From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web08.8046.1604904399466359928 for ; Sun, 08 Nov 2020 22:46:39 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@corthon-com.20150623.gappssmtp.com header.s=20150623 header.b=u+woR2rd; spf=none, err=permanent DNS error (domain: corthon.com, ip: 209.85.210.173, mailfrom: bret@corthon.com) Received: by mail-pf1-f173.google.com with SMTP id y7so7175863pfq.11 for ; Sun, 08 Nov 2020 22:46:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corthon-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=L6TW3+uqW+v4qtv0sewODpeWqyhbmi1o7TNz6WXIafk=; b=u+woR2rdO0aEejMx7bYyVcBgR6K+Pmo+DyvcJBZqe7VE/ZLbkSofQc/2K4yk+Ws6RC cggydjBh41lmclABeee0EHgSIwxmwCOVbi0TDTTUeV1GpekCe2iz3bYfKlz+QrC0P4aQ Lz/0sb+Ph3uFLup+2hw54VuMwV436phmQB+JF8zD1LKDkYl5R3MhLZOWFF1qZki2i56A /A4Bq0N3gehbQ9P6PJXGOLXhvWnQMEmYR/v6JpYDbCEHW5VE7RfmRNocJfUfx+GftxSS p8HX4hKqXhvnLXwHy9+qEdOO27IaonTJNMijnOLQF9RwNLj0GCCdhfd3fAIx0sPuBg38 kfPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=L6TW3+uqW+v4qtv0sewODpeWqyhbmi1o7TNz6WXIafk=; b=ugcyXOSRMLVsYIZJ3DUplRBLl9LbeJQH/wzZMBg/ol8gdJAvN0wrjXJwqg2fE18goy g7iQkAivDdUfWLqDpVjToz5hzJ2qPQE8a0POndy20nPVymxbQUtOaEQ8vxFgQyHDez34 uSPO437DG+FH4zyFqBfzqegsw8d3CXsvaOlD0Y8D8NeinX1kbonXuuHW+LdvzJ0DEn6m nq32GjuAdYto3hA7SyetxeAGzXRSZ5qSDRCcK0R39LiTKriz+XSjC91oJaFP3MfDgXo/ znU3L07cEqbcntaxXP/AQykud7ZI3Q9tuT8bU63iX2DnUbEIW3ioqg3xoxn8u1SL3HXJ f+og== X-Gm-Message-State: AOAM531NjLoNbvt4jE1AMOBUr5jwmcHsr6pLXVTSGKtdwGaovnDee6Rs 6vFvphYMa5XQy6PQ6VfjEH8LydDsAPxYuS27 X-Google-Smtp-Source: ABdhPJwoxlJHSMZvgc8Ftc3TGMUvlNPmsF1seePr0OVHRf0BMKbSss08CGKGX3ohfiupS3tuZButPw== X-Received: by 2002:a17:90a:80c6:: with SMTP id k6mr11415243pjw.73.1604904398642; Sun, 08 Nov 2020 22:46:38 -0800 (PST) Return-Path: Received: from localhost.localdomain ([71.212.128.184]) by smtp.gmail.com with ESMTPSA id s145sm10215111pfs.187.2020.11.08.22.46.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 Nov 2020 22:46:37 -0800 (PST) From: "Bret Barkelew" X-Google-Original-From: Bret Barkelew To: devel@edk2.groups.io Cc: Laszlo Ersek , Ard Biesheuvel , Leif Lindholm , Bret Barkelew Subject: [PATCH v9 07/13] ArmVirtPkg: Add VariablePolicy engine to ArmVirtPkg platform Date: Sun, 8 Nov 2020 22:45:16 -0800 Message-Id: <20201109064522.919-8-bret.barkelew@microsoft.com> X-Mailer: git-send-email 2.28.0.windows.1 In-Reply-To: <20201109064522.919-1-bret.barkelew@microsoft.com> References: <20201109064522.919-1-bret.barkelew@microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Bret Barkelew https://bugzilla.tianocore.org/show_bug.cgi?id=3D2522 Cc: Laszlo Ersek Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Bret Barkelew Signed-off-by: Bret Barkelew Reviewed-by: Laszlo Ersek --- ArmVirtPkg/ArmVirt.dsc.inc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc index 4dafd1fa0f1d..9ec92930472d 100644 --- a/ArmVirtPkg/ArmVirt.dsc.inc +++ b/ArmVirtPkg/ArmVirt.dsc.inc @@ -2,6 +2,7 @@ # Copyright (c) 2011-2015, ARM Limited. All rights reserved.=0D # Copyright (c) 2014, Linaro Limited. All rights reserved.=0D # Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.=0D +# Copyright (c) Microsoft Corporation.=0D #=0D # SPDX-License-Identifier: BSD-2-Clause-Patent=0D #=0D @@ -174,6 +175,8 @@ [LibraryClasses.common] AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf=0D !endif=0D VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ib.inf=0D + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Var= iablePolicyHelperLib.inf=0D UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManag= erLib.inf=0D =0D ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseRepor= tStatusCodeLibNull.inf=0D @@ -247,6 +250,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] !if $(TARGET) !=3D RELEASE=0D DebugLib|MdePkg/Library/DxeRuntimeDebugLibSerialPort/DxeRuntimeDebugLibS= erialPort.inf=0D !endif=0D + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyL= ibRuntimeDxe.inf=0D =0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D BaseCryptLib|CryptoPkg/Library/BaseCryptLib/RuntimeCryptLib.inf=0D --=20 2.28.0.windows.1