From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.web12.6331.1606308971966633469 for ; Wed, 25 Nov 2020 04:56:12 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@nuviainc-com.20150623.gappssmtp.com header.s=20150623 header.b=puaGKbC8; spf=pass (domain: nuviainc.com, ip: 209.85.128.66, mailfrom: leif@nuviainc.com) Received: by mail-wm1-f66.google.com with SMTP id w24so2070918wmi.0 for ; Wed, 25 Nov 2020 04:56:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nuviainc-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=KtS4NJU37NrqvvsILEFQU0Krac9TbBmM4mVwFsbOtCg=; b=puaGKbC8J6bySf9vkRxle5FPTsYrnQDcGmQeqQaE270lr4frwTP/RWQm7U/pAI3nGd 09xOoYJUE9m0G008/cteCjpRk0DEPo9aYyilq09xdrN43oUjBgrebYbLdGfKQ2qRp3KI WnsOW95/XmJKCFtUrKpsz6pBwTV9Lm5rhaH0vCnYZUDn12O2BAl1K3xI9Q0RndW/mBpx gyNJ3nzKUauU4mYCNe9TWlKydH/ieGt0MaMurpSswOQ71iUIG2RM5egoAVjeEdPDt5v8 qCdoLQJrc6MyJuEizCTrKKoXqodazHdPeLlFgPvG3LqRhVKQLdCLUbOeQ+49kjk+LrUH gQLQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=KtS4NJU37NrqvvsILEFQU0Krac9TbBmM4mVwFsbOtCg=; b=tgOEPU1IkCKbOlErhO5+E96HHGLhdQG9+CdjpfnqixzS25/0N4Hjn/oZ4TV/Q2BXrB JR74MA4HRZpG8w8O0ItbJbY6QixMKEFeN6QbbqzCXL3Ll52XUUP2TLxDW1N35tvUH2r3 yKosNXLZj80XK488R87hkngRpTydTNFEfcTL0uhKald5X/L1lUwKti3kDZeZP717Ysbp pb/3fF2IlMuCGLD/2J971HQbtAJeSZpKFfO26GCVWyYV3X6qlfw0sK6LeiMMEmyPcb9t Gx7UFsYhtVnzM6djXQSb9G9TykPv5VoDlN5PmBetW5tvh3nyhkSr9gPZQSagl256ZDNB ZR7A== X-Gm-Message-State: AOAM5330gjpowXYuOy/lkaT3MMlGUnTi4+JOXsEHwA/dRsViGudEaz9U iq5vVjhvp0nB1cAMasR/UMPsc1tW2uza39wvZHvh5YqOAtVmZc6PwTqR1nSwZBKEHAaVrQQEoWr MxdT1ZCQfhaJ5CEht6MMWvhjsxWHLJX1ALP7jJF//G5nSakypB2yqQr+UFdZnf2iN7VhT X-Google-Smtp-Source: ABdhPJzf/GszeDzUzgZ4fypuJp8VMzXwA9mupGPGD8/O8Q/Xd7sKyo9vW+NPZ25/IzHZx1HPqmx01Q== X-Received: by 2002:a1c:a706:: with SMTP id q6mr3833729wme.2.1606308970239; Wed, 25 Nov 2020 04:56:10 -0800 (PST) Return-Path: Received: from vanye.hemma.eciton.net (cpc1-cmbg19-2-0-cust915.5-4.cable.virginm.net. [82.27.183.148]) by smtp.gmail.com with ESMTPSA id p9sm4942639wrw.29.2020.11.25.04.56.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Nov 2020 04:56:09 -0800 (PST) From: "Leif Lindholm" To: devel@edk2.groups.io Cc: Marcin Wojtas Subject: [PATCH edk2-platforms 11/15] Silicon/Marvell: add VariablePolicy resolutions Date: Wed, 25 Nov 2020 12:55:55 +0000 Message-Id: <20201125125559.11631-12-leif@nuviainc.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201125125559.11631-1-leif@nuviainc.com> References: <20201125125559.11631-1-leif@nuviainc.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Add resolutions for - VariablePolicyLib - VariablePolicyHelperLib - VariablePolicyLib (DXE_RUNTIME_DRIVER) These need SafeIntLib, so move that out of the ifdef restricting it to capsule builds. Cc: Marcin Wojtas Signed-off-by: Leif Lindholm --- Silicon/Marvell/Armada7k8k/Armada7k8k.dsc.inc | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/Silicon/Marvell/Armada7k8k/Armada7k8k.dsc.inc b/Silicon/Marvell/Armada7k8k/Armada7k8k.dsc.inc index ce8e120ea4fd..017c6287f712 100644 --- a/Silicon/Marvell/Armada7k8k/Armada7k8k.dsc.inc +++ b/Silicon/Marvell/Armada7k8k/Armada7k8k.dsc.inc @@ -38,8 +38,8 @@ [LibraryClasses.common] BaseLib|MdePkg/Library/BaseLib/BaseLib.inf !if $(CAPSULE_ENABLE) BmpSupportLib|MdeModulePkg/Library/BaseBmpSupportLib/BaseBmpSupportLib.inf +!endif SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf -!endif SynchronizationLib|MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibNull.inf PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf @@ -185,6 +185,7 @@ [LibraryClasses.common.UEFI_DRIVER] ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLib.inf [LibraryClasses.common.DXE_RUNTIME_DRIVER] HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf @@ -197,6 +198,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] !if $(TARGET) != RELEASE DebugLib|MdePkg/Library/DxeRuntimeDebugLibSerialPort/DxeRuntimeDebugLibSerialPort.inf !endif + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLibRuntimeDxe.inf [LibraryClasses.ARM, LibraryClasses.AARCH64] # @@ -560,6 +562,7 @@ [Components.common] NULL|MdeModulePkg/Library/VarCheckUefiLib/VarCheckUefiLib.inf TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmMeasurementLibNull.inf VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/VariablePolicyHelperLib.inf } # UEFI application (Shell Embedded Boot Loader) -- 2.20.1