public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Brian J. Johnson" <brian.johnson@hpe.com>
To: <devel@edk2.groups.io>, <nathaniel.l.desimone@intel.com>,
	"Yao, Jiewen" <jiewen.yao@intel.com>,
	"michael.kubacki@outlook.com" <michael.kubacki@outlook.com>
Cc: "Wang, Jian J" <jian.j.wang@intel.com>,
	"Gao, Liming" <gaoliming@byosoft.com.cn>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>,
	"Oram, Isaac W" <isaac.w.oram@intel.com>,
	"Chiu, Chasel" <chasel.chiu@intel.com>,
	"Cheng, Gao" <gao.cheng@intel.com>,
	"Zhang, Di" <di.zhang@intel.com>,
	"Bu, Daocheng" <daocheng.bu@intel.com>,
	"Kubacki, Michael" <michael.kubacki@microsoft.com>
Subject: Re: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add Definition of EDKII_PEI_VARIABLE_PPI
Date: Wed, 22 Jun 2022 14:51:44 -0500	[thread overview]
Message-ID: <0b274bdc-e9dc-3808-21bb-9cf488fcd195@hpe.com> (raw)
In-Reply-To: <MW4PR11MB5821F9EE4F05B14934BEF4FCCDAB9@MW4PR11MB5821.namprd11.prod.outlook.com>

Nate,

FWIW I welcome having a standard interface to write EFI variables in 
PEI.  Not all platforms store variables in flash, so they don't all have 
tricky issues with fault-tolerant writes to h/w which is also being used 
for code fetches.  And writing variables early makes it possible to 
modify settings in response to h/w changes and external requests, 
without having to boot all the way to DXE, write the variables, then 
trigger a reset.

Brian J. Johnson
-------- Original Message --------
From: Nate DeSimone [mailto:nathaniel.l.desimone@intel.com]
Sent: Monday, June 13, 2022, 4:31 PM
To: Yao, Jiewen <jiewen.yao@intel.com>, devel@edk2.groups.io 
<devel@edk2.groups.io>, michael.kubacki@outlook.com 
<michael.kubacki@outlook.com>
Cc: Wang, Jian J <jian.j.wang@intel.com>, Gao, Liming 
<gaoliming@byosoft.com.cn>, Kinney, Michael D 
<michael.d.kinney@intel.com>, Oram, Isaac W <isaac.w.oram@intel.com>, 
Chiu, Chasel <chasel.chiu@intel.com>, Cheng, Gao <gao.cheng@intel.com>, 
Zhang, Di <di.zhang@intel.com>, Bu, Daocheng <daocheng.bu@intel.com>, 
Kubacki, Michael <michael.kubacki@microsoft.com>
Subject: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add Definition of 
EDKII_PEI_VARIABLE_PPI

Hi Jiewen,

I am fine with deferring the submission of this to edk2 until the 
implementation is ready for review. I just wanted to get feedback on the 
API so that once the implementation patch series arrives we will at 
least that that piece of the review done. I would say this thread 
achieved that goal. Thank you for the pointer to the protected variable 
code, we will review it and make sure that no issues would arise from 
the pre-memory PEI implementation.

Thanks,
Nate

-----Original Message-----
From: Yao, Jiewen <jiewen.yao@intel.com>
Sent: Friday, June 10, 2022 6:09 PM
To: Desimone, Nathaniel L <nathaniel.l.desimone@intel.com>; 
devel@edk2.groups.io; michael.kubacki@outlook.com
Cc: Wang, Jian J <jian.j.wang@intel.com>; Gao, Liming 
<gaoliming@byosoft.com.cn>; Kinney, Michael D 
<michael.d.kinney@intel.com>; Oram, Isaac W <isaac.w.oram@intel.com>; 
Chiu, Chasel <chasel.chiu@intel.com>; Cheng, Gao <gao.cheng@intel.com>; 
Zhang, Di <di.zhang@intel.com>; Bu, Daocheng <daocheng.bu@intel.com>; 
Kubacki, Michael <michael.kubacki@microsoft.com>
Subject: RE: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add Definition of 
EDKII_PEI_VARIABLE_PPI

Thanks for the response.

1) Why we need "enable UEFI variable write before permanent memory is 
available"?

2) If the implementation is not ready, I do have concern to add it so 
early in EDKII.
If I don’t have a big picture, I am not sure how to review the completeness.

