* Tue Feb 08 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-2
- edk2-OvmfPkg-remove-unused-TPM-options-from-MicrovmX64.ds.patch [bz#1935497] - edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch [bz#1935497] - edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch [bz#1935497] - edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch [bz#1935497] - edk2-OvmfPkg-rework-TPM-configuration.patch [bz#1935497] - edk2-spec-adapt-specfile-to-build-option-changes-disable-.patch [bz#1935497] - Resolves: bz#1935497 (edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default)
This commit is contained in:
parent
4dd210a593
commit
088600e053
158
edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch
Normal file
158
edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch
Normal file
@ -0,0 +1,158 @@
|
|||||||
|
From 0ecb863aaca8d71a35763645ced278589666ada2 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Date: Wed, 15 Dec 2021 12:39:19 +0100
|
||||||
|
Subject: [PATCH 4/6] OvmfPkg: create Tcg12ConfigPei.inf
|
||||||
|
|
||||||
|
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
|
||||||
|
RH-Commit: [4/6] 92926b9a05aaff38aab9a2aeee211be736863ab9 (kraxel/centos-edk2)
|
||||||
|
RH-Bugzilla: 1935497
|
||||||
|
RH-Acked-by: Oliver Steffen <None>
|
||||||
|
|
||||||
|
Split Tcg2ConfigPei.inf into two variants: Tcg12ConfigPei.inf with
|
||||||
|
TPM 1.2 support included and Tcg2ConfigPei.inf supporting TPM 2.0 only.
|
||||||
|
This allows x86 builds to choose whenever TPM 1.2 support should be
|
||||||
|
included or not by picking the one or the other inf file.
|
||||||
|
|
||||||
|
Switch x86 builds to Tcg12ConfigPei.inf, so they continue to
|
||||||
|
have TPM 1.2 support.
|
||||||
|
|
||||||
|
No functional change.
|
||||||
|
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
Tested-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
(cherry picked from commit b81938877276e808b6535e612b320eee559c4c2f)
|
||||||
|
---
|
||||||
|
OvmfPkg/OvmfTpmComponentsPei.dsc.inc | 2 +-
|
||||||
|
OvmfPkg/OvmfTpmPei.fdf.inc | 2 +-
|
||||||
|
OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf | 56 +++++++++++++++++++++++
|
||||||
|
OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf | 11 +----
|
||||||
|
4 files changed, 59 insertions(+), 12 deletions(-)
|
||||||
|
create mode 100644 OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
index 99fa7c13b3..87d491da50 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
@@ -4,7 +4,7 @@
|
||||||
|
|
||||||
|
!if $(TPM_ENABLE) == TRUE
|
||||||
|
OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
- OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+ OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPei.fdf.inc b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
index 9aefd73d21..709a608cc3 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
@@ -4,7 +4,7 @@
|
||||||
|
|
||||||
|
!if $(TPM_ENABLE) == TRUE
|
||||||
|
INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
-INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+INF OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
diff --git a/OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf b/OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..e8e0b88e60
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
@@ -0,0 +1,56 @@
|
||||||
|
+## @file
|
||||||
|
+# Set TPM device type - supports TPM 1.2 and 2.0
|
||||||
|
+#
|
||||||
|
+# In SecurityPkg, this module initializes the TPM device type based on a UEFI
|
||||||
|
+# variable and/or hardware detection. In OvmfPkg, the module only performs TPM
|
||||||
|
+# hardware detection.
|
||||||
|
+#
|
||||||
|
+# Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||||
|
+# Copyright (C) 2018, Red Hat, Inc.
|
||||||
|
+#
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+[Defines]
|
||||||
|
+ INF_VERSION = 0x00010005
|
||||||
|
+ BASE_NAME = Tcg2ConfigPei
|
||||||
|
+ FILE_GUID = 8AD3148F-945F-46B4-8ACD-71469EA73945
|
||||||
|
+ MODULE_TYPE = PEIM
|
||||||
|
+ VERSION_STRING = 1.0
|
||||||
|
+ ENTRY_POINT = Tcg2ConfigPeimEntryPoint
|
||||||
|
+
|
||||||
|
+[Sources]
|
||||||
|
+ Tcg2ConfigPeim.c
|
||||||
|
+ Tpm12Support.h
|
||||||
|
+ Tpm12Support.c
|
||||||
|
+
|
||||||
|
+[Packages]
|
||||||
|
+ MdePkg/MdePkg.dec
|
||||||
|
+ MdeModulePkg/MdeModulePkg.dec
|
||||||
|
+ OvmfPkg/OvmfPkg.dec
|
||||||
|
+ SecurityPkg/SecurityPkg.dec
|
||||||
|
+
|
||||||
|
+[LibraryClasses]
|
||||||
|
+ PeimEntryPoint
|
||||||
|
+ DebugLib
|
||||||
|
+ PeiServicesLib
|
||||||
|
+ Tpm2DeviceLib
|
||||||
|
+ BaseLib
|
||||||
|
+ Tpm12DeviceLib
|
||||||
|
+
|
||||||
|
+[Guids]
|
||||||
|
+ gEfiTpmDeviceSelectedGuid ## PRODUCES ## GUID # Used as a PPI GUID
|
||||||
|
+ gEfiTpmDeviceInstanceTpm20DtpmGuid ## SOMETIMES_CONSUMES
|
||||||
|
+ gEfiTpmDeviceInstanceTpm12Guid ## SOMETIMES_CONSUMES
|
||||||
|
+
|
||||||
|
+[Ppis]
|
||||||
|
+ gPeiTpmInitializationDonePpiGuid ## SOMETIMES_PRODUCES
|
||||||
|
+
|
||||||
|
+[Pcd]
|
||||||
|
+ gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid ## PRODUCES
|
||||||
|
+
|
||||||
|
+[Depex.IA32, Depex.X64]
|
||||||
|
+ gOvmfTpmMmioAccessiblePpiGuid
|
||||||
|
+
|
||||||
|
+[Depex.ARM, Depex.AARCH64]
|
||||||
|
+ gOvmfTpmDiscoveredPpiGuid
|
||||||
|
