From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by mx.groups.io with SMTP id smtpd.web11.8749.1648457685467316001 for ; Mon, 28 Mar 2022 01:54:46 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=none, err=permanent DNS error (domain: byosoft.com.cn, ip: 58.240.74.242, mailfrom: gaoliming@byosoft.com.cn) Received: from DESKTOPS6D0PVI ([101.224.116.119]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Mon, 28 Mar 2022 16:54:42 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 101.224.116.119 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: "'Judah Vang'" , Cc: "'Jian J Wang'" , "'Nishant C Mistry'" References: <20220325220243.1741-1-judah.vang@intel.com> In-Reply-To: <20220325220243.1741-1-judah.vang@intel.com> Subject: =?UTF-8?B?5Zue5aSNOiBbUEFUQ0ggdjEgMDEvMjhdIE1kZU1vZHVsZVBrZzogQWRkIGEgbmV3IEdVSUQ=?= Date: Mon, 28 Mar 2022 16:54:43 +0800 Message-ID: <00b601d84281$77c938c0$675baa40$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQGh4kmuJBtlP4yXuxXWZLtkAvP1Xa1BPUyQ Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn Judah: Is there the detail information or wiki about the code design and = usage for this feature?=20 Thanks Liming > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: Judah Vang > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA3=D4=C226=C8=D5 6:03 > =CA=D5=BC=FE=C8=CB: devel@edk2.groups.io > =B3=AD=CB=CD: Jian J Wang ; Liming Gao > ; Nishant C Mistry = > =D6=F7=CC=E2: [PATCH v1 01/28] MdeModulePkg: Add a new GUID >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2594 >=20 > Add a new Variable Store Guid. >=20 > Cc: Jian J Wang > Cc: Liming Gao > Cc: Nishant C Mistry > Signed-off-by: Judah Vang > --- > MdeModulePkg/MdeModulePkg.dec | 13 ++++++++++++- > 1 file changed, 12 insertions(+), 1 deletion(-) >=20 > diff --git a/MdeModulePkg/MdeModulePkg.dec > b/MdeModulePkg/MdeModulePkg.dec > index 40601c95832b..681607db0da6 100644 > --- a/MdeModulePkg/MdeModulePkg.dec > +++ b/MdeModulePkg/MdeModulePkg.dec > @@ -4,7 +4,7 @@ > # and libraries instances, which are used for those modules. > # > # Copyright (c) 2019, NVIDIA CORPORATION. All rights reserved. > -# Copyright (c) 2007 - 2021, Intel Corporation. All rights = reserved.
> +# Copyright (c) 2007 - 2022, Intel Corporation. All rights = reserved.
> # Copyright (c) 2016, Linaro Ltd. All rights reserved.
> # (C) Copyright 2016 - 2019 Hewlett Packard Enterprise Development > LP
> # Copyright (c) 2017, AMD Incorporated. All rights reserved.
> @@ -93,6 +93,14 @@ [LibraryClasses] > # > TpmMeasurementLib|Include/Library/TpmMeasurementLib.h >=20 > + ## @libraryclass Provides interfaces to encrypt/decrypt variable. > + # > + EncryptionVariableLib|Include/Library/EncryptionVariableLib.h > + > + ## @libraryclass Provides interfaces to encrypt/decrypt variable. > + # > + ProtectedVariableLib|Include/Library/ProtectedVariableLib.h > + > ## @libraryclass Provides authenticated variable services. > # > AuthVariableLib|Include/Library/AuthVariableLib.h > @@ -505,6 +513,9 @@ [Ppis] > gEdkiiPeiCapsuleOnDiskPpiGuid =3D { 0x71a9ea61, 0x5a35, > 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } } > gEdkiiPeiBootInCapsuleOnDiskModePpiGuid =3D { 0xb08a11e4, 0xe2b7, > 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } } >=20 > + ## Include/Ppi/ReadOnlyVariable2.h > + gEfiPeiVariableStoreDiscoveredPpiGuid =3D { 0xa2fc038d, 0xfdf5, > 0x4501, { 0xaf, 0x8e, 0x69, 0xb0, 0x20, 0xec, 0xe6, 0x63 } } > + > [Protocols] > ## Load File protocol provides capability to load and unload EFI = image into > memory and execute it. > # Include/Protocol/LoadPe32Image.h > -- > 2.26.2.windows.1