From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web12.3579.1660200849685231102 for ; Wed, 10 Aug 2022 23:54:10 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=KyWAKmei; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: judah.vang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1660200849; x=1691736849; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=2BSlXBI/NBRX5RUxO6GUlnfRwqiKR9V28JFN2H8ctxY=; b=KyWAKmeioB8e+ptG6jSSq/VtUkrSRrhshPRM6Udga7YTVXG4RHezVO8w +N8Uh5TUnApQAkbYNfIf8whzkhI7wPv3jUyMBgBkxzn51c6fkW8xJi5ZC jp52VJOM5bhC8nOJtnedvekKLm6YT7LtZUK3i4rxEmWpehGZBzOYay00I etzHaOx8CtzRNvbFxXMNAuXY0FL0K0nRJLtrmLVWi5M66K7PPfTkjsuD8 DmINVNBKEUhg8w4yfyGdQu1F99XjkeLEvnWRudcfaFQTdMKQlwHH2GOoE OkB55PqS/T2NRCbiwXB5bn+tz1GbU8VjesTTlqf3RTPce/LJlbKPZn3Ug A==; X-IronPort-AV: E=McAfee;i="6400,9594,10435"; a="377565731" X-IronPort-AV: E=Sophos;i="5.93,228,1654585200"; d="scan'208";a="377565731" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Aug 2022 23:54:09 -0700 X-IronPort-AV: E=Sophos;i="5.93,228,1654585200"; d="scan'208";a="673586256" Received: from moisespe-mobl.amr.corp.intel.com (HELO jvang-mobl.amr.corp.intel.com) ([10.212.171.64]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Aug 2022 23:54:08 -0700 From: "Judah Vang" To: devel@edk2.groups.io Cc: Jian J Wang , Liming Gao , Nishant C Mistry Subject: [PATCH v4 05/28] MdeModulePkg: Add new GUID for Variable Store Info Date: Wed, 10 Aug 2022 23:53:14 -0700 Message-Id: <20220811065337.2068-6-judah.vang@intel.com> X-Mailer: git-send-email 2.35.1.windows.2 In-Reply-To: <20220811065337.2068-1-judah.vang@intel.com> References: <20220811065337.2068-1-judah.vang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2594 Discover if Variable Store Info HOB has been published by platform driver. It contains information in regards to HOB or NV Variable Store availability Cc: Jian J Wang Cc: Liming Gao Cc: Nishant C Mistry Signed-off-by: Jian J Wang Signed-off-by: Nishant C Mistry Signed-off-by: Judah Vang Reviewed-by: Jian J Wang --- MdeModulePkg/MdeModulePkg.dec | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 7d989108324a..e812e016ccca 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -4,7 +4,7 @@ # and libraries instances, which are used for those modules. # # Copyright (c) 2019, NVIDIA CORPORATION. All rights reserved. -# Copyright (c) 2007 - 2021, Intel Corporation. All rights reserved.
+# Copyright (c) 2007 - 2022, Intel Corporation. All rights reserved.
# Copyright (c) 2016, Linaro Ltd. All rights reserved.
# (C) Copyright 2016 - 2019 Hewlett Packard Enterprise Development LP
# Copyright (c) 2017, AMD Incorporated. All rights reserved.
@@ -93,6 +93,14 @@ [LibraryClasses] # TpmMeasurementLib|Include/Library/TpmMeasurementLib.h + ## @libraryclass Provides interfaces to encrypt/decrypt variable. + # + EncryptionVariableLib|Include/Library/EncryptionVariableLib.h + + ## @libraryclass Provides interfaces to encrypt/decrypt variable. + # + ProtectedVariableLib|Include/Library/ProtectedVariableLib.h + ## @libraryclass Provides authenticated variable services. # AuthVariableLib|Include/Library/AuthVariableLib.h @@ -516,6 +524,9 @@ [Ppis] gEdkiiPeiCapsuleOnDiskPpiGuid = { 0x71a9ea61, 0x5a35, 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } } gEdkiiPeiBootInCapsuleOnDiskModePpiGuid = { 0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } } + ## Include/Ppi/ReadOnlyVariable2.h + gEfiPeiVariableStoreDiscoveredPpiGuid = { 0xa2fc038d, 0xfdf5, 0x4501, { 0xaf, 0x8e, 0x69, 0xb0, 0x20, 0xec, 0xe6, 0x63 } } + [Protocols] ## Load File protocol provides capability to load and unload EFI image into memory and execute it. # Include/Protocol/LoadPe32Image.h -- 2.35.1.windows.2