Changeset 106386 in vbox for trunk/src/VBox/Devices/EFI/Firmware
- Timestamp:
- Oct 16, 2024 2:15:04 PM (4 months ago)
- svn:sync-xref-src-repo-rev:
- 165199
- Location:
- trunk/src/VBox/Devices/EFI/Firmware
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Devices/EFI/Firmware/Makefile.kmk
r106190 r106386 284 284 -D NETWORK_IP6_ENABLE=1 -D NETWORK_ISCSI_ENABLE=1 \ 285 285 $(if $(VBOX_WITH_EFI_SECURE_BOOT),-D "SECURE_BOOT_ENABLE=1") \ 286 $(if $(VBOX_WITH_EFI_TPM),-D "TPM_ENABLE=1" -D "TPM1_ENABLE" -D "TPM2_ENABLE") \ 287 $(if $(VBOX_WITH_EFI_TPM),-D "TPM_CONFIG_ENABLE=1") \ 286 $(if $(VBOX_WITH_EFI_TPM),-D "TPM_ENABLE=1" -D "TPM1_ENABLE=1" -D "TPM2_ENABLE=1") \ 287 $(if $(VBOX_WITH_EFI_TPM),-D "TPM_CONFIG_ENABLE=1" -D "TPM2_CONFIG_ENABLE=1") \ 288 $(if $(VBOX_WITH_LSILOGIC),-D "MPT_SCSI_ENABLE=1") \ 288 289 $(if $(VBOX_WITH_LSILOGIC),-D "MPT_SCSI_ENABLE=1") \ 289 290 -D BUILD_NEW_SHELL=1 \ -
trunk/src/VBox/Devices/EFI/Firmware/MdePkg/Library/BaseRngLib/AArch64/Rndr.c
r105670 r106386 20 20 #include "BaseRngLibInternals.h" 21 21 22 /* 23 * This is non XIP (eXecute In Place) safe. 24 * This is used very early on in the TPM code when tings are still directly running from the ROM region which is RX only, 25 * causing a write access fault, so avoid caching the flag and query it always. 26 */ 27 #ifndef VBOX 22 28 STATIC BOOLEAN mRndrSupported; 29 #endif 23 30 24 31 // … … 44 51 ) 45 52 { 53 #ifndef VBOX 46 54 UINT64 Isar0; 47 55 … … 53 61 54 62 mRndrSupported = ((Isar0 & RNDR_MASK) != 0); 63 #endif 55 64 56 65 return EFI_SUCCESS; … … 138 147 ) 139 148 { 149 #ifndef VBOX 140 150 return mRndrSupported; 151 #else 152 return (ArmReadIdIsar0() & RNDR_MASK) != 0; 153 #endif 141 154 } 142 155 … … 163 176 } 164 177 178 #ifndef VBOX 165 179 if (!mRndrSupported) { 166 180 return EFI_UNSUPPORTED; 167 181 } 182 #else 183 if (!(ArmReadIdIsar0() & RNDR_MASK)) { 184 return EFI_UNSUPPORTED; 185 } 186 #endif 168 187 169 188 // -
trunk/src/VBox/Devices/EFI/Firmware/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
r101291 r106386 971 971 } 972 972 973 /* 974 * Measuring the BIOS would break BitLocker when updating VirtualBox with a new UEFI firmware 975 * as the measurement would change requiring the user to enter the recovery key. 976 * As we have to trust the hypervisor anyway for now we also trust it with providing an untampered 977 * UEFI firmware image. 978 */ 979 #ifndef VBOX 973 980 Status = MeasureMainBios (); 974 981 if (EFI_ERROR (Status)) { 975 982 return Status; 976 983 } 984 #endif 977 985 978 986 //
Note:
See TracChangeset
for help on using the changeset viewer.