From nobody Thu Apr 25 10:27:14 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+96189+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96189+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1668088084; cv=none; d=zohomail.com; s=zohoarc; b=BgEK26lZBul/O+lDbF0CzWR8LWR0hmzczW8YeE5DvTFnn1aLTS276LRNxAA7M+APChnQW3PDpv7lPda3UY1/IHH8Jpwe+3udK9zFS7o4mao2HNuDkA4ihoOsDjLyuiamfCeJctgsBz/ghPIdnUzX1aZ8jsxFHaP5VSa/KLsFBm8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1668088084; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=gZ/TDHzE6SmZ+YBy9zSKw4YkcSNaty+AoJIA9+Q8keQ=; b=mBbdHLx+nBk7oDMVITmz5VMykzvRc09fsMDKu67Gusa6r1bmGJ39mcGDhnF1ni8SN5u6suNoTWjK4ufac733gdIztbZALpmWAEKDbLFb022wNnwEbPFwcYCCpWGH+i6/tiEjO+J9pNAP5x2xHFlHSstfrTI75hFYkAKD3EvcddE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96189+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1668088084887841.550523079222; Thu, 10 Nov 2022 05:48:04 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 8T1ZYY1788612xPZI7b83RLm; Thu, 10 Nov 2022 05:48:03 -0800 X-Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web10.7543.1668088083133740311 for ; Thu, 10 Nov 2022 05:48:03 -0800 X-Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 86AE8617BE; Thu, 10 Nov 2022 13:48:02 +0000 (UTC) X-Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0F71AC433D7; Thu, 10 Nov 2022 13:47:59 +0000 (UTC) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Liming Gao , Rebecca Cran , Pierre Gondois , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , "Jason A . Donenfeld" Subject: [edk2-devel] [PATCH 1/3] ArmPkg/ArmTrngLib: Fix incorrect GUID reference in DEBUG() output Date: Thu, 10 Nov 2022 14:47:36 +0100 Message-Id: <20221110134738.3798618-2-ardb@kernel.org> In-Reply-To: <20221110134738.3798618-1-ardb@kernel.org> References: <20221110134738.3798618-1-ardb@kernel.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ardb@kernel.org X-Gm-Message-State: PtgNebPRgLwmM30V66FUj5nbx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1668088083; bh=o2vMHAG+U0IJLoiQ/HOarscCI3b30ThSemmNlxaoN9w=; h=Cc:Date:From:Reply-To:Subject:To; b=WaLEkjk5V5zX0bQet2DHQLNLOzry1c3jfhTH88fpojnVjJaOhX4Tdtw1USjE4dJD4TW 7STKqtBfGiPR3uELLy5amfRKuevw3SUSvgLM6ogYzSot3NmM/W9N0CDkTO3tgHHBvd+ab w5m3i40rCHo1H7jbFjPkiH8oUSRRaliHiDc= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1668088086870100002 Content-Type: text/plain; charset="utf-8" ArmTrngLib crashes when run in DEBUG mode due to the fact that it passed the [truncated] GUID value to a DEBUG() print statement instead of a pointer to the GUID which is what the %g conversion expects. Signed-off-by: Ard Biesheuvel Acked-by: Gerd Hoffmann Reviewed-by: Sami Mujawar --- ArmPkg/Library/ArmTrngLib/ArmTrngLib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ArmPkg/Library/ArmTrngLib/ArmTrngLib.c b/ArmPkg/Library/ArmTrn= gLib/ArmTrngLib.c index b974a9423880..fdabc02cd39c 100644 --- a/ArmPkg/Library/ArmTrngLib/ArmTrngLib.c +++ b/ArmPkg/Library/ArmTrngLib/ArmTrngLib.c @@ -375,7 +375,7 @@ ArmTrngLibConstructor ( "FW-TRNG: Version %d.%d, GUID {%g}\n", MajorRev, MinorRev, - Guid + &Guid )); =20 DEBUG_CODE_END (); --=20 2.35.