From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR02-AM5-obe.outbound.protection.outlook.com (EUR02-AM5-obe.outbound.protection.outlook.com [40.107.0.82]) by mx.groups.io with SMTP id smtpd.web08.8133.1626078030436789455 for ; Mon, 12 Jul 2021 01:20:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=roNOxt+D; spf=pass (domain: arm.com, ip: 40.107.0.82, mailfrom: sunny.wang@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jWQDHNblosQdywzmOJ03JnJRXhZ7pWQeYNKlYE2fAaU=; b=roNOxt+DWBDK+BH3sCWAZEXj+GWtLIuX2smblKRcfjyF6Fz0AHVuVj2FzbrC1xKxb/JlhbBhLX4MWT8FFU7kaSW6DhOXLQBjjkLi42NqA1FP+pSBNIUcpYP808HMIx8SAP455GxWMLAqb2IGjtbIM6/T3615UncmFkatqAo4ios= Received: from AM5PR04CA0006.eurprd04.prod.outlook.com (2603:10a6:206:1::19) by AM0PR08MB4082.eurprd08.prod.outlook.com (2603:10a6:208:12e::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.21; Mon, 12 Jul 2021 08:20:27 +0000 Received: from AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:1:cafe::89) by AM5PR04CA0006.outlook.office365.com (2603:10a6:206:1::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.19 via Frontend Transport; Mon, 12 Jul 2021 08:20:27 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT043.mail.protection.outlook.com (10.152.17.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.20 via Frontend Transport; Mon, 12 Jul 2021 08:20:27 +0000 Received: ("Tessian outbound 3852c8eefab6:v98"); Mon, 12 Jul 2021 08:20:27 +0000 X-CR-MTA-TID: 64aa7808 Received: from 0c0a6793a5e1.3 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 61B73FE8-A548-4AA9-8B83-0E82551EF1D6.1; Mon, 12 Jul 2021 08:20:18 +0000 Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0c0a6793a5e1.3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 12 Jul 2021 08:20:18 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=e2iWGgSye3aVQKhlWZWCg2dnRdBCehlk2BeM+KoxlQY/qLxbi7HlVk0QCtNEIyqc36YDxM40cXKDUs08bzoNg3S7qnU8Onrlml1tpeDc4h3JpyuzBNupax8UVajmQ0iQIM/EF2jvrF0I3kBS9N6pWm7d8fK8GD5PUJsOF2eDINCf0r6qLhzWa5ElyS4QFB7jzKVv7DEjnNJO9bv6WQwFbGjeLYs2dCXynwnfqDbEqfl+vOLCvFlP9pHTHmfpqjE1muFtel5SKzefxXp2GcM5EW9aSo7xk9rcTxygLasfMEmWG846hBNc+zEiD51qQztkPIPTl0HwGHWMYgXJJ9WoIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jWQDHNblosQdywzmOJ03JnJRXhZ7pWQeYNKlYE2fAaU=; b=J8pNJahSYRJ3x7UhkRcfLJLk54Es/TOsOJi5d0TROD4FVPEIx6yZf4r25GsedQ/xV9PCpxC+F935mWACCfVNhWrDvZPTChIeIEHQbnGIf9YQR9RQCZMDtp5kuA4UuElCUfpd63rpstzOcJUSv00oQ0zWLnCv3KIGfFe1igra3OqnznrxCovgQGK5F1TraQU8xAju4fgEsCemmQtJP+ZwzkqXKyZYmGPKJK8WLsB6ZkhnQo7G6BpZ9sjSa8W/zbFQKkevf6n46ZBj+yQCWgSz2JxR/psZmgLClrd76kqAo+V5XHlqlTRIzDhqpPwW51zHm4sD7SwInTgaDdv76kjm6g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jWQDHNblosQdywzmOJ03JnJRXhZ7pWQeYNKlYE2fAaU=; b=roNOxt+DWBDK+BH3sCWAZEXj+GWtLIuX2smblKRcfjyF6Fz0AHVuVj2FzbrC1xKxb/JlhbBhLX4MWT8FFU7kaSW6DhOXLQBjjkLi42NqA1FP+pSBNIUcpYP808HMIx8SAP455GxWMLAqb2IGjtbIM6/T3615UncmFkatqAo4ios= Received: from DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) by DB6PR0802MB2568.eurprd08.prod.outlook.com (2603:10a6:4:9f::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.25; Mon, 12 Jul 2021 08:20:13 +0000 Received: from DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0]) by DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0%7]) with mapi id 15.20.4308.026; Mon, 12 Jul 2021 08:20:13 +0000 From: "Sunny Wang" To: Grzegorz Bernacki , "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Samer El-Haj-Mahmoud , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Sami Mujawar , "afish@apple.com" , "ray.ni@intel.com" , "jordan.l.justen@intel.com" , "rebecca@bsdio.com" , "grehan@freebsd.org" , Thomas Abraham , "chasel.chiu@intel.com" , "nathaniel.l.desimone@intel.com" , "gaoliming@byosoft.com.cn" , "eric.dong@intel.com" , "michael.d.kinney@intel.com" , "zailiang.sun@intel.com" , "yi.qian@intel.com" , "graeme@nuviainc.com" , "rad@semihalf.com" , "pete@akeo.ie" , Sunny Wang Subject: Re: [edk2-platforms PATCH v5 0/4] Secure Boot default keys Thread-Topic: [edk2-platforms PATCH v5 0/4] Secure Boot default keys Thread-Index: AQHXblqSfij2YxzTfE2OoDfkIkbbyas/D6oA Date: Mon, 12 Jul 2021 08:20:12 +0000 Message-ID: References: <20210701092051.1057606-1-gjb@semihalf.com> In-Reply-To: <20210701092051.1057606-1-gjb@semihalf.com> Accept-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-ts-tracking-id: A4DAEA0FD4BD1D439CD01458A6468E1D.0 x-checkrecipientchecked: true Authentication-Results-Original: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: 94caa640-1629-48ea-a2e6-08d9450de7f5 x-ms-traffictypediagnostic: DB6PR0802MB2568:|AM0PR08MB4082: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:7691;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB8PR08MB3993.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(376002)(346002)(136003)(366004)(39850400004)(52536014)(5660300002)(122000001)(478600001)(99936003)(316002)(38100700002)(83380400001)(33656002)(9686003)(53546011)(4326008)(186003)(55016002)(71200400001)(19627235002)(26005)(110136005)(86362001)(8936002)(6506007)(54906003)(66476007)(66556008)(64756008)(66616009)(8676002)(2906002)(7696005)(66446008)(76116006)(7416002)(66946007);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?dQ0SFrL3Fcvb7XEbs4kmXUzd1DzM/ugbUT3KHhFUOQYqdAozqdmMSdQE8bUM?= =?us-ascii?Q?R8C/A0sWyQWoO21xq5+YH6rH4agVrHqV9j5PdKmQ+nnVAIWi9PjT5StOmAsg?= =?us-ascii?Q?G114atlaeshIO8cYPMTC1bY6SfTkmUVR6PEMRi5J1Ev+zjp7X7PQ/PMH8xSB?= =?us-ascii?Q?cAPJSFgAIbc60PuxaIrL+gxwMZKvR1WayruxeTdYYYJ2IKbzhCEvO2UbN7fe?= =?us-ascii?Q?5BItCLmYJY1csVea38uXTCrWyj72SdY4kWQwLic6QiNRlYS1PQcATv/QcjDc?= =?us-ascii?Q?M3ROeSYK6RjZJWtUohYhQ+UGG6IG2XL9nJuH8Oi6aB4Au/iXGEV8wayhMmWe?= =?us-ascii?Q?Upety2L22Lr583dpB/i9FKNATsfnvsQohEOKdzy/JYlgJJwnPYJ8UkA8zJ+1?= =?us-ascii?Q?Mq8sdXrJzRLmSVtlwxhkRGFaM1Z6AK0Bt17gd+cDYE4Nz9PLnlzpE8Fh+YwX?= =?us-ascii?Q?WPrQyBF1ieOQFu5Oo/SnNpA2d7gm3aQop1i4Hzx6E9MOlD1+EltXJdB3yo4/?= =?us-ascii?Q?w+7r0hBQoCbgghdx5uyxPzgifjuHgitBGTalt3teHj9cnb98iLhfbxrFOHZt?= =?us-ascii?Q?IeXJ2blQ7bsHcz3iroReQ/qCQsfORWniCMluum3XrzYUWp0R8P+2/LWtHc+S?= =?us-ascii?Q?wI6r8Ced1N+nnqUciRd6vCO+TLwcKZ+ud5EFSTtfkGSc3ndceKInSjLmYg14?= =?us-ascii?Q?lnxR4RFiILfTn5ZV7HwTF9dRxSsgkP2BIH5pZvkR3Bp45uXeQNg4zQUD2GFb?= =?us-ascii?Q?b13vPWgASjrkQtoif7Q8aQrnqOOaUB/MK5CIRl7yZY4z6N6gHM2Ffyo4NsSe?= =?us-ascii?Q?orA1I9K8mvBNMWKy7k8yOtn746I8sBhoGW6F4bt6qNtRKC7paoizBqHVCqOb?= =?us-ascii?Q?wfTWtkQm9tAdhDB7ibl23wbyU6+TA4tYDt1D8UIyS8Vz3yJ/kE7j9tGxZzr3?= =?us-ascii?Q?DBnCC1O7KJiah9lkekLRd5mwYgkQ4UG/ySw4EnRHt5UMkMNwc/xbeRebTUhs?= =?us-ascii?Q?FDoc9b09vNjdPtBCHCUly6MNkVZnI+6gosMAixHO9GNodj+XUyIStK6OlXlv?= =?us-ascii?Q?v3jPXneVEij9G/9CRMNlpHmZA34gKjmULHC3QLaoLk27nCGRLmgjDuB5RHrQ?= =?us-ascii?Q?rjQic9nk7dRFljffeZByzYeFQXpi8ko4Mgo9rdLKNreqqLtYZm1Zl+3nLspa?= =?us-ascii?Q?tOvUhOyJIwrob5DLP2EjYwBwgddjUQfisLY5V7GIaudeS+pI5tEhFSNslFqa?= =?us-ascii?Q?lhYnvHklQ+UlhLJX8BZCdq+VBeRhRDXE+M+MzHd66Zy0oHe7IQkgr+PpIE98?