From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.57]) by mx.groups.io with SMTP id smtpd.web10.8589.1625821791819900393 for ; Fri, 09 Jul 2021 02:09:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=CUSotmb1; spf=pass (domain: arm.com, ip: 40.107.22.57, mailfrom: sunny.wang@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hCLgXBKTJ8ynNmW5+k0VRh0dSO3bTjCe1tKwzDheKgo=; b=CUSotmb1vnA+wNXWh3gN8TPQ6bdSCtO87kTrlI86aABBSRLDdh0RkImQh7QmzADWcO6KF+wKitNcT5jR+6nYPqUoW6Qb/MuBlKG0o2vtU69QgbmpNTlhTt6OBSVzP7U2ISEeBa2y5Zq3RqfXJd10hSYIAZVjXI2P5xlFBxcdRyE= Received: from DB6PR0402CA0023.eurprd04.prod.outlook.com (2603:10a6:4:91::33) by HE1PR0802MB2570.eurprd08.prod.outlook.com (2603:10a6:3:df::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.21; Fri, 9 Jul 2021 09:09:23 +0000 Received: from DB5EUR03FT004.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:91:cafe::13) by DB6PR0402CA0023.outlook.office365.com (2603:10a6:4:91::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.20 via Frontend Transport; Fri, 9 Jul 2021 09:09:23 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT004.mail.protection.outlook.com (10.152.20.128) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.20 via Frontend Transport; Fri, 9 Jul 2021 09:09:23 +0000 Received: ("Tessian outbound 3852c8eefab6:v98"); Fri, 09 Jul 2021 09:09:23 +0000 X-CR-MTA-TID: 64aa7808 Received: from cba94af46cc4.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 2E327A5D-E555-411A-971A-0C14FF6F9A22.1; Fri, 09 Jul 2021 09:09:11 +0000 Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id cba94af46cc4.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 09 Jul 2021 09:09:11 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=f1phkaDtU1WuDr1Swp0qvYT7GrRcxKmlSKvpzk9mzZ38icqxrXMr7349OUjjappuZV+H7BAAg3NEDFEWC15x8YXKFXOcwmGEviOFDqX9KNOWHXU+ggb49RLz1Vt3N0DkBPtGHMtRSBSiqdnfEc6Ji2yOFZtsrRv2/zizTtENsgW8zo14FGxk1gv6vXFqDxa5grAd3PLGd75Tzs1sEqkJ3+IRQa2zz2kuEEQ+pCE+2TfdVDHISV+g+2oeSkV25yDWh5vol5caiDKwqZjkNX0qZeE7RwlCaakd5ryVS+fNENCVGNDeNKA+vBQ3r63YnKERWS6Emts5tjE7wfeffSI29A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hCLgXBKTJ8ynNmW5+k0VRh0dSO3bTjCe1tKwzDheKgo=; b=DKvnpgt2xPDzuDVYim7LjgnLE01Drmn1n0hPYluW307iEqHIxh2CqjY9bi3WMj2UB7bgOEZDE/l2xVsvlk19B2vxDoxP6rIvA7n2BjHl3ueDKj7qQRhuSyWg4ST8Cfn37CnNinBdNdPHJkRVhl3HVPzZf8W47hDtjbS4YwKsyWuAFekzV9HoQO3fv70xun6U03c27d3Z5hJo35SK44ONxZemHt6Rfnml7WbxUdzgFoyJam1lz/hLITTkzVuOGQ6k/AL+ui6aYU2JvWweui50vYJXmgL+qVagaSWy9fFcmIFB0MtRcgf8UnTq4umo/fRFxSVVZ9QsJXw3VnUfW+VMsA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hCLgXBKTJ8ynNmW5+k0VRh0dSO3bTjCe1tKwzDheKgo=; b=CUSotmb1vnA+wNXWh3gN8TPQ6bdSCtO87kTrlI86aABBSRLDdh0RkImQh7QmzADWcO6KF+wKitNcT5jR+6nYPqUoW6Qb/MuBlKG0o2vtU69QgbmpNTlhTt6OBSVzP7U2ISEeBa2y5Zq3RqfXJd10hSYIAZVjXI2P5xlFBxcdRyE= Received: from DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) by DBBPR08MB4776.eurprd08.prod.outlook.com (2603:10a6:10:f2::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.23; Fri, 9 Jul 2021 09:09:03 +0000 Received: from DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0]) by DB8PR08MB3993.eurprd08.prod.outlook.com ([fe80::14b0:85d6:deeb:9ee0%7]) with mapi id 15.20.4308.023; Fri, 9 Jul 2021 09:09:03 +0000 From: "Sunny Wang" To: Grzegorz Bernacki , "devel@edk2.groups.io" CC: "leif@nuviainc.com" , "ardb+tianocore@kernel.org" , Samer El-Haj-Mahmoud , "mw@semihalf.com" , "upstream@semihalf.com" , "jiewen.yao@intel.com" , "jian.j.wang@intel.com" , "min.m.xu@intel.com" , "lersek@redhat.com" , Sami Mujawar , "afish@apple.com" , "ray.ni@intel.com" , "jordan.l.justen@intel.com" , "rebecca@bsdio.com" , "grehan@freebsd.org" , Thomas Abraham , "chasel.chiu@intel.com" , "nathaniel.l.desimone@intel.com" , "gaoliming@byosoft.com.cn" , "eric.dong@intel.com" , "michael.d.kinney@intel.com" , "zailiang.sun@intel.com" , "yi.qian@intel.com" , "graeme@nuviainc.com" , "rad@semihalf.com" , "pete@akeo.ie" , Sunny