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#96189): https://edk2.groups.io/g/devel/message/96189 Mute This Topic: https://groups.io/mt/94935840/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Thu Apr 25 10:27:14 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+96190+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96190+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1668088086; cv=none; d=zohomail.com; s=zohoarc; b=C+YMw9+4CYNuc69y/pYF3r8F4yquUO0/4MheFq7VDBNn7UiGZPFUSU76uoW2nhBtBw+iUQezihpmjvyHASCbMrvPmJUbtbeIqGrdgGJCHyorAN18ePeI+uChyv64b/rkZFdpusSRnTwU7BcjlS8tWi/VHWfK6KWp1F39l1JWO54= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1668088086; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=d5zQCByV+hBy7vHoD8P0AfJkiO4Mhvn6rY0HTA4fQTk=; b=UvevO6pEYuxhloddEpKYuhhT/iGiJDYrp59bbvne3zMT1gXYmjV9txlb8xA1MzZJUncQwLeeR8cWXF42fsmvM1+CgEklkllFxHi51RnJ8QowU7yC51Y8quAA8vXDgawTQBd6meklxiByslkKs1AAdVPPk8tFGxvNHA10wYmy/dM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96190+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1668088086908453.3351072837304; Thu, 10 Nov 2022 05:48:06 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id edCLYY1788612x0TQFXmE1Mn; Thu, 10 Nov 2022 05:48:06 -0800 X-Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web09.7632.1668088085909545739 for ; Thu, 10 Nov 2022 05:48:06 -0800 X-Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4678561889; Thu, 10 Nov 2022 13:48:05 +0000 (UTC) X-Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68624C433C1; Thu, 10 Nov 2022 13:48:02 +0000 (UTC) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Liming Gao , Rebecca Cran , Pierre Gondois , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , "Jason A . Donenfeld" Subject: [edk2-devel] [PATCH 2/3] ArmVirtPkg/ArmVirtQemu: Expose TRNG hypercall via RngDxe if implemented Date: Thu, 10 Nov 2022 14:47:37 +0100 Message-Id: <20221110134738.3798618-3-ardb@kernel.org> In-Reply-To: <20221110134738.3798618-1-ardb@kernel.org> References: <20221110134738.3798618-1-ardb@kernel.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ardb@kernel.org X-Gm-Message-State: vMHfenGEz8KohxYyqb6uFxIRx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1668088086; bh=ZWBLyyFxp0ne2k5Xegwv08+mcmd/zssTmd7fjEMoBik=; h=Cc:Date:From:Reply-To:Subject:To; b=A1PySXw9xuFg3M7M0QYmfyCFzRWeqoJEkmsR5ai5wpWEkBUKk7cWiAA2D6f0kGmmJax XSe3Oxl+dWWw4fhwAL9mbJqyrq/zqQ+71NJ3Yrexmj0rXJxu8T1+KfBKNqMMwW+YNBnwf 7Ftwben4AN1pF/WRzlCGuHJ2D6uWfOQE/YA= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1668088088894100005 Content-Type: text/plain; charset="utf-8" Currently, we only expose the EFI_RNG_PROTOCOL in ArmVirtQemu if QEMU provides a virtio-rng device, and it doesn't do so by default. Given that KVM exposes the ARM architected TRNG service (and has done so for a while now), let's incorporate the RngDxe driver which has recently grown support for the ARM firmware/hypervisor service. If both the service and the virtio device are available, two implementations of the RNG protocol will be exposed, but this is fine: callers that don't care about the distinction will grab the first one available. Signed-off-by: Ard Biesheuvel Acked-by: Gerd Hoffmann --- ArmVirtPkg/ArmVirtQemu.dsc | 11 +++++++++++ ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 5 +++++ ArmVirtPkg/ArmVirtQemuKernel.dsc | 11 +++++++++++ 3 files changed, 27 insertions(+) diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc index f77443229e8e..1771ad562225 100644 --- a/ArmVirtPkg/ArmVirtQemu.dsc +++ b/ArmVirtPkg/ArmVirtQemu.dsc @@ -140,6 +140,8 @@ [PcdsFeatureFlag.common] =20 gArmVirtTokenSpaceGuid.PcdTpm2SupportEnabled|$(TPM2_ENABLE) =20 + gArmTokenSpaceGuid.PcdMonitorConduitHvc|TRUE + [PcdsFixedAtBuild.common] !if $(ARCH) =3D=3D AARCH64 gArmTokenSpaceGuid.PcdVFPEnabled|1 @@ -442,6 +444,15 @@ [Components.common] OvmfPkg/VirtioNetDxe/VirtioNet.inf OvmfPkg/VirtioRngDxe/VirtioRng.inf =20 + # + # Rng Support + # + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf { + + ArmMonitorLib|ArmPkg/Library/ArmMonitorLib/ArmMonitorLib.inf + ArmTrngLib|ArmPkg/Library/ArmTrngLib/ArmTrngLib.inf + } + # # FAT filesystem + GPT/MBR partitioning + UDF filesystem + virtio-fs # diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuF= vMain.fdf.inc index e06ca7424476..75c75a2d9a17 100644 --- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc +++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc @@ -99,6 +99,11 @@ [FV.FvMain] INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf INF OvmfPkg/VirtioRngDxe/VirtioRng.inf =20 + # + # Rng Support + # + INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf + INF ShellPkg/Application/Shell/Shell.inf INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKerne= l.dsc index f5db3ac432f3..abe0cbab8295 100644 --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc @@ -114,6 +114,8 @@ [PcdsFeatureFlag.common] =20 gEfiMdeModulePkgTokenSpaceGuid.PcdTurnOffUsbLegacySupport|TRUE =20 + gArmTokenSpaceGuid.PcdMonitorConduitHvc|TRUE + [PcdsFixedAtBuild.common] !if $(ARCH) =3D=3D AARCH64 gArmTokenSpaceGuid.PcdVFPEnabled|1 @@ -350,6 +352,15 @@ [Components.common] OvmfPkg/VirtioNetDxe/VirtioNet.inf OvmfPkg/VirtioRngDxe/VirtioRng.inf =20 + # + # Rng Support + # + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf { + + ArmMonitorLib|ArmPkg/Library/ArmMonitorLib/ArmMonitorLib.inf + ArmTrngLib|ArmPkg/Library/ArmTrngLib/ArmTrngLib.inf + } + # # FAT filesystem + GPT/MBR partitioning + UDF filesystem + virtio-fs # --=20 2.35.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#96190): https://edk2.groups.io/g/devel/message/96190 Mute This Topic: https://groups.io/mt/94935841/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Thu Apr 25 10:27:14 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+96191+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96191+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1668088088; cv=none; d=zohomail.com; s=zohoarc; b=e0LWQkrOuJAx0XiiQB9HphwzXsVxPn71shKAdCnblVjViRMXp3Auzn7fQ8T6eWUBkfxZW6OT2HMO23FAEr3sB57usIydbHONobrY5L91uc8e4NTJ3nWfVVjQr8xqseTH7kFHH98nq4xd/wVjIyQFf2iQAYAsUkafYCRQB/5mXvw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1668088088; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=E4vlU8FcPTCZMwX0fOtijWJYym55lF/qn3j7DAGSvSI=; b=Xpq988Da1IW6g9VCbNfQ+G8VzsfBk4TV8foQbf2OlcOe+kZYQNK7vT93QY6jdcM7K4jFdE1yR6WX60XwkkpMyd/BK/yvAve+TyqwIHvu7DwBT6WSDHUf1QQWUExY0chSWaKO2snz6CdRsKJqzj2emHOCJGgoG7b0sGCKic6k7Z8= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+96191+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1668088088759345.243756721551; Thu, 10 Nov 2022 05:48:08 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id m03cYY1788612xlfNrc2FXrD; Thu, 10 Nov 2022 05:48:08 -0800 X-Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web12.7636.1668088087829444963 for ; Thu, 10 Nov 2022 05:48:08 -0800 X-Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4F4C7617B6; Thu, 