-D SMM_REQUIRE signals that the firmware should be secure against tampering from a malicious OS; set PcdBaseExtractGuidedSectionLibForceInit to TRUE for that reason. (See the documentation in MdePkg.dec.)
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Laszlo Ersek <[email protected]> --- OvmfPkg/OvmfPkgIa32.dsc | 4 ++++ OvmfPkg/OvmfPkgIa32X64.dsc | 4 ++++ OvmfPkg/OvmfPkgX64.dsc | 4 ++++ 3 files changed, 12 insertions(+) diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc index 1ca12e8..5c726f8 100644 --- a/OvmfPkg/OvmfPkgIa32.dsc +++ b/OvmfPkg/OvmfPkgIa32.dsc @@ -404,6 +404,10 @@ [Components] OvmfPkg/Sec/SecMain.inf { <LibraryClasses> NULL|IntelFrameworkModulePkg/Library/LzmaCustomDecompressLib/LzmaCustomDecompressLib.inf +!if $(SMM_REQUIRE) == TRUE + <PcdsFeatureFlag> + gEfiMdePkgTokenSpaceGuid.PcdBaseExtractGuidedSectionLibForceInit|TRUE +!endif } # diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc index 4cda03c..664f946 100644 --- a/OvmfPkg/OvmfPkgIa32X64.dsc +++ b/OvmfPkg/OvmfPkgIa32X64.dsc @@ -410,6 +410,10 @@ [Components.IA32] OvmfPkg/Sec/SecMain.inf { <LibraryClasses> NULL|IntelFrameworkModulePkg/Library/LzmaCustomDecompressLib/LzmaCustomDecompressLib.inf +!if $(SMM_REQUIRE) == TRUE + <PcdsFeatureFlag> + gEfiMdePkgTokenSpaceGuid.PcdBaseExtractGuidedSectionLibForceInit|TRUE +!endif } # diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc index e3be189..b8d54eb 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc @@ -409,6 +409,10 @@ [Components] OvmfPkg/Sec/SecMain.inf { <LibraryClasses> NULL|IntelFrameworkModulePkg/Library/LzmaCustomDecompressLib/LzmaCustomDecompressLib.inf +!if $(SMM_REQUIRE) == TRUE + <PcdsFeatureFlag> + gEfiMdePkgTokenSpaceGuid.PcdBaseExtractGuidedSectionLibForceInit|TRUE +!endif } # -- 1.8.3.1 _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