Wang Subject: Re: [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVariableLib class resolution Thread-Topic: [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVariableLib class resolution Thread-Index: AQHXblqL/fVo83OUEUKdmY6ydYBncas6Zq0Q Date: Fri, 9 Jul 2021 09:09:03 +0000 Message-ID: References: <20210701092051.1057606-1-gjb@semihalf.com> <20210701092051.1057606-2-gjb@semihalf.com> In-Reply-To: <20210701092051.1057606-2-gjb@semihalf.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ts-tracking-id: B7177768D0C02240B40AED6C4E6C1133.0 x-checkrecipientchecked: true Authentication-Results-Original: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: c6a84dee-2e0e-418c-19d9-08d942b93e6d x-ms-traffictypediagnostic: DBBPR08MB4776:|HE1PR0802MB2570: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:2512;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB8PR08MB3993.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(376002)(39850400004)(366004)(346002)(136003)(186003)(83380400001)(53546011)(86362001)(64756008)(26005)(66556008)(66446008)(122000001)(66946007)(76116006)(71200400001)(66476007)(478600001)(6506007)(38100700002)(110136005)(55016002)(9686003)(2906002)(7416002)(8936002)(52536014)(8676002)(7696005)(5660300002)(54906003)(33656002)(4326008)(316002);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?mxn4d2koxifT0rXMdm9vhsdT9TjWhG4IvBpvmiv+ywgyWyWrDbgyaReHA31U?= =?us-ascii?Q?tFszxoa7B407IskqJo13qNMT90ZPLImGLy2pOWGIlJe2XkoYV8CVaz2845My?= =?us-ascii?Q?sUkKixS9c9fh4EpGslTwbQC4oH4XGLpsnta2KnDeojNRCJUrB/KwkL2Is9DD?= =?us-ascii?Q?0q8mMl1oiV7aWtp+zCsMYzphhv8fCv6GsDsa4DASjzCoU00eE4Cjn3wajeaW?= =?us-ascii?Q?Wz7qVu3FXA6hOTFxN22LGFifnT+BIN25gLb/XoLEquzW+w+oDNG3m2Dg+4tH?= =?us-ascii?Q?98nRCSak+l534Y7wEwrjRBEmkJDf5ynvpZ5TlLnSdYulkRCdfkRGFOaI8ohU?= =?us-ascii?Q?XlWNyDCmQVz6GJj8gN6fRgFItHn5P1+4YeOQ09bvDU5zB7sFiGCYnrxQXX94?= =?us-ascii?Q?ECMSWU4L8lf5m/Qvufl1X6KRLlMt6rTvtnlnErY90Y1Y4m1VNqozgWHfpFV+?= =?us-ascii?Q?nT4xa1vZ3wJdrLFg5LS+WFMLHFFDcP3rt2PgfYM2kE/NbMfMMu+jcdlYNeyR?= =?us-ascii?Q?7XyS5U4gm/+CIVialKLRKTipPPPrDm3opCtLh5mIH66PAdqGL06qFxfVnLI8?= =?us-ascii?Q?AtiJKj01DRHJ67qYfR9GFWFHjtYENFgTtzF5C1WU4pxcBjldhJXmsAfx0CFQ?= =?us-ascii?Q?Ny2nlx5rM1rw7b99oq0V8WVxMJs+zuRjmUxSHYIyq9XDoXqyxA0auoD4R4UN?= =?us-ascii?Q?ae5ohWvlKJXOWn0m8ox3ar6NLLJmaojFbgZANbuIHoPXRwwwa5sL5oUHYI13?= =?us-ascii?Q?FCDOhOkrlPTsbXkJPSvRulGuEYTsaQ30/TAhmzLcWsipb7KGkTatxD59MFBP?= =?us-ascii?Q?dW6a0FhBIqOzmOReNVM/WnliUw6YFnpHkbqtJZbb9bmFh1e/zDfFTlR2W5yI?= =?us-ascii?Q?eEwiDP5wWHRcmUYpH/nIBaJO+QXOvtx59llgh53ET1WdlYpHHNBkwUL+gP6c?= =?us-ascii?Q?9ud9JMaL06k/6pZETxWJlvbd9FvGVF2nA4dNCC0LQmSM2rgv5Uqj2o2ntIF4?= =?us-ascii?Q?GHa6lTChqn38fYybmN0/BIkuGX75GJqMaTj2J52f2f/OEhnmZE0bFdLK11gL?= =?us-ascii?Q?PhBfXh9isgwW3ORB94Yas3m+OCrz436BN8OKp7xfNNG+suZQQqogxjQI4tMo?= =?us-ascii?Q?DQzOy7S+8pCy/8uNlIKQ/vo1VxBuIuyDMvi3YgBWjVtjzbxbp9YLF3m95WOK?= =?us-ascii?Q?D2RsDVIiyeFVDmVXQQKWjyMGgQf0EZli6KfZtg21LiKAYDPU7Kn8q47FOOMQ?= =?us-ascii?Q?BjcxRwCh2rsS6MDa6aIA12AcFlSdhidkuHqWfAGT6Tx49+rmwn4h0uLizopg?= =?us-ascii?Q?muu/2G28ezStvpxb4pahP9E3?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4776 Original-Authentication-Results: semihalf.com; dkim=none (message not signed) header.d=none;semihalf.com; dmarc=none action=none header.from=arm.com; Return-Path: Sunny.Wang@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT004.