From nobody Mon Feb 9 13:38:19 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+69112+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1608210422391203.93163255221043; Thu, 17 Dec 2020 05:07:02 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 8qZEYY1788612xdyqM7DURd9; Thu, 17 Dec 2020 05:07:00 -0800 X-Received: from EUR02-VE1-obe.outbound.protection.outlook.com (EUR02-VE1-obe.outbound.protection.outlook.com [40.107.2.51]) by mx.groups.io with SMTP id smtpd.web10.7655.1608210376895588814 for ; Thu, 17 Dec 2020 05:06:17 -0800 X-Received: from AM6PR04CA0028.eurprd04.prod.outlook.com (2603:10a6:20b:92::41) by AM6PR08MB3573.eurprd08.prod.outlook.com (2603:10a6:20b:4b::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.24; Thu, 17 Dec 2020 13:06:14 +0000 X-Received: from AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:92:cafe::5f) by AM6PR04CA0028.outlook.office365.com (2603:10a6:20b:92::41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 17 Dec 2020 13:06:14 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+69112+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT022.mail.protection.outlook.com (10.152.16.79) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3676.22 via Frontend Transport; Thu, 17 Dec 2020 13:06:13 +0000 X-Received: ("Tessian outbound eeda57fffe7b:v71"); Thu, 17 Dec 2020 13:06:13 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 0f9fbb67a6a43714 X-CR-MTA-TID: 64aa7808 X-Received: from 8c2ccdfde012.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id ADF5CBD5-73AF-413F-9A6C-96F407FEAAC2.1; Thu, 17 Dec 2020 13:05:53 +0000 X-Received: from EUR02-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8c2ccdfde012.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 17 Dec 2020 13:05:53 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g2jv+5CWfkcEFexZCm2/LEogs/DWLAqCZBAQIMdzhhWXKRNKts7lovkbUI03jVqSPDoEEeFPHNKzPeCC4P8+HwJTbZIKPE0W7xFboz7bIoQeSTac563o0mTdhGRj3zWYGd4E6DY6u/cxE7y32LomYyoIbT4ZMNiffO/KxwKQImcOIZ9Ry4c1BSYIFtD8LLx4abjMQqW5hNWVGEYBw8LWLlRl8ljdUfFqSThOXg86AhmIz9TkU8HoGfIqHhtDNBuYzeuPWnM6Or81BVUByEtXp61RM3TQ/bUjGF5bJHTNWtYSWc2USYAsiu8lhQjbuO1vaCAkTNCHQpaW5P4OirxaNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5iG7eJJIpPAf1w2q58qvDmuyamNgbUTMDzqV7HlVZDc=; b=EtnZOrFzXUibMAcxvDo56K9SsrPA0cTFb7fp91WF3COhDOVKd0paMAOP3v0FVtT6xAdvh0qOZGqTcqcML/IAWXIS7M1i6X7/DH10tgnGaSekH6Vrc3aX3vMShSjaOD25TJ2QTtJneKBK2Ys8xcQqjo5rcmeCXXEbwNwlBR4d1GEYiIZzRg96eDv9EYFG4rXDVttqRa3ygYTRkfIR6jkuYDFlEZ+Zpfee1nmpkxGwJCDwSl7qM6+kdYfKFcOcFfjclJYhKBB3XYPmJ+mWxWozRQnaWvTsknIKTP/EqO/wheOYC+Ae7Ogxgzd+nh2RUMRAnRd6sIv6MKj301QI68uehg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0301CA0003.eurprd03.prod.outlook.com (2603:10a6:4:3e::13) by DBBPR08MB4364.eurprd08.prod.outlook.com (2603:10a6:10:c9::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.21; Thu, 17 Dec 2020 13:05:51 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:3e:cafe::75) by DB6PR0301CA0003.outlook.office365.com (2603:10a6:4:3e::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 17 Dec 2020 13:05:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3676.22 via Frontend Transport; Thu, 17 Dec 2020 13:05:51 +0000 X-Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2044.4; Thu, 17 Dec 2020 13:05:19 +0000 X-Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Thu, 17 Dec 2020 13:05:18 +0000 X-Received: from E107187.Arm.com (10.57.33.43) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Thu, 17 Dec 2020 13:05:18 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , Subject: [edk2-devel] [PATCH v2 13/26] StandaloneMmPkg: Fix ECC error 4002 in StandaloneMmCoreEntryPoint Date: Thu, 17 Dec 2020 13:04:56 +0000 Message-ID: <20201217130509.12568-14-sami.mujawar@arm.com> In-Reply-To: <20201217130509.12568-1-sami.mujawar@arm.com> References: <20201217130509.12568-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ba1080ab-cc9f-472d-dc1f-08d8a28c882e X-MS-TrafficTypeDiagnostic: DBBPR08MB4364:|AM6PR08MB3573: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:1824;OLM:1824; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: lZJolsM4Ul9WvYfrUF+wSHprJyzH6udmG1x7/wncV59ZiPi7NHzsJbaol4id1YGSyMu5y27BkaKQEx2x/CAae8wRL+3u/zBbFKFWLNO7hjtIvOx7ukewJ42dpo9jzp8b/FNBgknXenJFd5ywVytZdtEWG0ZLrs1r9cWs7YUqZOLoLkqLRq55pp+HvjAlWRCifMzA5B2o2iFtFYpPF332GApLxbcBGla2PXtwm/qC3Jj8tYuH6GsshjRnsM4iOseXTZrAROYdY2r6xmWSXK5cklKttBXCZ0g2ZM3vT457WFOC3IDgEqBSo30+hJyHhTUTI9Ej7SzAAG93vbpxKGiHgvTvFeiY4GeOFmk2lN03GofS5+wv/50z8TbGfIdd0+CH2Fl41hoDcM+KxjjQsKRpfw== X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(6029001)(4636009)(396003)(346002)(376002)(136003)(39850400004)(46966005)(356005)(70206006)(47076004)(426003)(81166007)(70586007)(478600001)(316002)(1076003)(2906002)(26005)(44832011)(36756003)(86362001)(186003)(7696005)(8676002)(8936002)(4326008)(54906003)(82740400003)(82310400003)(5660300002)(336012)(2616005)(6666004)(6916009)(83380400001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4364 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: f804b130-5215-4041-2dbc-08d8a28c7acc X-Microsoft-Antispam-Message-Info: AEZ0hiYOI5O3aZo3wsvOBSw3OTgf90BwwGMDpbnVcjlEjHHmkeizyTr8+LJ64vtQ6TXMA+FC8mVdTUqZUgiLHaZLkeTv2eXIXpNkiX7z3KpAWQD4Oa2r97NtWTTOSsMJk5LWFE7A1O2S2+BgQ5KQZ4A2ApoeZogi80k3xwovGQXjy1XpIZe2kVHiv7k9IFiRxQ8o+ZP+n2Zl9B5GSDyPre4N7liTE90M5T5gpFYUh7naRjIY1dSX326lPGb1UWdPuuAPwEYg+9fWAl0ksdopmk1YnwB38mGouqMcibi3KkjgBHXtIWJlYL39BkfuGVjmgz86iphd+A3sHbIFppbv/Xud9YuouzkvnbwO4W++1f6j+BW4xW4VSudAbGEvrKKII04RtI4qlO+fJzUenRKZyg== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Dec 2020 13:06:13.6129 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ba1080ab-cc9f-472d-dc1f-08d8a28c882e X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3573 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: XX7UxURLsi78CSr1IiSJAg7fx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1608210420; bh=WU1cyLcHaYKsDAjjL7I2rbeKZOVYCAciyGn9N8pmV6M=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=Oo9bpbu3V9LL9MTodCWXIbzmGRiUzHWBz/cxMZVDTLZ6cNhAa2gPGqdTB5O8hZAUK6t HWDTs7446ARtjwL3raV9FTiy1ar450Mazob2KTwY5p+i5t+PgipjUtv6nzfcTtVinDG5Y E8bDmR8s1uJhSC/aXzkr0RFsxm/kRgFiLAI= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add doxygen style function headers to fix ECC reported errors "[4002] Function header doesn't exist Function". Also update the corresponding declaration to add IN/OUT doxygen style reference tags. Signed-off-by: Sami Mujawar Acked-by: Jiewen Yao --- Notes: v2: - No code change. Resending patch with v2 series. [SAMI] StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h = | 34 +++++++------- StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermissions.= c | 48 ++++++++++++++++++++ StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/StandaloneMmCor= eEntryPoint.c | 14 +++++- 3 files changed, 78 insertions(+), 18 deletions(-) diff --git a/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryP= oint.h b/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint= .h index 0f9a032404582fd59e3d4e2bf2884b1077b78d5c..34c43897dded9aebe1470f2dbfe= 96b93590a9e45 100644 --- a/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h +++ b/StandaloneMmPkg/Include/Library/AArch64/StandaloneMmCoreEntryPoint.h @@ -2,7 +2,7 @@ Entry point to the Standalone MM Foundation when initialized during the = SEC phase on ARM platforms =20 -Copyright (c) 2017 - 2018, ARM Ltd. All rights reserved.
