|
Re: [PATCH] SecurityPkg/DxeImageVerificationLib: Always lookup SHA-256 hash in dbx
Good day,
I just woke up to this mess, yes. I actually did follow that guide, just around 3 years ago I believe, so let me check where things went wrong since then...
The patch you quoted was a
Good day,
I just woke up to this mess, yes. I actually did follow that guide, just around 3 years ago I believe, so let me check where things went wrong since then...
The patch you quoted was a
|
By
Marvin Häuser <mhaeuser@...>
·
#78917
·
|
|
Re: [PATCH] MdeModulePkg/PiSmmCore: Drop deprecated image profiling commands
Reviewed-by: Ray Ni <ray.ni@...>
+Star and Jiewen for confirmation.
Reviewed-by: Ray Ni <ray.ni@...>
+Star and Jiewen for confirmation.
|
By
Ni, Ray
·
#78916
·
|
|
Re: [PATCH] UefiPayloadPkg/UefiPayloadEntry: Fix memory corruption
It's so lucky that no code calls AllocatePool so the bug didn't cause real issues. (I tried to remove AllocatePool() and build still passed.)
Thanks for catching the bug. Reviewed-by: Ray Ni
It's so lucky that no code calls AllocatePool so the bug didn't cause real issues. (I tried to remove AllocatePool() and build still passed.)
Thanks for catching the bug. Reviewed-by: Ray Ni
|
By
Ni, Ray
·
#78915
·
|
|
Re: [PATCH] SecurityPkg/DxeImageVerificationLib: Always lookup SHA-256 hash in dbx
Hi Marvin
With this patch, the path "Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND" no longer exists.
Do you think we should remove EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND as well?
Thank you
Yao
Hi Marvin
With this patch, the path "Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND" no longer exists.
Do you think we should remove EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND as well?
Thank you
Yao
|
By
Yao, Jiewen
·
#78914
·
|
|
[PATCH] MdeModulePkg PCD: FSP NotifyPhase APIs caused 100ms delay
https://bugzilla.tianocore.org/show_bug.cgi?id=3D3525
After PciSegmentLib using Dynamic PCD for Pcie base address such
long delay found in FSP. The root cause is some of the PCD service
PPIs not
https://bugzilla.tianocore.org/show_bug.cgi?id=3D3525
After PciSegmentLib using Dynamic PCD for Pcie base address such
long delay found in FSP. The root cause is some of the PCD service
PPIs not
|
By
GregX Yeh
·
#78913
·
|
|
Re: [PATCH] SecurityPkg: TPM must go to Idle state on CRB command completion.
Would you please tell us how many TPM2 chip you have tested?
I think we need consider the compatibility of exiting TPM2 chips, to make sure the code still work.
Thank you
Yao Jiewen
Would you please tell us how many TPM2 chip you have tested?
I think we need consider the compatibility of exiting TPM2 chips, to make sure the code still work.
Thank you
Yao Jiewen
|
By
Yao, Jiewen
·
#78912
·
|
|
Re: [PATCH] SecurityPkg: Debug code to audit BIOS TPM extend operations.
Some feedback:
1) I think it is OK to add Tpm2PcrReadForActiveBank() API.
But I feel we will add too many noise to dump Tpm2PcrReadForActiveBank() in the code everytime.
I am not sure why it is
Some feedback:
1) I think it is OK to add Tpm2PcrReadForActiveBank() API.
But I feel we will add too many noise to dump Tpm2PcrReadForActiveBank() in the code everytime.
I am not sure why it is
|
By
Yao, Jiewen
·
#78911
·
|
|
Re: [PATCH] Reallocate TPM Active PCRs based on platform support.
Hi Rodrigo
I don't understand the problem statement.
This code has been there for long time. What is changed recently ?
Thank you
Yao Jiewen
Hi Rodrigo
I don't understand the problem statement.
This code has been there for long time. What is changed recently ?
