From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.87]) by mx.groups.io with SMTP id smtpd.web08.8730.1625823444175870050 for ; Fri, 09 Jul 2021 02:37:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=FrUo0hh+; spf=pass (domain: arm.com, ip: 40.107.8.87, mailfrom: sunny.wang@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fcxt3bl8dI3v2L50AjFHaulRC9VWiCfMfMu5f8pohSo=; b=FrUo0hh+BaHJ08HOOnR1rv7KmhLG4eA5qUMdlfNs4qpRW0g9FK6O3GRh4+ZDJ4N/mw5JMK8uruvlmBXcXJkAnfbrwLS5NYBg8gonhRwQ46ut8PTCbHrulMy5g7UjrVSXwc9pODfVBr6hQfQPFDGSF7VaY6bnULJQhfQpYqEqiYc= Received: from AM6P191CA0105.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:8a::46) by AM0PR08MB3970.eurprd08.prod.outlook.com (2603:10a6:208:131::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.23; Fri, 9 Jul 2021 09:37:19 +0000 Received: from AM5EUR03FT053.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:8a:cafe::51) by AM6P191CA0105.outlook.office365.com (2603:10a6:209:8a::46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.19 via Frontend Transport; Fri, 9 Jul 2021 09:37:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT053.mail.protection.outlook.com (10.152.16.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.20 via Frontend Transport; Fri, 9 Jul 2021 09:37:18 +0000 Received: ("Tessian outbound 4c0db4752fcb:v98"); Fri, 09 Jul 2021 09:37:18 +0000 X-CR-MTA-TID: 64aa7808 Received: from b5cc3b4f4432.3 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 809B4105-E024-4453-B428-F34A9747050E.1; Fri, 09 Jul 2021 09:37:09 +0000 Received: from EUR01-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b5cc3b4f4432.3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 09 Jul 2021 09:37:09 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AARStd1BTjdVWTs1qu8nAxRQ48hPO92/xGc/uO2EYiPwbbV/SRO6oQt+PYBTbuUIzU7PiIvNgOcQzfxkPGNrv3em0fE2cdTOzOL5ef/vbpJDAoIMQkA1uegiQFAF9rrDTnhnVJA119/5e1BaF+Jbw3zZ/5CyT1wDGizAxIwYvAGaOI9bs+FzmyxAskoM8DWwv73YIQYGwihY1J5FMg4nI2JLo8ZMzQzek4DIt7+5an4UYSz25kboMxq8zKLc4msgvLm+FZuJf86MLSZean7lA/vMtyXPNFOZ+c0ZgI4IiizQLdzXx9seMCBu0K6hemNnpfOFiJceLUyjDt77puow2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fcxt3bl8dI3v2L50AjFHaulRC9VWiCfMfMu5f8pohSo=; b=IFZ4sn3iLw1yUtPbVcx3lMCwsBVi6ggXNrdH++Q6ELUq2dPCDOFfV7MclJJx0gHyXwSMaMnSbfkgHIYAza5RYNkA4VetllBdICTf1+3Cwp1cS00PUftN+rAgx/KJQuld4R75o/sl5qGH/2tZYMSmd9dlUQLoqPXFYiSd+O8EPdiO42e7mgnerRnb4skGww8GdPmec5KmXmBJlwW/8FvLjW2QQX0Zzux8r99YQBv8hGazh/fPWDExk1p89AZGOJcveAz5BfraqVN3wG1cqW/fPKQkZUNaMWnzhuBxGkQoebAPuYEOgvWbPKD6JdytMnvMtMKo/AiBDD9fSNEqEqrBWg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fcxt3bl8dI3v2L50AjFHaulRC9VWiCfMfMu5f8pohSo=; b=FrUo0hh+BaHJ08HOOnR1rv7KmhLG4eA5qUMdlfNs4qpRW0g9FK6O3GRh4+ZDJ4N/mw5JMK8uruvlmBXcXJkAnfbrwLS5NYBg8gonhRwQ46ut8PTCbHrulMy5g7UjrVSXwc9pODfVBr6hQfQPFDGSF7VaY6bnULJQhfQpYqEqiYc= Received: from DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) by DB6PR0801MB1989.eurprd08.prod.outlook.com (2603:10a6:4:75::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.19; Fri, 9 Jul 2021 09:37:05 +0000 Received: from DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0]) by DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0%7]) with mapi id 15.20.4308.023; Fri, 9 Jul 2021 09:37:05 +0000 From: "Sunny Wang" To: Grzegorz Bernacki , "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Samer El-Haj-Mahmoud , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Sami Mujawar , "afish@apple.com" , "ray.ni@intel.com" , "jordan.l.justen@intel.com" , "rebecca@bsdio.com" , "grehan@freebsd.org" , Thomas Abraham , "chasel.chiu@intel.com" , "nathaniel.l.desimone@intel.com" , "gaoliming@byosoft.com.cn" , "eric.dong@intel.com" , "michael.d.kinney@intel.com" , "zailiang.sun@intel.com" , "yi.qian@intel.com" , "graeme@nuviainc.com" , "rad@semihalf.com" , "pete@akeo.ie" , Sunny Wang Subject: Re: [PATCH v5 03/10] OvmfPkg: add SecureBootVariableLib class resolution Thread-Topic: [PATCH v5 03/10] OvmfPkg: add SecureBootVariableLib class resolution Thread-Index: AQHXblob7AEuFx5lckyO6erXHCPPZ6s6bqMQ Date: Fri, 9 Jul 2021 09:37:04 +0000 Message-ID: References: <20210701091758.1057485-1-gjb@semihalf.com> <20210701091758.1057485-4-gjb@semihalf.com> In-Reply-To: <20210701091758.1057485-4-gjb@semihalf.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ts-tracking-id: EE049C418D0F3949851FD698E33C5590.0 x-checkrecipientchecked: true Authentication-Results-Original: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: 47ec6dea-991f-4acd-80e7-08d942bd24fe x-ms-traffictypediagnostic: DB6PR0801MB1989:|AM0PR08MB3970: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:2512;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: q7XyYQqttOV1eiXESPo+2StHCUhnt9a+VwvG7Nka24odgyRfEJI6b1oGZ/b/1d9ROoVHkzlBZhAM6LEGNmUuEnEqSow9EGOQeESzg+7lW4hBUXibbdQbFRC6GQP1ixev27TWmGbkCg1NLqsNe5GTYcFc88gNr3paXopabmcoj9A8kva2tTAo360Yv6agRKUn5TTS1xa41Yrg2YqG04adQknnXYeXDhjbs9zQh/LNjoXYfGvCFrW7y2qBaDQWtah7yUeSws7+T2yF4mHu2bK0+cKDUlbVQLrV6J4AlaoaPGSYm/Vnzpl6+WtDJMV0q41dGlBE12+IwuTt3YZmfW/qbiSRQ9fSnuHGDv6jl1E0YERG5X168MEwmoHMUkj4cP/EDWGH+RyQVWmGivDxaclGh2V7D+j5IeJrjmx2Q9YuT8Xyug7gzg9I00MJXNgFDZGkyHT0GfJrxBkWqZ/38SiAJmGfuj6yVgX6B0D6zB6s6V/h9xwKltLHH4DG6U9ZguxQkBH4U3TL8eQ2igzPLRJaAqeJ1mVq9NZa0SUsK9clDkL8n5/8R2+wVig3nlWyzFgr7gDYi97gcPr/dkaZlGfJ3uFEOgTv5i6HKBAYuIWRyDu3WdhUq+ZkAqtEVwN6j2Ha3fiTTqLTtACwumLmrn2OAw== X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB8PR08MB3993.