Can we put it to EDKII-staging 
(https://github.com/tianocore/edk2-staging) for a moment?
I don’t see the need to add the interface now for work-in-progress 
feature, since there is no consumer and no producer.

Another reason is that I happen to know other feature (in EDKII stage) 
is impacting variable driver.
https://github.com/tianocore/edk2-staging/tree/ProtectedVariable/libs

Please do consider that as well - how to write a protected variable in 
PEI phase.

Thank you
Yao Jiewen

> -----Original Message-----
> From: Desimone, Nathaniel L <nathaniel.l.desimone@intel.com>
> Sent: Saturday, June 11, 2022 5:49 AM
> To: Yao, Jiewen <jiewen.yao@intel.com>; devel@edk2.groups.io;
> michael.kubacki@outlook.com
> Cc: Wang, Jian J <jian.j.wang@intel.com>; Gao, Liming
> <gaoliming@byosoft.com.cn>; Kinney, Michael D
> <michael.d.kinney@intel.com>; Oram, Isaac W <isaac.w.oram@intel.com>;
> Chiu, Chasel <chasel.chiu@intel.com>; Cheng, Gao
> <gao.cheng@intel.com>; Zhang, Di <di.zhang@intel.com>; Bu, Daocheng
> <daocheng.bu@intel.com>; Kubacki, Michael
> <michael.kubacki@microsoft.com>
> Subject: RE: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add Definition
> of EDKII_PEI_VARIABLE_PPI
>
> Hi Jiewen,
>
> Thanks for the feedback, per your questions:
>
> 1. The primary use case for this is to enable UEFI variable writes
> before permanent memory is available.
> 2. The implementation is a work in progress. We will provide it
> shortly. As this will be a rather large patch set, I would like to get
> this piece in place beforehand so that the reviewers can focus on the
> implementation separate from the API definition.
> 3. No impact to secure boot. We are not going to support writing to
> authenticated variables in PEI. As mentioned in the comments, if a
> PEIM wishes to update any of the authenticated variables it must use
> the existing HOB mechanism to have a later DXE phase perform the update.
> 4. With regard to atomicity, we have a complete implementation of the
> fault tolerant write services operational in Pre-Memory PEI.
> 5. Good point on the S3 resume, we will need to add an SMI to have the
> variable services re-initialize the mNvVariableCache.
>
> Hope that helps,
> Nate
>
> -----Original Message-----
> From: Yao, Jiewen <jiewen.yao@intel.com>
> Sent: Friday, June 10, 2022 9:56 AM
> To: devel@edk2.groups.io; michael.kubacki@outlook.com; Desimone,
> Nathaniel L <nathaniel.l.desimone@intel.com>
> Cc: Wang, Jian J <jian.j.wang@intel.com>; Gao, Liming
> <gaoliming@byosoft.com.cn>; Kinney, Michael D
> <michael.d.kinney@intel.com>; Oram, Isaac W <isaac.w.oram@intel.com>;
> Chiu, Chasel <chasel.chiu@intel.com>; Cheng, Gao
> <gao.cheng@intel.com>; Zhang, Di <di.zhang@intel.com>; Bu, Daocheng
> <daocheng.bu@intel.com>; Kubacki, Michael
> <michael.kubacki@microsoft.com>
> Subject: RE: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add Definition
> of EDKII_PEI_VARIABLE_PPI
>
> Hi
>
> I am curious why we need this interface. Why we need write variable
> capability in PEI phase?
>
> Where is the implementation of this? I prefer to see an implementation
> submitted together with header file.
> For example, what is the impact to secure boot related feature, how to
> write auth variable in PEI, how PEI write variable cowork with SMM
> version in S3 resume phase, how to support variable atomicity, etc.
>
> Thank you
> Yao Jiewen
>
>
>> -----Original Message-----
>> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of
>> Michael Kubacki
>> Sent: Friday, June 10, 2022 10:00 AM
>> To: devel@edk2.groups.io; Desimone, Nathaniel L
>> <nathaniel.l.desimone@intel.com>
>> Cc: Wang, Jian J <jian.j.wang@intel.com>; Gao, Liming
>> <gaoliming@byosoft.com.cn>; Kinney, Michael D
>> <michael.d.kinney@intel.com>; Oram, Isaac W
>> <isaac.w.oram@intel.com>; Chiu, Chasel <chasel.chiu@intel.com>;
>> Cheng, Gao <gao.cheng@intel.com>; Zhang, Di <di.zhang@intel.com>;
>> Bu, Daocheng <daocheng.bu@intel.com>; Kubacki, Michael
>> <michael.kubacki@microsoft.com>
>> Subject: Re: [edk2-devel] [PATCH V1 1/1] MdeModulePkg: Add
>> Definition of EDKII_PEI_VARIABLE_PPI
>>
>> Is this change just adding the interface to Tianocore or is there
>> additional implementation planned as well?
>>
>> ---
>>
>> I thought we were following this convention now:
>>
>> "#ifndef __PEI_VARIABLE_PPI_H_" -> "#ifndef PEI_VARIABLE_PPI_H_"
>>
>> Some other comments are inline.
>>
>> Regards,
>> Michael
>>
>> On 6/9/2022 9:17 PM, Nate DeSimone wrote:
>>> Adds definition of EDKII_PEI_VARIABLE_PPI, a pre-cursor to
>>> enabling variable writes in the PEI environment.
>>>
>>> Cc: Jian J Wang <jian.j.wang@intel.com>
