From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by mx.groups.io with SMTP id smtpd.web11.10982.1626096367514710884 for ; Mon, 12 Jul 2021 06:26:09 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=none, err=permanent DNS error (domain: byosoft.com.cn, ip: 58.240.74.242, mailfrom: gaoliming@byosoft.com.cn) Received: from DESKTOPS6D0PVI ([116.128.224.11]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Mon, 12 Jul 2021 21:24:46 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 116.128.224.11 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: , , "'Grzegorz Bernacki'" Cc: , , "'Samer El-Haj-Mahmoud'" , , , , , , , "'Sami Mujawar'" , , , , , , "'Thomas Abraham'" , , , , , , , , , References: <20210701092051.1057606-1-gjb@semihalf.com> <20210701092051.1057606-2-gjb@semihalf.com> In-Reply-To: Subject: =?UTF-8?B?5Zue5aSNOiBbZWRrMi1kZXZlbF0gW2VkazItcGxhdGZvcm1zIFBBVENIIHY1IDEvNF0gSW50ZWwgUGxhdGZvcm1zOiBhZGQgU2VjdXJlQm9vdFZhcmlhYmxlTGliIGNsYXNzIHJlc29sdXRpb24=?= Date: Mon, 12 Jul 2021 21:24:35 +0800 Message-ID: <01de01d77721$48808f90$d981aeb0$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQLGE95Lc6Tjsue+ZHLKPwT9EdP38AJMDuyOAh0udbipPtDUsA== Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn Reviewed-by: Liming Gao > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: devel@edk2.groups.io =B4=FA= =B1=ED Sunny Wang > =B7=A2=CB=CD=CA=B1=BC=E4: 2021=C4=EA7=D4=C29=C8=D5 17:09 > =CA=D5=BC=FE=C8=CB: Grzegorz Bernacki ; devel@edk2.gro= ups.io > =B3=AD=CB=CD: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer > El-Haj-Mahmoud ; mw@semihalf.com; > upstream@semihalf.com; jiewen.yao@intel.com; jian.j.wang@intel.com; > min.m.xu@intel.com; lersek@redhat.com; Sami Mujawar > ; afish@apple.com; ray.ni@intel.com; > jordan.l.justen@intel.com; rebecca@bsdio.com; grehan@freebsd.org; > Thomas Abraham ; chasel.chiu@intel.com; > nathaniel.l.desimone@intel.com; gaoliming@byosoft.com.cn; > eric.dong@intel.com; michael.d.kinney@intel.com; zailiang.sun@intel.com; > yi.qian@intel.com; graeme@nuviainc.com; rad@semihalf.com; pete@akeo.ie; > Sunny Wang > =D6=F7=CC=E2: Re: [edk2-devel] [edk2-platforms PATCH v5 1/4] Intel Platf= orms: add > SecureBootVariableLib class resolution >=20 > Looks good to me. > Reviewed-by: Sunny Wang >=20 > -----Original Message----- > From: Grzegorz Bernacki > Sent: Thursday, July 1, 2021 5:21 PM > To: devel@edk2.groups.io > Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud > ; Sunny Wang ; > mw@semihalf.com; upstream@semihalf.com; jiewen.yao@intel.com; > jian.j.wang@intel.com; min.m.xu@intel.com; lersek@redhat.com; Sami > Mujawar ; afish@apple.com; ray.ni@intel.com; > jordan.l.justen@intel.com; rebecca@bsdio.com; grehan@freebsd.org; > Thomas Abraham ; chasel.chiu@intel.com; > nathaniel.l.desimone@intel.com; gaoliming@byosoft.com.cn; > eric.dong@intel.com; michael.d.kinney@intel.com; zailiang.sun@intel.com; > yi.qian@intel.com; graeme@nuviainc.com; rad@semihalf.com; pete@akeo.ie; > Grzegorz Bernacki > Subject: [edk2-platforms PATCH v5 1/4] Intel Platforms: add > SecureBootVariableLib class resolution >=20 > The edk2 patch > SecurityPkg: Create library for setting Secure Boot variables. >=20 > removes generic functions from SecureBootConfigDxe and places > them into SecureBootVariableLib. This patch adds SecureBootVariableLib > mapping for each Intel platform which uses SecureBootConfigDxe. >=20 > Signed-off-by: Grzegorz Bernacki > --- > Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc | 1 + > Platform/Intel/QuarkPlatformPkg/Quark.dsc | 1 + > Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc | 1 + > Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc | 3 ++- > 4 files changed, 5 insertions(+), 1 deletion(-) >=20 > diff --git a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc > b/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc > index b154f9615d..5157c87a9a 100644 > --- a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc > +++ b/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc > @@ -139,6 +139,7 @@ >=20 > !if gMinPlatformPkgTokenSpaceGuid.PcdUefiSecureBootEnable =3D=3D TRUE > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.i= nf > + > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo > otVariableLib.inf > !endif >=20 > SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf > diff --git a/Platform/Intel/QuarkPlatformPkg/Quark.dsc > b/Platform/Intel/QuarkPlatformPkg/Quark.dsc > index cc1eba4df4..35f99429f7 100644 > --- a/Platform/Intel/QuarkPlatformPkg/Quark.dsc > +++ b/Platform/Intel/QuarkPlatformPkg/Quark.dsc > @@ -175,6 +175,7 @@ > !if $(SECURE_BOOT_ENABLE) >=20 > PlatformSecureLib|QuarkPlatformPkg/Library/PlatformSecureLib/PlatformSec > ureLib.inf > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.i= nf > + > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo > otVariableLib.inf > !else >=20 > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLi > bNull.inf > !endif > diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc > b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc > index d15da40819..5a0d3e31e1 100644 > --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc > +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc > @@ -227,6 +227,7 @@ > !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE >=20 > PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= r > eLibNull.inf > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.i= nf > + > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo > otVariableLib.inf > !else >=20 > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLi > bNull.inf > !endif > diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc > b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc > index 4a5548b80e..36a5ae333c 100644 > --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc > +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc > @@ -1,4 +1,4 @@ > -#/** @file > +e > # Platform description. > # > # Copyright (c) 2012 - 2021, Intel Corporation. All rights reserved. > @@ -229,6 +229,7 @@ > !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE >=20 > PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= r > eLibNull.inf > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.i= nf > + > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo > otVariableLib.inf > !else >=20 > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLi > bNull.inf > !endif > -- > 2.25.1 >=20 > IMPORTANT NOTICE: The contents of this email and any attachments are > confidential and may also be privileged. If you are not the intended recipient, > please notify the sender immediately and do not disclose the contents to any > other person, use it for any purpose, or store or copy the information i= n any > medium. Thank you. >=20 >=20 >=20 >=20