10 Nov 2022 13:48:07 +0000 (UTC) X-Received: by smtp.kernel.org (Postfix) with ESMTPSA id C56ECC43153; Thu, 10 Nov 2022 13:48:04 +0000 (UTC) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Liming Gao , Rebecca Cran , Pierre Gondois , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , "Jason A . Donenfeld" Subject: [edk2-devel] [PATCH 3/3] OvmfPkg/OvmfX86: Enable RDRAND based EFI_RNG_PROTOCOL implementation Date: Thu, 10 Nov 2022 14:47:38 +0100 Message-Id: <20221110134738.3798618-4-ardb@kernel.org> In-Reply-To: <20221110134738.3798618-1-ardb@kernel.org> References: <20221110134738.3798618-1-ardb@kernel.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ardb@kernel.org X-Gm-Message-State: rRST2bDEhhRKoc9T5zEsBWjxx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1668088088; bh=8HLBVGMkcDjbqLSwLdqOzZphDhu9g8/dm1lJkCJrxfs=; h=Cc:Date:From:Reply-To:Subject:To; b=kAyy7kpsCCZoWPHps9T6qnpEKfIPekLmvz/A/VBuH1dnBnIfudJTPJj7oULh2ku9dHc j2pyreDbMaZPqLosuStxy0ApicRyeHYy6cEjd0uNkH36yLul7vHZqWGt8Uue4Nh7+wkro xmG3MgB22NNam5JmUQLpKnLYZmHjG23d32g= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1668088090881100009 Content-Type: text/plain; charset="utf-8" Expose the EFI_RNG_PROTOCOL based on RdRand, so that we don't have to rely on QEMU providing a virtio-rng device in order to implement this protocol. Signed-off-by: Ard Biesheuvel Acked-by: Gerd Hoffmann --- OvmfPkg/OvmfPkgIa32.dsc | 1 + OvmfPkg/OvmfPkgIa32.fdf | 1 + OvmfPkg/OvmfPkgIa32X64.dsc | 1 + OvmfPkg/OvmfPkgIa32X64.fdf | 1 + OvmfPkg/OvmfPkgX64.dsc | 1 + OvmfPkg/OvmfPkgX64.fdf | 1 + 6 files changed, 6 insertions(+) diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc index e9ba491237ae..18c1e7255812 100644 --- a/OvmfPkg/OvmfPkgIa32.dsc +++ b/OvmfPkg/OvmfPkgIa32.dsc @@ -941,6 +941,7 @@ [Components] } !endif =20 + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf index 7023ade8cebe..34f27ca832bc 100644 --- a/OvmfPkg/OvmfPkgIa32.fdf +++ b/OvmfPkg/OvmfPkgIa32.fdf @@ -248,6 +248,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf !endif =20 + INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf !endif diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc index af566b953f36..e9a199c9f490 100644 --- a/OvmfPkg/OvmfPkgIa32X64.dsc +++ b/OvmfPkg/OvmfPkgIa32X64.dsc @@ -955,6 +955,7 @@ [Components.X64] } !endif =20 + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf index 80de4fa2c0df..33cc163e596e 100644 --- a/OvmfPkg/OvmfPkgIa32X64.fdf +++ b/OvmfPkg/OvmfPkgIa32X64.fdf @@ -249,6 +249,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf !endif =20 + INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf !endif diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc index f39d9cd117e6..5572cb82998f 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc @@ -1023,6 +1023,7 @@ [Components] } !endif =20 + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf index c0f5a1ef3c30..d42deebe3f8f 100644 --- a/OvmfPkg/OvmfPkgX64.fdf +++ b/OvmfPkg/OvmfPkgX64.fdf @@ -274,6 +274,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf !endif =20 +INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf !endif --=20 2.35.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#96191): https://edk2.groups.io/g/devel/message/96191 Mute This Topic: https://groups.io/mt/94935843/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-