render / rpms / edk2

Forked from rpms/edk2 3 months ago
Clone

Blame SOURCES/edk2-OvmfPkg-rework-TPM-configuration.patch

7439a5
From 5787adaccb16e4af7df661d6c7eb3197c7f14218 Mon Sep 17 00:00:00 2001
7439a5
From: Gerd Hoffmann <kraxel@redhat.com>
7439a5
Date: Wed, 15 Dec 2021 12:39:20 +0100
7439a5
Subject: [PATCH 5/6] OvmfPkg: rework TPM configuration
7439a5
7439a5
RH-Author: Gerd Hoffmann <kraxel@redhat.com>
7439a5
RH-MergeRequest: 9: backport tpm build updates, disable tpm 1.2 support
7439a5
RH-Commit: [5/6] 81ed86c6993e8cca4fabf5f471e198134b907562 (kraxel/centos-edk2)
7439a5
RH-Bugzilla: 1935497
7439a5
RH-Acked-by: Oliver Steffen <None>
7439a5
7439a5
Rename TPM_ENABLE to TPM2_ENABLE so naming is in line with the
7439a5
ArmVirtPkg config option name.
7439a5
7439a5
Add separate TPM1_ENABLE option for TPM 1.2 support.
7439a5
7439a5
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
7439a5
Tested-by: Stefan Berger <stefanb@linux.ibm.com>
7439a5
(cherry picked from commit 4de8d61bcec02a13ceed84f92b0cf3ea58adf9c5)
7439a5
---
7439a5
 OvmfPkg/OvmfTpmComponentsDxe.dsc.inc                  | 4 +++-
7439a5
 OvmfPkg/OvmfTpmComponentsPei.dsc.inc                  | 6 +++++-
7439a5
 OvmfPkg/OvmfTpmDefines.dsc.inc                        | 5 ++++-
7439a5
 OvmfPkg/OvmfTpmDxe.fdf.inc                            | 4 +++-
7439a5
 OvmfPkg/OvmfTpmLibs.dsc.inc                           | 4 +++-
7439a5
 OvmfPkg/OvmfTpmLibsDxe.dsc.inc                        | 4 +++-
7439a5
 OvmfPkg/OvmfTpmLibsPeim.dsc.inc                       | 4 +++-
7439a5
 OvmfPkg/OvmfTpmPcds.dsc.inc                           | 2 +-
7439a5
 OvmfPkg/OvmfTpmPcdsHii.dsc.inc                        | 2 +-
7439a5
 OvmfPkg/OvmfTpmPei.fdf.inc                            | 6 +++++-
7439a5
 OvmfPkg/OvmfTpmSecurityStub.dsc.inc                   | 4 +++-
7439a5
 OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml    | 6 +++---
7439a5
 OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 6 +++---
7439a5
 OvmfPkg/PlatformCI/ReadMe.md                          | 2 +-
7439a5
 14 files changed, 41 insertions(+), 18 deletions(-)
7439a5
7439a5
diff --git a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
7439a5
index e025d85a58..75ae09571e 100644
7439a5
--- a/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmComponentsDxe.dsc.inc
7439a5
@@ -2,7 +2,7 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
   SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf {
7439a5
     <LibraryClasses>
7439a5
       Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
7439a5
@@ -15,10 +15,12 @@
7439a5
       NULL|SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
7439a5
   }
7439a5
   SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
   SecurityPkg/Tcg/TcgDxe/TcgDxe.inf {
7439a5
     <LibraryClasses>
7439a5
       Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
7439a5
   }
7439a5
+!endif
7439a5
   SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf {
7439a5
     <LibraryClasses>
7439a5
       TpmPlatformHierarchyLib|SecurityPkg/Library/PeiDxeTpmPlatformHierarchyLib/PeiDxeTpmPlatformHierarchyLib.inf
7439a5
diff --git a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
7439a5
index 87d491da50..fa486eed82 100644
7439a5
--- a/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmComponentsPei.dsc.inc
7439a5
@@ -2,10 +2,14 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
   OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
   OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
7439a5
   SecurityPkg/Tcg/TcgPei/TcgPei.inf
7439a5
+!else
7439a5
+  OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
7439a5
+!endif
7439a5
   SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf {
7439a5
     <LibraryClasses>
7439a5
       HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
7439a5
diff --git a/OvmfPkg/OvmfTpmDefines.dsc.inc b/OvmfPkg/OvmfTpmDefines.dsc.inc
7439a5
index 5df4a331fb..a65564d8d9 100644
7439a5
--- a/OvmfPkg/OvmfTpmDefines.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmDefines.dsc.inc
7439a5