>>> Cc: Liming Gao <gaoliming@byosoft.com.cn>
>>> Cc: Michael D Kinney <michael.d.kinney@intel.com>
>>> Cc: Isaac Oram <isaac.w.oram@intel.com>
>>> Cc: Chasel Chiu <chasel.chiu@intel.com>
>>> Cc: Gao Cheng <gao.cheng@intel.com>
>>> Cc: Di Zhang <di.zhang@intel.com>
>>> Cc: Daocheng Bu <daocheng.bu@intel.com>
>>> Cc: Michael Kubacki <michael.kubacki@microsoft.com>
>>> Signed-off-by: Nate DeSimone <nathaniel.l.desimone@intel.com>
>>> ---
>>>    MdeModulePkg/Include/Ppi/Variable.h | 189
>> ++++++++++++++++++++++++++++
>>>    MdeModulePkg/MdeModulePkg.dec       |   3 +
>>>    2 files changed, 192 insertions(+)
>>>    create mode 100644 MdeModulePkg/Include/Ppi/Variable.h
>>>
>>> diff --git a/MdeModulePkg/Include/Ppi/Variable.h
>> b/MdeModulePkg/Include/Ppi/Variable.h
>>> new file mode 100644
>>> index 0000000000..97dc7ceefa
>>> --- /dev/null
>>> +++ b/MdeModulePkg/Include/Ppi/Variable.h
>>> @@ -0,0 +1,189 @@
>>> +/** @file
>>> +  EDKII PEI Variable Protocol provides an implementation of
>>> +variables
>>
>> [MK] Was "EDKII PEI Variable PPI" intended?
>>
>>> +  intended for use as a means to store data in the PEI environment.
>>> +
>>> +  Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
>>> +  SPDX-License-Identifier: BSD-2-Clause-Patent
>>> +
>>> +**/
>>> +
>>> +#ifndef __PEI_VARIABLE_PPI_H_
>>> +#define __PEI_VARIABLE_PPI_H_
>>> +
>>> +#define EDKII_PEI_VARIABLE_PPI_GUID \
>>> +  { \
>>> +    0xe7b2cd04, 0x4b14, 0x44c2, { 0xb7, 0x48, 0xce, 0xaf, 0x2b,
>>> +0x66, 0x4a,
>> 0xb0 } \
>>> +  }
>>> +
>>> +typedef struct _EDKII_PEI_VARIABLE_PPI EDKII_PEI_VARIABLE_PPI;
>>> +
>>> +/**
>>> +  This service retrieves a variable's value using its name and GUID.
>>> +
>>> +  Read the specified variable from the UEFI variable store. If
>>> + the Data  buffer is too small to hold the contents of the
>>> + variable, the error EFI_BUFFER_TOO_SMALL is returned and
>>> + DataSize is set to the  required buffer size to obtain the data.
>>> +
>>> +  @param[in]        This              A pointer to this instance of the
>> EDKII_PEI_VARIABLE_PPI.
>>> +  @param[in]        VariableName      A pointer to a null-terminated string that
>> is the variable's name.
>>> +  @param[in]        VariableGuid      A pointer to an EFI_GUID that is the
>> variable's GUID. The combination of
>>> +                                      VariableGuid and VariableName must be unique.
>>> +  @param[out]       Attributes        If non-NULL, on return, points to the
>> variable's attributes.
>>> +  @param[in, out]   DataSize          On entry, points to the size in bytes of the
>> Data buffer.
>>> +                                      On return, points to the
>>> + size of the data returned in
> Data.
>>> +  @param[out]       Data              Points to the buffer which will hold the
>> returned variable value.
>>> +                                      May be NULL with a zero
>>> + DataSize in order to determine
>> the size of the
>>> +                                      buffer needed.
>>> +
>>> +  @retval EFI_SUCCESS                 The variable was read successfully.
>>> +  @retval EFI_NOT_FOUND               The variable was not found.
>>> +  @retval EFI_BUFFER_TOO_SMALL        The DataSize is too small for the
>> resulting data.
>>> +                                      DataSize is updated with the size required for
>>> +                                      the specified variable.
>>> +  @retval EFI_INVALID_PARAMETER       VariableName, VariableGuid,
>> DataSize or Data is NULL.
>>> +  @retval EFI_DEVICE_ERROR            The variable could not be retrieved
>> because of a device error.
>>> +
>>> +**/
>>> +typedef
>>> +EFI_STATUS
>>> +(EFIAPI *EDKII_PEI_GET_VARIABLE)(
>>> +  IN CONST  EDKII_PEI_VARIABLE_PPI    *This,
>>> +  IN CONST  CHAR16                    *VariableName,
>>> +  IN CONST  EFI_GUID                  *VariableGuid,
>>> +  OUT       UINT32                    *Attributes,
>>
>> [MK] Based on the description, Attributes should be marked "OPTIONAL".
>>
>>> +  IN OUT    UINTN                     *DataSize,
>>> +  OUT       VOID                      *Data OPTIONAL
>>> +  );
>>> +
>>> +/**
>>> +  Return the next variable name and GUID.
>>> +
>>> +  This function is called multiple times to retrieve the
>>> + VariableName  and VariableGuid of all variables currently
>>> + available in the
> system.
>>> +  On each call, the previous results are passed into the
>>> + interface, and, on return, the interface returns the data for
>>> + the next interface. When the entire variable list has been
>>> + returned, EFI_NOT_FOUND is returned.
>>> +
>>
>> [MK] I know other descriptions don't usually have it but it would be
