From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web12.7167.1635397214644232798 for ; Wed, 27 Oct 2021 22:00:16 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 134.134.136.31, mailfrom: min.m.xu@intel.com) X-IronPort-AV: E=McAfee;i="6200,9189,10150"; a="291160680" X-IronPort-AV: E=Sophos;i="5.87,188,1631602800"; d="scan'208";a="291160680" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Oct 2021 22:00:12 -0700 X-IronPort-AV: E=Sophos;i="5.87,188,1631602800"; d="scan'208";a="498214342" Received: from mxu9-mobl1.ccr.corp.intel.com ([10.238.4.37]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Oct 2021 22:00:09 -0700 From: "Min Xu" To: devel@edk2.groups.io Cc: Min Xu , Michael D Kinney , Liming Gao , Zhiguang Liu , Jiewen Yao , Jian J Wang , Sami Mujawar Subject: [PATCH V3 2/3] SecurityPkg: Support TeeMeasurementProtocol in DxeTpm2MeasureBootLib Date: Thu, 28 Oct 2021 12:59:28 +0800 Message-Id: X-Mailer: git-send-email 2.29.2.windows.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3625 DxeTpm2MeasureBootLib supports TPM2 based measure boot. After TeeMeasurementProtocol is introduced, TEE based measure boot needs to be supported in DxeTpm2MeasureBootLib as well. There are 2 major changes in this commit. 1. MEASURE_BOOT_PROTOCOLS is defined to store the instances of TCG2 protocol and TEE protocol. In the DxeTpm2MeasureBootHandler above 2 measure boot protocol instances will be located. Then the located protocol instances will be called to do the measure boot. 2. TeeEvent is similar to Tcg2Event except the MrIndex and PcrIndex. CreateTeeEventFromTcg2Event is used to create the TeeEvent based on the Tcg2Event. Above 2 changes make the minimize changes to the existing code. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Jiewen Yao Cc: Jian J Wang Cc: Sami Mujawar Signed-off-by: Min Xu --- .../DxeTpm2MeasureBootLib.c | 364 ++++++++++++++---- .../DxeTpm2MeasureBootLib.inf | 1 + 2 files changed, 297 insertions(+), 68 deletions(-) diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index 92eac715800f..cd4b779896fb 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -41,6 +41,13 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include #include #include +#include +#include + +typedef struct { + EFI_TCG2_PROTOCOL *Tcg2Protocol; + EFI_TEE_MEASUREMENT_PROTOCOL *TeeProtocol; +} MEASURE_BOOT_PROTOCOLS; // // Flag to check GPT partition. It only need be measured once. @@ -55,6 +62,62 @@ UINTN mTcg2ImageSize; EFI_HANDLE mTcg2CacheMeasuredHandle = NULL; MEASURED_HOB_DATA *mTcg2MeasuredHobData = NULL; +/** + Create TeeEvent from Tcg2Event. + + TeeEvent is similar to Tcg2Event except the MrIndex. + + @param TeeProtocol Pointer to the located Tee Measurement protocol instance. + @param Tcg2Event Pointer to the Tcg2Event. + @param EventSize Size of the Event. + @param EfiTeeEvent The created TeeEvent + + @retval EFI_SUCCESS Successfully create the TeeEvent + @retval EFI_INVALID_PARAMETER The input parameter is invalid + @retval EFI_UNSUPPORTED The input PCRIndex