From nobody Fri Apr 26 05:04:04 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+59605+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+59605+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1589493173; cv=none; d=zohomail.com; s=zohoarc; b=GrntOesVeNbnnmDxgU2t3VGcNySi5gBej2IJtFtHsG9Rq5cGPVUn+yB2RmGS5v6kXobmtq+eqpgi4165Tak9sUIRf1M1/NzHmk+Af35dBvC8/7HseMZ3QnTY9vFrUp10f/RwQksnqdpZKdPDgYrL20nVWh0hnZ6SoLp/O4wsXJw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1589493173; h=Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:Message-ID:Reply-To:References:Sender:Subject:To; bh=WS72VRd9JOIRixtOHpS4jG6oyXPCbVwOicAV4ZOgJjE=; b=A9zp53reMhUg2qbYBKofTm4ntrxRc+wGdx8ejqlgGurSEDy9G4aff+lj+M8hKJKH4fUElAYQS/5GHSo+xU2zTAMKeQp7u7g5mYLhkvFQ5ghZGY35iz3DVQZgOz323x3A8feniC2Rfxgs4IXTqwhKWDVwQ+QYmMrdwinxegNMuvI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+59605+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1589493173614331.40097859906143; Thu, 14 May 2020 14:52:53 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id FOMaYY1788612xR0PBK52XKH; Thu, 14 May 2020 14:52:53 -0700 X-Received: from mga04.intel.com (mga04.intel.com []) by mx.groups.io with SMTP id smtpd.web11.1970.1589493168169412090 for ; Thu, 14 May 2020 14:52:52 -0700 IronPort-SDR: KDdXWYiJ7CD4/ipqlVneuZHZEj6sXXJlr5H88hkzwnGyC2V0dwxLxSy29tsUhAxIOntbzlM1H5 Ofdgi/+PBF+A== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 May 2020 14:52:52 -0700 IronPort-SDR: rincHeq/twt0f2/tSi3vU60+CLR0ESg3Urc3FlLtijAriYPFFwsY/isYqd/Gc3Q9Z3iQJMv8nQ P4Ywa+sa6i6A== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,392,1583222400"; d="scan'208";a="410233894" X-Received: from shwdeopenpsi174.ccr.corp.intel.com ([10.239.157.39]) by orsmga004.jf.intel.com with ESMTP; 14 May 2020 14:52:50 -0700 From: "Xu, Wei6" To: devel@edk2.groups.io Cc: Michael D Kinney , Liming Gao , Sean Brogan Subject: [edk2-devel] [PATCH V3 3/5] FmpDevicePkg: Add FmpDependencyCheck library class and instances Date: Fri, 15 May 2020 05:52:30 +0800 Message-Id: <20200514215232.13372-4-wei6.xu@intel.com> In-Reply-To: <20200514215232.13372-1-wei6.xu@intel.com> References: <20200514215232.13372-1-wei6.xu@intel.com> Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,wei6.xu@intel.com X-Gm-Message-State: 7OxR6Fk2ix8K0r70V2oVRxcZx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1589493173; bh=olFfF50KXAAju6uMmtTrNptRBxZb8k5+/LWmk8MuXxs=; h=Cc:Date:From:Reply-To:Subject:To; b=JkW2lALcSe/NFcP4UPHC1QWckqj2inwapc4pNcNL9lz6KcmVIw8UuOihC92vPqwJ0Tz pcJT4EtZ5HmdmiSapfs0qRcIuzLE5v9KoRWNxOcCZXMtCZXohlhAW1U/XrA2S/DJJqWUA j+s5dRcHEDYM7ZjcL5cbKESjQdIw2etZKpE= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2696 * This library class provides platform specific services to support dependency check during updating firmware image. Platform can perform dependency check in platform specific manner by implementing its own FmpDependencyCheckLib. * Add FmpDependencyCheck instance to provide a sample of dependency check. The sample instance only checks the dependency from capsule image. The dependency from other FMP instances isn't checked here. * Add NULL instance as an option to skip the dependency check. Cc: Michael D Kinney Cc: Liming Gao Cc: Sean Brogan Signed-off-by: Wei6 Xu --- FmpDevicePkg/FmpDevicePkg.dec | 4 + FmpDevicePkg/FmpDevicePkg.dsc | 3 + .../Include/Library/FmpDependencyCheckLib.h | 38 ++++ .../FmpDependencyCheckLib/FmpDependencyCheckLib.c | 196 +++++++++++++++++= ++++ .../FmpDependencyCheckLib.inf | 43 +++++ .../FmpDependencyCheckLib.uni | 13 ++ .../FmpDependencyCheckLibNull.c | 34 ++++ .../FmpDependencyCheckLibNull.inf | 30 ++++ .../FmpDependencyCheckLibNull.uni | 13 ++ 9 files changed, 374 insertions(+) create mode 100644 FmpDevicePkg/Include/Library/FmpDependencyCheckLib.h create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependenc= yCheckLib.c create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependenc= yCheckLib.inf create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependenc= yCheckLib.uni create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDepen= dencyCheckLibNull.c create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDepen= dencyCheckLibNull.inf create mode 100644 FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDepen= dencyCheckLibNull.uni diff --git a/FmpDevicePkg/FmpDevicePkg.dec b/FmpDevicePkg/FmpDevicePkg.dec index 4947008346..871d5ce890 100644 --- a/FmpDevicePkg/FmpDevicePkg.dec +++ b/FmpDevicePkg/FmpDevicePkg.dec @@ -37,10 +37,14 @@ =20 ## @libraryclass Provides generic services to support capsule dependen= cy # expression evaluation. FmpDependencyLib|Include/Library/FmpDependencyLib.h =20 + ## @libraryclass Provides platform specific services to support depend= ency + # check during update of firmware image. + FmpDependencyCheckLib|Include/Library/FmpDependencyCheckLib.h + [LibraryClasses.Common.Private] ## @libraryclass Provides services to retrieve values from a capsule's= FMP # Payload Header. The structure is not included in the # library class. Instead, services are provided to ret= rieve # information from the FMP Payload Header. If informat= ion is diff --git a/FmpDevicePkg/FmpDevicePkg.dsc b/FmpDevicePkg/FmpDevicePkg.dsc index 49c6ff3a30..7e80806171 100644 --- a/FmpDevicePkg/FmpDevicePkg.dsc +++ b/FmpDevicePkg/FmpDevicePkg.dsc @@ -61,10 +61,11 @@ FmpAuthenticationLib|SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAu= thenticationLibPkcs7.inf CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/C= apsuleUpdatePolicyLibNull.inf FmpPayloadHeaderLib|FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloa= dHeaderLibV1.inf FmpDeviceLib|FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf FmpDependencyLib|FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.= inf + FmpDependencyCheckLib|FmpDevicePkg/Library/FmpDependencyCheckLibNull/Fmp= DependencyCheckLibNull.inf TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplat= e.inf =20 [LibraryClasses.ARM, LibraryClasses.AARCH64] # # It is not possible to prevent the ARM compiler for generic intrinsic f= unctions. @@ -90,10 +91,12 @@ FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNu= ll.inf FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolic= yLibOnProtocol.inf FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.inf + FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.inf + FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibNull= .inf FmpDevicePkg/FmpDxe/FmpDxeLib.inf =20 # # Modules # diff --git a/FmpDevicePkg/Include/Library/FmpDependencyCheckLib.h b/FmpDevi= cePkg/Include/Library/FmpDependencyCheckLib.h new file mode 100644 index 0000000000..ec380c4947 --- /dev/null +++ b/FmpDevicePkg/Include/Library/FmpDependencyCheckLib.h @@ -0,0 +1,38 @@ +/** @file + Fmp Capsule Dependency check functions for Firmware Management Protocol = based + firmware updates. + + Copyright (c) 2020, Intel Corporation. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef __FMP_DEPENDENCY_CHECK_LIB__ +#define __FMP_DEPENDENCY_CHECK_LIB__ + +#include +#include + +/** + Check dependency for firmware update. + + @param[in] ImageTypeId Image Type Id. + @param[in] Version New version. + @param[in] Dependencies Fmp dependency. + @param[in] DependenciesSize Size, in bytes, of the Fmp dependency. + + @retval TRUE Dependencies are satisfied. + @retval FALSE Dependencies are unsatisfied or dependency check fails. + +**/ +BOOLEAN +EFIAPI +CheckFmpDependency ( + IN EFI_GUID ImageTypeId, + IN UINT32 Version, + IN EFI_FIRMWARE_IMAGE_DEP *Dependencies, OPTIONAL + IN UINT32 DependenciesSize + ); + +#endif diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckL= ib.c b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.c new file mode 100644 index 0000000000..5e0241b259 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.c @@ -0,0 +1,196 @@ +/** @file + Provides FMP capsule dependency check services when updating the firmware + image of a FMP device. + + Copyright (c) 2020, Intel Corporation. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ +#include +#include +#include +#include +#include +#include +#include +#include +#include + +/** + Check dependency for firmware update. + + @param[in] ImageTypeId Image Type Id. + @param[in] Version New version. + @param[in] Dependencies Fmp dependency. + @param[in] DependenciesSize Size, in bytes, of the Fmp dependency. + + @retval TRUE Dependencies are satisfied. + @retval FALSE Dependencies are unsatisfied or dependency check fails. + +**/ +BOOLEAN +EFIAPI +CheckFmpDependency ( + IN EFI_GUID ImageTypeId, + IN UINT32 Version, + IN EFI_FIRMWARE_IMAGE_DEP *Dependencies, OPTIONAL + IN UINT32 DependenciesSize + ) +{ + EFI_STATUS Status; + EFI_HANDLE *HandleBuffer; + UINTN Index; + EFI_FIRMWARE_MANAGEMENT_PROTOCOL *Fmp; + UINTN ImageInfoSize; + UINT32 *DescriptorVer; + UINT8 FmpImageInfoCount; + UINTN *DescriptorSize; + UINT32 PackageVersion; + CHAR16 *PackageVersionName; + UINTN NumberOfFmpInstance; + EFI_FIRMWARE_IMAGE_DESCRIPTOR **FmpImageInfoBuf; + FMP_DEPEX_CHECK_VERSION_DATA *FmpVersions; + UINTN FmpVersionsCount; + BOOLEAN IsSatisfied; + + FmpImageInfoBuf =3D NULL; + DescriptorVer =3D NULL; + DescriptorSize =3D NULL; + NumberOfFmpInstance =3D 0; + FmpVersions =3D NULL; + FmpVersionsCount =3D 0; + IsSatisfied =3D TRUE; + PackageVersionName =3D NULL; + + // + // Get ImageDescriptors of all FMP instances, and archive them for depen= dency evaluation. + // + Status =3D gBS->LocateHandleBuffer ( + ByProtocol, + &gEfiFirmwareManagementProtocolGuid, + NULL, + &NumberOfFmpInstance, + &HandleBuffer + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "CheckFmpDependency: Get Firmware Management Prot= ocol failed. (%r)", Status)); + goto cleanup; + } + + FmpImageInfoBuf =3D AllocateZeroPool (sizeof(EFI_FIRMWARE_IMAGE_DESCRIPT= OR *) * NumberOfFmpInstance); + if (FmpImageInfoBuf =3D=3D NULL) { + IsSatisfied =3D FALSE; + goto cleanup; + } + + DescriptorVer =3D AllocateZeroPool (sizeof(UINT32) * NumberOfFmpInstance= ); + if (DescriptorVer =3D=3D NULL ) { + IsSatisfied =3D FALSE; + goto cleanup; + } + + DescriptorSize =3D AllocateZeroPool (sizeof(UINTN) * NumberOfFmpInstance= ); + if (DescriptorSize =3D=3D NULL ) { + IsSatisfied =3D FALSE; + goto cleanup; + } + + FmpVersions =3D AllocateZeroPool (sizeof(FMP_DEPEX_CHECK_VERSION_DATA) *= NumberOfFmpInstance); + if (FmpVersions =3D=3D NULL) { + IsSatisfied =3D FALSE; + goto cleanup; + } + + for (Index =3D 0; Index < NumberOfFmpInstance; Index ++) { + Status =3D gBS->HandleProtocol ( + HandleBuffer[Index], + &gEfiFirmwareManagementProtocolGuid, + (VOID **) &Fmp + ); + if (EFI_ERROR(Status)) { + continue; + } + + ImageInfoSize =3D 0; + Status =3D Fmp->GetImageInfo ( + Fmp, + &ImageInfoSize, + NULL, + NULL, + NULL, + NULL, + NULL, + NULL + ); + if (Status !