diff --git a/OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf b/OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
index 39d1deeed1..51078c9813 100644
|
||||||
|
--- a/OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+++ b/OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
@@ -1,5 +1,5 @@
|
||||||
|
## @file
|
||||||
|
-# Set TPM device type
|
||||||
|
+# Set TPM device type - supports TPM 2.0 only
|
||||||
|
#
|
||||||
|
# In SecurityPkg, this module initializes the TPM device type based on a UEFI
|
||||||
|
# variable and/or hardware detection. In OvmfPkg, the module only performs TPM
|
||||||
|
@@ -22,11 +22,6 @@
|
||||||
|
[Sources]
|
||||||
|
Tcg2ConfigPeim.c
|
||||||
|
Tpm12Support.h
|
||||||
|
-
|
||||||
|
-[Sources.IA32, Sources.X64]
|
||||||
|
- Tpm12Support.c
|
||||||
|
-
|
||||||
|
-[Sources.ARM, Sources.AARCH64]
|
||||||
|
Tpm12SupportNull.c
|
||||||
|
|
||||||
|
[Packages]
|
||||||
|
@@ -41,10 +36,6 @@
|
||||||
|
PeiServicesLib
|
||||||
|
Tpm2DeviceLib
|
||||||
|
|
||||||
|
-[LibraryClasses.IA32, LibraryClasses.X64]
|
||||||
|
- BaseLib
|
||||||
|
- Tpm12DeviceLib
|
||||||
|
-
|
||||||
|
[Guids]
|
||||||
|
gEfiTpmDeviceSelectedGuid ## PRODUCES ## GUID # Used as a PPI GUID
|
||||||
|
gEfiTpmDeviceInstanceTpm20DtpmGuid ## SOMETIMES_CONSUMES
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
151
edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch
Normal file
151
edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch
Normal file
@ -0,0 +1,151 @@
|
|||||||
|
From 505473655db4b91e4a0ac732069968f9eddabc51 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Date: Wed, 15 Dec 2021 12:39:18 +0100
|
||||||
|
Subject: [PATCH 3/6] OvmfPkg: drop TPM_CONFIG_ENABLE
|
||||||
|
|
||||||
|
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
|
||||||
|
RH-Commit: [3/6] be335526f74358d4af21fbd35cc7008b227ebb23 (kraxel/centos-edk2)
|
||||||
|
RH-Bugzilla: 1935497
|
||||||
|
RH-Acked-by: Oliver Steffen <None>
|
||||||
|
|
||||||
|
Drop TPM_CONFIG_ENABLE config option. Including TPM support in the
|
||||||
|
build without also including the TPM configuration menu is not useful.
|
||||||
|
|
||||||
|
Suggested-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Tested-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
(cherry picked from commit 5711ff4d0b56ff4c58dc7a780e706bc58aed2253)
|
||||||
|
---
|
||||||
|
OvmfPkg/OvmfTpmComponentsDxe.dsc.inc | 2 --
|
||||||
|
OvmfPkg/OvmfTpmDefines.dsc.inc | 1 -
|
||||||
|
OvmfPkg/OvmfTpmDxe.fdf.inc | 2 --
|
||||||
|
OvmfPkg/OvmfTpmPcdsHii.dsc.inc | 2 +-
|
||||||
|
OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 6 +++---
|
||||||
|
OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 6 +++---
|
||||||
|
OvmfPkg/PlatformCI/ReadMe.md | 2 +-
|
||||||
|
7 files changed, 8 insertions(+), 13 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
index d5c2586118..e025d85a58 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
@@ -14,9 +14,7 @@
|
||||||
|
NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
}
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDefines.dsc.inc b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
index 51da7508b3..5df4a331fb 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
@@ -3,4 +3,3 @@
|
||||||
|
##
|
||||||
|
|
||||||
|
DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDxe.fdf.inc b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
index 9dcdaaf01c..32eef24638 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
@@ -6,7 +6,5 @@
|
||||||
|
INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
!endif
|
||||||
|
-!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
index 164bc9c7fc..2e02a5b4cb 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
@@ -2,7 +2,7 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
index 7117b86b81..1774423580 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
@@ -95,21 +95,21 @@ jobs:
|
||||||
|
OVMF_IA32X64_FULL_DEBUG:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "DEBUG"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_RELEASE:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "RELEASE"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_NOOPT:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "NOOPT"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
index 2e07a3d889..09f9851312 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
@@ -94,14 +94,14 @@ jobs:
|
||||||
|
OVMF_IA32X64_FULL_DEBUG:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "DEBUG"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_RELEASE:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "RELEASE"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
@@ -112,7 +112,7 @@ jobs:
|
||||||
|
# OVMF_IA32X64_FULL_NOOPT:
|
||||||
|
# Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
# Build.Arch: "IA32,X64"
|
||||||
|
- # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
# Build.Target: "NOOPT"
|
||||||
|
# Run.Flags: $(run_flags)
|
||||||
|
# Run: $(should_run)
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/ReadMe.md b/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
index 2ce9007dbe..44aa7c4a9d 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
+++ b/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
@@ -14,7 +14,7 @@ supported and are described below.
