From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id D3A5774003E for ; Thu, 9 May 2024 03:42:08 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=gKv8Gdd+JNopOMtVgyuGo1/H14pZwaTT74HSgvTnmEE=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1715226127; v=1; b=Zp7VPcFhKFo2xNfiE6oQ37DzxfcwOv8Nz+ajJa3ZfSLIXVSVZgn+dqq6sf+Jd3Tm3uryUi+v YGBla7m1AbeEI4Z8fJ4bzNdTx5SlZHH2/Tcyd49ODhNPqw0x8gCteWFpwiTz1FzveVDnJ8qgT5v JAuU3RSZom8yASLQkBDHqhHfMqA82aSrc+2kdxCOHHF6om93mHHECtvtwyukXLi2W1okAft7Llx DNOIyOL2dnNEpAm27NGPMJDA2p1GJ/u2OYeu67LNYMCuycwGVyvijFncURwcEdSvGAF5BFrjwzN 1ZZWZV6TbTqFTliLIgCa3IwNQS8pjXyB5/ua6KGdDf24A== X-Received: by 127.0.0.2 with SMTP id YjVrYY7687511xNwoY7NtRpt; Wed, 08 May 2024 20:42:07 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) by mx.groups.io with SMTP id smtpd.web10.1926.1715226126655986532 for ; Wed, 08 May 2024 20:42:06 -0700 X-CSE-ConnectionGUID: fJetczyaSm2GczH0xIvsJA== X-CSE-MsgGUID: Z7kB2xMQTTGnb9TmFRZGnA== X-IronPort-AV: E=McAfee;i="6600,9927,11067"; a="36504327" X-IronPort-AV: E=Sophos;i="6.08,146,1712646000"; d="scan'208";a="36504327" X-Received: from fmviesa009.fm.intel.com ([10.60.135.149]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 May 2024 20:42:06 -0700 X-CSE-ConnectionGUID: FV/kncM0QlS0qpEd48EN+w== X-CSE-MsgGUID: k3IpdylUTj21OCyCQ3TDKg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,146,1712646000"; d="scan'208";a="29067119" X-Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by fmviesa009.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 08 May 2024 20:42:06 -0700 X-Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 8 May 2024 20:42:06 -0700 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 8 May 2024 20:42:05 -0700 X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Wed, 8 May 2024 20:42:05 -0700 X-Received: from NAM02-SN1-obe.outbound.protection.outlook.com (104.47.57.41) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 8 May 2024 20:42:05 -0700 X-Received: from MN0PR11MB6158.namprd11.prod.outlook.com (2603:10b6:208:3ca::18) by SN7PR11MB7018.namprd11.prod.outlook.com (2603:10b6:806:2ad::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.39; Thu, 9 May 2024 03:42:03 +0000 X-Received: from MN0PR11MB6158.namprd11.prod.outlook.com ([fe80::13cf:47a8:4737:84e9]) by MN0PR11MB6158.namprd11.prod.outlook.com ([fe80::13cf:47a8:4737:84e9%3]) with mapi id 15.20.7544.039; Thu, 9 May 2024 03:42:03 +0000 From: "Wu, Jiaxin" To: "Xie, Yuanhao" , "devel@edk2.groups.io" CC: Liming Gao , "Ni, Ray" Subject: Re: [edk2-devel] [PATCH 3/3] MdeModulePkg: Add Standalone MM Lockbox Driver. Thread-Topic: [PATCH 3/3] MdeModulePkg: Add Standalone MM Lockbox Driver. Thread-Index: AQHaoEUpGM6jeHIPxkKKWswYgr14J7GORSDA Date: Thu, 9 May 2024 03:42:03 +0000 Message-ID: References: <20240507060910.1687-1-yuanhao.xie@intel.com> <20240507060910.1687-4-yuanhao.xie@intel.com> In-Reply-To: <20240507060910.1687-4-yuanhao.xie@intel.com> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN0PR11MB6158:EE_|SN7PR11MB7018:EE_ x-ms-office365-filtering-correlation-id: 43dc4a5c-4b68-4fda-8b24-08dc6fd9fda4 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?0xcYEF113s8pN5Ich1KCwMd9izbpQZkZTYmY2irbte18agYq5btxUNxLVPf1?