From nobody Sun May 19 06:23:01 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+81043+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+81043+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=intel.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1632407915464575.7427232256294; Thu, 23 Sep 2021 07:38:35 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 5CPUYY1788612xZ4nDThX8Cx; Thu, 23 Sep 2021 07:38:35 -0700 X-Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web12.3312.1632369161874230464 for ; Wed, 22 Sep 2021 20:52:42 -0700 X-IronPort-AV: E=McAfee;i="6200,9189,10115"; a="284769357" X-IronPort-AV: E=Sophos;i="5.85,315,1624345200"; d="scan'208,217";a="284769357" X-Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Sep 2021 20:52:40 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.85,315,1624345200"; d="scan'208,217";a="534078279" X-Received: from orsmsx605.amr.corp.intel.com ([10.22.229.18]) by fmsmga004.fm.intel.com with ESMTP; 22 Sep 2021 20:52:40 -0700 X-Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by ORSMSX605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Wed, 22 Sep 2021 20:52:39 -0700 X-Received: from orsmsx604.amr.corp.intel.com (10.22.229.17) by ORSMSX609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Wed, 22 Sep 2021 20:52:39 -0700 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12 via Frontend Transport; Wed, 22 Sep 2021 20:52:39 -0700 X-Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.43) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.12; Wed, 22 Sep 2021 20:52:39 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dFpVTntYpgnsQGmv72OiuJ2UmWYNZwkm4CxggRoFHngFbGumZBvnrjCEsQ8koLsmt5raTYttblfpNHOkg1se/7//mPWa0DkwKL7f8EK5L4pjz0VCJ8ZVIEFPqqRUhYjDJeCLUC47GXh7G7Ff6zcLEoLb96Dpw/L1lH66NkHnE3ZW1Hc6/nX15E5mcQ4jF9WRYPZhZ3vQG2Bj28kd2se0akJG/VCVvRd6ZXdeGHfFBdHbK1HAFEcCFBqLLYg09JcoQTKo7S1I06TGtkCPYUGy81qGedxDU8AsHMCEZ3iWVCQTWrXJM/8pVCZlewO2EEQS90c+ZbQyE+qlWj0In9dVLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Sb4y3+FQbZzuCVrORxaU1LnLdEMkDXJKpMUMieOKB7Q=; b=XoDvgzP8YYnaFiXOsO7LlermHdFCXpEleYemUIDWplXEOOZLpS50LUcSHAD4FdUoMO0+pGpetAKyk+5ShJe57/4N2qeyN6Xzcj0C2xtLyln25EGJeIBXtZ13YyXA4a3Vzn852KXO4sgP8Rb97S0uQ1lsF7/d3FpeFhqLsc7RL9b5sBVd8LvetNT4KDpwpnF6oiZbKSkdvawedrpaEE7eBbEOOUjGVGD6YNqF3Jd6uL7DKOlgr3tRD3Ypv6tLsGwbytagjCSPziqdiDd1jmX708RsTGUAeXCULFKnOmOOsYhr6Cv/zlDoOYA+PHYeHRDcSRsSeKdEET5B2IsP5tY4NQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from BN9PR11MB5529.namprd11.prod.outlook.com (2603:10b6:408:102::16) by BN8PR11MB3761.namprd11.prod.outlook.com (2603:10b6:408:85::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.13; Thu, 23 Sep 2021 03:52:37 +0000 X-Received: from BN9PR11MB5529.namprd11.prod.outlook.com ([fe80::7d94:8664:9dde:9f91]) by BN9PR11MB5529.namprd11.prod.outlook.com ([fe80::7d94:8664:9dde:9f91%6]) with mapi id 15.20.4544.013; Thu, 23 Sep 2021 03:52:37 +0000 From: "Shi, Hao" To: "devel@edk2.groups.io" Subject: [edk2-devel] [PATCH] UserAuthFeaturePkg/UserAuthenticationDxeSmm: The SMI to handle the user authentication should be unregister before booting to OS Thread-Topic: [PATCH] UserAuthFeaturePkg/UserAuthenticationDxeSmm: The SMI to handle the user authentication should be unregister before booting to OS Thread-Index: AdewLmOXerPXAjsmS4KqwPFLhlbBmg== Date: Thu, 23 Sep 2021 03:52:37 +0000 Message-ID: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.6.200.16 dlp-reaction: no-action x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 205ef549-0b6e-4e46-3ed1-08d97e4595b4 x-ms-traffictypediagnostic: BN8PR11MB3761: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?oc+PNvRRZc2fq1+4fZbUjEgU6jjlHeK/0v0yR+bb2XrkvZVBqWHlOLnW2xeJ?