= =?us-ascii?Q?x+6IhHW72PKDASOY/x7m2KSy?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2568 Original-Authentication-Results: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; Return-Path: Sunny.Wang@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 39c51573-ba8f-4157-9af4-08d9450ddf5c X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(346002)(376002)(136003)(39850400004)(396003)(46966006)(36840700001)(8676002)(82310400003)(9686003)(5660300002)(55016002)(336012)(19627235002)(83380400001)(36860700001)(47076005)(2906002)(52536014)(356005)(8936002)(81166007)(86362001)(478600001)(99936003)(82740400003)(235185007)(7696005)(316002)(6506007)(53546011)(186003)(33656002)(66616009)(4326008)(70206006)(70586007)(26005)(54906003)(110136005);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jul 2021 08:20:27.7372 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 94caa640-1629-48ea-a2e6-08d9450de7f5 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4082 X-Groupsio-MsgNum: 77685 Content-Language: en-US Content-Type: multipart/mixed; boundary="_002_DB8PR08MB3993394571D6BCA84057024685159DB8PR08MB3993eurp_" --_002_DB8PR08MB3993394571D6BCA84057024685159DB8PR08MB3993eurp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed whole series. Reviewed-by: Sunny Wang We still need Intel platforms' maintainers to review the patch below. All o= ther patches (for ARM, RISC-V, and QEMU platforms) were already reviewed by= maintainers. - [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVariable= Lib class resolution Best Regards, Sunny Wang -----Original Message----- From: Grzegorz Bernacki Sent: Thursday, July 1, 2021 5:21 PM To: devel@edk2.groups.io Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud ; Sunny Wang ; mw@semihalf.co= m; upstream@semihalf.com; jiewen.yao@intel.com; jian.j.wang@intel.com; min.= m.xu@intel.com; lersek@redhat.com; Sami Mujawar ; afi= sh@apple.com; ray.ni@intel.com; jordan.l.justen@intel.com; rebecca@bsdio.co= m; grehan@freebsd.org; Thomas Abraham ; chasel.chiu= @intel.com; nathaniel.l.desimone@intel.com; gaoliming@byosoft.com.cn; eric.= dong@intel.com; michael.d.kinney@intel.com; zailiang.sun@intel.com; yi.qian= @intel.com; graeme@nuviainc.com; rad@semihalf.com; pete@akeo.ie; Grzegorz B= ernacki Subject: [edk2-platforms PATCH v5 0/4] Secure Boot default keys This patchset is a consequence of "Secure Boot default keys" patchset in edk2. It adds SecureBootVariableLib class resolution for each platform which uses SecureBootConfigDxe and also enables Secure Boot variables initialization for RPi4. Previously these commits were part of edk2 patchset, but since number of commits increased in v5 version, it is now separate patchset. Changes related to both edk2 & edk-platform versions: Changes since v1: - change names: SecBootVariableLib =3D> SecureBootVariableLib SecBootDefaultKeysDxe =3D> SecureBootDefaultKeysDxe SecEnrollDefaultKeysApp =3D> EnrollFromDefaultKeysApp - change name of function CheckSetupMode to GetSetupMode - remove ShellPkg dependecy from EnrollFromDefaultKeysApp - rebase to master Changes since v2: - fix coding style for functions headers in SecureBootVariableLib.h - add header to SecureBootDefaultKeys.fdf.inc - remove empty line spaces in SecureBootDefaultKeysDxe files - revert FAIL macro in EnrollFromDefaultKeysApp - remove functions duplicates and add SecureBootVariableLib