@@ -2,4 +2,7 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-  DEFINE TPM_ENABLE              = FALSE
7439a5
+  DEFINE TPM2_ENABLE             = FALSE
7439a5
+
7439a5
+  # has no effect unless TPM2_ENABLE == TRUE
7439a5
+  DEFINE TPM1_ENABLE             = TRUE
7439a5
diff --git a/OvmfPkg/OvmfTpmDxe.fdf.inc b/OvmfPkg/OvmfTpmDxe.fdf.inc
7439a5
index 32eef24638..7fc2bf8590 100644
7439a5
--- a/OvmfPkg/OvmfTpmDxe.fdf.inc
7439a5
+++ b/OvmfPkg/OvmfTpmDxe.fdf.inc
7439a5
@@ -2,8 +2,10 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
 INF  SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
7439a5
+!endif
7439a5
 INF  SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
7439a5
 INF  SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
7439a5
 INF  SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
7439a5
diff --git a/OvmfPkg/OvmfTpmLibs.dsc.inc b/OvmfPkg/OvmfTpmLibs.dsc.inc
7439a5
index 50100f2c03..418747b134 100644
7439a5
--- a/OvmfPkg/OvmfTpmLibs.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmLibs.dsc.inc
7439a5
@@ -2,8 +2,10 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
   Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
7439a5
+!endif
7439a5
   Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
7439a5
   Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
7439a5
   Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
7439a5
diff --git a/OvmfPkg/OvmfTpmLibsDxe.dsc.inc b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
7439a5
index 67d5027aba..1d66cdac77 100644
7439a5
--- a/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmLibsDxe.dsc.inc
7439a5
@@ -2,7 +2,9 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
   Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
7439a5
+!endif
7439a5
   Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/OvmfTpmLibsPeim.dsc.inc b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
7439a5
index 4e84e3dcaa..03caccd7c6 100644
7439a5
--- a/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmLibsPeim.dsc.inc
7439a5
@@ -2,8 +2,10 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
   BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
   Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
7439a5
+!endif
7439a5
   Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/OvmfTpmPcds.dsc.inc b/OvmfPkg/OvmfTpmPcds.dsc.inc
7439a5
index 0e7f83c04b..0d55d62737 100644
7439a5
--- a/OvmfPkg/OvmfTpmPcds.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmPcds.dsc.inc
7439a5
@@ -2,6 +2,6 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
   gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
7439a5
index 2e02a5b4cb..e842253235 100644
7439a5
--- a/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmPcdsHii.dsc.inc
7439a5
@@ -2,7 +2,7 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
   gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x0|"1.3"|NV,BS
7439a5
   gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableRev|L"TCG2_VERSION"|gTcg2ConfigFormSetGuid|0x8|3|NV,BS
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/OvmfTpmPei.fdf.inc b/OvmfPkg/OvmfTpmPei.fdf.inc
7439a5
index 709a608cc3..9f8b9bdd5b 100644
7439a5
--- a/OvmfPkg/OvmfTpmPei.fdf.inc
7439a5
+++ b/OvmfPkg/OvmfTpmPei.fdf.inc
7439a5
@@ -2,10 +2,14 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
 INF  OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
 INF  OvmfPkg/Tcg/Tcg2Config/Tcg12ConfigPei.inf
7439a5
 INF  SecurityPkg/Tcg/TcgPei/TcgPei.inf
7439a5
+!else
7439a5
+INF  OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
7439a5
+!endif
7439a5
 INF  SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
7439a5
 INF  SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/OvmfTpmSecurityStub.dsc.inc b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
7439a5
index 4bd4066843..e9ab2fca7b 100644
7439a5
--- a/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
7439a5
+++ b/OvmfPkg/OvmfTpmSecurityStub.dsc.inc
7439a5
@@ -2,7 +2,9 @@
7439a5
 #    SPDX-License-Identifier: BSD-2-Clause-Patent
7439a5
 ##
7439a5
 