+Copyright (c) 2017 - 2020, Arm Ltd. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -70,13 +70,13 @@ typedef RETURN_STATUS (*REGION_PERMISSION_UPDATE_FUNC) ( sections in the Standalone MM Core module to be able to access RO and RW= data and make further progress in the boot process. =20 - @param ImageContext Pointer to PE/COFF image context - @param ImageBase Base of image in memory - @param SectionHeaderOffset Offset of PE/COFF image section header - @param NumberOfSections Number of Sections - @param TextUpdater Function to change code permissions - @param ReadOnlyUpdater Function to change RO permissions - @param ReadWriteUpdater Function to change RW permissions + @param [in] ImageContext Pointer to PE/COFF image context + @param [in] ImageBase Base of image in memory + @param [in] SectionHeaderOffset Offset of PE/COFF image section head= er + @param [in] NumberOfSections Number of Sections + @param [in] TextUpdater Function to change code permissions + @param [in] ReadOnlyUpdater Function to change RO permissions + @param [in] ReadWriteUpdater Function to change RW permissions =20 **/ EFI_STATUS @@ -98,11 +98,11 @@ UpdateMmFoundationPeCoffPermissions ( the Standalone MM Core module to be able to change permissions of the individual sections later in the boot process. =20 - @param TeData Pointer to PE/COFF image data - @param ImageContext Pointer to PE/COFF image context - @param ImageBase Pointer to ImageBase variable - @param SectionHeaderOffset Offset of PE/COFF image section header - @param NumberOfSections Number of Sections + @param [in] TeData Pointer to PE/COFF image data + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Pointer to ImageBase variable + @param [in, out] SectionHeaderOffset Offset of PE/COFF image section = header + @param [in, out] NumberOfSections Number of Sections =20 **/ EFI_STATUS @@ -121,10 +121,10 @@ GetStandaloneMmCorePeCoffSections ( by the Boot Firmware Volume. This function locates the Standalone MM Core module PE/COFF image in the BFV and returns this information. =20 - @param BfvAddress Base Address of Boot Firmware Volume - @param TeData Pointer to address for allocating memory = for - PE/COFF image data - @param TeDataSize Pointer to size of PE/COFF image data + @param [in] BfvAddress Base Address of Boot Firmware Volume + @param [in, out] TeData Pointer to address for allocating m= emory + for PE/COFF image data + @param [in, out] TeDataSize Pointer to size of PE/COFF image da= ta =20 **/ EFI_STATUS diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/Set= Permissions.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/= SetPermissions.c index 0ab6edaeb7f05bc814281d0e928305804633e970..f2e724cfc38e75d61bae5d8d21d= 40feda1685144 100644 --- a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermiss= ions.c +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/SetPermiss= ions.c @@ -25,6 +25,21 @@ SPDX-License-Identifier: BSD-2-Clause-Patent =20 #include =20 +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function sets the correct permissions = of + sections in the Standalone MM Core module to be able to access RO and RW= data + and make further progress in the boot process. + + @param [in] ImageContext Pointer to PE/COFF image context + @param [in] ImageBase Base of image in memory + @param [in] SectionHeaderOffset Offset of PE/COFF image section head= er + @param [in] NumberOfSections Number of Sections + @param [in] TextUpdater Function to change code permissions + @param [in] ReadOnlyUpdater Function to change RO permissions + @param [in] ReadWriteUpdater Function to change RW permissions + +**/ EFI_STATUS EFIAPI UpdateMmFoundationPeCoffPermissions ( @@ -113,6 +128,17 @@ UpdateMmFoundationPeCoffPermissions ( return RETURN_SUCCESS; } =20 +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function locates the Standalone MM Core + module PE/COFF image in the BFV and returns this information. + + @param [in] BfvAddress Base Address of Boot Firmware Volume + @param [in, out] TeData Pointer to address for allocating m= emory + for PE/COFF image data + @param [in, out] TeDataSize Pointer to size of PE/COFF image da= ta + +**/ EFI_STATUS EFIAPI LocateStandaloneMmCorePeCoffData ( @@ -151,6 +177,15 @@ LocateStandaloneMmCorePeCoffData ( return Status; } =20 +/** + Returns the PC COFF section information. + + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Base of image in memory + @param [out] SectionHeaderOffset Offset of PE/COFF image section h= eader + @param [out] NumberOfSections Number of Sections + +**/ STATIC EFI_STATUS GetPeCoffSectionInformation ( @@ -241,6 +276,19 @@ GetPeCoffSectionInformation ( return RETURN_SUCCESS; } =20 +/** + Privileged firmware assigns RO & Executable attributes to all memory occ= upied + by the Boot Firmware Volume. This function locates the section informati= on of + the Standalone MM Core module to be able to change permissions of the + individual sections later in the boot process. + + @param [in] TeData Pointer to PE/COFF image data + @param [in, out] ImageContext Pointer to PE/COFF image context + @param [out] ImageBase Pointer to ImageBase variable + @param [in, out] SectionHeaderOffset Offset of PE/COFF image section = header + @param [in, out] NumberOfSections Number of Sections + +**/ EFI_STATUS EFIAPI GetStandaloneMmCorePeCoffSections ( diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/Sta= ndaloneMmCoreEntryPoint.c b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPo= int/AArch64/StandaloneMmCoreEntryPoint.c index 9cecfa667b905c975ddd348513c51fc8a5955718..3d3c772019df9afe9b8ec77019c= 776ea7c3b55fb 100644 --- a/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/Standalone= MmCoreEntryPoint.c +++ b/StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/AArch64/Standalone= MmCoreEntryPoint.c @@ -2,7 +2,7 @@ Entry point to the Standalone MM Foundation when initialized during the = SEC phase on ARM platforms =20 -Copyright (c) 2017 - 2018, ARM Ltd. All rights reserved.
+Copyright (c) 2017 - 2020, Arm Ltd. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -101,6 +101,12 @@ GetAndPrintBootinformation ( return PayloadBootInfo; } =20 +/** + A loop to delegated events. + + @param [in] EventCompleteSvcArgs Pointer to the event completion argu= ments. + +**/ VOID EFIAPI DelegatedEventLoop ( @@ -156,6 +162,12 @@ DelegatedEventLoop ( } } =20 +/** + Query the SPM version, check compatibility and return success if compati= ble. + + @retval EFI_SUCCESS SPM versions compatible. + @retval EFI_UNSUPPORTED SPM versions not compatible. +**/ STATIC EFI_STATUS GetSpmVersion (VOID) --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#69112): https://edk2.groups.io/g/devel/message/69112 Mute This Topic: https://groups.io/mt/79035562/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-