From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR04-HE1-obe.outbound.protection.outlook.com (EUR04-HE1-obe.outbound.protection.outlook.com [40.107.7.74]) by mx.groups.io with SMTP id smtpd.web12.3686.1631954920261967547 for ; Sat, 18 Sep 2021 01:48:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=kIu9Q/Lm; spf=pass (domain: arm.com, ip: 40.107.7.74, mailfrom: sami.mujawar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SmOfYVFIUSAJ6wo8uNEoXZdN1D5xElIC+lva3eh9KY8=; b=kIu9Q/Lm8oyzjUG9ZUpf1za13hLhcWQ72tr4XX5vueF9FPZuc4I8pzzahYvnjwEJWfJgyqA9ofTKJM8vUjO7xUkWV6zAbLtYt57/q3hFX9UAQo5CBCsv1dxKTiPTsrqGKBG3+sc76B9NE4WGJVU2Z24cfn4BokAmZkFD2fsA/AM= Received: from DB8PR06CA0065.eurprd06.prod.outlook.com (2603:10a6:10:120::39) by AM5PR0801MB1683.eurprd08.prod.outlook.com (2603:10a6:203:3a::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14; Sat, 18 Sep 2021 08:48:37 +0000 Received: from DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:120:cafe::bf) by DB8PR06CA0065.outlook.office365.com (2603:10a6:10:120::39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14 via Frontend Transport; Sat, 18 Sep 2021 08:48:37 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT048.mail.protection.outlook.com (10.152.21.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14 via Frontend Transport; Sat, 18 Sep 2021 08:48:37 +0000 Received: ("Tessian outbound d5def7722ff7:v103"); Sat, 18 Sep 2021 08:48:37 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 268ff36e07a9503a X-CR-MTA-TID: 64aa7808 Received: from b00dd3dc73ba.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1722FB93-18C3-4C00-8DDB-D3CA7E784FE5.1; Sat, 18 Sep 2021 08:48:30 +0000 Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b00dd3dc73ba.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Sat, 18 Sep 2021 08:48:30 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c6kl33HQZVypbRo5WetAKihQKdnOZZ7CsblbxAsqOtqcpj2EE3G3UXyxZxsWAzCire0hqq9CgoSR6wGPKG6LO6PLVZqeJ/l1McIT0tgXJiQgHvA0WER5rfslh5LxDMiISTSjvaW6pQSOU7/OqNLGi3XCHQ5ti1kWslDdse12I8RphR79GoHulu1WJRobn6E/qq0jS56kizQnXeqMEQVuCfimgamqeyJQzKBx3kyRDV1I1EgAppWMIK0/lr1G0EpXzSJ6Iu6uBzPySC0Upoy4x5aPE103bIbfRDAnlweJ62rcTCNE/9cF9NRp0f4zrlAxzWRuDBDOthPFqEWybrH90w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=SmOfYVFIUSAJ6wo8uNEoXZdN1D5xElIC+lva3eh9KY8=; b=NMiBo9fq3SJ6W2qV7sSv4I5GN5swjPxtM4pnOKfFcpAQ9s5si2mSRopOjsFhbnhvBxVdIcPZow+wpNMHZrzsbq1DvvJt6VYv6l+JnPgL9wjvYgMTcbvEkcXFzDbjPVs9Z7E7jBlI/SV3sa0f5+uaz2ZxfHwDwtihAO6LEjXWIe71SPL/HJZDSb5TWgyeaiW5dABNAhWsm4HJTsEC5fJbtuILjCLBDnSdq/ZVcqHv+EfyR3PbY5tcwtaHwX0Jp9NWicpDnPJaT8lIn+gz/nZnPbOf0fpuDCHHUqE6mbgQsbnZF4j9RHed4EsFjKP7L1NRaE0tR4Jlj7UODLw/h4ND6Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SmOfYVFIUSAJ6wo8uNEoXZdN1D5xElIC+lva3eh9KY8=; b=kIu9Q/Lm8oyzjUG9ZUpf1za13hLhcWQ72tr4XX5vueF9FPZuc4I8pzzahYvnjwEJWfJgyqA9ofTKJM8vUjO7xUkWV6zAbLtYt57/q3hFX9UAQo5CBCsv1dxKTiPTsrqGKBG3+sc76B9NE4WGJVU2Z24cfn4BokAmZkFD2fsA/AM= Authentication-Results-Original: linux.vnet.ibm.com; dkim=none (message not signed) header.d=none;linux.vnet.ibm.com; dmarc=none action=none header.from=arm.com; Received: from AM9PR08MB6802.eurprd08.prod.outlook.com (2603:10a6:20b:308::14) by AM0PR08MB3699.eurprd08.prod.outlook.com (2603:10a6:208:10c::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14; Sat, 18 Sep 2021 08:48:28 +0000 Received: from AM9PR08MB6802.eurprd08.prod.outlook.com ([fe80::4e5:e0a2:3a63:26c7]) by AM9PR08MB6802.eurprd08.prod.outlook.com ([fe80::4e5:e0a2:3a63:26c7%5]) with mapi id 15.20.4523.018; Sat, 18 Sep 2021 08:48:27 +0000 Subject: Re: [RFC PATCH 1/3] ArmVirtPkg/TPM: Add a NULL implementation of TpmPlatformHierarchyLib To: Stefan Berger , devel@edk2.groups.io Cc: marcandre.lureau@redhat.com, kraxel@redhat.com, jiewen.yao@intel.com, ardb+tianocore@kernel.org, leif@nuviainc.com, Stefan Berger References: <20210916211752.2714332-1-stefanb@linux.ibm.com> <20210916211752.2714332-2-stefanb@linux.ibm.com> From: "Sami Mujawar" Message-ID: Date: Sat, 18 Sep 2021 09:48:27 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.0.1 In-Reply-To: <20210916211752.2714332-2-stefanb@linux.ibm.com> X-ClientProxiedBy: LO4P265CA0022.