-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[202405][Rebase&&FF] Everything MS Changes #311
Changes from all commits
fecb34c
14e14eb
ed5f6c7
5bcabe1
d3ab135
66dd5fd
4922cf6
a598db7
a486470
e0a5cb0
699235c
b542b90
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
/** @file -- Tcg2PreUefiEventLogLib.h | ||
This describes the interface that should be published by instances of the | ||
Tcg2PreUefiEventLogLib. This library can be used to publish TPM EventLog | ||
entries for measurements that may have been made prior to driver | ||
initialization. | ||
|
||
Copyright (c) Microsoft Corporation. | ||
SPDX-License-Identifier: BSD-2-Clause-Patent | ||
**/ | ||
|
||
#ifndef TCG_2_PRE_UEFI_EVENT_LOG_LIB_H_ | ||
#define TCG_2_PRE_UEFI_EVENT_LOG_LIB_H_ | ||
|
||
/** | ||
Create the EventLog entries. | ||
**/ | ||
VOID | ||
EFIAPI | ||
CreateTcg2PreUefiEventLogEntries ( | ||
VOID | ||
); | ||
|
||
#endif // TCG_2_PRE_UEFI_EVENT_LOG_LIB_H_ |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -212,6 +212,25 @@ AuthVariableLibInitialize ( | |
if (!EFI_ERROR (Status)) { | ||
if (mPlatformMode == USER_MODE) { | ||
SecureBootEnable = *(UINT8 *)Data; | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. potentially can't upstream - may want to keep as one of our changes |
||
// MU_CHANGE_173316 | ||
// MU_CHANGE [BEGIN] - In our implementation, we do not allow SecureBootEnable to override mPlatformMode. | ||
// If SecureBootEnable is FOUND and mPlatformMode is USER_MODE, ensure that | ||
// SecureBootEnable == SECURE_BOOT_ENABLE. | ||
if (SecureBootEnable == SECURE_BOOT_DISABLE) { | ||
SecureBootEnable = SECURE_BOOT_ENABLE; | ||
Status = AuthServiceInternalUpdateVariable ( | ||
EFI_SECURE_BOOT_ENABLE_NAME, | ||
&gEfiSecureBootEnableDisableGuid, | ||
&SecureBootEnable, | ||
sizeof (UINT8), | ||
EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | ||
); | ||
if (EFI_ERROR (Status)) { | ||
return Status; | ||
} | ||
} | ||
|
||
// MU_CHANGE [END] | ||
} | ||
} else if (mPlatformMode == USER_MODE) { | ||
// | ||
|
Flickdm marked this conversation as resolved.
Show resolved
Hide resolved
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,8 +12,18 @@ SPDX-License-Identifier: BSD-2-Clause-Patent | |
#string TPM_PPI_HEAD_STR #language en-US "A configuration change was requested to allow the Operating System to %s the computer's TPM (Trusted Platform Module) without asking for user confirmation in the future.\n\n" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. look at physical presence spec - this was potentially implemented for tablets. this may require spec change. look for a different commit / or make change that pushes this logic up to allow platforms to make changes. This may need to be a library allowing edk2 to use their own strings and a platform their own |
||
|
||
#string TPM_ACCEPT_KEY #language en-US "Press F10 " | ||
#string TPM_CAUTION_KEY #language en-US "Press F12 " | ||
#string TPM_REJECT_KEY #language en-US "to %s the TPM \nPress ESC to reject this change request and continue\n" | ||
|
||
/** | ||
MU_CHANGE_70401 | ||
MU_CHANGE [BEGIN] - Alter the strings to reflect the new dialog box. | ||
**/ | ||
#string TPM_CAUTION_KEY #language en-US "Press OK " | ||
#string TPM_REJECT_KEY #language en-US "to %s the TPM \nPress CANCEL to reject this change request and continue\n" | ||
// #string TPM_CAUTION_KEY #language en-US "Press F12 " | ||
// #string TPM_REJECT_KEY #language en-US "to %s the TPM \nPress ESC to reject this change request and continue\n" | ||
/** | ||
MU_CHANGE [END] | ||
**/ | ||
|
||
#string TPM_ENABLE #language en-US "enable" | ||
#string TPM_DISABLE #language en-US "disable" | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Investigate Tianocore version of the different options for the PCR banks. If rotten throw away otherwise upstream