From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pj1-f66.google.com (mail-pj1-f66.google.com [209.85.216.66]) by mx.groups.io with SMTP id smtpd.web11.6980.1600841361848426307 for ; Tue, 22 Sep 2020 23:09:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@corthon-com.20150623.gappssmtp.com header.s=20150623 header.b=itkozOv8; spf=none, err=permanent DNS error (domain: corthon.com, ip: 209.85.216.66, mailfrom: bret@corthon.com) Received: by mail-pj1-f66.google.com with SMTP id t7so2666227pjd.3 for ; Tue, 22 Sep 2020 23:09:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corthon-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=N27Sz+T5Gj4uzge7SuI1t4N1z9WJxiEXAL0B19GXmC8=; b=itkozOv8Ml72GtY2918haw4+qxs8NC3SvyZcgdNsieKs5+2uoNlFFDw44xUeRPmAr5 psRu8f4J5pkG4Qd+QNjEaK1zt1q36vU9oMFfMH+Nb0qgxwl0tt+eVDmbtgMEXcCFNbyi SwSlJFwC3hQvK/GCBHoVXHYNixnIuIMJYeBEzr4hJp+bN3kosBF6BHQRnsQ0F5ioqLbD JcaKsyOV2+1i/Oh29M1JFX1Ss0hqB1rswnDaR6QK4FmDgf9G9zJVmYdP9oJf7Px3GME5 aA4J5tLrCp9p9GxCe/wRCWVhKltmnsT5aDSw2Ea6cmkiTHcVaXlH0KwFXc0aEz6bmO53 zJfg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=N27Sz+T5Gj4uzge7SuI1t4N1z9WJxiEXAL0B19GXmC8=; b=SCMItSLoBiPDOD5RkQbgt6voVl8sLJ70A4eu0ICQ5wCjR1mU6pNsAdnDHXxAENrzuM 6db0twtKugh1fQqqQ9H4oh8UaPSQxrUgNFYTqPtIw8iQnpX9wUcKb0K0rlMkXe0lyu7F 1tc4VM2NlYUC1NbF5eEJeY/5VfbtxK+bOBJaaoTkYaiiL20/970JBqXeqY85Ir/Zkprp E021OWqme+ESieAZ6XpNzy39pm438FNHtbZZNAizfg133SlgR2SXBb8WK3c0BsmGZM9V pxAblfOHSeZvX0fK8j3QG8xFtU8FEGhlRrQjZ4Gt+cqmr7s5vTd4htbCLPKLfYtnx+8I pFCQ== X-Gm-Message-State: AOAM533lzcIYjNzmH2SZjOVTG9J+ClM13uIHV4GkvhxKm28RbdyQ4KoN xU6W7TzrV2z9b8X7jLkKiR3cEPZ2V0nNtfKD X-Google-Smtp-Source: ABdhPJxFS9CKMkq5aSuRNz1VvLqhlqfvDKz0JzXnZiMGnpcTVqBHC0VZbmFrtJddKoGnEfiIgRoK7w== X-Received: by 2002:a17:902:6b02:b029:d2:2e08:1b9a with SMTP id o2-20020a1709026b02b02900d22e081b9amr6488351plk.55.1600841361103; Tue, 22 Sep 2020 23:09:21 -0700 (PDT) Return-Path: Received: from localhost.localdomain (174-21-140-128.tukw.qwest.net. [174.21.140.128]) by smtp.gmail.com with ESMTPSA id x4sm16960498pff.57.2020.09.22.23.09.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 22 Sep 2020 23:09:20 -0700 (PDT) From: "Bret Barkelew" X-Google-Original-From: Bret Barkelew To: devel@edk2.groups.io Cc: Maurice Ma , Guo Dong , Benjamin You , Bret Barkelew Subject: [PATCH v8 08/14] UefiPayloadPkg: Add VariablePolicy engine to UefiPayloadPkg platform Date: Tue, 22 Sep 2020 23:07:42 -0700 Message-Id: <20200923060748.3795-9-bret.barkelew@microsoft.com> X-Mailer: git-send-email 2.28.0.windows.1 In-Reply-To: <20200923060748.3795-1-bret.barkelew@microsoft.com> References: <20200923060748.3795-1-bret.barkelew@microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Bret Barkelew https://bugzilla.tianocore.org/show_bug.cgi?id=3D2522 Cc: Maurice Ma Cc: Guo Dong Cc: Benjamin You Cc: Bret Barkelew Signed-off-by: Bret Barkelew Reviewed-by: Maurice Ma --- UefiPayloadPkg/UefiPayloadPkgIa32.dsc | 4 ++++ UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc | 4 ++++ 2 files changed, 8 insertions(+) diff --git a/UefiPayloadPkg/UefiPayloadPkgIa32.dsc b/UefiPayloadPkg/UefiPay= loadPkgIa32.dsc index 12d7ffe81416..2206ccdc94c4 100644 --- a/UefiPayloadPkg/UefiPayloadPkgIa32.dsc +++ b/UefiPayloadPkg/UefiPayloadPkgIa32.dsc @@ -4,6 +4,7 @@ # Provides drivers and definitions to create uefi payload for bootloaders.= =0D #=0D # Copyright (c) 2014 - 2020, Intel Corporation. All rights reserved.
=0D +# Copyright (c) Microsoft Corporation.=0D # SPDX-License-Identifier: BSD-2-Clause-Patent=0D #=0D ##=0D @@ -208,6 +209,8 @@ [LibraryClasses] AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf=0D TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurem= entLibNull.inf=0D VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ib.inf=0D + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Var= iablePolicyHelperLib.inf=0D =0D [LibraryClasses.IA32.SEC]=0D DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf=0D @@ -257,6 +260,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf=0D MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf=0D ReportStatusCodeLib|MdeModulePkg/Library/RuntimeDxeReportStatusCodeLib/R= untimeDxeReportStatusCodeLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ibRuntimeDxe.inf=0D =0D [LibraryClasses.common.UEFI_DRIVER,LibraryClasses.common.UEFI_APPLICATION]= =0D PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf=0D diff --git a/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc b/UefiPayloadPkg/Uefi= PayloadPkgIa32X64.dsc index e18c4678e8e3..cc34fd520b9a 100644 --- a/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc +++ b/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc @@ -4,6 +4,7 @@ # Provides drivers and definitions to create uefi payload for bootloaders.= =0D #=0D # Copyright (c) 2014 - 2020, Intel Corporation. All rights reserved.
=0D +# Copyright (c) Microsoft Corporation.=0D # SPDX-License-Identifier: BSD-2-Clause-Patent=0D #=0D ##=0D @@ -209,6 +210,8 @@ [LibraryClasses] AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf=0D TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurem= entLibNull.inf=0D VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ib.inf=0D + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Var= iablePolicyHelperLib.inf=0D =0D [LibraryClasses.IA32.SEC]=0D DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf=0D @@ -258,6 +261,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf=0D MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf=0D ReportStatusCodeLib|MdeModulePkg/Library/RuntimeDxeReportStatusCodeLib/R= untimeDxeReportStatusCodeLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ibRuntimeDxe.inf=0D =0D [LibraryClasses.common.UEFI_DRIVER,LibraryClasses.common.UEFI_APPLICATION]= =0D PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf=0D --=20 2.28.0.windows.1