7439a5
-!if $(TPM_ENABLE) == TRUE
7439a5
+!if $(TPM2_ENABLE) == TRUE
7439a5
+!if $(TPM1_ENABLE) == TRUE
7439a5
       NULL|SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
7439a5
+!endif
7439a5
       NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
7439a5
 !endif
7439a5
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
7439a5
index 1774423580..8df31298f5 100644
7439a5
--- a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
7439a5
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
7439a5
@@ -95,21 +95,21 @@ jobs:
7439a5
           OVMF_IA32X64_FULL_DEBUG:
7439a5
             Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
             Build.Arch: "IA32,X64"
7439a5
-            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
             Build.Target: "DEBUG"
7439a5
             Run.Flags: $(run_flags)
7439a5
             Run: $(should_run)
7439a5
           OVMF_IA32X64_FULL_RELEASE:
7439a5
             Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
             Build.Arch: "IA32,X64"
7439a5
-            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
             Build.Target: "RELEASE"
7439a5
             Run.Flags: $(run_flags)
7439a5
             Run: $(should_run)
7439a5
           OVMF_IA32X64_FULL_NOOPT:
7439a5
             Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
             Build.Arch: "IA32,X64"
7439a5
-            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
             Build.Target: "NOOPT"
7439a5
             Run.Flags: $(run_flags)
7439a5
             Run: $(should_run)
7439a5
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
7439a5
index 09f9851312..68b5d951e9 100644
7439a5
--- a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
7439a5
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml
7439a5
@@ -94,14 +94,14 @@ jobs:
7439a5
           OVMF_IA32X64_FULL_DEBUG:
7439a5
             Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
             Build.Arch: "IA32,X64"
7439a5
-            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
             Build.Target: "DEBUG"
7439a5
             Run.Flags: $(run_flags)
7439a5
             Run: $(should_run)
7439a5
           OVMF_IA32X64_FULL_RELEASE:
7439a5
             Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
             Build.Arch: "IA32,X64"
7439a5
-            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+            Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
             Build.Target: "RELEASE"
7439a5
             Run.Flags: $(run_flags)
7439a5
             Run: $(should_run)
7439a5
@@ -112,7 +112,7 @@ jobs:
7439a5
     #       OVMF_IA32X64_FULL_NOOPT:
7439a5
     #         Build.File: "$(package)/PlatformCI/PlatformBuild.py"
7439a5
     #         Build.Arch: "IA32,X64"
7439a5
-    #         Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
+    #         Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1  BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1"
7439a5
     #         Build.Target: "NOOPT"
7439a5
     #         Run.Flags: $(run_flags)
7439a5
     #         Run: $(should_run)
7439a5
diff --git a/OvmfPkg/PlatformCI/ReadMe.md b/OvmfPkg/PlatformCI/ReadMe.md
7439a5
index 44aa7c4a9d..1216dee126 100644
7439a5
--- a/OvmfPkg/PlatformCI/ReadMe.md
7439a5
+++ b/OvmfPkg/PlatformCI/ReadMe.md
7439a5
@@ -14,7 +14,7 @@ supported and are described below.
7439a5
 | IA32                    | IA32               | OvmfPkgIa32.dsc     | None            |
7439a5
 | X64                     | X64                | OvmfPkgIa64.dsc     | None            |
7439a5
 | IA32 X64                | PEI-IA32 DXE-X64   | OvmfPkgIa32X64.dsc  | None            |
7439a5
-| IA32 X64 Full           | PEI-IA32 DXE-X64   | OvmfPkgIa32X64.dsc  | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
7439a5
+| IA32 X64 Full           | PEI-IA32 DXE-X64   | OvmfPkgIa32X64.dsc  | SECURE_BOOT_ENABLE=1 SMM_REQUIRE=1 TPM1_ENABLE=1 TPM2_ENABLE=1 NETWORK_TLS_ENABLE=1 NETWORK_IP6_ENABLE=1 NETWORK_HTTP_BOOT_ENABLE=1 |
7439a5
 
7439a5
 ## EDK2 Developer environment
7439a5
 
7439a5
-- 
7439a5
2.27.0
7439a5