cannot be mapped to Tee MR + @retval EFI_OUT_OF_RESOURCES Out of resource +**/ +EFI_STATUS +CreateTeeEventFromTcg2Event ( + IN EFI_TEE_MEASUREMENT_PROTOCOL *TeeProtocol, + IN EFI_TCG2_EVENT *Tcg2Event, + IN UINT32 EventSize, + IN OUT EFI_TEE_EVENT **EfiTeeEvent + ) +{ + UINT32 MrIndex; + EFI_STATUS Status; + EFI_TEE_EVENT *TeeEvent; + + if (Tcg2Event == NULL || TeeProtocol == NULL || EfiTeeEvent == NULL) { + return EFI_INVALID_PARAMETER; + } + + *EfiTeeEvent = NULL; + + Status = TeeProtocol->MapPcrToMrIndex (TeeProtocol, Tcg2Event->Header.PCRIndex, &MrIndex); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Cannot map PcrIndex(%d) to MrIndex\n", Tcg2Event->Header.PCRIndex)); + return Status; + } + + TeeEvent = (EFI_TEE_EVENT *)AllocateZeroPool (Tcg2Event->Size); + if (TeeEvent == NULL) { + return EFI_OUT_OF_RESOURCES; + } + + TeeEvent->Size = Tcg2Event->Size; + TeeEvent->Header.HeaderSize = Tcg2Event->Header.HeaderSize; + TeeEvent->Header.HeaderVersion = Tcg2Event->Header.HeaderVersion; + TeeEvent->Header.MrIndex = MrIndex; + TeeEvent->Header.EventType = Tcg2Event->Header.EventType; + CopyMem (TeeEvent->Event, Tcg2Event->Event, EventSize); + + *EfiTeeEvent = TeeEvent; + + return EFI_SUCCESS; +} + /** Reads contents of a PE/COFF image in memory buffer. @@ -109,7 +172,7 @@ DxeTpm2MeasureBootLibImageRead ( Caution: This function may receive untrusted input. The GPT partition table is external input, so this function should parse partition data carefully. - @param Tcg2Protocol Pointer to the located TCG2 protocol instance. + @param MeasureBootProtocols Pointer to the located MeasureBoot protocol instances (i.e. TCG2/Td protocol). @param GptHandle Handle that GPT partition was installed. @retval EFI_SUCCESS Successfully measure GPT table. @@ -121,8 +184,8 @@ DxeTpm2MeasureBootLibImageRead ( EFI_STATUS EFIAPI Tcg2MeasureGptTable ( - IN EFI_TCG2_PROTOCOL *Tcg2Protocol, - IN EFI_HANDLE GptHandle + IN MEASURE_BOOT_PROTOCOLS *MeasureBootProtocols, + IN EFI_HANDLE GptHandle ) { EFI_STATUS Status; @@ -134,13 +197,29 @@ Tcg2MeasureGptTable ( UINTN NumberOfPartition; UINT32 Index; EFI_TCG2_EVENT *Tcg2Event; + EFI_TEE_EVENT *TeeEvent; EFI_GPT_DATA *GptData; UINT32 EventSize; + EFI_TCG2_PROTOCOL *Tcg2Protocol; + EFI_TEE_MEASUREMENT_PROTOCOL *TeeProtocol; if (mTcg2MeasureGptCount > 0) { return EFI_SUCCESS; } + PrimaryHeader = NULL; + EntryPtr = NULL; + TeeEvent = NULL; + Tcg2Event = NULL; + + Tcg2Protocol = MeasureBootProtocols->Tcg2Protocol; + TeeProtocol = MeasureBootProtocols->TeeProtocol; + + if (Tcg2Protocol == NULL && TeeProtocol == NULL) { + ASSERT (FALSE); + return EFI_UNSUPPORTED; + } + Status = gBS->HandleProtocol (GptHandle, &gEfiBlockIoProtocolGuid, (VOID**)&BlockIo); if (EFI_ERROR (Status)) { return EFI_UNSUPPORTED; @@ -149,6 +228,7 @@ Tcg2MeasureGptTable ( if (EFI_ERROR (Status)) { return EFI_UNSUPPORTED; } + // // Read the EFI Partition Table Header // @@ -156,6 +236,7 @@ Tcg2MeasureGptTable ( if (PrimaryHeader == NULL) { return EFI_OUT_OF_RESOURCES; } + Status = DiskIo->ReadDisk ( DiskIo, BlockIo->Media->MediaId, @@ -164,10 +245,20 @@ Tcg2MeasureGptTable ( (UINT8 *)PrimaryHeader ); if (EFI_ERROR (Status)) { - DEBUG ((EFI_D_ERROR, "Failed to Read Partition Table Header!