|
||||||
|
| IA32 | IA32 | OvmfPkgIa32.dsc | None |
|
||||||
|
| X64 | X64 | OvmfPkgIa64.dsc | None |
|
||||||
|
| IA32 X64 | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | None |
|
||||||
|
-| IA32 X64 Full | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM_ENABLE=1 TPM_CONFIG_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
|
||||||
|
+| IA32 X64 Full | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
|
||||||
|
|
||||||
|
## EDK2 Developer environment
|
||||||
|
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
993
edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch
Normal file
993
edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch
Normal file
@ -0,0 +1,993 @@
|
|||||||
|
From 02544e617ce4dfffff15dab47463484ccdc9a51f Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Date: Wed, 15 Dec 2021 12:39:17 +0100
|
||||||
|
Subject: [PATCH 2/6] OvmfPkg: move tcg configuration to dsc and fdf include
|
||||||
|
files
|
||||||
|
|
||||||
|
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
|
||||||
|
RH-Commit: [2/6] d811b2cf266baa0fa3f958af0b80bb208f3fe27c (kraxel/centos-edk2)
|
||||||
|
RH-Bugzilla: 1935497
|
||||||
|
RH-Acked-by: Oliver Steffen <None>
|
||||||
|
|
||||||
|
With this in place the tpm configuration is not duplicated for each of
|
||||||
|
our four ovmf config variants (ia32, ia32x64, x64, amdsev) and it is
|
||||||
|
easier to keep them all in sync when updating the tpm configuration.
|
||||||
|
|
||||||
|
No functional change.
|
||||||
|
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
(cherry picked from commit b47575801e1903e8b316d01840572ce2681cf2c6)
|
||||||
|
|
||||||
|
[ kraxel: solve conflict in OvmfPkg/AmdSev/AmdSevX64.dsc ]
|
||||||
|
---
|
||||||
|
OvmfPkg/AmdSev/AmdSevX64.dsc | 85 ++++-----------------------
|
||||||
|
OvmfPkg/AmdSev/AmdSevX64.fdf | 17 +-----
|
||||||
|
OvmfPkg/OvmfPkgIa32.dsc | 88 ++++------------------------
|
||||||
|
OvmfPkg/OvmfPkgIa32.fdf | 17 +-----
|
||||||
|
OvmfPkg/OvmfPkgIa32X64.dsc | 85 ++++-----------------------
|
||||||
|
OvmfPkg/OvmfPkgIa32X64.fdf | 17 +-----
|
||||||
|
OvmfPkg/OvmfPkgX64.dsc | 85 ++++-----------------------
|
||||||
|
OvmfPkg/OvmfPkgX64.fdf | 17 +-----
|
||||||
|
OvmfPkg/OvmfTpmComponentsDxe.dsc.inc | 28 +++++++++
|
||||||
|
OvmfPkg/OvmfTpmComponentsPei.dsc.inc | 22 +++++++
|
||||||
|
OvmfPkg/OvmfTpmDefines.dsc.inc | 6 ++
|
||||||
|
OvmfPkg/OvmfTpmDxe.fdf.inc | 12 ++++
|
||||||
|
OvmfPkg/OvmfTpmLibs.dsc.inc | 14 +++++
|
||||||
|
OvmfPkg/OvmfTpmLibsDxe.dsc.inc | 8 +++
|
||||||
|
OvmfPkg/OvmfTpmLibsPeim.dsc.inc | 9 +++
|
||||||
|
OvmfPkg/OvmfTpmPcds.dsc.inc | 7 +++
|
||||||
|
OvmfPkg/OvmfTpmPcdsHii.dsc.inc | 8 +++
|
||||||
|
OvmfPkg/OvmfTpmPei.fdf.inc | 11 ++++
|
||||||
|
OvmfPkg/OvmfTpmSecurityStub.dsc.inc | 8 +++
|
||||||
|
19 files changed, 185 insertions(+), 359 deletions(-)
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
create mode 100644 OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/AmdSev/AmdSevX64.dsc b/OvmfPkg/AmdSev/AmdSevX64.dsc
|
||||||
|
index 88b65b9f59..8610602ddb 100644
|
||||||
|
--- a/OvmfPkg/AmdSev/AmdSevX64.dsc
|
||||||
|
+++ b/OvmfPkg/AmdSev/AmdSevX64.dsc
|
||||||
|
@@ -32,8 +32,8 @@
|
||||||
|
# -D FLAG=VALUE
|
||||||
|
#
|
||||||
|
DEFINE SOURCE_DEBUG_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# Shell can be useful for debugging but should not be enabled for production
|
||||||
|
@@ -203,16 +203,7 @@
|
||||||
|
SmbusLib|MdePkg/Library/BaseSmbusLibNull/BaseSmbusLibNull.inf
|
||||||
|
OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
- Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
- TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||||
|
-!else
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common]
|
||||||
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
||||||
|
@@ -286,11 +277,7 @@
|
||||||
|
PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf
|
||||||
|
QemuFwCfgLib|OvmfPkg/Library/QemuFwCfgLib/QemuFwCfgPeiLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
|
||||||
|
MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf
|
||||||
|
|
||||||
|
@@ -371,10 +358,8 @@
|
||||||
|
MpInitLib|UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf
|
||||||
|
QemuFwCfgS3Lib|OvmfPkg/Library/QemuFwCfgS3Lib/DxeQemuFwCfgS3LibFwCfg.inf
|
||||||
|
QemuLoadImageLib|OvmfPkg/Library/GenericQemuLoadImageLib/GenericQemuLoadImageLib.inf
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
-!endif
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common.UEFI_APPLICATION]
|
||||||
|
PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
|
||||||
|
@@ -576,15 +561,10 @@
|
||||||
|
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x00
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
|
||||||
|
[PcdsDynamicHii]
|
||||||
|
-!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
#
|
||||||
|
@@ -625,24 +605,7 @@
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
OvmfPkg/AmdSev/SecretPei/SecretPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
- OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
- SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
- SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# DXE Phase modules
|
||||||
|
@@ -664,10 +627,7 @@
|
||||||
|
|
||||||
|
MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
}
|
||||||
|
|
||||||
|
OvmfPkg/8259InterruptControllerDxe/8259.inf
|
||||||
|
@@ -830,27 +790,4 @@
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
- SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
diff --git a/OvmfPkg/AmdSev/AmdSevX64.fdf b/OvmfPkg/AmdSev/AmdSevX64.fdf
|
||||||
|
index 325570c5a3..3f2329dab4 100644
|
||||||
|
--- a/OvmfPkg/AmdSev/AmdSevX64.fdf
|
||||||
|
+++ b/OvmfPkg/AmdSev/AmdSevX64.fdf
|
||||||
|
