From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web10.11378.1592930760009631979 for ; Tue, 23 Jun 2020 09:46:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=cygbFx5N; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: maurice.ma@intel.com) IronPort-SDR: fnWsKvjPjViDMn4PzXPZMucL4YIUGPRBNBB7Q065p7SGWQB8MMX1kdy907gwFh4N639JTXmtZm H9/fW7kI4Smw== X-IronPort-AV: E=McAfee;i="6000,8403,9661"; a="124391450" X-IronPort-AV: E=Sophos;i="5.75,271,1589266800"; d="scan'208";a="124391450" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jun 2020 09:45:58 -0700 IronPort-SDR: zmoIfs4jOBcTpIN8B94x1LTwcQh82hejfJNAUqQiCabGg1iMGPDAv8X3NT82F4G5/rXleJOitJ l+VCfI/6t1dg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,271,1589266800"; d="scan'208";a="319204039" Received: from fmsmsx108.amr.corp.intel.com ([10.18.124.206]) by FMSMGA003.fm.intel.com with ESMTP; 23 Jun 2020 09:45:58 -0700 Received: from fmsmsx603.amr.corp.intel.com (10.18.126.83) by FMSMSX108.amr.corp.intel.com (10.18.124.206) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 23 Jun 2020 09:45:58 -0700 Received: from fmsmsx605.amr.corp.intel.com (10.18.126.85) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Tue, 23 Jun 2020 09:45:57 -0700 Received: from FMSEDG002.ED.cps.intel.com (10.1.192.134) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1713.5 via Frontend Transport; Tue, 23 Jun 2020 09:45:57 -0700 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.101) by edgegateway.intel.com (192.55.55.69) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 23 Jun 2020 09:45:56 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JpQ0pV4yT1ISoNynw141yGw6Tdv9pCAc/40Rm1LdwkoQHjX9t73vj4pMbsWNPStU9urog7FfOBtlFSPAX+2wE5S/zYsBSl8juUmNB48jAOJoSM7wQ315drnI90zGIZkLOI6ziLhr9pWo6zDgpKL5eyLq3+iBruKhPKghiwQQjvT20SGsMOG6KBoE4Le8pto4w0Idls2VjCebxgNLOxRAFmxDmZSC222MYVdgDQaMPhUxUL1hnIzh0h6akvs0F/o0g909n6tpqdw5F2tVnKjCtfMFwPaLzbUH6x8Ww4UOUpqWbWutqlfQx4OozaE2vFRD87028mc+7z00OjOQFmwy3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mjE+SYAqVlRhFy88xG9VwGzgii78z6TLd+hdQE6eHHQ=; b=bIuu6ZIa+WYhcLSmyZvlxaz7whyoFKzVxgsGwwsJHgjRdqenrduGoOVpXPknH2D8J8pn7ut5BGStXPivaITJmHILbChkvj9O5p+G4qJ/Vz7ghxZsb9Xvu2TIILKcL6SQXPa3jBQfkGGMu7R+6dMWh/DoXdNV4hTyjW35YS+Xr0Tj3pod3UaQY2xjnQ9SL5q+lqXdzS2ltUKGzZ0Vr9EogKxqRLa/mfUSjZd1k6puNU8I3VxA27PcC5u/yYWqzues/u3CkwfQiyJBIspifrD0f0jsJ/CDnNzgCgnRVMX/uXpYUuJ/N/E3CUTUiHGrBEsoIKYfKjHs9e/9zxpQr2ix0A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mjE+SYAqVlRhFy88xG9VwGzgii78z6TLd+hdQE6eHHQ=; b=cygbFx5NNGSt0Mr9DGjqT+hu2uq0aXRr+7NUbR9hL6sZkCViSHpxPSBjb6ZlXqNg1GQsfB3/4LVHzv1R5xCNWw3IJgax5qI1Uj3oOTOZlJXVHHl6B6eA61dueF/V6b2cWQGRh4iwe8YoohpZGBS4LP/iT4CT0yfq4YEeaEDD3z0= Received: from DM6PR11MB2793.namprd11.prod.outlook.com (2603:10b6:5:c0::29) by DM5PR11MB1801.namprd11.prod.outlook.com (2603:10b6:3:106::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.23; Tue, 23 Jun 2020 16:45:54 +0000 Received: from DM6PR11MB2793.namprd11.prod.outlook.com ([fe80::d43:5665:5cee:b3c5]) by DM6PR11MB2793.namprd11.prod.outlook.com ([fe80::d43:5665:5cee:b3c5%6]) with mapi id 15.20.3109.027; Tue, 23 Jun 2020 16:45:54 +0000 From: "Ma, Maurice" To: Bret Barkelew , "devel@edk2.groups.io" CC: "Dong, Guo" , "You, Benjamin" Subject: Re: [PATCH v6 08/14] UefiPayloadPkg: Add VariablePolicy engine to UefiPayloadPkg platform Thread-Topic: [PATCH v6 08/14] UefiPayloadPkg: Add VariablePolicy engine to UefiPayloadPkg platform Thread-Index: AQHWSSnYplx9tjBrbkG+kVE0bWy4VajmaSPA Date: Tue, 23 Jun 2020 16:45:53 +0000 Message-ID: References: <20200623064104.1908-1-brbarkel@microsoft.com> <20200623064104.1908-9-brbarkel@microsoft.com> In-Reply-To: <20200623064104.1908-9-brbarkel@microsoft.