= =?us-ascii?Q?RhHKpWQEm0yAfwhvhVVFi95drHFfUB8D9YStoSaEnYUq7hAcRdeZmoKaRYw/?= =?us-ascii?Q?R/bCFd5z6Y6ZTJggOsPkLOFZQTtI9eLU+CyvIDAP2w8aROEMl3VUJ0RxwR4M?= =?us-ascii?Q?PI72ANEX1iIOU9dG70AiqB92dRBL9NQTkyn+3tBtgqbiw3I09J3D8X8ctDSj?= =?us-ascii?Q?D6auOU4h1OdSYO91Rx6skANIlybFlEGa6kB99gq7VfIdLrpwp1NZ21lh/3uY?= =?us-ascii?Q?l8SnpZWdQnNGJsDBquVSUMVe9yYSBCDD9j6Hs5q6vwC2wsKll6a+XwvKR58e?= =?us-ascii?Q?V9l4/L5hcl/7Y7htS4BJME4SQ+toWSrqvoTyfvmrfe+q43av9HkwpINEFnA5?= =?us-ascii?Q?3Tw9o2FKE+ov0INTct3boeJ1ZW2OsyifOLixrvxUII9X3ARfXxzhXbT9Mj5C?= =?us-ascii?Q?sQfbNVq2JvHzTiObYxZlxZaR2owaMas3gFliiWjqYFOxwDgH9MG4glNRPiVC?= =?us-ascii?Q?cUwPFmwVyU0J2eteWjRauHXzT65KMXOc6B9GbjjVyRdC+CNcLxwR5jrnnHJ/?= =?us-ascii?Q?73bVvpYJ1CKmO3ScIEYgupUV+Mb6cEsr+W+msJeHV6hsMxlgqNg7IatbVsvL?= =?us-ascii?Q?oKTB17Vba69JxZJ04cSer8wJg4i/aUd3JHgBLo4Hk9WIqCPXxqT3WTbE8G/h?= =?us-ascii?Q?7DPvFd6AO31gmqlLqt/ksTXz6fqr04WAzdT3Z6VsyHHotIsfHv71u3IqR4HT?= =?us-ascii?Q?HyT83JsxN3EhtD/njJ/yOQlv7qgr4EQvn1/1tgCjCksLNIHuJ6sFSjGG6VHK?= =?us-ascii?Q?fma1ZljOicKUUJV0+h6zoWTAl6peKwOt5V3MqIgDYnGjCGCffIsYp/nkXBlj?= =?us-ascii?Q?xmPxDMA/ij7yjrDaWFmjvEQMP/XXnJKctxHoZ1jf/fWsqIXF6WPkTRR65cEz?= =?us-ascii?Q?ern4DPmrTB/pfvDGVdhz1oCbn3gLoTIwVadd467QgL+mZHejIEERdZT8Ym1r?= =?us-ascii?Q?b958fLcwyiUaSjUOqO7fJQ1zTADT6Og2uqhIh67TBRhPYIeoVeAl6V+TdgEX?= =?us-ascii?Q?5FrCtztf8Hf9zUWe+qVWdPXZrJqA7vbNW76EXefv+iW+aQskcCSg+gH+EyRS?= =?us-ascii?Q?JQr1y6KKVg9i8ryZb+7KC/2gxog5dnwp2DSXO5GhR1NohshxXZKo55hrPTDg?= =?us-ascii?Q?bIz2Hy+Cle5yco+fuCt83IaVVmFMEGN6iGPJMzw+tZXUt657egCvt+QPg7mI?= =?us-ascii?Q?NXdD1n+sWwiUV+lpFTnOVrs0MEw5ThUmbpCEs78caUelckBMCrunFOaTMojm?= =?us-ascii?Q?58A=3D?= x-ms-exchange-transport-forked: True MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5529.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 205ef549-0b6e-4e46-3ed1-08d97e4595b4 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Sep 2021 03:52:37.7673 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Gl3HjT6nl4eiZtk5qBxreOZQ23y48XrNovqjOYtB4evrhcObegUHVMsnnX3I9p8dhw3/7R3CaXSrgSD5fRBLuQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3761 X-OriginatorOrg: intel.com Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,hao.shi@intel.com X-Gm-Message-State: 4zRzGilWl31VoiAMc35X4bQyx1787277AA= Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_BN9PR11MB5529DEA0052C8D0D6DE79E62F5A39BN9PR11MB5529namp_" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1632407915; bh=MZvI64ACDce+FAljvbGR885LGFAEhAwh6E7EDsLtQHY=; h=Content-Type:Date:From:Reply-To:Subject:To; b=UzpkgwPuAuQiAENFZx780QKHq3MRXV3e/Uwwnd2rAyLDiVIIVY0zYZeVv86QIb700o5 sWjX1Hq1oAkmiVQij+t/nZJdj2QL2gxYIc8klHANtHVyezq2ZLKvggeCDaLTeg2USr1yt dFlJ1yGk2kyCqIdVcQwEgE59C/W7X2GUUuw= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1632407919434100002 --_000_BN9PR11MB5529DEA0052C8D0D6DE79E62F5A39BN9PR11MB5529namp_ Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3648 Register SmmExitBootServices and SmmLegacyBoot callback function to unregis= ter this handler. Signed-off-by: Hao Shi > --- .../UserAuthenticationSmm.c | 34 +++++++++++++++++++ .../UserAuthenticationSmm.inf | 2 ++ 2 files changed, 36 insertions(+) diff --git a/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthentica= tionDxeSmm/UserAuthenticationSmm.c b/Features/Intel/UserInterface/UserAuthF= eaturePkg/UserAuthenticationDxeSmm/UserAuthenticationSmm.c index 07e834eb..30f889dd 100644 --- a/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthenticationDxe= Smm/UserAuthenticationSmm.c +++ b/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthentication +++ DxeSmm/UserAuthenticationSmm.c @@ -13,6 +13,7 @@ UINTN mAdminPasswordTryCount = =3D 0; BOOLEAN mNeedReVerify =3D TRUE; BOOLEAN mPasswordVerified =3D FALSE; +EFI_HANDLE mSmmHandle =3D NULL; /** Verify if the password is correct. @@ -612,6 +613,30 @@ EXIT: return EFI_SUCCESS; } +/** + Performs Exit Boot Services UserAuthentication actions + + @param[in] Protocol Points to the protocol's unique identifier. + @param[in] Interface Points to the interface instance. + @param[in] Handle The handle on which the interface was installed. + + @retval EFI_SUCCESS Notification runs successfully. +**/ +EFI_STATUS +EFIAPI +UaExitBootServices ( + IN CONST EFI_GUID *Protocol, + IN VOID *Interface, + IN EFI_HANDLE Handle + ) +{ + DEBUG ((DEBUG_INFO, "Unregister User Authentication Smi\n")); + + gSmst->SmiHandlerUnRegister(mSmmHandle); + + return EFI_SUCCESS; +} + /** Main entry for this driver. @@ -633,6 +658,7 @@ PasswordSmmInit ( EDKII_VARIABLE_LOCK_PROTOCOL *VariableLock; CHAR16 PasswordHistoryName[sizeof(USER_AU= THENTICATION_VAR_NAME)/sizeof(CHAR16) + 5]; UINTN Index; + EFI_EVENT ExitBootServicesEvent; ASSERT (PASSWORD_HASH_SIZE =3D=3D SHA256_DIGEST_SIZE); ASSERT (PASSWORD_HISTORY_CHECK_COUNT < 0xFFFF); @@ -663,6 +689,14 @@ Pas= swordSmmInit ( if (EFI_ERROR (Status)) { return Status; } + mSmmHandle =3D SmmHandle; + // + // Register for SmmExitBootServices and SmmLegacyBoot notification. + // + Status =3D gSmst->SmmRegisterProtocolNotify + (&gEdkiiSmmExitBootServicesProtocolGuid, UaExitBootServices, + &ExitBootServicesEvent); ASSERT_EFI_ERROR (Status); Status =3D + gSmst->SmmRegisterProtocolNotify (&gEdkiiSmmLegacyBootProtocolGuid, + UaExitBootServices, &ExitBootServicesEvent); ASSERT_EFI_ERROR + (Status); if (IsPasswordCleared()) { DEBUG ((DEBUG_INFO, "IsPasswordCleared\n")); diff --git a/Features/Int= el/UserInterface/UserAuthFeaturePkg/UserAuthenticationDxeSmm/UserAuthentica= tionSmm.inf b/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthentic= ationDxeSmm/UserAuthenticationSmm.inf index 0b33b194..d73a2fe2 100644 --- a/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthenticationDxe= Smm/UserAuthenticationSmm.inf +++ b/Features/Intel/UserInterface/UserAuthFeaturePkg/UserAuthentication +++ DxeSmm/UserAuthenticationSmm.inf @@ -48,6 +48,8 @@ [Protocols] gEdkiiVariableLockProtocolGuid ## CONSUMES gEfiSmmVariableProtocolGuid ## CONSUMES + gEdkiiSmmExitBootServicesProtocolGuid ## CONSUMES + gEdkiiSmmLegacyBootProtocolGuid ## CONSUMES [Depex] gEfiSmmVariableProtocolGuid AND gEfiVariableWriteArchProtocolGuid -- 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#81043): https://edk2.groups.io/g/devel/message/81043 Mute This Topic: https://groups.io/mt/85815441/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --_000_BN9PR11MB5529DEA0052C8D0D6DE79E62F5A39BN9PR11MB5529namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