@@ -156,13 +156,7 @@ INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
|
||||||
|
INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
INF OvmfPkg/AmdSev/SecretPei/SecretPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
-INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
@@ -311,14 +305,7 @@ INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
||||||
|
index fa42d919be..904176ccfc 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
||||||
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
||||||
|
@@ -32,10 +32,10 @@
|
||||||
|
DEFINE SECURE_BOOT_ENABLE = FALSE
|
||||||
|
DEFINE SMM_REQUIRE = FALSE
|
||||||
|
DEFINE SOURCE_DEBUG_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
DEFINE LOAD_X64_ON_IA32_ENABLE = FALSE
|
||||||
|
|
||||||
|
+!include OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
+
|
||||||
|
#
|
||||||
|
# Network definition
|
||||||
|
#
|
||||||
|
@@ -229,16 +229,7 @@
|
||||||
|
SmbusLib|MdePkg/Library/BaseSmbusLibNull/BaseSmbusLibNull.inf
|
||||||
|
OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
- Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
- TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||||
|
-!else
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common]
|
||||||
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
||||||
|
@@ -309,11 +300,7 @@
|
||||||
|
PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf
|
||||||
|
QemuFwCfgLib|OvmfPkg/Library/QemuFwCfgLib/QemuFwCfgPeiLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
|
||||||
|
MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf
|
||||||
|
|
||||||
|
@@ -401,10 +388,8 @@
|
||||||
|
MpInitLib|UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf
|
||||||
|
QemuFwCfgS3Lib|OvmfPkg/Library/QemuFwCfgS3Lib/DxeQemuFwCfgS3LibFwCfg.inf
|
||||||
|
QemuLoadImageLib|OvmfPkg/Library/X86QemuLoadImageLib/X86QemuLoadImageLib.inf
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
-!endif
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common.UEFI_APPLICATION]
|
||||||
|
PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
|
||||||
|
@@ -643,19 +628,14 @@
|
||||||
|
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x00
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
|
||||||
|
# IPv4 and IPv6 PXE Boot support.
|
||||||
|
gEfiNetworkPkgTokenSpaceGuid.PcdIPv4PXESupport|0x01
|
||||||
|
gEfiNetworkPkgTokenSpaceGuid.PcdIPv6PXESupport|0x01
|
||||||
|
|
||||||
|
[PcdsDynamicHii]
|
||||||
|
-!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
#
|
||||||
|
@@ -705,24 +685,7 @@
|
||||||
|
!endif
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
- OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
- SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
- SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# DXE Phase modules
|
||||||
|
@@ -747,10 +710,7 @@
|
||||||
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
||||||
|
NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
|
||||||
|
!endif
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
}
|
||||||
|
|
||||||
|
OvmfPkg/8259InterruptControllerDxe/8259.inf
|
||||||
|
@@ -1004,31 +964,5 @@
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
- SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
|
||||||
|
-!if $(LOAD_X64_ON_IA32_ENABLE) == TRUE
|
||||||
|
- OvmfPkg/CompatImageLoaderDxe/CompatImageLoaderDxe.inf
|
||||||
|
-!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
|
||||||
|
index 51433836d6..8ba9ffc83e 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgIa32.fdf
|
||||||
|
+++ b/OvmfPkg/OvmfPkgIa32.fdf
|
||||||
|
@@ -161,13 +161,7 @@ INF OvmfPkg/SmmAccess/SmmAccessPei.inf
|
||||||
|
!endif
|
||||||
|
INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
-INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
@@ -353,14 +347,7 @@ INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
|
||||||
|
!if $(LOAD_X64_ON_IA32_ENABLE) == TRUE
|
||||||
|
INF OvmfPkg/CompatImageLoaderDxe/CompatImageLoaderDxe.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
||||||
|
index ef962565f8..aebd8980e4 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
||||||
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
||||||
|
@@ -32,8 +32,8 @@
|
||||||
|
DEFINE SECURE_BOOT_ENABLE = FALSE
|
||||||
|
DEFINE SMM_REQUIRE = FALSE
|
||||||
|
DEFINE SOURCE_DEBUG_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# Network definition
|
||||||
|
@@ -233,16 +233,7 @@
|
||||||
|
SmbusLib|MdePkg/Library/BaseSmbusLibNull/BaseSmbusLibNull.inf
|
||||||
|
OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
- Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
- TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||||
|
-!else
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common]
|
||||||
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
||||||
|
@@ -313,11 +304,7 @@
|
||||||
|
PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf
|
||||||
|
QemuFwCfgLib|OvmfPkg/Library/QemuFwCfgLib/QemuFwCfgPeiLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
|
||||||
|
MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf
|
||||||
|
|
||||||
|
@@ -405,10 +392,8 @@
|
||||||
|
MpInitLib|UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf
|
||||||
|
QemuFwCfgS3Lib|OvmfPkg/Library/QemuFwCfgS3Lib/DxeQemuFwCfgS3LibFwCfg.inf
|
||||||
|
QemuLoadImageLib|OvmfPkg/Library/X86QemuLoadImageLib/X86QemuLoadImageLib.inf
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
-!endif
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common.UEFI_APPLICATION]
|
||||||
|
PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
|
||||||
|
@@ -655,9 +640,7 @@
|
||||||
|
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x00
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
|
||||||
|
[PcdsDynamicDefault.X64]