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(136003)(346002)(39850400004)(366004)(396003)(376002)(7416002)(52536014)(122000001)(7696005)(8936002)(86362001)(110136005)(71200400001)(38100700002)(5660300002)(478600001)(2906002)(54906003)(4326008)(6506007)(53546011)(55016002)(66476007)(66946007)(33656002)(83380400001)(316002)(76116006)(19627235002)(66446008)(64756008)(66556008)(8676002)(9686003)(26005)(186003);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?9CApcXwbM1DTYrgpzJBOWNBva4/AS3+KZ5BjaoDGvEqV/HFoEZ9PMAMbp1zs?= =?us-ascii?Q?1mGVRcBNbY/sRZksCgBFN5rnYhh+O6vEXAkN1Uwq5ly7PtuSZGq8sXWycxT7?= =?us-ascii?Q?cC9sIgBzHGV/uya1AE8CwPxmUmLu1Si4d2dd8b8lqhSUu7Ymx43VAHVF4pHy?= =?us-ascii?Q?AhBxrBO4z0nhxH37/qYDNkD53p8qpEN7s+NIY2jIgezRnQXVpwXtN6PDPXN+?= =?us-ascii?Q?qTMLUXmgOmjC2MZCAA8Q9tCk+lIUJOK640TEd9w7Pud9BRGzyAg4gGadiUvP?= =?us-ascii?Q?3E8NjgqWidsZVAhq0ZGKQishEwbU8USifNc8I2gQ+hQpIiczsDuvOIHApKm5?= =?us-ascii?Q?Vua6JPnNRkFgdpRjVTl9QEThCpVoScWRJuKfIm7VZC6b7JDHJSKkW7kOdNXq?= =?us-ascii?Q?umEYgZ3banPQuD4tyjTkVYzeVmwzM6Ay0Q7AJdV6lSGw/atjd+MeMS/QXBJ/?= =?us-ascii?Q?yUfU+kUqveBz63+6VapUpRiyA3i3nlNK/MuG4sCi8Sjg3BDgyJaKllAs6KvP?= =?us-ascii?Q?ALqKpm+ngBgWWJmk85QM0K7QagXH8Ho/G8RR0Q+q8TZ4WQ/pQr+jM7qGINTf?= =?us-ascii?Q?47oj2LOlPpqCMQQkKkvOH0o7Yv/m20QPMahlK7FYW2AetyAi5mGvRylxOM9N?= =?us-ascii?Q?LVJ1ad9jvzjiVu1Z5kSOz5uJWWpnqOITiFTsQqSLoxCIlFnzsqB9ae8pZ/Jc?= =?us-ascii?Q?rnZkHsTvq20ZXR2OaB9RkokNC4Ma4ShuCCmwK+vKUHBMMvCSv4VYS/NIO/4W?= =?us-ascii?Q?QrkaPiZjrhSjm2CA7S8EroaS4X0THgc1PT88XsgdQ5jR0Eb6iuahsaVdJQaD?= =?us-ascii?Q?TSV429jgBFP9xtXdRXmhPWAcM2Lsd+pronRAIk/Xb3B/NaHvqoRNqjjr5azv?= =?us-ascii?Q?KH6p4R7KJBn4b1uCtlMz1y0LPGcFyc1W7Rs0zAQz5MxzVlnWVSW3/xqbIwZJ?= =?us-ascii?Q?ZioB+EOYCKdzHfaZ/yaFqOvRQ4o9/RGM+1YBNq7XmUR13nJ96piU718HJRl9?= =?us-ascii?Q?S0WOsncpep+ISaJAm7PPfbmYA8hxFySfVzv0o1G/CsdOYsgpZZesNSHRVkJ3?= =?us-ascii?Q?G+wMFd5Qot/oApR9qZo6NnaO7DuWC0+11qWYrQdLzF8vugLeqZEDL7vmADMc?= =?us-ascii?Q?UsT2jTG2kFf1iKHm/eKBr36LwXuvwi/sTxh/AdxN+HpuEJrXRhVHlwboKEv7?= =?us-ascii?Q?OrTskWF1Yhl1RTZlR1sMA7EEL3F7cA4AJsi7kk+asBAlp1Ij3mFfVmtqSexI?= =?us-ascii?Q?+/SHwkqAXbVFcpV0zxl1hxhkD2Jqa1SACPi4YKOelgwK4YdsKYVFBlyx9aXp?= =?us-ascii?Q?wMbouPGFgUVzWESD8J+gJLxI?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1989 Original-Authentication-Results: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; Return-Path: Sunny.Wang@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT053.