>> nice to describe the initial calling values expected.
>>
>>> +  @param[in]        This              A pointer to this instance of the
>> EDKII_PEI_VARIABLE_PPI.
>>> +  @param[in, out]   VariableNameSize  On entry, points to the size of the
>> buffer pointed to by VariableName.
>>> +                                      On return, the size of the variable name buffer.
>>> +  @param[in, out]   VariableName      On entry, a pointer to a null-
> terminated
>> string that is the variable's name.
>>> +                                      On return, points to the
>>> + next variable's null-terminated
>> name string.
>>> +  @param[in, out]   VariableGuid      On entry, a pointer to an EFI_GUID that
> is
>> the variable's GUID.
>>> +                                      On return, a pointer to the next variable's GUID.
>>> +
>>> +  @retval EFI_SUCCESS                 The variable was read successfully.
>>> +  @retval EFI_NOT_FOUND               The variable could not be found.
>>> +  @retval EFI_BUFFER_TOO_SMALL        The VariableNameSize is too small
> for
>> the resulting
>>> +                                      data. VariableNameSize is updated with the size
>>> +                                      required for the specified variable.
>>> +  @retval EFI_INVALID_PARAMETER       VariableName, VariableGuid or
>>> +                                      VariableNameSize is NULL.
>>> +  @retval EFI_DEVICE_ERROR            The variable could not be retrieved
>> because of a device error.
>>> +
>>> +**/
>>> +typedef
>>> +EFI_STATUS
>>> +(EFIAPI *EDKII_PEI_GET_NEXT_VARIABLE_NAME)(
>>> +  IN CONST  EDKII_PEI_VARIABLE_PPI    *This,
>>> +  IN OUT    UINTN                     *VariableNameSize,
>>> +  IN OUT    CHAR16                    *VariableName,
>>> +  IN OUT    EFI_GUID                  *VariableGuid
>>> +  );
>>> +
>>> +/**
>>> +  Sets the value of a variable.
>>> +
>>> +  @param[in]        This              A pointer to this instance of the
>> EDKII_PEI_VARIABLE_PPI.
>>> +  @param[in]        VariableName      A Null-terminated string that is the name
>> of the vendor's variable.
>>> +                                      Each VariableName is unique for each VendorGuid.
>> VariableName must
>>> +                                      contain 1 or more characters.
>>> + If VariableName is an
>> empty string,
>>> +                                      then EFI_INVALID_PARAMETER is returned.
>>> +  @param[in]        VendorGuid        A unique identifier for the vendor.
>>> +  @param[in]        Attributes        Attributes bitmask to set for the variable.
>>> +  @param[in]        DataSize          The size in bytes of the Data buffer. Unless
>> the EFI_VARIABLE_APPEND_WRITE
>>> +                                      attribute is set, a size of
>>> + zero causes the variable to be
>> deleted. When the
>>> +                                      EFI_VARIABLE_APPEND_WRITE
>>> + attribute is set, then a
>> SetVariable() call with a
>>> +                                      DataSize of zero will not
>>> + cause any change to the
>> variable value.
>>> +  @param[in]        Data              The contents for the variable.
>>> +
>>> +  @retval EFI_SUCCESS                 The firmware has successfully stored the
>> variable and its data as
>>> +                                      defined by the Attributes.
>>> +  @retval EFI_INVALID_PARAMETER       An invalid combination of attribute
>> bits, name, and GUID was supplied, or the
>>> +                                      DataSize exceeds the maximum allowed.
>>> +  @retval EFI_INVALID_PARAMETER       VariableName is an empty string.
>>> +  @retval EFI_OUT_OF_RESOURCES        Not enough storage is available to
>> hold the variable and its data.
>>> +  @retval EFI_DEVICE_ERROR            The variable could not be retrieved due
>> to a hardware error.
>>> +  @retval EFI_WRITE_PROTECTED         The variable in question is read-only.
>>> +  @retval EFI_WRITE_PROTECTED         The variable in question cannot be
>> deleted.
>>> +  @retval EFI_SECURITY_VIOLATION      The variable could not be written
> due
>> to EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS,
>>> +                                      or
>> EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS, or
>>> +
>>> + EFI_VARIABLE_ENHANCED_AUTHENTICATED_ACCESS
>> being set. Writing to authenticated
>>> +                                      variables is not supported in the PEI environment.
>> Updates to authenticated
>>> +                                      variables can be requested
>>> + during PEI via the
>> EFI_AUTHENTICATED_VARIABLE_HOB, but