|
||||||
|
# IPv4 and IPv6 PXE Boot support.
|
||||||
|
@@ -665,10 +648,7 @@
|
||||||
|
gEfiNetworkPkgTokenSpaceGuid.PcdIPv6PXESupport|0x01
|
||||||
|
|
||||||
|
[PcdsDynamicHii]
|
||||||
|
-!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
#
|
||||||
|
@@ -718,24 +698,7 @@
|
||||||
|
!endif
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
- OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
- SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
- SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
|
||||||
|
[Components.X64]
|
||||||
|
#
|
||||||
|
@@ -761,10 +724,7 @@
|
||||||
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
||||||
|
NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
|
||||||
|
!endif
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
}
|
||||||
|
|
||||||
|
OvmfPkg/8259InterruptControllerDxe/8259.inf
|
||||||
|
@@ -1019,27 +979,4 @@
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
- SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
|
||||||
|
index a50f80e1e9..65d2600016 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
|
||||||
|
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
|
||||||
|
@@ -164,13 +164,7 @@ INF OvmfPkg/SmmAccess/SmmAccessPei.inf
|
||||||
|
!endif
|
||||||
|
INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
-INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
@@ -363,14 +357,7 @@ INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
||||||
|
index ba9f9833b0..e85ac3d682 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
||||||
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
||||||
|
@@ -32,8 +32,8 @@
|
||||||
|
DEFINE SECURE_BOOT_ENABLE = FALSE
|
||||||
|
DEFINE SMM_REQUIRE = FALSE
|
||||||
|
DEFINE SOURCE_DEBUG_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# Network definition
|
||||||
|
@@ -233,16 +233,7 @@
|
||||||
|
SmbusLib|MdePkg/Library/BaseSmbusLibNull/BaseSmbusLibNull.inf
|
||||||
|
OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
- Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
- TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||||
|
-!else
|
||||||
|
- Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
- TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common]
|
||||||
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
||||||
|
@@ -315,11 +306,7 @@
|
||||||
|
PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf
|
||||||
|
QemuFwCfgLib|OvmfPkg/Library/QemuFwCfgLib/QemuFwCfgPeiLib.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
|
||||||
|
MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf
|
||||||
|
|
||||||
|
@@ -407,10 +394,8 @@
|
||||||
|
MpInitLib|UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf
|
||||||
|
QemuFwCfgS3Lib|OvmfPkg/Library/QemuFwCfgS3Lib/DxeQemuFwCfgS3LibFwCfg.inf
|
||||||
|
QemuLoadImageLib|OvmfPkg/Library/X86QemuLoadImageLib/X86QemuLoadImageLib.inf
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
-!endif
|
||||||
|
+
|
||||||
|
+!include OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
|
||||||
|
[LibraryClasses.common.UEFI_APPLICATION]
|
||||||
|
PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
|
||||||
|
@@ -655,19 +640,14 @@
|
||||||
|
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x00
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
|
||||||
|
# IPv4 and IPv6 PXE Boot support.
|
||||||
|
gEfiNetworkPkgTokenSpaceGuid.PcdIPv4PXESupport|0x01
|
||||||
|
gEfiNetworkPkgTokenSpaceGuid.PcdIPv6PXESupport|0x01
|
||||||
|
|
||||||
|
[PcdsDynamicHii]
|
||||||
|
-!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
- gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
#
|
||||||
|
@@ -717,24 +697,7 @@
|
||||||
|
!endif
|
||||||
|
UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
- OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
- SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
- SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
|
||||||
|
#
|
||||||
|
# DXE Phase modules
|
||||||
|
@@ -758,10 +721,7 @@
|
||||||
|
<LibraryClasses>
|
||||||
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
||||||
|
NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
|
||||||
|
-!endif
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
- NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
+!include OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
!endif
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -1017,27 +977,4 @@
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
|
||||||
|
- HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
- NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
- }
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
- SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
- }
|
||||||
|
- SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
- <LibraryClasses>
|
||||||
|
- TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
- }
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
|
||||||
|
index dd1c6eded9..e5cbae2073 100644
|
||||||
|
--- a/OvmfPkg/OvmfPkgX64.fdf
|
||||||
|
+++ b/OvmfPkg/OvmfPkgX64.fdf
|
||||||
|
@@ -180,13 +180,7 @@ INF OvmfPkg/SmmAccess/SmmAccessPei.inf
|
||||||
|
!endif
|
||||||
|
INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
-INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
@@ -379,14 +373,7 @@ INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
|
||||||
|
#
|
||||||
|
# TPM support
|
||||||
|
#
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
-!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
-INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
-!endif
|
||||||
|
-!endif
|
||||||
|
+!include OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..d5c2586118
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
@@ -0,0 +1,28 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
+ <LibraryClasses>
|
||||||
|
+ Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
+ NULL|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
|
||||||
|
+ HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
+ }
|
||||||
|
+!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
+ SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
+!endif
|
||||||
|
+ SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
+ <LibraryClasses>
|
||||||
|
+ Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
+ }
|
||||||
|
+ SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