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 6bf0a403-837a-41a6-b429-08d942b932a6 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(39850400004)(346002)(136003)(376002)(396003)(46966006)(36840700001)(70206006)(70586007)(81166007)(82740400003)(83380400001)(4326008)(336012)(316002)(5660300002)(8936002)(356005)(52536014)(478600001)(110136005)(54906003)(55016002)(9686003)(47076005)(2906002)(7696005)(26005)(186003)(6506007)(53546011)(36860700001)(8676002)(82310400003)(86362001)(33656002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Jul 2021 09:09:23.3296 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c6a84dee-2e0e-418c-19d9-08d942b93e6d X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT004.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2570 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Looks good to me. Reviewed-by: Sunny Wang -----Original Message----- From: Grzegorz Bernacki Sent: Thursday, July 1, 2021 5:21 PM To: devel@edk2.groups.io Cc: leif@nuviainc.com; ardb+tianocore@kernel.org; Samer El-Haj-Mahmoud ; Sunny Wang ; mw@semihalf.co= m; upstream@semihalf.com; jiewen.yao@intel.com; jian.j.wang@intel.com; min.= m.xu@intel.com; lersek@redhat.com; Sami Mujawar ; afi= sh@apple.com; ray.ni@intel.com; jordan.l.justen@intel.com; rebecca@bsdio.co= m; grehan@freebsd.org; Thomas Abraham ; chasel.chiu= @intel.com; nathaniel.l.desimone@intel.com; gaoliming@byosoft.com.cn; eric.= dong@intel.com; michael.d.kinney@intel.com; zailiang.sun@intel.com; yi.qian= @intel.com; graeme@nuviainc.com; rad@semihalf.com; pete@akeo.ie; Grzegorz B= ernacki Subject: [edk2-platforms PATCH v5 1/4] Intel Platforms: add SecureBootVaria= bleLib class resolution The edk2 patch SecurityPkg: Create library for setting Secure Boot variables. removes generic functions from SecureBootConfigDxe and places them into SecureBootVariableLib. This patch adds SecureBootVariableLib mapping for each Intel platform which uses SecureBootConfigDxe. Signed-off-by: Grzegorz Bernacki --- Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc | 1 + Platform/Intel/QuarkPlatformPkg/Quark.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc | 1 + Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc | 3 ++- 4 files changed, 5 insertions(+), 1 deletion(-) diff --git a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc b/= Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc index b154f9615d..5157c87a9a 100644 --- a/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc +++ b/Platform/Intel/MinPlatformPkg/Include/Dsc/CoreCommonLib.dsc @@ -139,6 +139,7 @@ !if gMinPlatformPkgTokenSpaceGuid.PcdUefiSecureBootEnable =3D=3D TRUE AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !endif SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf diff --git a/Platform/Intel/QuarkPlatformPkg/Quark.dsc b/Platform/Intel/Qua= rkPlatformPkg/Quark.dsc index cc1eba4df4..35f99429f7 100644 --- a/Platform/Intel/QuarkPlatformPkg/Quark.dsc +++ b/Platform/Intel/QuarkPlatformPkg/Quark.dsc @@ -175,6 +175,7 @@ !if $(SECURE_BOOT_ENABLE) PlatformSecureLib|QuarkPlatformPkg/Library/PlatformSecureLib/PlatformSec= ureLib.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc b/Platfor= m/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc index d15da40819..5a0d3e31e1 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc @@ -227,6 +227,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= reLibNull.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc b/Platform= /Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc index 4a5548b80e..36a5ae333c 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc @@ -1,4 +1,4 @@ -#/** @file +e # Platform description. # # Copyright (c) 2012 - 2021, Intel Corporation. All rights reserved.
@@ -229,6 +229,7 @@ !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecu= reLibNull.inf AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf + SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBo= otVariableLib.inf !else AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib= Null.inf !endif -- 2.25.1 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.