Thank you
Yao Jiewen
|
By
Yao, Jiewen
·
#78910
·
|
|
Re: [PATCH] SecurityPkg/DxeImageVerificationLib: Always lookup SHA-256 hash in dbx
It seems there are 3 patches sent from Marvin Häuser and I suppose they're in one patch-set, right? Please follow the link below to send out patch-set for
It seems there are 3 patches sent from Marvin Häuser and I suppose they're in one patch-set, right? Please follow the link below to send out patch-set for
|
By
Min Xu
·
#78909
·
|
|
[PATCH 2/3] efi_gdb.py: - Add gdb EFI commands and pretty Print
https://bugzilla.tianocore.org/show_bug.cgi?id=3500
Use efi_debugging.py Python Classes to implement EFI gdb commands:
(gdb) help efi
Commands for debugging EFI. efi <cmd>
List of efi
https://bugzilla.tianocore.org/show_bug.cgi?id=3500
Use efi_debugging.py Python Classes to implement EFI gdb commands:
(gdb) help efi
Commands for debugging EFI. efi <cmd>
List of efi
|
By
Andrew Fish
·
#78908
·
|
|
[PATCH 3/3] efi_lldb.py: - Add lldb EFI commands and pretty Print
https://bugzilla.tianocore.org/show_bug.cgi?id=3500
Use efi_debugging.py Python Classes to implement EFI gdb commands:
efi_symbols, guid, table, hob, and devicepath
You can attach to any standard
https://bugzilla.tianocore.org/show_bug.cgi?id=3500
Use efi_debugging.py Python Classes to implement EFI gdb commands:
efi_symbols, guid, table, hob, and devicepath
You can attach to any standard
|
By
Andrew Fish
·
#78907
·
|
|
[PATCH 0/3] Add support for gdb and lldb
This patch set adds debugging support for gdb and lldb.
It also adds generic debugging classes that use a file like object to
make it easy to import into any debugger that supports Python.
Since
This patch set adds debugging support for gdb and lldb.
It also adds generic debugging classes that use a file like object to
make it easy to import into any debugger that supports Python.
Since
|
By
Andrew Fish
·
#78906
·
|
|
[PATCH 1/3] efi_debugging.py: - Add debugger agnostic debugging Python Classes
By
Andrew Fish
·
#78905
·
|
|
[PATCH] EmbeddedPkg/GdbStub: Mandatory LoadedImage for DebugImageInfoTable
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Ard Biesheuvel <ardb+tianocore@...>
Cc: Abner Chang
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Ard Biesheuvel <ardb+tianocore@...>
Cc: Abner Chang
|
By
Marvin Häuser <mhaeuser@...>
·
#78904
·
|
|
[PATCH] ArmPkg/DefaultExceptionHandlerLib: Mandatory LoadedImage for DebugImageInfoTable
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Leif Lindholm <leif@...>
Cc: Ard Biesheuvel
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Leif Lindholm <leif@...>
Cc: Ard Biesheuvel
|
By
Marvin Häuser <mhaeuser@...>
·
#78903
·
|
|
[PATCH] MdeModulePkg/CoreDxe: Mandatory LoadedImage for DebugImageInfoTable
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Hao A Wu <hao.a.wu@...>
Cc: Dandan Bi
To make parsing DebugImageInfoTable easier and safer, require the
LoadedImage protocol instance to be valid for every NormalImage
entry.
Cc: Hao A Wu <hao.a.wu@...>
Cc: Dandan Bi
|
By
Marvin Häuser <mhaeuser@...>
·
#78902
·
|
|
[PATCH] ArmPkg/DefaultExceptionHandlerLib: Check DebugImageInfoTable type safely
C does not allow casting to or dereferencing incompatible pointer
types. Use the ImageInfoType member of the union first to determine
the data type before dereferencing NormalImage.
Cc: Leif Lindholm
C does not allow casting to or dereferencing incompatible pointer
types. Use the ImageInfoType member of the union first to determine
the data type before dereferencing NormalImage.
Cc: Leif Lindholm
|
By
Marvin Häuser <mhaeuser@...>
·
#78901
·
|
|
[PATCH] EmbeddedPkg/GdbStub: Check DebugImageInfoTable type safely
C does not allow casting to or dereferencing incompatible pointer
types. Use the ImageInfoType member of the union first to determine
the data type before dereferencing NormalImage.
Cc: Ard
C does not allow casting to or dereferencing incompatible pointer
types. Use the ImageInfoType member of the union first to determine
the data type before dereferencing NormalImage.
Cc: Ard
|
By
Marvin Häuser <mhaeuser@...>
·
#78900
·
|
|
[PATCH] SecurityPkg/SecureBootConfigDxe: Fix certificate lookup algorithm
The current certificate lookup code does not check the bounds of the
authentication data before accessing it. Abort if the header cannot
fit, and proceed to the next hashing algortihm if the OID of
The current certificate lookup code does not check the bounds of the
authentication data before accessing it. Abort if the header cannot
fit, and proceed to the next hashing algortihm if the OID of
|
By
Marvin Häuser <mhaeuser@...>
·
#78899
·
|
|
[PATCH] UefiCpuPkg/BaseUefiCpuLib: Use toolchain-specific rodata section name
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3318
Correctly define the read-only data sections with the
toolchain-specific section name. This hardens image permission
security and may save
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3318
Correctly define the read-only data sections with the
toolchain-specific section name. This hardens image permission
security and may save
|
By
Marvin Häuser <mhaeuser@...>
·
#78898
·
|