From nobody Sun Feb 8 15:47:06 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+80830+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+80830+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=linux.ibm.com ARC-Seal: i=1; a=rsa-sha256; t=1631827083; cv=none; d=zohomail.com; s=zohoarc; b=WRr4MCUp5QkwvYs8Y46oRdEu/0ZTIFUnz+TDG85ovuDhpvHlqtOolc2nYfsW0hUIjtDYYsFkiSPGPDzHp/cTCkVfyaijIjOTInmWS/6XgcaOuNba++D5g1FRNbPCFiQ1Ebfv1YDiCfsv0AvRE9Q+w2C8PW5TlQjyh658O5nVqmg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1631827083; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=+kDUYbZ2zVPHtV2/38jQfPJXDmO+OZowpjXNuK7372A=; b=NjFViCDLMyWegEwEVUQP2BZabsjOP0re50/J5NZr8OLStB/Ah87ZM5B2x6D+IggsL3G8Rnzs5BX/XssPdfVL6XZhh3BDM2B2h5IYnpHjhFJ99+1EUfkfOStZogfMLN0RzZxauIDdiv9BSVE+kLoi0V0XpWjmRe73E1Fa+pEsRgU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+80830+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1631827083405599.8318990245734; Thu, 16 Sep 2021 14:18:03 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id vN5zYY1788612xX3tOsOwbxa; Thu, 16 Sep 2021 14:18:03 -0700 X-Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by mx.groups.io with SMTP id smtpd.web12.4086.1631827081652347957 for ; Thu, 16 Sep 2021 14:18:02 -0700 X-Received: from pps.filterd (m0187473.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 18GKgKFv035594; Thu, 16 Sep 2021 17:17:58 -0400 X-Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3b49k0w8t6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Sep 2021 17:17:58 -0400 X-Received: from m0187473.ppops.net (m0187473.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 18GLGGMP031623; Thu, 16 Sep 2021 17:17:57 -0400 X-Received: from ppma03wdc.us.ibm.com (ba.79.3fa9.ip4.static.sl-reverse.com [169.63.121.186]) by mx0a-001b2d01.pphosted.com with ESMTP id 3b49k0w8su-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Sep 2021 17:17:57 -0400 X-Received: from pps.filterd (ppma03wdc.us.ibm.com [127.0.0.1]) by ppma03wdc.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 18GLBIv5006354; Thu, 16 Sep 2021 21:17:56 GMT X-Received: from b03cxnp08026.gho.boulder.ibm.com (b03cxnp08026.gho.boulder.ibm.com [9.17.130.18]) by ppma03wdc.us.ibm.com with ESMTP id 3b0m3cmmkm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Sep 2021 21:17:56 +0000 X-Received: from b03ledav002.gho.boulder.ibm.com (b03ledav002.gho.boulder.ibm.com [9.17.130.233]) by b03cxnp08026.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 18GLHtEk21561798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 16 Sep 2021 21:17:55 GMT X-Received: from b03ledav002.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 422AD136067; Thu, 16 Sep 2021 21:17:55 +0000 (GMT) X-Received: from b03ledav002.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B431B136066; Thu, 16 Sep 2021 21:17:54 +0000 (GMT) X-Received: from sbct-2.pok.ibm.com (unknown [9.47.158.152]) by b03ledav002.gho.boulder.ibm.com (Postfix) with ESMTP; Thu, 16 Sep 2021 21:17:54 +0000 (GMT) From: "Stefan Berger" To: devel@edk2.groups.io Cc: marcandre.lureau@redhat.com, kraxel@redhat.com, jiewen.yao@intel.com, ardb+tianocore@kernel.org, leif@nuviainc.com, sami.mujawar@arm.com, Stefan Berger , Stefan Berger Subject: [edk2-devel] [RFC PATCH 1/3] ArmVirtPkg/TPM: Add a NULL implementation of TpmPlatformHierarchyLib Date: Thu, 16 Sep 2021 17:17:50 -0400 Message-Id: <20210916211752.2714332-2-stefanb@linux.ibm.com> In-Reply-To: <20210916211752.2714332-1-stefanb@linux.ibm.com> References: <20210916211752.2714332-1-stefanb@linux.ibm.com> MIME-Version: 1.0 X-TM-AS-GCONF: 00 X-Proofpoint-GUID: YarLtero5LOwH-sy82UjrHgNPmI0QCZy X-Proofpoint-ORIG-GUID: MWgAwJ6boEL9EsuoSBCsy_ADylHp_E0i Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,stefanb@linux.ibm.com X-Gm-Message-State: agxUFi8g3dBvqGVcLJaFGfRjx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1631827083; bh=ZxU9r3Sa0JPYHD14K7TBkKDtTPYoeY0wfvSUzWeQfBU=; h=Cc:Date:From:Reply-To:Subject:To; b=G90vogP/zYh48xwPaBO/XtCBzw4wcc/UnJGNkhbQfJ4gR1ZD/CQ7wFc33srEHfW8w1m vbTA2tlmsH+27PNx+iGBOMhYUyrIvyS2nwK+av1Z77In31b8SJj0x96OtGRxTJwTzc67p jK9pDCbJHI8R46gWbxzXAtuiVt09mn4reS0= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1631827987385100001 Content-Type: text/plain; charset="utf-8" From: Stefan Berger Add a NULL implementation of the library class TpmPlatformHierarchyLib. Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann Signed-off-by: Stefan Berger --- ArmVirtPkg/ArmVirtPkg.dec | 1 + .../Include/Library/TpmPlatformHierarchyLib.h | 27 +++++++++++++++++ .../PeiDxeTpmPlatformHierarchyLib.c | 22 ++++++++++++++ .../PeiDxeTpmPlatformHierarchyLib.inf | 30 +++++++++++++++++++ 4 files changed, 80 insertions(+) create mode 100644 ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h create mode 100644 ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/Pe= iDxeTpmPlatformHierarchyLib.c create mode 100644 ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/Pe= iDxeTpmPlatformHierarchyLib.inf diff --git a/ArmVirtPkg/ArmVirtPkg.dec b/ArmVirtPkg/ArmVirtPkg.dec index 4e4d758015..f3bdca118b 100644 --- a/ArmVirtPkg/ArmVirtPkg.dec +++ b/ArmVirtPkg/ArmVirtPkg.dec @@ -27,6 +27,7 @@ =20 [LibraryClasses] ArmVirtMemInfoLib|Include/Library/ArmVirtMemInfoLib.h + TpmPlatformHierarchyLib|Include/Library/TpmPlatformHierarchyLib.h =20 [Guids.common] gArmVirtTokenSpaceGuid =3D { 0x0B6F5CA7, 0x4F53, 0x445A, { 0xB7, 0x6E, 0= x2E, 0x36, 0x5B, 0x80, 0x63, 0x66 } } diff --git a/ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h b/ArmVirt= Pkg/Include/Library/TpmPlatformHierarchyLib.h new file mode 100644 index 0000000000..8d61a4867b --- /dev/null +++ b/ArmVirtPkg/Include/Library/TpmPlatformHierarchyLib.h @@ -0,0 +1,27 @@ +/** @file + TPM Platform Hierarchy configuration library. + + This library provides functions for customizing the TPM's Platform Hie= rarchy + Authorization Value (platformAuth) and Platform Hierarchy Authorization + Policy (platformPolicy) can be defined through this function. + +Copyright (c) 2019, Intel Corporation. All rights reserved.
+Copyright (c) Microsoft Corporation.
+SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef TPM_PLATFORM_HIERARCHY_LIB_H_ +#define TPM_PLATFORM_HIERARCHY_LIB_H_ + +/** + This service will perform the TPM Platform Hierarchy configuration at t= he SmmReadyToLock event. + +**/ +VOID +EFIAPI +ConfigureTpmPlatformHierarchy ( + VOID + ); + +#endif diff --git a/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpm= PlatformHierarchyLib.c b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNu= ll/PeiDxeTpmPlatformHierarchyLib.c new file mode 100644 index 0000000000..bac1efda63 --- /dev/null +++ b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpmPlatfor= mHierarchyLib.c @@ -0,0 +1,22 @@ +/** @file + Null TPM Platform Hierarchy configuration library. + + This library provides stub functions for customizing the TPM's Platfor= m Hierarchy. + + Copyright (c) 2021, IBM Corporation. + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include + +/** + A NULL implementation of ConfigureTpmPlatformHierarchy. +**/ +VOID +EFIAPI +ConfigureTpmPlatformHierarchy ( + ) +{ + /* no nothing */ +} diff --git a/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpm= PlatformHierarchyLib.inf b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLib= Null/PeiDxeTpmPlatformHierarchyLib.inf new file mode 100644 index 0000000000..4f02818bbc --- /dev/null +++ b/ArmVirtPkg/Library/PeiDxeTpmPlatformHierarchyLibNull/PeiDxeTpmPlatfor= mHierarchyLib.inf @@ -0,0 +1,30 @@ +### @file +# NULL TPM Platform Hierarchy configuration library. +# +# This library provides functions for customizing the TPM's Platform Hie= rarchy +# Authorization Value (platformAuth) and Platform Hierarchy Authorization +# Policy (platformPolicy) can be defined through this function. +# +# Copyright (c) 2019, Intel Corporation. All rights reserved.
+# Copyright (c) Microsoft Corporation.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +### + +[Defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D PeiDxeTpmPlatformHierarchyLibNull + FILE_GUID =3D 8947A3F2-BfB4-45EF-968D-5C40C1CE6A58 + MODULE_TYPE =3D PEIM + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D TpmPlatformHierarchyLib|PEIM DXE_DRIV= ER + +[LibraryClasses] + BaseLib + +[Packages] + MdePkg/MdePkg.dec + +[Sources] + PeiDxeTpmPlatformHierarchyLib.c --=20 2.31.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#80830): https://edk2.groups.io/g/devel/message/80830 Mute This Topic: https://groups.io/mt/85662429/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-