+ <LibraryClasses>
|
||||||
|
+ TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
+ }
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..99fa7c13b3
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
@@ -0,0 +1,22 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
+ OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+ SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
+ SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
+ <LibraryClasses>
|
||||||
|
+ HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSha512/HashInstanceLibSha512.inf
|
||||||
|
+ NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
+ }
|
||||||
|
+ SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf {
|
||||||
|
+ <LibraryClasses>
|
||||||
|
+ TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
+ }
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDefines.dsc.inc b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..51da7508b3
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
@@ -0,0 +1,6 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+ DEFINE TPM_ENABLE = FALSE
|
||||||
|
+ DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDxe.fdf.inc b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..9dcdaaf01c
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
@@ -0,0 +1,12 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
+INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
+INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
+!if $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
+INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
+!endif
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibs.dsc.inc b/OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..50100f2c03
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
@@ -0,0 +1,14 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
+ Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
+ Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
+ Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
+ TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||||
|
+!else
|
||||||
|
+ Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibNull/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
+ TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibsDxe.dsc.inc b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..67d5027aba
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
@@ -0,0 +1,8 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
+ Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibsPeim.dsc.inc b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..4e84e3dcaa
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
@@ -0,0 +1,9 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
+ Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
+ Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPcds.dsc.inc b/OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..0e7f83c04b
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
@@ -0,0 +1,7 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..164bc9c7fc
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
@@ -0,0 +1,8 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE && $(TPM_CONFIG_ENABLE) == TRUE
|
||||||
|
+ gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
+ gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPei.fdf.inc b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..9aefd73d21
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
@@ -0,0 +1,11 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
+INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
+INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
+INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
+!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmSecurityStub.dsc.inc b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..4bd4066843
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
@@ -0,0 +1,8 @@
|
||||||
|
+##
|
||||||
|
+# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
+##
|
||||||
|
+
|
||||||
|
+!if $(TPM_ENABLE) == TRUE
|
||||||
|
+ NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
+ NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
+!endif
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
@ -0,0 +1,33 @@
|
|||||||
|
From 9948bb7e9e693b4add121964ec724d4db09df352 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Date: Wed, 15 Dec 2021 12:39:16 +0100
|
||||||
|
Subject: [PATCH 1/6] OvmfPkg: remove unused TPM options from MicrovmX64.dsc
|
||||||
|
|
||||||
|
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
|
||||||
|
RH-Commit: [1/6] cce6ba5501b413c0eb87ac452a53818e68dfa630 (kraxel/centos-edk2)
|
||||||
|
RH-Bugzilla: 1935497
|
||||||
|
RH-Acked-by: Oliver Steffen <None>
|
||||||
|
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
(cherry picked from commit 3a72ec71cd83f0f5ad2f1d3c78527f4b247da75f)
|
||||||
|
---
|
||||||
|
OvmfPkg/Microvm/MicrovmX64.dsc | 2 --
|
||||||
|
1 file changed, 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/Microvm/MicrovmX64.dsc b/OvmfPkg/Microvm/MicrovmX64.dsc
|
||||||
|
index 617f925395..c58c4c35d4 100644
|
||||||
|
--- a/OvmfPkg/Microvm/MicrovmX64.dsc
|
||||||
|
+++ b/OvmfPkg/Microvm/MicrovmX64.dsc
|
||||||
|
@@ -32,8 +32,6 @@
|
||||||
|
DEFINE SECURE_BOOT_ENABLE = FALSE
|
||||||
|
DEFINE SMM_REQUIRE = FALSE
|
||||||
|
DEFINE SOURCE_DEBUG_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
- DEFINE TPM_CONFIG_ENABLE = FALSE
|
||||||
|
|
||||||
|
#
|
||||||
|
# Network definition
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
293
edk2-OvmfPkg-rework-TPM-configuration.patch
Normal file
293
edk2-OvmfPkg-rework-TPM-configuration.patch
Normal file
@ -0,0 +1,293 @@
|
|||||||
|
From 5787adaccb16e4af7df661d6c7eb3197c7f14218 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Date: Wed, 15 Dec 2021 12:39:20 +0100
|
||||||
|
Subject: [PATCH 5/6] OvmfPkg: rework TPM configuration
|
||||||
|
|
||||||
|
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
|
||||||
|
RH-Commit: [5/6] 81ed86c6993e8cca4fabf5f471e198134b907562 (kraxel/centos-edk2)
|
||||||
|
RH-Bugzilla: 1935497
|
||||||
|
RH-Acked-by: Oliver Steffen <None>
|
||||||
|
|
||||||
|
Rename TPM_ENABLE to TPM2_ENABLE so naming is in line with the
|
||||||
|
ArmVirtPkg config option name.
|
||||||
|
|
||||||
|
Add separate TPM1_ENABLE option for TPM 1.2 support.
