From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web09.30.1658434056978631862 for ; Thu, 21 Jul 2022 13:07:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=RoCR+eQz; spf=pass (domain: gmail.com, ip: 209.85.214.171, mailfrom: kuqin12@gmail.com) Received: by mail-pl1-f171.google.com with SMTP id d7so2821714plr.9 for ; Thu, 21 Jul 2022 13:07:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=6b/VSg9NNRwEyhAKH9nYktvjQiYQUlueVq7enamji8E=; b=RoCR+eQzVe0v1o5vP+mrwPUrxBSM/RPxDRDrjHLGwa1aOm5YXyP3YCnSMt5ubcHd+x 6zCAWMoEoe2F79AWhx1l3xm0TcxEGQ9P3acWlzxKsOY+xi9QQKuWR1thOQpnURHNJa7/ CFNL6ZlWpP/COzku9cq6uIuIKpFQW5icySk/CbkX1jwwF+3xax9XwOnuZOY2Uvr6UUs+ ZJ5UTNR55xcvHJnGkxQV27KlzZXjuyrH4ApwmU2j5ii00aunGXCAQ5sWPDexYLWIR3tc LcfSQj3x4SPcOn6QqddtBKCa5t/7drtx+1FGrwhV3QUmWzq/FCuIt4l+HQiwb9DxcO5X I9iw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=6b/VSg9NNRwEyhAKH9nYktvjQiYQUlueVq7enamji8E=; b=7cFfniNkx12gTtZcQpWwju4rNof0KOTw+4cztrPvn+/6VEeSD4b3sP3FYay3mGlWeh /IW0Q+Nr5V0sYToZ33FZF9g7yKo3OOwQWOJkZZKZxB4RJ84LDy6pYdrE549gw5JankWk AnPaZDAJ7pXMpVMYxrYVeimDIK/jO1ZyjXWS0Rzfn/XbONz6c5ECSZcRmjTgWnM7MG74 zpEs8jJbTKYq1PlYLQLcWCN8toIl0aZK8rmxDP5f8hGP0tMDDwYtq0JPdCGaywBgP1Hi T97eh5YT+XuApv9C7TTBT12qp5tOighe/Y++22WFsoz4gwk7pyVWv1Jh2mLDiDJuTwdh NzAg== X-Gm-Message-State: AJIora+B+ebTq/xPZACmPfjh11RPDDIGBPB9aV1ftr5dQ2aiX7RaGNxJ q2K+qTpMpEbFUeekb4VlcddOPECWlxI= X-Google-Smtp-Source: AGRyM1vmqgokkcNcqJc1/+MehEhUir9wtFYRm7BbMbsLtxqjL8bWVga8F2J0ytTJKYU277mTQlo1Ng== X-Received: by 2002:a17:902:dad2:b0:16d:3086:a200 with SMTP id q18-20020a170902dad200b0016d3086a200mr5192720plx.11.1658434056247; Thu, 21 Jul 2022 13:07:36 -0700 (PDT) Return-Path: Received: from MININT-0U7P5GU.redmond.corp.microsoft.com ([2001:4898:80e8:3:24ce:6464:b273:7182]) by smtp.gmail.com with ESMTPSA id q3-20020a632a03000000b00415b0c3f0b1sm1912494pgq.69.2022.07.21.13.07.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Jul 2022 13:07:35 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Thomas Abraham , Sami Mujawar Subject: [edk2-platforms][PATCH v2 3/7] VExpressPkg: Pipeline: Resolving newly introduced dependency Date: Thu, 21 Jul 2022 13:07:26 -0700 Message-Id: <20220721200730.1811-4-kuqin12@gmail.com> X-Mailer: git-send-email 2.37.1.windows.1 In-Reply-To: <20220721200730.1811-1-kuqin12@gmail.com> References: <20220721200730.1811-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable The new changes in SecureBootVariableLib brought in a new dependency of PlatformPKProtectionLib. This change added the new library instance from SecurityPkg to resolve ArmVExpress platforms build. Cc: Ard Biesheuvel Cc: Thomas Abraham Cc: Sami Mujawar Signed-off-by: Kun Qin Reviewed-by: Sami Mujawar --- Notes: v2: - Added reviewed-by tag [Sami] Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc b/Platform/ARM/VE= xpressPkg/ArmVExpress.dsc.inc index e637f8933f79..17e4a3fd13d7 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc +++ b/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc @@ -143,6 +143,7 @@ [LibraryClasses.common] AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf= =0D SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf=0D SecureBootVariableProvisionLib|SecurityPkg/Library/SecureBootVariablePro= visionLib/SecureBootVariableProvisionLib.inf=0D + PlatformPKProtectionLib|SecurityPkg/Library/PlatformPKProtectionLibVarPo= licy/PlatformPKProtectionLibVarPolicy.inf=0D =0D # re-use the UserPhysicalPresent() dummy implementation from the ovmf tr= ee=0D PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f=0D --=20 2.37.1.windows.1