to platforms which used it Changes since v3: - move SecureBootDefaultKeys.fdf.inc to ArmPlatformPkg - leave duplicate of CreateTimeBasedPayload in PlatformVarCleanupLib - fix typo in guid description Changes since v4: - reorder patches to make it bisectable - split commits related to more than one platform - move edk2-platform commits to separate patchset Grzegorz Bernacki (4): Intel Platforms: add SecureBootVariableLib class resolution ARM Silicon and Platforms: add SecureBootVariableLib class resolution RISC-V Platforms: add SecureBootVariableLib class resolution Platform/RaspberryPi: Enable default Secure Boot variables initialization Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc | 1 + Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc | 1 + Platform/Intel/QuarkPlatformPkg/Quark.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc | 3 += +- Platform/Qemu/SbsaQemu/SbsaQemu.dsc | 1 + Platform/RaspberryPi/RPi3/RPi3.dsc | 1 + Platform/RaspberryPi/RPi4/RPi4.dsc | 4 += +++ Platform/SiFive/U5SeriesPkg/FreedomU500VC707Board/U500.dsc | 1 + Platform/SiFive/U5SeriesPkg/FreedomU540HiFiveUnleashedBoard/U540.dsc | 1 + Platform/Socionext/DeveloperBox/DeveloperBox.dsc | 4 += +++ Platform/RaspberryPi/RPi4/RPi4.fdf | 2 += + 12 files changed, 20 insertions(+), 1 deletion(-) -- 2.25.1 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you. --_002_DB8PR08MB3993394571D6BCA84057024685159DB8PR08MB3993eurp_ Content-Type: message/rfc822 Content-Disposition: attachment; creation-date="Mon, 12 Jul 2021 08:20:10 GMT"; modification-date="Mon, 12 Jul 2021 08:20:10 GMT" Received: from AM6PR08MB4135.eurprd08.prod.outlook.com (2603:10a6:20b:a9::16) by DB8PR08MB3993.eurprd08.prod.outlook.com with HTTPS; Thu, 1 Jul 2021 09:21:58 +0000 Received: from AM6P195CA0076.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:86::17) by AM6PR08MB4135.eurprd08.prod.outlook.com (2603:10a6:20b:a9::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.23; Thu, 1 Jul 2021 09:21:58 +0000 Received: from AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:86:cafe::53) by AM6P195CA0076.outlook.office365.com (2603:10a6:209:86::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 09:21:58 +0000 Received: from 64aa7808-inbound-1.mta.getcheckrecipient.com (34.249.187.16) by AM5EUR03FT040.mail.protection.outlook.com (10.152.17.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 09:21:57 +0000 Received: ("Tessian outbound b0d80e6eee1b:v97"); Thu, 01 Jul 2021 09:21:57 +0000 Received: from mail-lj1-f169.google.com (209.85.208.169) by DB5EUR03FT039.mail.protection.outlook.com (10.152.21.120) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 09:21:07 +0000 Received: from b551f30503c1.1 by 64aa7808-inbound-1.mta.getcheckrecipient.com id 17987D91-637B-4AF3-9E1D-2CE05D6C0AF5.1; Thu, 01 Jul 2021 09:21:09 +0000 Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-inbound-1.mta.getcheckrecipient.com with ESMTPS id b551f30503c1.