\n")); + DEBUG ((DEBUG_ERROR, "Failed to Read Partition Table Header!\n")); FreePool (PrimaryHeader); return EFI_DEVICE_ERROR; } + + // + // PrimaryHeader->SizeOfPartitionEntry should not be zero + // + if (PrimaryHeader->SizeOfPartitionEntry == 0) { + DEBUG ((DEBUG_ERROR, "SizeOfPartitionEntry should not be zero!\n")); + FreePool (PrimaryHeader); + return EFI_BAD_BUFFER_SIZE; + } + // // Read the partition entry. // @@ -202,15 +293,14 @@ Tcg2MeasureGptTable ( } // - // Prepare Data for Measurement + // Prepare Data for Measurement (TeeProtocol and Tcg2Protocol) // EventSize = (UINT32)(sizeof (EFI_GPT_DATA) - sizeof (GptData->Partitions) + NumberOfPartition * PrimaryHeader->SizeOfPartitionEntry); Tcg2Event = (EFI_TCG2_EVENT *) AllocateZeroPool (EventSize + sizeof (EFI_TCG2_EVENT) - sizeof(Tcg2Event->Event)); if (Tcg2Event == NULL) { - FreePool (PrimaryHeader); - FreePool (EntryPtr); - return EFI_OUT_OF_RESOURCES; + Status = EFI_OUT_OF_RESOURCES; + goto Exit; } Tcg2Event->Size = EventSize + sizeof (EFI_TCG2_EVENT) - sizeof(Tcg2Event->Event); @@ -243,22 +333,57 @@ Tcg2MeasureGptTable ( } // - // Measure the GPT data + // Measure the GPT data by Tcg2Protocol // - Status = Tcg2Protocol->HashLogExtendEvent ( - Tcg2Protocol, - 0, - (EFI_PHYSICAL_ADDRESS) (UINTN) (VOID *) GptData, - (UINT64) EventSize, - Tcg2Event - ); - if (!EFI_ERROR (Status)) { - mTcg2MeasureGptCount++; - } - - FreePool (PrimaryHeader); - FreePool (EntryPtr); - FreePool (Tcg2Event); + if (Tcg2Protocol != NULL) { + Status = Tcg2Protocol->HashLogExtendEvent ( + Tcg2Protocol, + 0, + (EFI_PHYSICAL_ADDRESS) (UINTN) (VOID *) GptData, + (UINT64) EventSize, + Tcg2Event + ); + if (!EFI_ERROR (Status)) { + mTcg2MeasureGptCount++; + } + DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tcg2 MeasureGptTable - %r\n", Status)); + + } else if (TeeProtocol != NULL) { + + // + // Measure the GPT data by TdProtocol + // + Status = CreateTeeEventFromTcg2Event (TeeProtocol, Tcg2Event, EventSize, &TeeEvent); + if (EFI_ERROR (Status)) { + goto Exit; + } + + Status = TeeProtocol->HashLogExtendEvent ( + TeeProtocol, + 0, + (EFI_PHYSICAL_ADDRESS) (UINTN) (VOID *) GptData, + (UINT64) EventSize, + TeeEvent + ); + if (!EFI_ERROR (Status)) { + mTcg2MeasureGptCount++; + } + DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tee MeasureGptTable - %r\n", Status)); + } + +Exit: + if (PrimaryHeader != NULL) { + FreePool (PrimaryHeader); + } + if (EntryPtr != NULL) { + FreePool (EntryPtr); + } + if (Tcg2Event != NULL) { + FreePool (Tcg2Event); + } + if (TeeEvent != NULL) { + FreePool (TeeEvent); + } return Status; } @@ -271,12 +396,12 @@ Tcg2MeasureGptTable ( PE/COFF image is external input, so this function will validate its data structure within this image buffer before use. - @param[in] Tcg2Protocol Pointer to the located TCG2 protocol