REF:https://bugzilla.tianocore.org/show_bug.cgi?i= d=3D3648

 

Register SmmExitBootServices and SmmLegacyBoot ca= llback function to unregister this handler.

 

Signed-off-by: Hao Shi <hao.shi@intel.com>

 

---

.../UserAuthenticationSmm.c   &nbs= p;            &= nbsp;  | 34 +++++++++++++++++++

.../UserAuthenticationSmm.inf   &n= bsp;            = ; |  2 ++

2 files changed, 36 insertions(+)

 

diff --git a/Features/Intel/UserInterface/UserAut= hFeaturePkg/UserAuthenticationDxeSmm/UserAuthenticationSmm.c b/Features/Int= el/UserInterface/UserAuthFeaturePkg/UserAuthenticationDxeSmm/UserAuthentica= tionSmm.c

index 07e834eb..30f889dd 100644

--- a/Features/Intel/UserInterface/UserAuthFeatur= ePkg/UserAuthenticationDxeSmm/UserAuthenticationSmm.c

+++ b/Features/Intel/UserInterface/UserAuthFeatur= ePkg/UserAuthentication

+++ DxeSmm/UserAuthenticationSmm.c

@@ -13,6 +13,7 @@ UINTN    &n= bsp;            = ;          mAdminPasswordTryCo= unt =3D 0;

 BOOLEAN      =             &nb= sp;      mNeedReVerify =3D TRUE;

BOOLEAN       =              &n= bsp;    mPasswordVerified =3D FALSE;

+EFI_HANDLE      &n= bsp;            = ;   mSmmHandle =3D NULL;

 /**

   Verify if the password is correct.

@@ -612,6 +613,30 @@ EXIT:

   return EFI_SUCCESS;

}

+/**

+  Performs Exit Boot Services UserAuthentic= ation actions

+

+  @param[in] Protocol   Points to= the protocol's unique identifier.

+  @param[in] Interface  Points to the = interface instance.