|
||||||
|
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
Tested-by: Stefan Berger <stefanb@linux.ibm.com>
|
||||||
|
(cherry picked from commit 4de8d61bcec02a13ceed84f92b0cf3ea58adf9c5)
|
||||||
|
---
|
||||||
|
OvmfPkg/OvmfTpmComponentsDxe.dsc.inc | 4 +++-
|
||||||
|
OvmfPkg/OvmfTpmComponentsPei.dsc.inc | 6 +++++-
|
||||||
|
OvmfPkg/OvmfTpmDefines.dsc.inc | 5 ++++-
|
||||||
|
OvmfPkg/OvmfTpmDxe.fdf.inc | 4 +++-
|
||||||
|
OvmfPkg/OvmfTpmLibs.dsc.inc | 4 +++-
|
||||||
|
OvmfPkg/OvmfTpmLibsDxe.dsc.inc | 4 +++-
|
||||||
|
OvmfPkg/OvmfTpmLibsPeim.dsc.inc | 4 +++-
|
||||||
|
OvmfPkg/OvmfTpmPcds.dsc.inc | 2 +-
|
||||||
|
OvmfPkg/OvmfTpmPcdsHii.dsc.inc | 2 +-
|
||||||
|
OvmfPkg/OvmfTpmPei.fdf.inc | 6 +++++-
|
||||||
|
OvmfPkg/OvmfTpmSecurityStub.dsc.inc | 4 +++-
|
||||||
|
OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 6 +++---
|
||||||
|
OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 6 +++---
|
||||||
|
OvmfPkg/PlatformCI/ReadMe.md | 2 +-
|
||||||
|
14 files changed, 41 insertions(+), 18 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
index e025d85a58..75ae09571e 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
|
||||||
|
@@ -2,7 +2,7 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
|
||||||
|
@@ -15,10 +15,12 @@
|
||||||
|
NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
|
||||||
|
}
|
||||||
|
SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
}
|
||||||
|
+!endif
|
||||||
|
SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
index 87d491da50..fa486eed82 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
|
||||||
|
@@ -2,10 +2,14 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
+!else
|
||||||
|
+ OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+!endif
|
||||||
|
SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
|
||||||
|
<LibraryClasses>
|
||||||
|
HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDefines.dsc.inc b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
index 5df4a331fb..a65564d8d9 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDefines.dsc.inc
|
||||||
|
@@ -2,4 +2,7 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
- DEFINE TPM_ENABLE = FALSE
|
||||||
|
+ DEFINE TPM2_ENABLE = FALSE
|
||||||
|
+
|
||||||
|
+ # has no effect unless TPM2_ENABLE == TRUE
|
||||||
|
+ DEFINE TPM1_ENABLE = TRUE
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmDxe.fdf.inc b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
index 32eef24638..7fc2bf8590 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmDxe.fdf.inc
|
||||||
|
@@ -2,8 +2,10 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
|
||||||
|
+!endif
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibs.dsc.inc b/OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
index 50100f2c03..418747b134 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibs.dsc.inc
|
||||||
|
@@ -2,8 +2,10 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||||
|
+!endif
|
||||||
|
Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||||
|
Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||||
|
Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibsDxe.dsc.inc b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
index 67d5027aba..1d66cdac77 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
|
||||||
|
@@ -2,7 +2,9 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
|
||||||
|
+!endif
|
||||||
|
Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmLibsPeim.dsc.inc b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
index 4e84e3dcaa..03caccd7c6 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
|
||||||
|
@@ -2,8 +2,10 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
|
||||||
|
+!endif
|
||||||
|
Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPcds.dsc.inc b/OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
index 0e7f83c04b..0d55d62737 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPcds.dsc.inc
|
||||||
|
@@ -2,6 +2,6 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
index 2e02a5b4cb..e842253235 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
|
||||||
|
@@ -2,7 +2,7 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
|
||||||
|
gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmPei.fdf.inc b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
index 709a608cc3..9f8b9bdd5b 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmPei.fdf.inc
|
||||||
|
@@ -2,10 +2,14 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
INF OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
|
||||||
|
INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
|
||||||
|
+!else
|
||||||
|
+INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
|
||||||
|
+!endif
|
||||||
|
INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
|
||||||
|
INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/OvmfTpmSecurityStub.dsc.inc b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
index 4bd4066843..e9ab2fca7b 100644
|
||||||
|
--- a/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
+++ b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
|
||||||
|
@@ -2,7 +2,9 @@
|
||||||
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
##
|
||||||
|
|
||||||
|
-!if $(TPM_ENABLE) == TRUE
|
||||||
|
+!if $(TPM2_ENABLE) == TRUE
|
||||||
|
+!if $(TPM1_ENABLE) == TRUE
|
||||||
|
NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
|
||||||
|
+!endif
|
||||||
|
NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
|
||||||
|
!endif
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
index 1774423580..8df31298f5 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
|
||||||
|
@@ -95,21 +95,21 @@ jobs:
|
||||||
|
OVMF_IA32X64_FULL_DEBUG:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "DEBUG"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_RELEASE:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "RELEASE"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_NOOPT:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "NOOPT"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
index 09f9851312..68b5d951e9 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
|
||||||
|
@@ -94,14 +94,14 @@ jobs:
|
||||||
|
OVMF_IA32X64_FULL_DEBUG:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "DEBUG"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
OVMF_IA32X64_FULL_RELEASE:
|
||||||
|
Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
Build.Arch: "IA32,X64"
|
||||||
|
- Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
Build.Target: "RELEASE"
|
||||||
|
Run.Flags: $(run_flags)
|
||||||
|
Run: $(should_run)
|
||||||
|
@@ -112,7 +112,7 @@ jobs:
|
||||||
|
# OVMF_IA32X64_FULL_NOOPT:
|
||||||
|
# Build.File: "$(package)/PlatformCI/PlatformBuild.py"
|
||||||
|
# Build.Arch: "IA32,X64"
|
||||||
|
- # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
+ # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
|
||||||
|
# Build.Target: "NOOPT"
|
||||||
|
# Run.Flags: $(run_flags)
|
||||||
|
# Run: $(should_run)
|
||||||
|
diff --git a/OvmfPkg/PlatformCI/ReadMe.md b/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
index 44aa7c4a9d..1216dee126 100644
|
||||||
|
--- a/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
+++ b/OvmfPkg/PlatformCI/ReadMe.md
|
||||||
|
@@ -14,7 +14,7 @@ supported and are described below.