= =?us-ascii?Q?Ob9Cs5E+z+0EI9tLhpamj+polVAVzHR5g+3bAXAjKQTDsiw0N6lXeyLkzNrp?= =?us-ascii?Q?j3hefVjah43MLcQjcbqs+wK+ZDNBSFyc44lpCJcUoiNDQW5EyO3u8QQXtkge?= =?us-ascii?Q?FeMydQpxIlymiKL/eKckHTW1vho7yPHW8hn7D/XA87dgZVZPLy4WOBFTo0ay?= =?us-ascii?Q?u/I6SxLYRljd1w0kw54Kks3LevKOswvBYeOH4ld5wHsV0yvrKpNA0s3KYbS/?= =?us-ascii?Q?FIY+rBtpbDrG0BC5JI2QBRA1D82o26kjN4oaa14bhMJcplSUhG+astbWSwEO?= =?us-ascii?Q?lOUvs/3WEzXo9znzGiqhflTIt1ctnacVs1tYwayUbVSuSJAqe5oqgTwMoWhF?= =?us-ascii?Q?J3EleXo1nOgLf4GGUPZScD8y5m76NFy4ME2+TJFJIMPORq83E4QgwzJhM1E0?= =?us-ascii?Q?t2CtZo5Eln809ND5uU9GYYC68WoGkpya/kpbvTbAB4/aNKozLHryaFnmN/Pi?= =?us-ascii?Q?VFJUiiy8bo3eDIOsW1acdF9CI4o69FOc8dq2aToOhfMZmTsTtzLBcL+39Rip?= =?us-ascii?Q?6MDHa44NyTC5kFQ0luHkHoYBqJ6J73ICrwqiW0+VzQrjNTPJe8tOBuAA4CMU?= =?us-ascii?Q?K43E7mjoMZI/2tUL2oirWGxDLJnDtPY5+cVCPCemGQPkZG9aFYyVHZtySqky?= =?us-ascii?Q?Qc1YxDG3baJDknSCGiaxU5ZvbtaaFNtR987y1iOexE11HoqgIlLv2Rnh5uTa?= =?us-ascii?Q?dMnE4UewkzLLCxwuyCBqTq14kzmQXZ6dTFEPTAIbSa21mp8Szw40q079osMB?= =?us-ascii?Q?QI9r7vw/eIhXzdQmORwS65x1bpxy4ZgEpGQU4zDTKxLGJOcu7eSUjeaRqmp8?= =?us-ascii?Q?MvbWqwltc8tbCkdZydVL3eTag5OqOdicNBYx450gnU8YFi+QPHKmXUcqPd/A?= =?us-ascii?Q?wKw9lv1XvosCczdAisdiQDObS5ssT+Prm5K5ByncQOGjMls/Et36js79KoS+?= =?us-ascii?Q?nk56gqtDXVIrwWxS4HY3HWrHWL3zDYHON6IQ7ASLlTKXoVQWdHHl2kReO9O8?= =?us-ascii?Q?x9Zim320BQnkqH8gn91CPMAvQsf0gGi/llVppcFeTSC74T+waqdP4ZVjIbdE?= =?us-ascii?Q?tgq4r3bLeAWmgyreWCDuKUsfnJ50un8qrw3IenBWPRNb2AN1gvoYyAFX0GJo?= =?us-ascii?Q?K8FFybev5LG+l0FMFKgT8NkM1T72Rjt8Xkm0m3FnopML9n1Z0AHWxjRrNrXn?= =?us-ascii?Q?fOk0aWpHunv6TC3/NVrgybu/FV/f43oda8bn0bRBY8QgEVLv5n+ChcgsKbmv?= =?us-ascii?Q?s3awd0XaZC4ZaPIUqGrMaT8/B9OV1QCVI5ZeD/u2lRwy+Q=3D=3D?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?eda1mLfprQxwyAocB4zu7CuH/wmhAAkFTlEKTsFRIuvrvdeLuQbq7oF6080b?= =?us-ascii?Q?7Pus6IRnW0yiZqK1qWkZs6hYkYZ029A34mnySA9FvBeQFmbLiJ7Ht6aX77O7?= =?us-ascii?Q?vKJvR9NgmnyLBTr3vcEEjWm6Vsnrk3LCozuagbz0HAx60p4SvwucHabbE00c?= =?us-ascii?Q?xKBuUSy6wGQ5L2tncRNyZReRln8RMG6wEMcyJbeaVQ+eJria+w5JeRo32zEs?= =?us-ascii?Q?/6MS384ZFLeP/y3F+TA+owTwmsU9hHAEOZEtRT2OcHToPkHa7S+GAblOvbag?= =?us-ascii?Q?3AezT9HRioAB6mgdQc6GiIr2JaX+uKLLrcTX++RId6DT/j9JaPpJaVDPwHpw?= =?us-ascii?Q?Fw8WAkrtQ0v/bm7pQ79KFb6Q0qzaVQHEgHCXTwvD07HddLnzCawFPCKXxwF7?= =?us-ascii?Q?R3sxMyLbqU3wz0foB9mUlbP+6HVtdLFNtgVIy6tUA5vZ8Zb3q8C8sWXSvG5H?= =?us-ascii?Q?iu9sC7W63cMMZL/rvMLJ7f+djSaltx9riHFcMGIlKE+1u61gxHTTst16MpIY?= =?us-ascii?Q?KbzuLifbwtmJDbBdfrz3mjCW8yefi8nm+LdUXZ7vbAyP2EJYEYxD1/tJ2SFi?= =?us-ascii?Q?ZIGBca2Zs4E4nzRK3LyGZBYZeQ5ImNDA8l9Zf/3TNtkkx3e1VGdr2+ZbZ1vz?= =?us-ascii?Q?yX0uyi62s9hhhwLmpzaY8GIUdMJJkYDXLLBNq5Tc9+i6tbSRcqTvuJV46f0A?= =?us-ascii?Q?azQCdgmlYkooOmTvCMVG4jZYu5o80V79rRrtzcLx4PGK4urkNlllbZ1pC0KP?= =?us-ascii?Q?F15QPKAp8v5A2eG/DtrIo+g4++GKtyJdE4AD6tG5KARjiPIJoRe1tAaXqPHc?= =?us-ascii?Q?aBxuxRZW7kXEesmGeb6QNte92ii2ubCxXxx04ReTW3jxQ733lBnBome9CA0L?= =?us-ascii?Q?trnWmTuGheaIyJOVm9kk2R6rCix4aP1fGiBPu12e/NP4Et+0xcl+HqAN+Etz?= =?us-ascii?Q?L2bctZ1ey13D8ix27E57XelAj3Vl11q1+Xv9T+tOVtFkJqjh/HqcXa6lmE6W?