From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web08.1621.1659659717904443110 for ; Thu, 04 Aug 2022 17:35:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bpDeuRpu; spf=pass (domain: gmail.com, ip: 209.85.210.175, mailfrom: kuqin12@gmail.com) Received: by mail-pf1-f175.google.com with SMTP id f28so952284pfk.1 for ; Thu, 04 Aug 2022 17:35:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc; bh=MIIvIW0ABF7mgVuQV9Iws3fIabQ775Z3SThDezld0/g=; b=bpDeuRpushbxX+k/6t7S86bsxD3xg/vCmypP77cynmhC+zS/6YrP0BFBn3onou8KsR ogeN8FT/wJP+kJS9V3MQWR2us2mUk+UVgRxN7Kk50hSrzw4Q2zAsvARmjBsno0WaBajJ J9HHS0KLTR5klWdXp32OECTq50bTOIhLdI/8oftTjsYy5iZgQyB1lkQTs+LPWlLvcfQG n28rZuOyQ8/O+A3XfEQZDdpE/YPdtbcDWItaJjPsOfZJn334607vdPgqv/VkL8nacplk 6RdcFZ6wTELM8fsOH6WNqHjcxxy6Syp/6Wr+htM60Sp4zi/nHBUaiAlWezuYqGyS0VZb GUjQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc; bh=MIIvIW0ABF7mgVuQV9Iws3fIabQ775Z3SThDezld0/g=; b=ZgyRT6nnkXIqCYbFdO961PereEXjLCdqiEE1X+Ii1KivO1XWHNYkvpnfJ6tZmHVfxD IIvn+iGwS7dqJtiiom8nAg8cL10bczB+9rfLNkEMwt4TLG2F5BJ/B8qa/HoYHR774kOK vkv37UOTmGFBdaC6R2OznJY/QO391eD0cLC9RdlfGRCp7K1i3yfQ/gN8o4LEINZezmnc /R2ao0mwpYAAkBPwZXZCC58s52lf10iGet+D6mXxb342uUgR0yHU4PJoW9/Keg5DcKul Y8b1zz+kfTn2vyULGxXFcvubc4m52tLQVrJlVkSWZ3+DfyI/PDWH6NkedQFYJkYESQ63 OqEg== X-Gm-Message-State: ACgBeo36ycnmV9w+uvLewW3IyCBAodBy7Deay+9jIK1Q2NgGjZr/4Prr fFhbldoQNm6RdSKHnd7h30yO3IQeuAg= X-Google-Smtp-Source: AA6agR7UBwILcP6Syae5kHSqUBAYRQzhvVE4bX89xwQuocULDlI+pU7Hd9+nuG4S/AEkonpLrTpGpQ== X-Received: by 2002:aa7:8096:0:b0:52d:d5f6:2ea6 with SMTP id v22-20020aa78096000000b0052dd5f62ea6mr4445130pff.0.1659659717244; Thu, 04 Aug 2022 17:35:17 -0700 (PDT) Return-Path: Received: from MININT-0U7P5GU.redmond.corp.microsoft.com ([2001:4898:80e8:a:a1b3:892a:ee11:1b86]) by smtp.gmail.com with ESMTPSA id 141-20020a621493000000b0052d14966783sm1661198pfu.15.2022.08.04.17.35.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Aug 2022 17:35:16 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Thomas Abraham , Sami Mujawar Subject: [edk2-platforms][PATCH v4 3/6] VExpressPkg: Platform Build: Resolving newly introduced dependency Date: Thu, 4 Aug 2022 17:35:08 -0700 Message-Id: <20220805003512.1478-4-kuqin12@gmail.com> X-Mailer: git-send-email 2.37.1.windows.1 In-Reply-To: <20220805003512.1478-1-kuqin12@gmail.com> References: <20220805003512.1478-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable The new changes in SecureBootVariableLib brought in a new dependency of PlatformPKProtectionLib. This change added the new library instance from SecurityPkg to resolve ArmVExpress platforms build. Cc: Ard Biesheuvel Cc: Thomas Abraham Cc: Sami Mujawar Signed-off-by: Kun Qin Reviewed-by: Sami Mujawar --- Notes: v2: - Added reviewed-by tag [Sami] =20=20=20=20 v4: - Updated commits title Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc b/Platform/ARM/VE= xpressPkg/ArmVExpress.dsc.inc index e637f8933f79..17e4a3fd13d7 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc +++ b/Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc @@ -143,6 +143,7 @@ [LibraryClasses.common] AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf= =0D SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf=0D SecureBootVariableProvisionLib|SecurityPkg/Library/SecureBootVariablePro= visionLib/SecureBootVariableProvisionLib.inf=0D + PlatformPKProtectionLib|SecurityPkg/Library/PlatformPKProtectionLibVarPo= licy/PlatformPKProtectionLibVarPolicy.inf=0D =0D # re-use the UserPhysicalPresent() dummy implementation from the ovmf tr= ee=0D PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f=0D --=20 2.37.1.windows.1