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 01 Jul 2021 09:21:09 +0000 Received: from DB6PR0802CA0034.eurprd08.prod.outlook.com (2603:10a6:4:a3::20) by DB6PR0801MB1799.eurprd08.prod.outlook.com (2603:10a6:4:3a::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.23; Thu, 1 Jul 2021 09:21:07 +0000 Received: from DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:a3:cafe::62) by DB6PR0802CA0034.outlook.office365.com (2603:10a6:4:a3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 09:21:07 +0000 Received: from mail-lj1-f169.google.com (209.85.208.169) by DB5EUR03FT039.mail.protection.outlook.com (10.152.21.120) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 09:21:07 +0000 Received: by mail-lj1-f169.google.com with SMTP id q4so7427368ljp.13 for ; Thu, 01 Jul 2021 02:21:07 -0700 (PDT) Received: from gilgamesh.lab.semihalf.net ([83.142.187.85]) by smtp.gmail.com with ESMTPSA id g15sm2343205lfr.110.2021.07.01.02.21.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Jul 2021 02:21:06 -0700 (PDT) From: Grzegorz Bernacki To: "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Samer El-Haj-Mahmoud , Sunny Wang , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Sami Mujawar , "afish@apple.com" , "ray.ni@intel.com" , "jordan.l.justen@intel.com" , "rebecca@bsdio.com" , "grehan@freebsd.org" , Thomas Abraham , "chasel.chiu@intel.com" , "nathaniel.l.desimone@intel.com" , "gaoliming@byosoft.com.cn" , "eric.dong@intel.com" , "michael.d.kinney@intel.com" , "zailiang.sun@intel.com" , "yi.qian@intel.com" , "graeme@nuviainc.com" , "rad@semihalf.com" , "pete@akeo.ie" , Grzegorz Bernacki Subject: [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVariableLib class resolution Thread-Topic: [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVariableLib class resolution Thread-Index: AQHXblqL/fVo83OUEUKdmY6ydYBncQ== Date: Thu, 1 Jul 2021 09:20:48 +0000 Message-ID: <20210701092051.1057606-2-gjb@semihalf.com> References: <20210701092051.1057606-1-gjb@semihalf.com> In-Reply-To: <20210701092051.1057606-1-gjb@semihalf.com> Content-Language: en-US X-MS-Exchange-Organization-AuthSource: DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com X-MS-Has-Attach: X-MS-Exchange-Organization-Network-Message-Id: 1b70b820-a2d3-4b18-e9b4-08d93c71acee X-MS-TNEF-Correlator: X-MS-Exchange-Organization-RecordReviewCfmType: 0 x-ms-publictraffictype: Email received-spf: None (protection.outlook.com: semihalf.com does not designate permitted sender hosts) x-ms-exchange-organization-originalserveripaddress: 10.152.17.148 x-ms-exchange-organization-originalclientipaddress: 209.85.208.169 x-ms-exchange-organization-submissionquotaskipped: False authentication-results: spf=none (sender IP is 209.85.208.169) smtp.mailfrom=semihalf.com; arm.com; dkim=pass (signature was verified) header.d=semihalf-com.20150623.gappssmtp.com;arm.com; dmarc=none action=none header.from=semihalf.com;compauth=pass reason=106 x-forefront-antispam-report: CIP:34.249.187.16;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SFE;H:mail-lj1-f169.google.com;PTR:mail-lj1-f169.google.com;CAT:NONE;SFS:;DIR:INB; x-ms-office365-filtering-correlation-id: 1b70b820-a2d3-4b18-e9b4-08d93c71acee x-microsoft-antispam: BCL:0; x-ms-traffictypediagnostic: DB6PR0801MB1799:|AM6PR08MB4135: x-ms-exchange-crosstenant-originalarrivaltime: 01 Jul 2021 09:21:57.9335 (UTC) x-ms-exchange-crosstenant-fromentityheader: HybridOnPrem x-ms-exchange-crosstenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d x-ms-exchange-crosstenant-network-message-id: 1b70b820-a2d3-4b18-e9b4-08d93c71acee x-ms-exchange-transport-crosstenantheadersstamped: AM6PR08MB4135 x-ms-exchange-transport-endtoendlatency: 00:00:00.8338024 x-originatororg: arm.com x-eopattributedmessage: 1 x-crosspremisesheadersfiltered: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com