+  @param[in] Handle    = The handle on which the interface was installed.

+

+  @retval EFI_SUCCESS   Notificat= ion runs successfully.

+**/

+EFI_STATUS

+EFIAPI

+UaExitBootServices (

+  IN CONST EFI_GUID    = *Protocol,

+  IN VOID     &nbs= p;         *Interface,

+  IN EFI_HANDLE    &nbs= p;    Handle

+  )

+{

+  DEBUG ((DEBUG_INFO, "Unregister User= Authentication Smi\n"));

+

+  gSmst->SmiHandlerUnRegister(mSmmHandle= );

+

+  return EFI_SUCCESS;

+}

+

/**

   Main entry for this driver.

@@ -633,6 +658,7 @@ PasswordSmmInit (<= /p>

   EDKII_VARIABLE_LOCK_PROTOCOL &n= bsp;        *VariableLock;

   CHAR16     =             &nb= sp;            =   PasswordHistoryName[sizeof(USER_AUTHENTICATION_VAR_NAME)/sizeof(CHAR= 16) + 5];

   UINTN     &= nbsp;           &nbs= p;            &= nbsp;  Index;

+  EFI_EVENT     &n= bsp;            = ;         ExitBootServicesEvent;

   ASSERT (PASSWORD_HASH_SIZE =3D= =3D SHA256_DIGEST_SIZE);

   ASSERT (PASSWORD_HISTORY_CHECK_COUNT= < 0xFFFF); @@ -663,6 +689,14 @@ PasswordSmmInit (

   if (EFI_ERROR (Status)) {=

     return Status;

   }

+  mSmmHandle =3D SmmHandle;

+  //

+  // Register for SmmExitBootServices and S= mmLegacyBoot notification.

+  //

+  Status =3D gSmst->SmmRegisterProtocolN= otify

+ (&gEdkiiSmmExitBootServicesProtocolGuid, Ua= ExitBootServices,

+ &ExitBootServicesEvent);  ASSERT_EFI_E= RROR (Status);  Status =3D

+ gSmst->SmmRegisterProtocolNotify (&gEdki= iSmmLegacyBootProtocolGuid,

+ UaExitBootServices, &ExitBootServicesEvent)= ;  ASSERT_EFI_ERROR

+ (Status);

   if (IsPasswordCleared()) {=

     DEBUG ((DEBUG_INFO, &quo= t;IsPasswordCleared\n")); diff --git a/Features/Intel/UserInterface/Us= erAuthFeaturePkg/UserAuthenticationDxeSmm/UserAuthenticationSmm.inf b/Featu= res/Intel/UserInterface/UserAuthFeaturePkg/UserAuthenticationDxeSmm/UserAut= henticationSmm.inf

index 0b33b194..d73a2fe2 100644

--- a/Features/Intel/UserInterface/UserAuthFeatur= ePkg/UserAuthenticationDxeSmm/UserAuthenticationSmm.inf

+++ b/Features/Intel/UserInterface/UserAuthFeatur= ePkg/UserAuthentication

+++ DxeSmm/UserAuthenticationSmm.inf

@@ -48,6 +48,8 @@

[Protocols]

   gEdkiiVariableLockProtocolGuid =             &nb= sp;  ## CONSUMES

   gEfiSmmVariableProtocolGuid &nb= sp;            =      ## CONSUMES

+  gEdkiiSmmExitBootServicesProtocolGuid&nbs= p;        ## CONSUMES

+  gEdkiiSmmLegacyBootProtocolGuid &nbs= p;             = ## CONSUMES

 [Depex]

   gEfiSmmVariableProtocolGuid AND gEfi= VariableWriteArchProtocolGuid

--

2.26.2.windows.1

 

 

_._,_._,_

G= roups.io Links:

You receive all messages sent to this group.

Vi= ew/Reply Online (#81043) | | Mute This Topic | New Topic
Your Subscription | Contact Group Owner | Unsubscribe [importer@patchew.org]
_._,_._,_=20 --_000_BN9PR11MB5529DEA0052C8D0D6DE79E62F5A39BN9PR11MB5529namp_--