From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pg1-f194.google.com (mail-pg1-f194.google.com [209.85.215.194]) by mx.groups.io with SMTP id smtpd.web12.8366.1591167571823568509 for ; Tue, 02 Jun 2020 23:59:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@corthon-com.20150623.gappssmtp.com header.s=20150623 header.b=VKb0CySv; spf=none, err=permanent DNS error (domain: corthon.com, ip: 209.85.215.194, mailfrom: bret@corthon.com) Received: by mail-pg1-f194.google.com with SMTP id e9so1094142pgo.9 for ; Tue, 02 Jun 2020 23:59:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corthon-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=hFLgN7c3wvSy0b0BlLyVWCfUaA6HR6aimBAFFlDcaXQ=; b=VKb0CySvw+qN+kmB8t9BKop+vq7rC2TNjcHbltcgRvCsszyf+4aaRyHEpOvJnUCH6Y cCD584EHcNdWKeILirJfUGUp/e+tM1s7HP3oxXvBM9rGfeaPt2mspXhDTFDPwGqAkEKW AX1TFTu5cmWEvCB306zGAlOHi/G/+4lsvvCrdQSj9fPq25vpbu0iT56hKqNRBM0oEuE7 UTAw4LQ7pyRt5l7Jva5jluFD6cqA2W9UfRqchEZaD/9M2j8GHVujFXxmYjVQgPCmzeQi +LMdd/0iLmtH3Z+bKaueyHhHwagSDTRO5GkKO28cJxEIZ+82HJb0tbZjBDlxiIZbSd/e MpEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=hFLgN7c3wvSy0b0BlLyVWCfUaA6HR6aimBAFFlDcaXQ=; b=CanAj5mQI5nAzZM2/2b4Ld6V4RGHw3SVnzWLQnwJrI6yHNlCVoQNFBzHteouPOlYor SmEVamHo/OyHQ1AlLwLU1wptLT5TevW04pWjhzeXYFHtBJLhV8wzOP3TIuMriaL3LhyF W5Hu7ogBUUX2juimIjV8iBgTZkhCi7EGT/p2R7jm1truVQEUmmY4CWl6d1vHZdqaUfVI tG0kA7YLz25173F+jQVI/hQsXYIxtUAsUTQdoBsu4GnFsfswmWUo6e68kCrsHoM4OLpn +E3PxB1ychDRN9DuBkkDDT/NrA00ofmLK734gYTgyLyguofwAwEDtb4Jhmqpt1LhCAsZ 7kVg== X-Gm-Message-State: AOAM533ae97xUYumG4o9aJ6XXHjQ6HtuWpFhlC8pUB/hZew4rUFl1k9v GJMTTmSDoTMzsDz+dnNZlzD+lNCYw3k= X-Google-Smtp-Source: ABdhPJy3rYhqEz/qh11+oF4TvvURyNhHCU6getwZ7ig94BlYKElHzvxHnBBzBbzC06ISaoEsRnTq9g== X-Received: by 2002:a63:4b0a:: with SMTP id y10mr27334977pga.57.1591167571165; Tue, 02 Jun 2020 23:59:31 -0700 (PDT) Return-Path: Received: from localhost.localdomain ([71.212.144.72]) by smtp.gmail.com with ESMTPSA id y6sm1262003pjn.37.2020.06.02.23.59.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Jun 2020 23:59:30 -0700 (PDT) From: Bret Barkelew X-Google-Original-From: Bret Barkelew To: devel@edk2.groups.io Cc: Laszlo Ersek , Ard Biesheuvel , Leif Lindholm Subject: [PATCH v5 07/14] ArmVirtPkg: Add VariablePolicy engine to ArmVirtPkg platform Date: Tue, 2 Jun 2020 23:58:03 -0700 Message-Id: <20200603065810.806-8-brbarkel@microsoft.com> X-Mailer: git-send-email 2.26.2.windows.1.8.g01c50adf56.20200515075929 In-Reply-To: <20200603065810.806-1-brbarkel@microsoft.com> References: <20200603065810.806-1-brbarkel@microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable https://bugzilla.tianocore.org/show_bug.cgi?id=3D2522 Cc: Laszlo Ersek Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Bret Barkelew Signed-off-by: Bret Barkelew Reviewed-by: Laszlo Ersek --- ArmVirtPkg/ArmVirt.dsc.inc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc index cf44fc73890b..0af6d839cf11 100644 --- a/ArmVirtPkg/ArmVirt.dsc.inc +++ b/ArmVirtPkg/ArmVirt.dsc.inc @@ -2,6 +2,7 @@ # Copyright (c) 2011-2015, ARM Limited. All rights reserved.=0D # Copyright (c) 2014, Linaro Limited. All rights reserved.=0D # Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.=0D +# Copyright (c) Microsoft Corporation.=0D #=0D # SPDX-License-Identifier: BSD-2-Clause-Patent=0D #=0D @@ -173,6 +174,8 @@ [LibraryClasses.common] AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf=0D !endif=0D VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ib.inf=0D + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Var= iablePolicyHelperLib.inf=0D UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManag= erLib.inf=0D =0D ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseRepor= tStatusCodeLibNull.inf=0D @@ -246,6 +249,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] !if $(TARGET) !=3D RELEASE=0D DebugLib|MdePkg/Library/DxeRuntimeDebugLibSerialPort/DxeRuntimeDebugLibS= erialPort.inf=0D !endif=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ibRuntimeDxe.inf=0D =0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D BaseCryptLib|CryptoPkg/Library/BaseCryptLib/RuntimeCryptLib.inf=0D --=20 2.26.2.windows.1.8.g01c50adf56.20200515075929