x-organizationheaderspreserved: DB6PR0801MB1799.eurprd08.prod.outlook.com x-crosspremisesheaderspromoted: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com authentication-results-original: spf=none (sender IP is 209.85.208.169) smtp.mailfrom=semihalf.com; arm.com; dkim=pass (signature was verified) header.d=semihalf-com.20150623.gappssmtp.com;arm.com; dmarc=none action=none header.from=semihalf.com;compauth=pass reason=106 x-ms-exchange-atpmessageproperties: SA x-ms-oob-tlc-oobclassifiers: OLM:2399;OLM:2399; x-forefront-antispam-report-untrusted: CIP:209.85.208.169;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SFE;H:mail-lj1-f169.google.com;PTR:mail-lj1-f169.google.com;CAT:NONE;SFS:;DIR:INB; x-microsoft-antispam-untrusted: BCL:0; x-microsoft-antispam-message-info-original: =?iso-8859-1?Q?0yu0cZt09Nl6DEam5J0BVtL2GfdGsNWI+R88ZPqAwPQg4u3+GCOfeNns1F?= =?iso-8859-1?Q?/3b2ou5ASO1vfTj5glEIbl8N/WUtFecJqtLJXldt6eGhmaOyXuzm8zTxTN?= =?iso-8859-1?Q?1I+kZvedDRU9Smt8RDgXyhCWFji9b6sQl0lEPLvNLd7Yv48qLMfUw7YmuH?= =?iso-8859-1?Q?1RT4RPmhO8Iqz2mbjna5HhlcIvCzeGFzJPZXxVM5+ei07vl0/uYeG2Qv5U?= =?iso-8859-1?Q?5XMsfXcNDXoSWNS3hu0mBJDmkfyHLteodXp8UDoft3uUZCTkC48dkjx+kF?= =?iso-8859-1?Q?AhIWziF0Sex9GbbxNeYv5frjV6NCzMfSXnlTjI8B+2MRzT2CYYjT05wOgC?= =?iso-8859-1?Q?c1sxQaq8bBrQUJqHv6GuJsmBvOaowerMJ96IDO5LI95yFkkKVvYgbNFln5?= =?iso-8859-1?Q?QHEUWFssKYdIh4k57NOjb1BMaY8xV9LVLMZx51t4HwjZBz2fVVW8IaQ/Td?= =?iso-8859-1?Q?U1KRyXJgEFmT1NIwGDqyFjo6Y+18kxeH6GQpeMbpH5ocxHlJj6Ijr/8Z5U?= =?iso-8859-1?Q?G7n/KkKhZTEeoQd//p/9sJR7YCI9/hTUpqnz6996S6rOJJi+SzgpR+NADz?= =?iso-8859-1?Q?qQfzEjemKBbRnDioPqbNAAxM2F7ngZuOBs8WxRuW90/DJ+OQJbrFSDRHhh?= =?iso-8859-1?Q?hZbS3lFYjIIR0oMaMQjmUrbQk5to7bp3MYtTSEL+Y7EPTlDDm2yxUukWiI?= =?iso-8859-1?Q?/1ey4TQmJvdG3ouElZi4GKJclhTuPZKjrOCfwWnk6p6471Hn1XaBZfu2I9?= =?iso-8859-1?Q?PTD6IHYMZDkfYaIvFz+TCM14wRN0FXskNhsEHhVB4PNKKMqSr8OhpQuqFM?= =?iso-8859-1?Q?j2FGtFLWJEYTQer+jtRIiBkfR5DENf7ZlVGckP4etfxkZDJdU3pzX0kkAl?= =?iso-8859-1?Q?OL3NqMZx6m6rGnawblovSOotlKlERatQfx0InolUcaVHDKElHHAkwD172p?= =?iso-8859-1?Q?AdlbcSPFnvEVIEJIwQGMto9VJlBQT0CbacRoXxASvZkRshL166+bSAzN0R?= =?iso-8859-1?Q?53lGph43+SEXPMhuQNJ5WPfsw01zM+N2OuWuevMzs8KHrY5ZWqDABh1atL?= =?iso-8859-1?Q?/dy79y45Vu4TQEbRjfQd9JKaUmuXcKSESwI33i3dITqVafcDhsaVQtw6od?= =?iso-8859-1?Q?DqJ6DBbQ/opJvj2cO5XJSEYfa5Wq4MterBpSDsAE8ANOymuPEIVHrIxFXO?= =?iso-8859-1?Q?+djuSHlOE5pZYLYWrNFaCAIWluxRjsmohQ1/lvq2L8lGeNLedv9LbXai5c?= =?iso-8859-1?Q?nVR9B/u1SD7nPhxHlKHdeQRUg/htlVcd+lZrFe6cQfyBET30yRPDYQVCRw?= =?iso-8859-1?Q?O30JnGjDWeoRRw+Njk6Axq3TpVI51lYBobdJ845ridZ+V5IGxHAKzRKbOX?= =?iso-8859-1?Q?XEvhEdCm6BTa7S1AWNkU0+g1D9H9Tds481pUTkhjBPhkK3gHw8px2xcfpn?= =?iso-8859-1?Q?fTeVfAK+N9P0onzm5EUEH7k6K7mu6Jj9VdLMZGzQj926at+JFLxqXEkkjj?= =?iso-8859-1?Q?qidfVqJc9qhDKYEmwjm6uOSmLPfG2nUFzaEY/5jMAK3TIDsdumkT/D8LC4?= =?iso-8859-1?Q?LWI+54+cx1i6ZSu9Cg6BFmoufDACgG4rxqikPla3KWPozESsiduFlKdmrL?= =?iso-8859-1?Q?X9ahQHuwfHo1QUT0gbrELeTuoFQ3LSpC3c?