diff options
author | Wei6 Xu <wei6.xu@intel.com> | 2024-08-16 16:33:44 +0800 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2024-08-30 13:18:08 +0000 |
commit | 5aa684271512d180514e671f7a7266e67db8df92 (patch) | |
tree | 934f7d4eb510769c1c93f29b55e1551a62671b78 /EmbeddedPkg | |
parent | f31aa47deea9239d61b41fda8d445ecf607fcef9 (diff) | |
download | edk2-5aa684271512d180514e671f7a7266e67db8df92.tar.gz |
MdeModulePkg/VariableStandaloneMm: Fix TCG MOR secure feature issue
According to TCG's Platform Reset Attack Mitigation spec, the OS should
never create the MOR variable, only read and write it.
But some OSes (Fedora 24 and 25) don't follow the TCG's Platform Reset
Attack Mitigation spec and unintentionally create MOR variable.
The commit fda8f631edbbf3823760542a06f12bd60fd39181 added function
VariableHaveTcgProtocols() to check against Tcg/Tcg2 protocol to infer
whether the MOR variable is created by platform firmware or not. If not,
delete the variable created by OS and lock the variable to avoid OS to
create it.
But in VariableStandaloneMm, VariableHaveTcgProtocols() always returns
FALSE, it causes TCG MOR secure feature does not work in standalone MM
environment.
As Fedora 24 and 25 are EOL today, directly returns TRUE in the function
VariableHaveTcgProtocols() for VariableStandaloneMm, and rename the
function to VariableIsMorVariableLegitimate() to make it more obvious
what the narrow use-case is for which it exists.
Signed-off-by: Wei6 Xu <wei6.xu@intel.com>
Diffstat (limited to 'EmbeddedPkg')
0 files changed, 0 insertions, 0 deletions