=3D EFI_BUFFER_TOO_SMALL) { + continue; + } + + FmpImageInfoBuf[Index] =3D AllocateZeroPool (ImageInfoSize); + if (FmpImageInfoBuf[Index] =3D=3D NULL) { + continue; + } + + Status =3D Fmp->GetImageInfo ( + Fmp, + &ImageInfoSize, // ImageInfoSize + FmpImageInfoBuf[Index], // ImageInfo + &DescriptorVer[Index], // DescriptorVersion + &FmpImageInfoCount, // DescriptorCount + &DescriptorSize[Index], // DescriptorSize + &PackageVersion, // PackageVersion + &PackageVersionName // PackageVersionName + ); + if (EFI_ERROR(Status)) { + FreePool (FmpImageInfoBuf[Index]); + FmpImageInfoBuf[Index] =3D NULL; + continue; + } + + if (PackageVersionName !=3D NULL) { + FreePool (PackageVersionName); + PackageVersionName =3D NULL; + } + + CopyGuid (&FmpVersions[FmpVersionsCount].ImageTypeId, &FmpImageInfoBuf= [Index]->ImageTypeId); + FmpVersions[FmpVersionsCount].Version =3D FmpImageInfoBuf[Index]->Vers= ion; + FmpVersionsCount ++; + } + + // + // Evaluate firmware image's depex, against the version of other Fmp ins= tances. + // + if (Dependencies !=3D NULL) { + IsSatisfied =3D EvaluateDependency (Dependencies, DependenciesSize, Fm= pVersions, FmpVersionsCount); + } + + if (!IsSatisfied) { + DEBUG ((DEBUG_ERROR, "CheckFmpDependency: %g\'s dependency is not sati= sfied!\n", ImageTypeId)); + goto cleanup; + } + +cleanup: + if (FmpImageInfoBuf !=3D NULL) { + for (Index =3D 0; Index < NumberOfFmpInstance; Index ++) { + if (FmpImageInfoBuf[Index] !=3D NULL) { + FreePool (FmpImageInfoBuf[Index]); + } + } + FreePool (FmpImageInfoBuf); + } + + if (DescriptorVer !=3D NULL) { + FreePool (DescriptorVer); + } + + if (DescriptorSize !=3D NULL) { + FreePool (DescriptorSize); + } + + if (FmpVersions !=3D NULL) { + FreePool (FmpVersions); + } + + return IsSatisfied; +} diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckL= ib.inf b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.i= nf new file mode 100644 index 0000000000..2050cc6490 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.inf @@ -0,0 +1,43 @@ +## @file +# Provides FMP capsule dependency check services when updating the firmwa= re +# image of a FMP device. +# +# Copyright (c) 2020, Intel Corporation. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D FmpDependencyCheckLib + MODULE_UNI_FILE =3D FmpDependencyCheckLib.uni + FILE_GUID =3D 8296D425-3095-4CFE-88D8-B0A44DB174A8 + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D FmpDependencyCheckLib|DXE_DRIVER UEFI_DRIVER UEFI_AP= PLICATION + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D IA32 X64 ARM AARCH64 +# + +[Sources] + FmpDependencyCheckLib.c + +[Packages] + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + FmpDevicePkg/FmpDevicePkg.dec + +[LibraryClasses] + BaseLib + BaseMemoryLib + DebugLib + FmpDependencyLib + MemoryAllocationLib + UefiLib + UefiBootServicesTableLib + +[Protocols] + gEfiFirmwareManagementProtocolGuid ## CONSUMES diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckL= ib.uni b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.u= ni new file mode 100644 index 0000000000..c6369e2277 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.uni @@ -0,0 +1,13 @@ +// /** @file +// Provides FMP capsule dependency check services when updating the firmwa= re +// image of a FMP device. +// +// Copyright (c) 2020, Intel Corporation. All rights reserved.
+// +// SPDX-License-Identifier: BSD-2-Clause-Patent +// +// **/ + +#string STR_MODULE_ABSTRACT #language en-US "FMP Dependency Check Lib" + +#string STR_MODULE_DESCRIPTION #language en-US "Provides FMP capsule dep= endency check services when updating the firmware image of a FMP device." diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCh= eckLibNull.c b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependency= CheckLibNull.c new file mode 100644 index 0000000000..55e9af2290 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibN= ull.c @@ -0,0 +1,34 @@ +/** @file + Null instance of FmpDependencyCheckLib. + + Copyright (c) 2020, Intel Corporation. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ +#include +#include + +/** + Check dependency for firmware update. + + @param[in] ImageTypeId Image Type Id. + @param[in] Version New version. + @param[in] Dependencies Fmp dependency. + @param[in] DependenciesSize Size, in bytes, of the Fmp dependency. + + @retval TRUE Dependencies are satisfied. + @retval FALSE Dependencies are unsatisfied or dependency check fails. + +**/ +BOOLEAN +EFIAPI +CheckFmpDependency ( + IN EFI_GUID ImageTypeId, + IN UINT32 Version, + IN EFI_FIRMWARE_IMAGE_DEP *Dependencies, OPTIONAL + IN UINT32 DependenciesSize + ) +{ + return TRUE; +} diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCh= eckLibNull.inf b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependen= cyCheckLibNull.inf new file mode 100644 index 0000000000..5794d89191 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibN= ull.inf @@ -0,0 +1,30 @@ +## @file +# Null instance of FmpDependencyCheckLib as an option to skip the depende= ncy +# check when updating the firmware image of a FMP device. +# +# Copyright (c) 2020, Intel Corporation. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D FmpDependencyCheckLibNull + MODULE_UNI_FILE =3D FmpDependencyCheckLibNull.uni + FILE_GUID =3D D63F3166-9CBC-4AC2-8F23-8818E42EA2BD + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D FmpDependencyCheckLib|DXE_DRIVER UEFI_DRIVER UEFI_AP= PLICATION + +# +# The following information is for reference only and not required by the = build tools. +# +# VALID_ARCHITECTURES =3D IA32 X64 ARM AARCH64 +# + +[Sources] + FmpDependencyCheckLibNull.c + +[Packages] + MdePkg/MdePkg.dec + FmpDevicePkg/FmpDevicePkg.dec diff --git a/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCh= eckLibNull.uni b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependen= cyCheckLibNull.uni new file mode 100644 index 0000000000..7942d08f76 --- /dev/null +++ b/FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibN= ull.uni @@ -0,0 +1,13 @@ +// /** @file +// Null instance of FmpDependencyCheckLib as an option to skip the depende= ncy +// check when updating the firmware image of a FMP device. +// +// Copyright (c) 2020, Intel Corporation. All rights reserved.
+// +// SPDX-License-Identifier: BSD-2-Clause-Patent +// +// **/ + +#string STR_MODULE_ABSTRACT #language en-US "FMP Dependency Check Lib= rary NULL instance" + +#string STR_MODULE_DESCRIPTION #language en-US "Null instance of FmpDepe= ndencyCheckLib as an option to skip the dependency check when updating the = firmware image of a FMP device." --=20 2.16.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#59605): https://edk2.groups.io/g/devel/message/59605 Mute This Topic: https://groups.io/mt/74215663/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-