>>> +                                      these updates won't be
>>> + written to non-volatile storage
>> until later in DXE. See
>>> +
>>> + MdeModulePkg/Include/Guid/VariableFormat.h for
>> more details on
>>> +                                      EFI_AUTHENTICATED_VARIABLE_HOB.
>>
>> [MK] I didn't see "EFI_AUTHENTICATED_VARIABLE_HOB" mentioned in
>> VariableFormat.h.
>>
>> [MK] It seems that if a contract for producing and then consuming
>> this HOB is going to be defined between the HOB producer and
>> consumer phase, it should be described in something like the PI Spec.
>>
>>> +  @retval EFI_NOT_FOUND               The variable trying to be updated or
>> deleted was not found.
>>> +
>>> +**/
>>> +typedef
>>> +EFI_STATUS
>>> +(EFIAPI *EDKII_PEI_SET_VARIABLE)(
>>> +  IN CONST  EDKII_PEI_VARIABLE_PPI    *This,
>>> +  IN        CHAR16                    *VariableName,
>>> +  IN        EFI_GUID                  *VendorGuid,
>>> +  IN        UINT32                    Attributes,
>>> +  IN        UINTN                     DataSize,
>>> +  IN        VOID                      *Data
>>> +  );
>>> +
>>> +/**
>>> +  Returns information about the UEFI variables.
>>> +
>>> +  @param[in]        This                          A pointer to this instance of the
>> EDKII_PEI_VARIABLE_PPI.
>>> +  @param[in]        Attributes                    Attributes bitmask to specify the type
>> of variables on
>>> +                                                  which to return information.
>>> +  @param[out]       MaximumVariableStorageSize    On output the maximum
>> size of the storage space
>>> +                                                  available for
>>> + the EFI variables associated with
> the
>>> +                                                  attributes specified.
>>> +  @param[out]       RemainingVariableStorageSize  Returns the remaining
> size
>> of the storage space
>>> +                                                  available for
>>> + the EFI variables associated with
> the
>>> +                                                  attributes specified.
>>> +  @param[out]       MaximumVariableSize           Returns the maximum size of
>> the individual EFI
>>> +                                                  variables
>>> + associated with the attributes
> specified.
>>> +
>>> +  @retval EFI_SUCCESS                             Valid answer returned.
>>> +  @retval EFI_INVALID_PARAMETER                   An invalid combination of
>> attribute bits was supplied
>>> +  @retval EFI_UNSUPPORTED                         The attribute is not supported
> on
>> this platform, and the
>>> +
>>> + MaximumVariableStorageSize,
>>> +
>>> + RemainingVariableStorageSize,
>> MaximumVariableSize
>>> +                                                  are undefined.
>>> +
>>> +**/
>>> +typedef
>>> +EFI_STATUS
>>> +(EFIAPI *EDKII_PEI_QUERY_VARIABLE_INFO)(
>>> +  IN CONST  EDKII_PEI_VARIABLE_PPI    *This,
>>> +  IN        UINT32                    Attributes,
>>> +  OUT       UINT64                    *MaximumVariableStorageSize,
>>> +  OUT       UINT64                    *RemainingVariableStorageSize,
>>> +  OUT       UINT64                    *MaximumVariableSize
>>> +  );
>>> +
>>> +///
>>> +/// PEI Variable Protocol is intended for use as a means
>>
>> [MK] Was "PEI Variable PPI" intended?
>>
>>> +/// to store data in the PEI environment.
>>> +///
>>> +struct _EDKII_PEI_VARIABLE_PPI {
>>> +  EDKII_PEI_GET_VARIABLE            GetVariable;
>>> +  EDKII_PEI_GET_NEXT_VARIABLE_NAME  GetNextVariableName;
>>> +  EDKII_PEI_SET_VARIABLE            SetVariable;
>>> +  EDKII_PEI_QUERY_VARIABLE_INFO     QueryVariableInfo;
>>> +};
>>> +
>>> +extern EFI_GUID  gEdkiiPeiVariablePpiGuid;
>>> +
>>> +#endif
>>> diff --git a/MdeModulePkg/MdeModulePkg.dec
>> b/MdeModulePkg/MdeModulePkg.dec
>>> index 2bcb9f9453..4f4c48b81f 100644
>>> --- a/MdeModulePkg/MdeModulePkg.dec
>>> +++ b/MdeModulePkg/MdeModulePkg.dec
>>> @@ -513,6 +513,9 @@
>>>      gEdkiiPeiCapsuleOnDiskPpiGuid             = { 0x71a9ea61, 0x5a35, 0x4a5d,
>> { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } }
>>>      gEdkiiPeiBootInCapsuleOnDiskModePpiGuid   = { 0xb08a11e4, 0xe2b7,
>> 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1  } }
>>>
>>> +  ## Include/Ppi/Variable.h
>>> +  gEdkiiPeiVariablePpiGuid                  = { 0xe7b2cd04, 0x4b14, 0x44c2, { 0xb7,
>> 0x48, 0xce, 0xaf, 0x2b, 0x66, 0x4a, 0xb0 } }
>>> +
>>>    [Protocols]
>>>      ## Load File protocol provides capability to load and unload
>>> EFI image into
>> memory and execute it.
>>>      #  Include/Protocol/LoadPe32Image.h
>>
>>
>>
>>