= original-authentication-results: spf=none (sender IP is 209.85.208.169) smtp.mailfrom=semihalf.com; arm.com; dkim=pass (signature was verified) header.d=semihalf-com.20150623.gappssmtp.com;arm.com; dmarc=none action=none header.from=semihalf.com;compauth=pass reason=106 x-ms-exchange-transport-crosstenantheadersstripped: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com x-ms-office365-filtering-correlation-id-prvs: 2f27e090-04f5-494f-f9d6-08d93c718ec9 x-ms-exchange-crosstenant-originalattributedtenantconnectingip: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[34.249.187.16];Helo=[64aa7808-inbound-1.mta.getcheckrecipient.com] x-ms-exchange-processed-by-bccfoldering: 15.20.4287.024 x-ms-exchange-crosstenant-authsource: DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com x-ms-exchange-crosstenant-authas: Anonymous x-mailer: git-send-email 2.29.0 x-ts-email-id: 1a775b8d-6ac9-4cae-a6a6-b059944f6d8b dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=semihalf-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=GBDsAtxs6IuiVTwg3dN/Go0ZKJgetBBVeGpdaezF4Dk=; b=Z6u/jOcR0QMmOp8OwCTnYLs9cCVrbTGCYQmACWHqrMdp/9XSd4ITVdL5tX1R1zQuSl BwLyj2viODdHFRecdX1QMXFpHDx5L2gHfXGHOVVEz0z0uT0qfxkhPZJv2W8d9746TZ4V MSFi8hUbfurlqYr0XtfRYyL201Rx00ceZ8xt8kuaz27XcuN7GUOEAIYjvqDqSrRjJHvl amc8K3RqAGs1HfmzeVQ2jeL99CZiVy+S7eGYlCzEPqF1KVJhbm2qYb5T+KC4kwUGhrTb 8s2G8jobWoIwJda+foOo0xP/wqyoGee7pHIQtGugujOOxUHUldsYB7PZoM/M7EAASrWX LcLw== ms-exchange-organization-phishthresholdlevel: 2 x-ms-exchange-skiplistedinternetsender: ip=[209.85.208.169];domain=mail-lj1-f169.google.com x-ms-exchange-externaloriginalinternetsender: ip=[209.85.208.169];domain=mail-lj1-f169.google.com x-checktessianinbound: true x-received: by 2002:a2e:1452:: with SMTP id 18mr11718907lju.4.1625131266842; Thu, 01 Jul 2021 02:21:06 -0700 (PDT) x-google-dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=GBDsAtxs6IuiVTwg3dN/Go0ZKJgetBBVeGpdaezF4Dk=; b=qGVrT+gtjF7NE6GZdpmQsaoKM69yNapa4nTVCaEMPH6CQAR2BGMJCG3qWGShDtUjcG YgAUGDXnrdB1dHzGIiDBHdSRIynFkaTX57ulY7R8vhWoYRehtI05FWlGO3QkoISCjv4j eEYYIKJNVNZiIa8648pfu7lzmr1aP5r4/8wDrWeNli2RkQNEtbn3RACuwT6PT3yjxsIL Bb3V/EztbqC7VXGuF0Bdch0MQ9A6/ZAik7m93nhQtnl+T+V1FqeMxeR9v2KxoZgqEB33 cujOYxwvDnfESr7qv3G/9V8jSBIntcAH6FPTdciSSkY8sS80m9CK5H6j2Ol0CCrr6Y5T Iqwg== x-gm-message-state: AOAM530CkZTinqc+U2As6tDOC/GWK3Flwtq8j99chqkB9p4CqPQHzj+a JUjBNByU3UYrRWF4YtT0LBJnFA== x-google-smtp-source: ABdhPJzQeI/FUzr8txct8ZdLBiYhhEwAiJI9lrwyoi4B1jditdY7+fOFWdU6xO0IcJ73HzV5aw0PVw== X-Microsoft-Antispam-Mailbox-Delivery: wl:1;pcwl:1;ucf:0;jmr:0;auth:0;dest:I;ENG:(750129)(520011016)(520004051)(702028)(944506458)(944626604); X-Microsoft-Antispam-Message-Info: =?iso-8859-1?Q?v3ByaHgpQ8BSICxVSIi0jUZnZd7Kkh886Sog7Uxt4j8ezAQuQzlQWywmd1?= =?iso-8859-1?Q?sxFZIQ68n29GUfiTQ8p02MW3sPoBaKFwMSIwIFiLEGgxVd/RN+YcFEUWNY?= =?iso-8859-1?Q?PglVulTST4t4GdgqfCT6qXu0/8schjcsFM7ZCCAyBLfjguK+p3Mf9r6j1H?= =?iso-8859-1?Q?GH8FZFDM7Rxll3m1gdXY/UBgQGUN4FZXYnBrFzUOk127X9vSqJBRfvW+IS?= =?iso-8859-1?Q?bsOmtVtbEx01xBHD/h6014L2Ti80apZdmi0eIP8+9nXH94VHG9jrLhPMtU?= =?iso-8859-1?Q?bPjzzkryhfhJ4dGJZnu5S5tPkwhOs+Hx6YfD1fZm1vElczJmINUEQxTRto?= =?iso-8859-1?Q?pjILgDdkxHNrGAkUjWtFWjzs01+o9OGKYFwacBsWaEs7Iu/7UmBkReegvY?= =?iso-8859-1?Q?+rRb/SOfB1FJLfYzHJX86H5PZI1VgYcCuJmJwkVZH9wz/BHuzyabvso/MO?= =?iso-8859-1?Q?FToh5HXzhx7clEhCWJmU7k+4ZX7avj45zKmPw5OcuQ7hwWPc/ltvS6kap/?= =?iso-8859-1?Q?2VcVnSXgcmhRDIXrcimmRzbZoNDyBOOGLlJ1+i0ErjZR2mjmuFNbJVYGqF?= =?iso-8859-1?Q?cvYPdg7UiexS500i2ewaaM85lYYRWdFCLn0lFLGMD6fe0LZfWgp8v0h724?= =?iso-8859-1?Q?HF7CZ7iyGhehxDcVO3hT5siR9uAtoq5N6ghEYgYl89C0br0uaZS5yiZtJI?= =?iso-8859-1?Q?5DErmWpzOoebHCN8KEaKaav+GWrxDX7nbLRXYkQizqMPaBiQKHHjv7gn2R?= =?iso-8859-1?Q?szz2y3G56SQRVRVEuiYG+dIl4bdt7u/t7VWuL+qPA4liA5Ai6oGwkQJ4X4?= =?iso-8859-1?Q?hZ1gHK3F9GKa9JvgOnhrp4i2GdSRTclGkW/dVbmLsDShKguidsOdQLwiys?= =?iso-8859-1?Q?GkoqLjPKthk+V5kONlLLrhkRuX9Q+N3y8tn+zqVyDJGmsUqNFmffGRTtTO?