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action authentication-results: corthon.com; dkim=none (message not signed) header.d=none;corthon.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [104.153.200.60] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: ea9b1802-1b42-4470-10cc-08d81794e533 x-ms-traffictypediagnostic: DM5PR11MB1801: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:249; x-forefront-prvs: 04433051BF x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: oTW5agjYUpmHg0r0TYxyvdEERqHs6TapubWnRm8kt1PW5b58u5om6nczsOxQQTE9crTtkPwuxe98QzT3MS5eWHhv+SRBH1ihAmzd7GbYE5+B2gbGb/8ugAe1Hit/oU2SiS4VpSZf7zuBPXdGLmWaW8zDX9op9wkQzzyACfNbYo8n+wvqYgJiBLP7mErR8LgNFtXVdz8+lbNcMVyXqCTEFn8RyEpGqvs4SNeXLKrlau3T6HDDuEZbl8OkQlwYVutk2z51bgL8nRYa1iVmDl9c1LzV93TMAioiWFh5PeX273z/KBPcnUuAGrNxa/Ya/hbYybaPPxEZnsjlcx9OnV6zxEGMO0R8KzYFdaxRn3FB/q7r9CH//HUzqXLYpxeD8GAaBM3scmfGfrPF8CMV6o6Ynw== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM6PR11MB2793.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(4636009)(366004)(19627235002)(86362001)(66556008)(66476007)(64756008)(66446008)(110136005)(71200400001)(498600001)(8676002)(45080400002)(52536014)(5660300002)(66946007)(76116006)(8936002)(54906003)(2906002)(966005)(9686003)(83380400001)(186003)(4326008)(7696005)(107886003)(33656002)(26005)(55016002)(6506007)(53546011);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: 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 MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: ea9b1802-1b42-4470-10cc-08d81794e533 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jun 2020 16:45:53.9283 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: T7+b3MXVDDAQDuVGXa/3bHzEd6szL1qaGDeySXNcs9GiixKvsEl9SDD87mGPVWKSvTAM0NLKSCCMULCN8PLyRw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1801 Return-Path: maurice.ma@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Maurice Ma > -----Original Message----- > From: Bret Barkelew > Sent: Monday, June 22, 2020 23:41 > To: devel@edk2.groups.io > Cc: Ma, Maurice ; Dong, Guo ; > You, Benjamin > Subject: [PATCH v6 08/14] UefiPayloadPkg: Add VariablePolicy engine to > UefiPayloadPkg platform >=20 > https://bugzilla.tianocore.org/show_bug.cgi?id=3D2522 >=20 > Cc: Maurice Ma > Cc: Guo Dong > Cc: Benjamin You > Cc: Bret Barkelew > Signed-off-by: Bret Barkelew > Reviewed-by: Maurice Ma > --- > UefiPayloadPkg/UefiPayloadPkgIa32.dsc | 4 ++++ > UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc | 4 ++++ > 2 files changed, 8 insertions(+) >=20 > diff --git a/UefiPayloadPkg/UefiPayloadPkgIa32.dsc > b/UefiPayloadPkg/UefiPayloadPkgIa32.dsc > index c6c47833871b..4bed6aaa78d0 100644 > --- a/UefiPayloadPkg/UefiPayloadPkgIa32.dsc > +++ b/UefiPayloadPkg/UefiPayloadPkgIa32.dsc > @@ -4,6 +4,7 @@ > # Provides drivers and definitions to create uefi payload for bootloader= s. >=20 > # >=20 > # Copyright (c) 2014 - 2020, Intel Corporation. All rights reserved.