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:2ae::14) To AM9PR08MB6802.eurprd08.prod.outlook.com (2603:10a6:20b:308::14) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [10.1.196.43] (217.140.106.53) by LO4P265CA0022.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:2ae::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14 via Frontend Transport; Sat, 18 Sep 2021 08:48:27 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 10e77731-d553-4f88-ffe3-08d97a811b0a X-MS-TrafficTypeDiagnostic: AM0PR08MB3699:|AM5PR0801MB1683: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:10000;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM9PR08MB6802.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(376002)(396003)(366004)(39860400002)(136003)(26005)(66946007)(8936002)(36756003)(52116002)(6486002)(38350700002)(5660300002)(66556008)(66476007)(83380400001)(53546011)(186003)(2906002)(2616005)(8676002)(86362001)(956004)(16576012)(44832011)(316002)(31696002)(478600001)(4326008)(45080400002)(31686004)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3699 Original-Authentication-Results: linux.vnet.ibm.com; dkim=none (message not signed) header.d=none;linux.vnet.ibm.com; dmarc=none action=none header.from=arm.com; Return-Path: Sami.Mujawar@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 20d58013-eb69-4fae-331b-08d97a811508 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(46966006)(36840700001)(356005)(36756003)(82310400003)(2906002)(186003)(26005)(44832011)(53546011)(316002)(81166007)(70586007)(47076005)(83380400001)(5660300002)(31686004)(36860700001)(2616005)(31696002)(16576012)(86362001)(4326008)(8676002)(956004)(508600001)(336012)(8936002)(6486002)(45080400002)(70206006)(43740500002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Sep 2021 08:48:37.2636 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 10e77731-d553-4f88-ffe3-08d97a811b0a X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1683 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Content-Language: en-GB Hi Stefan, Thank you for this patch. I have a few minor comments marked inline as [SAMI]. Regards, Sami Mujawar On 16/09/2021 10:17 PM, Stefan Berger wrote: > From: Stefan Berger > > Add a NULL implementation of the library class TpmPlatformHierarchyLib. [SAMI] Is it possible to add a link to the bugzilla (https://bugzilla.tianocore.org/show_bug.cgi?id=3D3510), please? Also, would it be possible to place 'PeiDxeTpmPlatformHierarchyLibNull' in SecurityPkg (i.e. if this library can be useful for other architectures). > Cc: Ard Biesheuvel > Cc: Leif Lindholm > Cc: Sami Mujawar > Cc: Gerd Hoffmann > Signed-off-by: Stefan Berger > --- > ArmVirtPkg/ArmVirtPkg.dec | 1 + > .../Include/Library/TpmPlatformHierarchyLib.h | 27 +++++++++++++++++ > .../PeiDxeTpmPlatformHierarchyLib.c | 22 ++++++++++++++ > .../PeiDxeTpmPlatformHierarchyLib.inf | 30 +++++++++++++++++++ > 4 files changed, 80 insertions(+) > create mode 100644 ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h > create mode 100644 ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull= /PeiDxeTpmPlatformHierarchyLib.c > create mode 100644 ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull= /PeiDxeTpmPlatformHierarchyLib.inf > > diff --git a/ArmVirtPkg/ArmVirtPkg.dec b/ArmVirtPkg/ArmVirtPkg.dec > index 4e4d758015..f3bdca118b 100644 > --- a/ArmVirtPkg/ArmVirtPkg.dec > +++ b/ArmVirtPkg/ArmVirtPkg.dec > @@ -27,6 +27,7 @@ > > > [LibraryClasses] > > ArmVirtMemInfoLib|Include/Library/ArmVirtMemInfoLib.h > > + TpmPlatformHierarchyLib|Include/Library/TpmPlatformHierarchyLib.h [SAMI] The file 'ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h' appears to be a copy of the header file SecurityPkg/Include/Library/TpmPlatformHierarchyLib.h. Is this needed here or we could reference the one from SecurityPkg? > > > > [Guids.common] > > gArmVirtTokenSpaceGuid =3D { 0x0B6F5CA7, 0x4F53, 0x445A, { 0xB7, 0x6E= , 0x2E, 0x36, 0x5B, 0x80, 0x63, 0x66 } } > > diff --git a/ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h b/ArmVi= rtPkg/Include/Library/TpmPlatformHierarchyLib.h > new file mode 100644 > index 0000000000..8d61a4867b > --- /dev/null > +++ b/ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h > @@ -0,0 +1,27 @@ > +/** @file > > + TPM Platform Hierarchy configuration library. > > + > > + This library provides functions for customizing the TPM's Platform H= ierarchy > > + Authorization Value (platformAuth) and Platform Hierarchy Authorizat= ion > > + Policy (platformPolicy) can be defined through this function. > > + > > +Copyright (c) 2019, Intel Corporation. All rights reserved.
> > +Copyright (c) Microsoft Corporation.
> > +SPDX-License-Identifier: BSD-2-Clause-Patent > > + > > +**/ > > + > > +#ifndef TPM_PLATFORM_HIERARCHY_LIB_H_ > > +#define TPM_PLATFORM_HIERARCHY_LIB_H_ > > + > > +/** > > + This service will perform the TPM Platform Hierarchy configuration at= the SmmReadyToLock event. > > + > > +**/ > > +VOID > > +EFIAPI > > +ConfigureTpmPlatformHierarchy ( > > + VOID > > + ); > > + > > +#endif > > diff --git a/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeT= pmPlatformHierarchyLib.c b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLib= Null/PeiDxeTpmPlatformHierarchyLib.c > new file mode 100644 > index 0000000000..bac1efda63 > --- /dev/null > +++ b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpmPlatf= ormHierarchyLib.c > @@ -0,0 +1,22 @@ > +/** @file > > + Null TPM Platform Hierarchy configuration library. > > + > > + This library provides stub functions for customizing the TPM's Platf= orm Hierarchy. > > + > > + Copyright (c) 2021, IBM Corporation. > > + SPDX-License-Identifier: BSD-2-Clause-Patent > > + > > +**/ > > + > > +#include > > + > > +/** > > + A NULL implementation of ConfigureTpmPlatformHierarchy. > > +**/ > > +VOID > > +EFIAPI > > +ConfigureTpmPlatformHierarchy ( > > + ) > > +{ > > + /* no nothing */ > > +} > > diff --git a/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeT= pmPlatformHierarchyLib.inf b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyL= ibNull/PeiDxeTpmPlatformHierarchyLib.inf > new file mode 100644 > index 0000000000..4f02818bbc > --- /dev/null > +++ b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpmPlatf= ormHierarchyLib.inf > @@ -0,0 +1,30 @@ > +### @file > > +# NULL TPM Platform Hierarchy configuration library. > > +# > > +# This library provides functions for customizing the TPM's Platform H= ierarchy > > +# Authorization Value (platformAuth) and Platform Hierarchy Authorizat= ion > > +# Policy (platformPolicy) can be defined through this function. > > +# > > +# Copyright (c) 2019, Intel Corporation. All rights reserved.
> > +# Copyright (c) Microsoft Corporation.
> > +# > > +# SPDX-License-Identifier: BSD-2-Clause-Patent > > +# > > +### > > + > > +[Defines] > > + INF_VERSION =3D 0x00010005 > > + BASE_NAME =3D PeiDxeTpmPlatformHierarchyLibNull > > + FILE_GUID =3D 8947A3F2-BfB4-45EF-968D-5C40C1CE6A5= 8 > > + MODULE_TYPE =3D PEIM > > + VERSION_STRING =3D 1.0 > > + LIBRARY_CLASS =3D TpmPlatformHierarchyLib|PEIM DXE_DR= IVER > > + > > +[LibraryClasses] > > + BaseLib > > + > > +[Packages] > > + MdePkg/MdePkg.dec > > + > > +[Sources] > > + PeiDxeTpmPlatformHierarchyLib.c > IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.