= =?us-ascii?Q?8zeIzSkBFNyj4EOpKN6vBM/WaOxnUrUjS/T54ojBXDtTr+kwNOwBGP91OfN+?= =?us-ascii?Q?9DhaT4B4FQ823RDETUtuGxohRaP0eLYDTpCyjfeJpNm18YqVvCfZj5vA9BUb?= =?us-ascii?Q?OmvPoIP9DhRb0jBWRknIOzHXcms/EQxrRiDT5aV7unhMAQTM0Z1stS8GPJce?= =?us-ascii?Q?i+X82/FeFiGbWlxZ1C015z62Qe0biOACkiD++OXuDdRKErZCMzN6yYn7YUjX?= =?us-ascii?Q?XA8tO8OHeCn/4dwhWX2/jROZ3UnZjcUopbIcAR+SJs8bWTK38aVluono/nuq?= =?us-ascii?Q?xsics9O/JHpNESqcep9pUHCMHSBgtr4DTSEsA8f8x3dFqz2LsXHuDbjCD7vz?= =?us-ascii?Q?avBFC6hU2KWGwsNUL1LWDo3HaSyPtynzHIPFiYyq+FRPRH74a5H2JoMhWP/h?= =?us-ascii?Q?9yAbHPm/cXTcEHMod+z58IAZW16hgI4z9ujCz645bs/nrfqbHyVm1RpKYbE3?= =?us-ascii?Q?w2OSAj0F4hAbKqxJiaFRL01DKsr7I257KCcqU4lPOO0GbrOByoDFl4TNNo+j?= =?us-ascii?Q?+g/wGFLGn68ToDAsQtI=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN0PR11MB6158.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 43dc4a5c-4b68-4fda-8b24-08dc6fd9fda4 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 May 2024 03:42:03.3158 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rgbRfXtc77R4bglLgJBGpHNP2ncbudZNO4okcC8yrY+L20lVCEVR31YnDnU3zcN0TUjkU9fClLO8lgQqUDs+KQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB7018 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Wed, 08 May 2024 20:42:06 -0700 Resent-From: jiaxin.wu@intel.com Reply-To: devel@edk2.groups.io,jiaxin.wu@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: IGW2k0F7VzHGEE37lp52o8Cgx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=Zp7VPcFh; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io Reviewed-by: Jiaxin Wu > -----Original Message----- > From: Xie, Yuanhao > Sent: Tuesday, May 7, 2024 2:09 PM > To: devel@edk2.groups.io > Cc: Liming Gao ; Wu, Jiaxin > ; Ni, Ray ; Xie, Yuanhao > > Subject: [PATCH 3/3] MdeModulePkg: Add Standalone MM Lockbox Driver. >=20 > The Lockbox Driver allows sensitive data to be securely stored in a > designated area, thus protected against unauthorized access. >=20 > This patch adds a Standalone MM Lockbox Driver with main modifications: > 1. Separating shared code between the Standalone MM driver and the > DXE MM Driver. > 2. Utilizing services from the SMM Services Table (gSmst) as opposed to > relying on Boot Services. >=20 > Cc: Liming Gao > Cc: Jiaxin Wu > Cc: Ray Ni >=20 > Signed-off-by: Yuanhao Xie > --- > MdeModulePkg/MdeModulePkg.dsc = | 1 + >=20 > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandaloneM > m.c | 84 > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > ++++++++++++++++++++++++++ >=20 > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandaloneM > m.inf | 56 > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ >=20 > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandaloneM > m.uni | 14 ++++++++++++++ >=20 > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandaloneM > mExtra.uni | 14 ++++++++++++++ > 5 files changed, 169 insertions(+) >=20 > diff --git a/MdeModulePkg/MdeModulePkg.dsc > b/MdeModulePkg/MdeModulePkg.dsc > index 6bed9205ea..f0f02f180f 100644 > --- a/MdeModulePkg/MdeModulePkg.dsc > +++ b/MdeModulePkg/MdeModulePkg.dsc > @@ -500,6 +500,7 @@ >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCode > RouterSmm.inf >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCode > RouterStandaloneMm.inf > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf > + > MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandaloneM > m.inf >=20 > MdeModulePkg/Library/SmmMemoryAllocationProfileLib/SmmMemoryAlloc > ationProfileLib.inf >=20 > MdeModulePkg/Library/PiSmmCoreMemoryAllocationLib/PiSmmCoreMemo > ryAllocationProfileLib.inf >=20 > MdeModulePkg/Library/PiSmmCoreMemoryAllocationLib/PiSmmCoreMemo > ryAllocationLib.inf > diff --git > a/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.c > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.c > new file mode 100644 > index 0000000000..503be7efa8 > --- /dev/null > +++ > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.c > @@ -0,0 +1,84 @@ > +/** @file > + LockBox MM driver. > + > +Copyright (c) 2024, Intel Corporation. All rights reserved.
> + > +SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include > +#include > +#include > +#include > + > +#include "SmmLockBoxCommon.h" > + > +/** > + This function is an abstraction layer for implementation specific Mm b= uffer > validation routine. > + > + @param Buffer The buffer start address to be checked. > + @param Length The buffer length to be checked. > + > + @retval TRUE This buffer is valid per processor architecture and not = overlap > with SMRAM. > + @retval FALSE This buffer is not valid per processor architecture or o= verlap > with SMRAM. > +**/ > +BOOLEAN > +IsBufferOutsideMmValid ( > + IN EFI_PHYSICAL_ADDRESS Buffer, > + IN UINT64 Length > + ) > +{ > + return MmIsBufferOutsideMmValid (Buffer, Length); > +} > + > +/** > + Entry Point for LockBox MM driver. > + > + @param[in] ImageHandle Image handle of this driver. > + @param[in] SystemTable A Pointer to the EFI System Table. > + > + @retval EFI_SUCEESS > + @return Others Some error occurs. > +**/ > +EFI_STATUS > +EFIAPI > +SmmLockBoxStandaloneMmEntryPoint ( > + IN EFI_HANDLE ImageHandle, > + IN EFI_MM_SYSTEM_TABLE *SystemTable > + ) > +{ > + EFI_STATUS Status; > + EFI_HANDLE DispatchHandle; > + VOID *Registration; > + > + // > + // Register LockBox communication handler > + // > + Status =3D gMmst->MmiHandlerRegister ( > + SmmLockBoxHandler, > + &gEfiSmmLockBoxCommunicationGuid, > + &DispatchHandle > + ); > + ASSERT_EFI_ERROR (Status); > + > + // > + // Register SMM Ready To Lock Protocol notification > + // > + Status =3D gMmst->MmRegisterProtocolNotify ( > + &gEfiSmmReadyToLockProtocolGuid, > + SmmReadyToLockEventNotify, > + &Registration > + ); > + ASSERT_EFI_ERROR (Status); > + return Status; > +} > diff --git > a/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.inf > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.inf > new file mode 100644 > index 0000000000..544c87790c > --- /dev/null > +++ > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.inf > @@ -0,0 +1,56 @@ > +## @file > +# LockBox MM driver. > +# > +# Copyright (c) 2024, Intel Corporation. All rights reserved.