>=20 > +# Copyright (c) Microsoft Corporation. >=20 > # SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > # >=20 > ## >=20 > @@ -204,6 +205,8 @@ [LibraryClasses] >=20 > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib > Null.inf >=20 >=20 > TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmM > easurementLibNull.inf >=20 > VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf >=20 > + > VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLi= b.i > nf >=20 > + > VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Vari= a > blePolicyHelperLib.inf >=20 >=20 >=20 > [LibraryClasses.IA32.SEC] >=20 > DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf >=20 > @@ -251,6 +254,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] > HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf >=20 >=20 > MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemory > AllocationLib.inf >=20 >=20 > ReportStatusCodeLib|MdeModulePkg/Library/RuntimeDxeReportStatusCodeLib > /RuntimeDxeReportStatusCodeLib.inf >=20 > + > VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLi= bR > untimeDxe.inf >=20 >=20 >=20 >=20 > [LibraryClasses.common.UEFI_DRIVER,LibraryClasses.common.UEFI_APPLICATI > ON] >=20 > PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf >=20 > diff --git a/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc > b/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc > index 5559b1258521..6e07dd866acd 100644 > --- a/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc > +++ b/UefiPayloadPkg/UefiPayloadPkgIa32X64.dsc > @@ -4,6 +4,7 @@ > # Provides drivers and definitions to create uefi payload for bootloader= s. >=20 > # >=20 > # Copyright (c) 2014 - 2020, Intel Corporation. All rights reserved.
>=20 > +# Copyright (c) Microsoft Corporation. >=20 > # SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > # >=20 > ## >=20 > @@ -205,6 +206,8 @@ [LibraryClasses] >=20 > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableLib > Null.inf >=20 >=20 > TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/TpmM > easurementLibNull.inf >=20 > VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf >=20 > + > VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLi= b.i > nf >=20 > + > VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/Vari= a > blePolicyHelperLib.inf >=20 >=20 >=20 > [LibraryClasses.IA32.SEC] >=20 > DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf >=20 > @@ -252,6 +255,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] > HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf >=20 >=20 > MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemory > AllocationLib.inf >=20 >=20 > ReportStatusCodeLib|MdeModulePkg/Library/RuntimeDxeReportStatusCodeLib > /RuntimeDxeReportStatusCodeLib.inf >=20 > + > VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLi= bR > untimeDxe.inf >=20 >=20 >=20 >=20 > [LibraryClasses.common.UEFI_DRIVER,LibraryClasses.common.UEFI_APPLICATI > ON] >=20 > PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf >=20 > -- > 2.26.2.windows.1.8.g01c50adf56.20200515075929