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 7dd8482a-75e3-46de-52a3-08d942bd1cde X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(136003)(39850400004)(346002)(376002)(396003)(46966006)(36840700001)(81166007)(356005)(6506007)(53546011)(36860700001)(2906002)(9686003)(86362001)(8676002)(8936002)(83380400001)(5660300002)(316002)(186003)(70206006)(70586007)(52536014)(478600001)(26005)(4326008)(7696005)(55016002)(47076005)(82740400003)(33656002)(82310400003)(110136005)(54906003)(336012)(19627235002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Jul 2021 09:37:18.6037 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 47ec6dea-991f-4acd-80e7-08d942bd24fe X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT053.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3970 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Looks good to me. Reviewed-by: Sunny Wang -----Original Message----- From: Grzegorz Bernacki Sent: Thursday, July 1, 2021 5:18 PM To: devel@edk2.groups.io Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud ; Sunny Wang ; mw@semihalf.co= m; upstream@semihalf.com; jiewen.yao@intel.com; jian.j.wang@intel.com; min.= m.xu@intel.com; lersek@redhat.com; Sami Mujawar ; afi= sh@apple.com; ray.ni@intel.com; jordan.l.justen@intel.com; rebecca@bsdio.co= m; grehan@freebsd.org; Thomas Abraham ; chasel.chiu= @intel.com; nathaniel.l.desimone@intel.com; gaoliming@byosoft.com.cn; eric.= dong@intel.com; michael.d.kinney@intel.com; zailiang.sun@intel.com; yi.qian= @intel.com; graeme@nuviainc.com; rad@semihalf.com; pete@akeo.ie; Grzegorz B= ernacki Subject: [PATCH v5 03/10] OvmfPkg: add SecureBootVariableLib class resoluti= on The edk2 patch SecurityPkg: Create library for setting Secure Boot variables. moves generic functions from SecureBootConfigDxe and places them into SecureBootVariableLib. This patch adds SecureBootVariableLib mapping for OvmfPkg. Signed-off-by: Grzegorz Bernacki --- OvmfPkg/Bhyve/BhyveX64.dsc | 1 + OvmfPkg/OvmfPkgIa32.dsc | 1 + OvmfPkg/OvmfPkgIa32X64.dsc | 1 + OvmfPkg/OvmfPkgX64.dsc | 1 + 4 files changed, 4 insertions(+) diff --git a/OvmfPkg/Bhyve/BhyveX64.dsc b/OvmfPkg/Bhyve/BhyveX64.dsc index cbf896e89b..bcc0b2f2f4 100644 --- a/OvmfPkg/Bhyve/BhyveX64.dsc +++ b/OvmfPkg/Bhyve/BhyveX64.dsc @@ -196,6 +196,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|OvmfPkg/Bhyve/Library/PlatformSecureLib/PlatformSecure= Lib.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc index f53efeae79..9225966541 100644 --- a/OvmfPkg/OvmfPkgIa32.dsc +++ b/OvmfPkg/OvmfPkgIa32.dsc @@ -204,6 +204,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc index b3662e17f2..5d53327edb 100644 --- a/OvmfPkg/OvmfPkgIa32X64.dsc +++ b/OvmfPkg/OvmfPkgIa32X64.dsc @@ -208,6 +208,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc index 0a237a9058..509acf7926 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc @@ -208,6 +208,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.in= f AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif -- 2.25.1 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.