|
||||||
|
| IA32 | IA32 | OvmfPkgIa32.dsc | None |
|
||||||
|
| X64 | X64 | OvmfPkgIa64.dsc | None |
|
||||||
|
| IA32 X64 | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | None |
|
||||||
|
-| IA32 X64 Full | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
|
||||||
|
+| IA32 X64 Full | PEI-IA32 DXE-X64 | OvmfPkgIa32X64.dsc | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM1_ENABLE=1 TPM2_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
|
||||||
|
|
||||||
|
## EDK2 Developer environment
|
||||||
|
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
26
edk2.spec
26
edk2.spec
@ -24,7 +24,7 @@ ExclusiveArch: x86_64 aarch64
|
|||||||
|
|
||||||
Name: edk2
|
Name: edk2
|
||||||
Version: %{GITDATE}git%{GITCOMMIT}
|
Version: %{GITDATE}git%{GITCOMMIT}
|
||||||
Release: 1%{?dist}
|
Release: 2%{?dist}
|
||||||
Summary: UEFI firmware for 64-bit virtual machines
|
Summary: UEFI firmware for 64-bit virtual machines
|
||||||
License: BSD-2-Clause-Patent and OpenSSL and MIT
|
License: BSD-2-Clause-Patent and OpenSSL and MIT
|
||||||
URL: http://www.tianocore.org
|
URL: http://www.tianocore.org
|
||||||
@ -83,6 +83,16 @@ Patch0043: 0043-OvmfPkg-Remove-HttpDynamicCommand-from-shell-RHEL-on.patch
|
|||||||
Patch0044: 0044-ArmVirtPkg-Remove-HttpDynamicCommand-from-shell-RHEL.patch
|
Patch0044: 0044-ArmVirtPkg-Remove-HttpDynamicCommand-from-shell-RHEL.patch
|
||||||
Patch0045: 0045-OvmfPkg-Remove-LinuxInitrdDynamicShellCommand-RHEL-o.patch
|
Patch0045: 0045-OvmfPkg-Remove-LinuxInitrdDynamicShellCommand-RHEL-o.patch
|
||||||
Patch0046: 0046-ArmVirtPkg-Remove-LinuxInitrdDynamicShellCommand-RHE.patch
|
Patch0046: 0046-ArmVirtPkg-Remove-LinuxInitrdDynamicShellCommand-RHE.patch
|
||||||
|
# For bz#1935497 - edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default
|
||||||
|
Patch47: edk2-OvmfPkg-remove-unused-TPM-options-from-MicrovmX64.ds.patch
|
||||||
|
# For bz#1935497 - edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default
|
||||||
|
Patch48: edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch
|
||||||
|
# For bz#1935497 - edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default
|
||||||
|
Patch49: edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch
|
||||||
|
# For bz#1935497 - edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default
|
||||||
|
Patch50: edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch
|
||||||
|
# For bz#1935497 - edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default
|
||||||
|
Patch51: edk2-OvmfPkg-rework-TPM-configuration.patch
|
||||||
|
|
||||||
|
|
||||||
# python3-devel and libuuid-devel are required for building tools.
|
# python3-devel and libuuid-devel are required for building tools.
|
||||||
@ -226,8 +236,8 @@ fi
|
|||||||
CC_FLAGS="$CC_FLAGS --cmd-len=65536 -t %{TOOLCHAIN} -b DEBUG --hash"
|
CC_FLAGS="$CC_FLAGS --cmd-len=65536 -t %{TOOLCHAIN} -b DEBUG --hash"
|
||||||
CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE"
|
CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE"
|
||||||
CC_FLAGS="$CC_FLAGS -D NETWORK_HTTP_BOOT_ENABLE -D NETWORK_TLS_ENABLE"
|
CC_FLAGS="$CC_FLAGS -D NETWORK_HTTP_BOOT_ENABLE -D NETWORK_TLS_ENABLE"
|
||||||
CC_FLAGS="$CC_FLAGS -D TPM_ENABLE" # x86
|
CC_FLAGS="$CC_FLAGS -D TPM2_ENABLE=TRUE"
|
||||||
CC_FLAGS="$CC_FLAGS -D TPM2_ENABLE" # arm
|
CC_FLAGS="$CC_FLAGS -D TPM1_ENABLE=FALSE"
|
||||||
|
|
||||||
OVMF_FLAGS="${CC_FLAGS}"
|
OVMF_FLAGS="${CC_FLAGS}"
|
||||||
OVMF_FLAGS="${OVMF_FLAGS} -D FD_SIZE_4MB"
|
OVMF_FLAGS="${OVMF_FLAGS} -D FD_SIZE_4MB"
|
||||||
@ -521,6 +531,16 @@ KERNEL_IMG=$(rpm -q -l $KERNEL_PKG | egrep '^/lib/modules/[^/]+/vmlinuz$')
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Feb 08 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-2
|
||||||
|
- edk2-OvmfPkg-remove-unused-TPM-options-from-MicrovmX64.ds.patch [bz#1935497]
|
||||||
|
- edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch [bz#1935497]
|
||||||
|
- edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch [bz#1935497]
|
||||||
|
- edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch [bz#1935497]
|
||||||
|
- edk2-OvmfPkg-rework-TPM-configuration.patch [bz#1935497]
|
||||||
|
- edk2-spec-adapt-specfile-to-build-option-changes-disable-.patch [bz#1935497]
|
||||||
|
- Resolves: bz#1935497
|
||||||
|
(edk2 implements and/or uses the deprecated MD5 and SHA-1 algorithms by default)
|
||||||
|
|
||||||
* Tue Feb 01 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-1
|
* Tue Feb 01 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-1
|
||||||
- Rebase to latest upstream release [bz#2018388]
|
- Rebase to latest upstream release [bz#2018388]
|
||||||
- Resolves: bz#2018388
|
- Resolves: bz#2018388
|
||||||
|
Loading…
Reference in New Issue
Block a user