instance. - @param[in] ImageAddress Start address of image buffer. - @param[in] ImageSize Image size - @param[in] LinkTimeBase Address that the image is loaded into memory. - @param[in] ImageType Image subsystem type. - @param[in] FilePath File path is corresponding to the input image. + @param[in] MeasureBootProtocols Pointer to the located MeasureBoot protocol instances. + @param[in] ImageAddress Start address of image buffer. + @param[in] ImageSize Image size + @param[in] LinkTimeBase Address that the image is loaded into memory. + @param[in] ImageType Image subsystem type. + @param[in] FilePath File path is corresponding to the input image. @retval EFI_SUCCESS Successfully measure image. @retval EFI_OUT_OF_RESOURCES No enough resource to measure image. @@ -287,7 +412,7 @@ Tcg2MeasureGptTable ( EFI_STATUS EFIAPI Tcg2MeasurePeImage ( - IN EFI_TCG2_PROTOCOL *Tcg2Protocol, + IN MEASURE_BOOT_PROTOCOLS *MeasureBootProtocols, IN EFI_PHYSICAL_ADDRESS ImageAddress, IN UINTN ImageSize, IN UINTN LinkTimeBase, @@ -300,9 +425,22 @@ Tcg2MeasurePeImage ( EFI_IMAGE_LOAD_EVENT *ImageLoad; UINT32 FilePathSize; UINT32 EventSize; + EFI_TEE_EVENT *TeeEvent; + EFI_TEE_MEASUREMENT_PROTOCOL *TeeProtocol; + EFI_TCG2_PROTOCOL *Tcg2Protocol; Status = EFI_UNSUPPORTED; ImageLoad = NULL; + TeeEvent = NULL; + + Tcg2Protocol = MeasureBootProtocols->Tcg2Protocol; + TeeProtocol = MeasureBootProtocols->TeeProtocol; + + if (Tcg2Protocol == NULL && TeeProtocol == NULL) { + ASSERT (FALSE); + return EFI_UNSUPPORTED; + } + FilePathSize = (UINT32) GetDevicePathSize (FilePath); // @@ -334,7 +472,7 @@ Tcg2MeasurePeImage ( break; default: DEBUG (( - EFI_D_ERROR, + DEBUG_ERROR, "Tcg2MeasurePeImage: Unknown subsystem type %d", ImageType )); @@ -352,28 +490,125 @@ Tcg2MeasurePeImage ( // // Log the PE data // - Status = Tcg2Protocol->HashLogExtendEvent ( - Tcg2Protocol, - PE_COFF_IMAGE, - ImageAddress, - ImageSize, - Tcg2Event - ); - if (Status == EFI_VOLUME_FULL) { - // - // Volume full here means the image is hashed and its result is extended to PCR. - // But the event log can't be saved since log area is full. - // Just return EFI_SUCCESS in order not to block the image load. - // - Status = EFI_SUCCESS; + if (Tcg2Protocol != NULL) { + Status = Tcg2Protocol->HashLogExtendEvent ( + Tcg2Protocol, + PE_COFF_IMAGE, + ImageAddress, + ImageSize, + Tcg2Event + ); + if (Status == EFI_VOLUME_FULL) { + // + // Volume full here means the image is hashed and its result is extended to PCR. + // But the event log can't be saved since log area is full. + // Just return EFI_SUCCESS in order not to block the image load. + // + Status = EFI_SUCCESS; + } + DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tcg2 MeasurePeImage - %r\n", Status)); + + } else if (TeeProtocol != NULL) { + + Status = CreateTeeEventFromTcg2Event (TeeProtocol, Tcg2Event, EventSize, &TeeEvent); + if (EFI_ERROR (Status)) { + goto Finish; + } + + Status = TeeProtocol->HashLogExtendEvent ( + TeeProtocol, + PE_COFF_IMAGE, + ImageAddress, + ImageSize, + TeeEvent + ); + if (Status == EFI_VOLUME_FULL) { + // + // Volume full here means the image is hashed and its result is extended to PCR. + // But the event log can't be saved since log area is full. + // Just return EFI_SUCCESS in order not to block the image load. + // + Status = EFI_SUCCESS; + } + DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - Tee MeasurePeImage - %r\n", Status)); } Finish: - FreePool (Tcg2Event); + if (Tcg2Event != NULL) { + FreePool (Tcg2Event); + } + + if (TeeEvent != NULL) { + FreePool (TeeEvent); + } return Status; } +/** + Get the measure boot protocols. + + There are 2 measure boot, TCG2 protocol based and Tee measurement protocol based. + + @param MeasureBootProtocols Pointer to the located measure boot protocol instances. + + @retval EFI_SUCCESS Sucessfully locate the measure boot protocol instances (at least one instance). + @retval EFI_UNSUPPORTED Measure boot is not supported. +**/ +EFI_STATUS +EFIAPI +GetMeasureBootProtocols ( + MEASURE_BOOT_PROTOCOLS *MeasureBootProtocols + ) +{ + EFI_STATUS Status; + EFI_TCG2_PROTOCOL *Tcg2Protocol; + EFI_TEE_MEASUREMENT_PROTOCOL *TeeProtocol; + EFI_TCG2_BOOT_SERVICE_CAPABILITY Tcg2ProtocolCapability; + EFI_TEE_BOOT_SERVICE_CAPABILITY TeeProtocolCapability; + + TeeProtocol = NULL; + Status = gBS->LocateProtocol (&gEfiTeeMeasurementProtocolGuid, NULL, (VOID **) &TeeProtocol); + if (EFI_ERROR (Status)) { + // + // Tee Measurement protocol is not installed. + // + DEBUG ((DEBUG_VERBOSE, "TeeMeasurementProtocol is not installed. - %r\n", Status)); + } else { + ZeroMem (&TeeProtocolCapability, sizeof (TeeProtocolCapability)); + TeeProtocolCapability.Size = sizeof (TeeProtocolCapability); + Status = TeeProtocol->GetCapability (TeeProtocol, &TeeProtocolCapability); + if (EFI_ERROR (Status) || TeeProtocolCapability.TeeType.Type == EFI_TEE_TYPE_NONE) { + DEBUG ((DEBUG_ERROR, " TeeProtocol->GetCapability returns : %x, %r\n", TeeProtocolCapability.TeeType.Type, Status)); + TeeProtocol = NULL; + } + } + + Tcg2Protocol = NULL; + Status = gBS->LocateProtocol (&gEfiTcg2ProtocolGuid, NULL, (VOID **) &Tcg2Protocol); + if (EFI_ERROR (Status)) { + // + // Tcg2 protocol is not installed. So, TPM2 is not present. + // + DEBUG ((DEBUG_VERBOSE, "Tcg2Protocol is not installed. - %r\n", Status)); + } else { + Tcg2ProtocolCapability.Size = (UINT8) sizeof (Tcg2ProtocolCapability); + Status = Tcg2Protocol->GetCapability (Tcg2Protocol, &Tcg2ProtocolCapability); + if (EFI_ERROR (Status) || (!Tcg2ProtocolCapability.TPMPresentFlag)) { + // + // TPM device doesn't work or activate. + // + DEBUG ((DEBUG_ERROR, "TPMPresentFlag=FALSE %r\n", Status)); + Tcg2Protocol = NULL; + } + } + + MeasureBootProtocols->Tcg2Protocol = Tcg2Protocol; + MeasureBootProtocols->TeeProtocol = TeeProtocol; + + return (Tcg2Protocol == NULL && TeeProtocol == NULL) ? EFI_UNSUPPORTED: EFI_SUCCESS; +} + /** The security handler is used to abstract platform-specific policy from the DXE core response to an attempt to use a file that returns a @@ -422,9 +657,8 @@ DxeTpm2MeasureBootHandler ( IN BOOLEAN BootPolicy ) { - EFI_TCG2_PROTOCOL *Tcg2Protocol; + MEASURE_BOOT_PROTOCOLS MeasureBootProtocols; EFI_STATUS Status; - EFI_TCG2_BOOT_SERVICE_CAPABILITY ProtocolCapability; EFI_DEVICE_PATH_PROTOCOL *DevicePathNode; EFI_DEVICE_PATH_PROTOCOL *OrigDevicePathNode; EFI_HANDLE Handle; @@ -435,28 +669,23 @@ DxeTpm2MeasureBootHandler ( EFI_PHYSICAL_ADDRESS FvAddress; UINT32 Index; - Status = gBS->LocateProtocol (&gEfiTcg2ProtocolGuid, NULL, (VOID **) &Tcg2Protocol); + MeasureBootProtocols.Tcg2Protocol = NULL; + MeasureBootProtocols.TeeProtocol = NULL; + + Status = GetMeasureBootProtocols(&MeasureBootProtocols); + if (EFI_ERROR (Status)) { // - // Tcg2 protocol is not installed. So, TPM2 is not present. + // None of Measured boot protocols (Tcg2, Tee) is installed. // Don't do any measurement, and directly return EFI_SUCCESS. // - DEBUG ((EFI_D_VERBOSE, "DxeTpm2MeasureBootHandler - Tcg2 - %r\n", Status)); + DEBUG ((DEBUG_INFO, "None of Tcg2Protocol/TeeMeasurementProtocol is installed.\n")); return EFI_SUCCESS; } - ProtocolCapability.Size = (UINT8) sizeof (ProtocolCapability); - Status = Tcg2Protocol->GetCapability ( - Tcg2Protocol, - &ProtocolCapability - ); - if (EFI_ERROR (Status) || (!ProtocolCapability.TPMPresentFlag)) { - // - // TPM device doesn't work or activate. - // - DEBUG ((EFI_D_ERROR, "DxeTpm2MeasureBootHandler (%r) - TPMPresentFlag - %x\n", Status, ProtocolCapability.TPMPresentFlag)); - return EFI_SUCCESS; - } + DEBUG ((DEBUG_INFO, "Tcg2Protocol = %p, TdProtocol = %p\n", + MeasureBootProtocols.Tcg2Protocol, + MeasureBootProtocols.TeeProtocol)); // // Copy File Device Path @@ -502,8 +731,8 @@ DxeTpm2MeasureBootHandler ( // // Measure GPT disk. // - Status = Tcg2MeasureGptTable (Tcg2Protocol, Handle); - DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasureGptTable - %r\n", Status)); + Status = Tcg2MeasureGptTable (&MeasureBootProtocols, Handle); + if (!EFI_ERROR (Status)) { // // GPT disk check done. @@ -647,14 +876,13 @@ DxeTpm2MeasureBootHandler ( // Measure PE image into TPM log. // Status = Tcg2MeasurePeImage ( - Tcg2Protocol, + &MeasureBootProtocols, (EFI_PHYSICAL_ADDRESS) (UINTN) FileBuffer, FileSize, (UINTN) ImageContext.ImageAddress, ImageContext.ImageType, DevicePathNode ); - DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - Tcg2MeasurePeImage - %r\n", Status)); } // @@ -665,7 +893,7 @@ Finish: FreePool (OrigDevicePathNode); } - DEBUG ((EFI_D_INFO, "DxeTpm2MeasureBootHandler - %r\n", Status)); + DEBUG ((DEBUG_INFO, "DxeTpm2MeasureBootHandler - %r\n", Status)); return Status; } diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf index 2506abbe7c8b..6c4860745f35 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf @@ -61,6 +61,7 @@ [Protocols] gEfiTcg2ProtocolGuid ## SOMETIMES_CONSUMES + gEfiTeeMeasurementProtocolGuid ## SOMETIMES_CONSUMES gEfiFirmwareVolumeBlockProtocolGuid ## SOMETIMES_CONSUMES gEfiBlockIoProtocolGuid ## SOMETIMES_CONSUMES gEfiDiskIoProtocolGuid ## SOMETIMES_CONSUMES -- 2.29.2.windows.2