> +# > +# SPDX-License-Identifier: BSD-2-Clause-Patent > +# > +## > + > +[Defines] > + INF_VERSION =3D 0x00010005 > + BASE_NAME =3D SmmLockBoxStandaloneMm > + MODULE_UNI_FILE =3D SmmLockBoxStandaloneMm.uni > + FILE_GUID =3D a83a87a0-8a3e-482d-86c8-84a139f6ded= 0 > + MODULE_TYPE =3D MM_STANDALONE > + VERSION_STRING =3D 1.0 > + PI_SPECIFICATION_VERSION =3D 0x00010032 > + ENTRY_POINT =3D SmmLockBoxStandaloneMmEntryPoint > + > +# > +# The following information is for reference only and not required by th= e build > tools. > +# > +# VALID_ARCHITECTURES =3D IA32 X64 > +# > + > +[Sources] > + SmmLockBoxStandaloneMm.c > + SmmLockBoxCommon.c > + SmmLockBoxCommon.h > + > +[Packages] > + MdePkg/MdePkg.dec > + MdeModulePkg/MdeModulePkg.dec > + StandaloneMmPkg/StandaloneMmPkg.dec > + > +[LibraryClasses] > + MmServicesTableLib > + BaseLib > + BaseMemoryLib > + DebugLib > + LockBoxLib > + MemLib > + StandaloneMmDriverEntryPoint > + > +[Guids] > + gEfiSmmLockBoxCommunicationGuid ## PRODUCES ## GUID # > SmiHandlerRegister > + > +[Protocols] > + gEfiSmmReadyToLockProtocolGuid ## NOTIFY > + gEfiLockBoxProtocolGuid ## PRODUCES > + > +[Depex] > + TRUE > + > +[UserExtensions.TianoCore."ExtraFiles"] > + SmmLockBoxStandaloneMm.uni > diff --git > a/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.uni > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.uni > new file mode 100644 > index 0000000000..7f6218102f > --- /dev/null > +++ > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > Mm.uni > @@ -0,0 +1,14 @@ > +// /** @file > +// LockBox MM driver. > +// > +// Copyright (c) 2024, Intel Corporation. All rights reserved.
> +// > +// SPDX-License-Identifier: BSD-2-Clause-Patent > +// > +// **/ > + > + > +#string STR_MODULE_ABSTRACT #language en-US "LockBox MM > driver." > + > +#string STR_MODULE_DESCRIPTION #language en-US "LockBox MM > driver." > + > diff --git > a/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > MmExtra.uni > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > MmExtra.uni > new file mode 100644 > index 0000000000..a5443ca5f9 > --- /dev/null > +++ > b/MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBoxStandalone > MmExtra.uni > @@ -0,0 +1,14 @@ > +// /** @file > +// SmmLockBox Localized Strings and Content > +// > +// Copyright (c) 2024, Intel Corporation. All rights reserved.
> +// > +// SPDX-License-Identifier: BSD-2-Clause-Patent > +// > +// **/ > + > +#string STR_PROPERTIES_MODULE_NAME > +#language en-US > +"MM Lock Box Driver" > + > + > -- > 2.39.1.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118710): https://edk2.groups.io/g/devel/message/118710 Mute This Topic: https://groups.io/mt/105955701/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-