= =?iso-8859-1?Q?PkvbV9eM7r4r4td/FWV42Mg21Y4u6pBmh6/bl4JrbhefOMSe3Y9ouI2kC6?= =?iso-8859-1?Q?jA8mYQhv0O7kH8vRVG/13C/QGG9+dbz7LgzHzTuZf/EO5iqkMns2Wobfyz?= =?iso-8859-1?Q?E9mhCifzkRKLsekvUvQPb6WvIESA3R4BjDmJAp32nq+yWdE0xQeSb0se+P?= =?iso-8859-1?Q?UeqGeh1MlFSLJy55U2oVtThgD/avC5kzkgA++0GgHpm/tqzWhPORSi/0LS?= =?iso-8859-1?Q?nmhEXtUZLe72UQyUKb02xMVq+eMMq2teEiVXbEn6v/TjyAa+1u+A4Agm3h?= =?iso-8859-1?Q?pLrASRh+sTfiM9u/JLqHrRRG25jpgCE1w6GdAK1W4fOoF1MF/prekIq5T8?= =?iso-8859-1?Q?fOKGmK/VzeQ28eOFActlPb/FwZdAEcKZ7j/2lWi8tCw68Js7KeeLnNgyx7?= =?iso-8859-1?Q?i6pQ28gugN2G12ov9a+o4cd2/KNT0x4So+bV2t60sxgL3MQhMV/DV/ovHz?= =?iso-8859-1?Q?eVELyMTF/QROW6ug1V0BxsUFLuaEARvq25vgKuCjhB4tzFHMeRXzmv8KJ4?= =?iso-8859-1?Q?R7Otfe0N2UL/HGuSA7tmIuZSwU/AbI3zsS2yALG0lnfucOpRhoeiZzYolr?= =?iso-8859-1?Q?TWPWcSjYKD3Nds8k3J9Q8uTY/vVioR7PIxbi+ZiQ2Nj/gAT9sVfEIg4nzh?= =?iso-8859-1?Q?wHk6K049RlSF12alOas4ATbAtHXo38h4isDgJsF5AaNgEGRgWrttPg9aXq?= =?iso-8859-1?Q?EXhfnoNBA1tR6xRq4tux1E7HsuSGw9GxO98dkfmCLlYlTYivtdherozOmM?= =?iso-8859-1?Q?NZfZHoGCMyduCKY1MsUj3E0bGnr9S0876xcxXf8B/aK2EWy9soYDb9HAE5?= =?iso-8859-1?Q?5VtUarmH+vXFjSqBBUP63+wGaz9CI8kG/hpB05jBhVb3bH0C2WKs?= Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 The edk2 patch SecurityPkg: Create library for setting Secure Boot variables. removes generic functions from SecureBootConfigDxe and places them into SecureBootVariableLib. This patch adds SecureBootVariableLib mapping for each Intel platform which uses SecureBootConfigDxe. Signed-off-by: Grzegorz Bernacki --- Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc | 1 + Platform/Intel/QuarkPlatformPkg/Quark.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc | 3 ++- 4 files changed, 5 insertions(+), 1 deletion(-) diff --git a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc b/= Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc index b154f9615d..5157c87a9a 100644 --- a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc +++ b/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc @@ -139,6 +139,7 @@ !if gMinPlatformPkgTokenSpaceGuid.PcdUefiSecureBootEnable =3D=3D TRUE AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !endif SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf diff --git a/Platform/Intel/QuarkPlatformPkg/Quark.dsc b/Platform/Intel/Qua= rkPlatformPkg/Quark.dsc index cc1eba4df4..35f99429f7 100644 --- a/Platform/Intel/QuarkPlatformPkg/Quark.dsc +++ b/Platform/Intel/QuarkPlatformPkg/Quark.dsc @@ -175,6 +175,7 @@ !if $(SECURE_BOOT_ENABLE) PlatformSecureLib|QuarkPlatformPkg/Library/PlatformSecureLib/PlatformSec= ureLib.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc b/Platfor= m/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc index d15da40819..5a0d3e31e1 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc @@ -227,6 +227,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= reLibNull.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc b/Platform= /Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc index 4a5548b80e..36a5ae333c 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc @@ -1,4 +1,4 @@ -#/** @file +e # Platform description. # # Copyright (c) 2012 - 2021, Intel Corporation. All rights reserved.
@@ -229,6 +229,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= reLibNull.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif -- 2.25.1 --_002_DB8PR08MB3993394571D6BCA84057024685159DB8PR08MB3993eurp_--