From patchwork Tue Nov 30 11:52:19 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1561613 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=eWoeFx/6; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4J3LF32wJcz9sRR for ; Tue, 30 Nov 2021 22:52:39 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id B97BE8305E; Tue, 30 Nov 2021 12:52:33 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=fail (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="eWoeFx/6"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id E8DAD83070; Tue, 30 Nov 2021 12:52:31 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 9052B83060 for ; Tue, 30 Nov 2021 12:52:28 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1638273146; bh=rEaEaHEsh6tAGt22WUpapwmBahJzqYZn+/OYwPbG2hI=; h=X-UI-Sender-Class:Date:To:Cc:From:Subject; b=eWoeFx/6R2geLr6denMDYhzoMNDvBkTv7Y9am23sIrOJpJyAx2VyFI829iyQzYD2Y LsS1TGRAduB9bldfieUs+KrQFUQrfpXOzbirVcn3YUNFNqkbDy0Mr0PzyWuQFKhfBQ kg2wvFLoghAhEIR/Hz0Ks4qoPXgqSY/SrTGm3TRI= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.123.35] ([88.152.144.157]) by mail.gmx.net (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MPGRz-1nFSsh075B-00PZz1; Tue, 30 Nov 2021 12:52:26 +0100 Message-ID: <70d686d0-30b0-4f9a-3db5-0f0569a833c3@gmx.de> Date: Tue, 30 Nov 2021 12:52:19 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.3.1 Content-Language: en-US To: Tom Rini Cc: U-Boot Mailing List , Alexander Graf , Ruchika Gupta , Ilias Apalodimas From: Heinrich Schuchardt Subject: Pull request for efi-2022-01-rc4 X-Provags-ID: V03:K1:iBnEVLg8TzlUDyrq/SA5tw1wRR2fKf9Qwd7q1/6MZVefXLYbR/K uz42YYYdqz1oUACRj1FIM1U3RyXfu3vbwLo2q9ATFxC/S4DDFjGxTbT0gkiPQNh0/B3RnE9 C6ZIA75KmrM53+oqVkXn5R/KTVzohg4+cTOi92n0F/5Q1si050TB9ktbRNBGqeLCYCCQ7Nf Y3Cahd75pHPhCe1uZcnZA== X-UI-Out-Filterresults: notjunk:1;V03:K0:BTP4zyUGNgo=:/sSK4gjLov1oct9TulP2pN 901N+JAr/X9fQ46t6g4zQbMxJMy6m7fHOoUAPzH3t9jYoCtiwjer2HXOJcoRDw/KSzZ9VNKv9 Mv+Ne/782wL4Q8guqX8nMjCHP9MaGtkwf3H9z15Q1xB+9nfs7HfwUTzza82d4+bqN8TA71SEG 6n8pxdZP5u3rEcgfrUJ/1K3AHfRPOpf70kBpvY9jJ8+X60P5l5BICMCe0Mvuoihww4L8ZRaTO HAoEfM5YjbJ8AuUnbpMCCJr4LuqkjaCMYsSDSBAQd7sxkWa/+2Cp+hdROsVcLiLTHwe/NXSXG g/JTAjeZec8fDdzjR5L06lrjIO4MeP5EtzY5eYyhlSXWTD0dQvGJg92rrN2MRerfePgTh7svW XaZ/lbTtKDKP5+m8kRdkQeipUx0UN0S5OWELfpqwHJRRvYgD53FcJLKaR9VgHITjaYSs5CMTt AlTvBh9tJQL1V5L+ESNC3T58CFMKHr+LpO6uYDjcOQoaKGKwftd0lqaxKFNEprQxkquS5gYyE brp8Aa2lhWm/CvtvYaz3y5GyZyyku+yLqGGGB09N8VHHSReV9asIyOiHXhoZbAHxUdYJJzkCh n9UISme6rOff4BFlni/eyleikF8QnW2aCrlX/nU+Z+tYLUSxwBydZoMGnV/wsQYSeC7E3gfsl b08AEcG9WxJKgBwcrYKGDpKgY6mLjxo2fL4xKD61S1jgFYa2q0wZRl+OCEhEJVPisZITmwX2Z lp6jmi72D6iGHKYqeZ/riYDQSSW9wOCtPhzvmrnaydmsDa4k6nXqxDiHo+tC5znxAT9Dk0tkV e3FphyeNAXkre62IQi74X82QTn+gIT2z7wivk9UOOdIPPWZYST8Q812FsyRSxpYU+dUM6u1ve teYLW9akLHTgPRB9zf6XjScH/ZiwWSpb6bOgwI3sGThXdfF/3Iygfwlr04kFfuQIHhgQ8EFmr FwkZpzNtkQiWXmzj1EVl+/K/73ljfen6XUYa8Aj2CtEcBCxZTXs9X+REal5jG45OptM2U956B V1AJy2BkVrlVb0GKIJ6JYnfuUb4PBBVRLh2rGyoUvm7XrSmjklyvlmGhNDSebA/zHLdjVHv9x wV2rUdgBkZcH7s= X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.37 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Hello Tom, now that you have merged running swtpm via u-boot-test-hooks this pull request finally finishes of making TPMs and the EFI_TCG2_PROTOCOL on ARM testable. The following changes since commit ade37460a944aed36ae6ee634c4d4a9a22690461: Prepare v2022.01-rc3 (2021-11-29 11:16:03 -0500) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2022-01-rc4 for you to fetch changes up to c0d9bb0b4a747a7ec481b2369391ca8f53e50bc9: efi_loader: Extend PCR's for firmware measurements (2021-11-30 09:23:49 +0100) Gitlab CI showed no problems: https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/10033 ---------------------------------------------------------------- Pull request for efi-2022-01-rc4 Documentation: * describe how to enable Virtio RNG on QEMU ARM UEFI: * enable testing the TCG2 protocol * support TPM event log passed from firmware ---------------------------------------------------------------- Heinrich Schuchardt (3): doc: qemu-arm peripherials configs: enable CMD_TPM on QEMU ARM test: unit test for the EFI_TCG2_PROTOCOL Ruchika Gupta (3): efi_loader: Add check for event log passed from firmware tpm: use more algorithms than sha256 on pcr_read efi_loader: Extend PCR's for firmware measurements cmd/tpm-v2.c | 3 +- configs/qemu_arm64_defconfig | 1 + configs/qemu_arm_defconfig | 1 + doc/board/emulation/qemu-arm.rst | 9 +- drivers/tpm/tpm2_tis_mmio.c | 5 +- include/efi_loader.h | 2 + include/tpm-v2.h | 5 +- lib/efi_loader/efi_tcg2.c | 545 ++++++++++++++++++++++++++++++++----- lib/tpm-v2.c | 12 +- test/py/tests/test_efi_selftest.py | 20 ++ test/py/tests/test_tpm2.py | 1 + 11 files changed, 526 insertions(+), 78 deletions(-)