-- 

                                                 Brian

--------------------------------------------------------------------

   "Not to find even more ways of saving time, but to look for ways to
    spend it"
        -- The secret to "celebrating the sidelines of life" - Adair Lara


  parent reply	other threads:[~2022-06-22 19:54 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-06-10  1:17 [PATCH V1 0/1] Add EDKII_PEI_VARIABLE_PPI Nate DeSimone
2022-06-10  1:17 ` [PATCH V1 1/1] MdeModulePkg: Add Definition of EDKII_PEI_VARIABLE_PPI Nate DeSimone
2022-06-10  1:59   ` [edk2-devel] " Michael Kubacki
2022-06-10  2:07     ` Michael Kubacki
2022-06-10 16:56     ` Yao, Jiewen
2022-06-10 21:48       ` Nate DeSimone
2022-06-11  1:09         ` Yao, Jiewen
2022-06-11  1:14           ` Michael Kubacki
2022-06-13 21:31           ` Nate DeSimone
2022-06-14 10:44             ` Albecki, Mateusz
2022-06-22 19:51             ` Brian J. Johnson [this message]
2022-06-22 21:02               ` Michael Kubacki
2022-06-10 21:20     ` Nate DeSimone

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0b274bdc-e9dc-3808-21bb-9cf488fcd195@hpe.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox