-ascii?Q?/EX6bCP0CAQVxha3qGOg9W5mkwNNA57mVF57yTIRqt/dmyS1vLdf867aNXVx?= =?us-ascii?Q?ZIjycvehuYOVhbWDY6L0IAe+tiGRs2ke18bpdWGA5RqroMwWJV9A6kl3LAnj?= =?us-ascii?Q?Cp2rhkSkB9c3VnGXZEdk27QwDbKLRnFJZM98DGYG+/BET5xL9vsHiwlEeIIj?= =?us-ascii?Q?9Irf+YdwwUk09xqHTk4SUDryvvnCgt5GUf8dvjZ7CUq3dmFYEX5iyyKBjgwT?= =?us-ascii?Q?QHdunqya2D4tagcdBu+QhnWXMsVG?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6207 Original-Authentication-Results: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; Return-Path: Samer.El-Haj-Mahmoud@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 5ff1adc5-b559-45b3-d080-08d9423f7adc X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(39840400004)(396003)(136003)(346002)(376002)(36840700001)(46966006)(186003)(5660300002)(54906003)(4326008)(8676002)(8936002)(478600001)(336012)(316002)(52536014)(81166007)(110136005)(82310400003)(70586007)(70206006)(55016002)(33656002)(26005)(2906002)(83380400001)(53546011)(47076005)(36860700001)(9686003)(7696005)(356005)(86362001)(6506007)(19627235002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jul 2021 18:37:53.6200 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5a002fd5-c1a4-42ee-b161-08d9423f7f65 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3056 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-By: Samer El-Haj-Mahmoud > -----Original Message----- > From: Grzegorz Bernacki > Sent: Tuesday, June 1, 2021 9:12 AM > To: devel@edk2.groups.io > Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud > ; Sunny Wang > ; mw@semihalf.com; upstream@semihalf.com; > jiewen.yao@intel.com; jian.j.wang@intel.com; min.m.xu@intel.com; > lersek@redhat.com; Grzegorz Bernacki > Subject: [edk2-platforms PATCH v2] Platform/RaspberryPi: Enable default > Secure Boot variables initialization > > This commit allows to initialize Secure Boot default key > and databases from data embedded in firmware binary. > > Signed-off-by: Grzegorz Bernacki > --- > Platform/RaspberryPi/RPi4/RPi4.dsc | 5 ++++- > Platform/RaspberryPi/RPi4/RPi4.fdf | 2 ++ > 2 files changed, 6 insertions(+), 1 deletion(-) > > diff --git a/Platform/RaspberryPi/RPi4/RPi4.dsc > b/Platform/RaspberryPi/RPi4/RPi4.dsc > index d8c6fdd4bd..1fb4df0b81 100644 > --- a/Platform/RaspberryPi/RPi4/RPi4.dsc > +++ b/Platform/RaspberryPi/RPi4/RPi4.dsc > @@ -164,7 +164,7 @@ > !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE > > TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTp > mMeasurementLib.inf > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.in= f > - > + > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo > otVariableLib.inf > # re-use the UserPhysicalPresent() dummy implementation from the ovmf > tree > > PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in > f > !else > @@ -217,6 +217,7 @@ > > MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemor > yAllocationLib.inf > HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf > ShellLib|ShellPkg/Library/UefiShellLib/UefiShellLib.inf > + ShellCEntryLib|ShellPkg/Library/UefiShellCEntryLib/UefiShellCEntryLib.= inf > FileHandleLib|MdePkg/Library/UefiFileHandleLib/UefiFileHandleLib.inf > > [LibraryClasses.common.UEFI_DRIVER] > @@ -612,6 +613,8 @@ > > NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.= i > nf > } > > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfig > Dxe.inf > + SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.inf > + > SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootD > efaultKeysDxe.inf > !else > MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf > !endif > diff --git a/Platform/RaspberryPi/RPi4/RPi4.fdf > b/Platform/RaspberryPi/RPi4/RPi4.fdf > index 1e13909a57..0e43d24c7a 100644 > --- a/Platform/RaspberryPi/RPi4/RPi4.fdf > +++ b/Platform/RaspberryPi/RPi4/RPi4.fdf > @@ -189,7 +189,9 @@ READ_LOCK_STATUS =3D TRUE > INF > MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf > INF > MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf > !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE > +!include SecurityPkg/SecureBootDefaultKeys.fdf.inc > INF > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfig > Dxe.inf > + INF > SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootD > efaultKeysDxe.inf > !endif > INF > MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCount > erRuntimeDxe.inf > INF EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf > -- > 2.25.1 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.