From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com [40.107.237.77]) by mx.groups.io with SMTP id smtpd.web10.21333.1674061302048401353 for ; Wed, 18 Jan 2023 09:01:42 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@amd.com header.s=selector1 header.b=Zx3lXfOV; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.237.77, mailfrom: abdullateef.attar@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R3H2vXMIYHlDzRhLpkAni5E9Sm3bsteoPJTQ/PmqgSEUkz3XiFe9ozWyvYBIbXXyjh1hszCyBx5/MBWCQPJevKOGNyfKRx+1flpiwEh56b0BhqBLauj3aqWaGAHr5sIa23v9dzUW6+26HvQ21WTv6yZnrKijN/FieenJWlY3M3okZw7N9Hc29Olf1RmLqvUDsUpADCIfzkDB18TzRZW+eD176XGVsGAMcMGaGpGW31FyNrpRgo+I2I9VwpcrnvtojjB4rVnWDfeBDMz9fwttOX/oZkQ/9BEzE5thYN1ul7NKl2ol/QyKY5/cffOgYV8Woz8KvPtM29567lxACcXCow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OcsJ0/bJqWzuNHmpRO3pWjdBHWX71orpgiObCpEmjo0=; b=VdB87OgftoM2NC7qq+GDWA0KjNsEsJvh7GKKYmSoTcvKFBlwWQ3WidnWZWUnUHZu+naeW1Ndn7IZnReC9uikSuTv8YfwBVrcLxVxQBjRP2v3HSjEQgMtf30OJp5297vEHVAkbMenJ5eiRjfM/GOKKZQDcAft91RuiV8ytiZNn2Uf/a4DVdIy5Bp0JCbsRsmpR1iWvrPEsxUjQuu8Sy3AduoC7RJEm6JCMA3Gspn7gA++lIoM2JaAvED4PBKm2suZCqhvmipHf1Ax++6ZaU9beyuOxm1sXm7lqgXu6XCeb8SSLWpD799dbzRVD6fQZcB8Kw+RJixb7IcCorgL6ikG3w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OcsJ0/bJqWzuNHmpRO3pWjdBHWX71orpgiObCpEmjo0=; b=Zx3lXfOVdyuPxZ8qkJ/cWYaHtroK6QPsQVc/3DfnjWsO9JD8MeqX7GhFjQtSQwcJJLe54pguBgpOLPBgCgjr3wxBXb1RVXmEec2V0YfrDwXamSIG+Sl/u6/sB00EXsm0C0RFwSOSVDvcL6ORARThs3Y4uWu+WGF9egHkmKh/h+Q= Received: from MW4PR04CA0349.namprd04.prod.outlook.com (2603:10b6:303:8a::24) by IA1PR12MB8192.namprd12.prod.outlook.com (2603:10b6:208:3f9::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6002.13; Wed, 18 Jan 2023 17:01:39 +0000 Received: from CO1NAM11FT006.eop-nam11.prod.protection.outlook.com (2603:10b6:303:8a:cafe::b9) by MW4PR04CA0349.outlook.office365.com (2603:10b6:303:8a::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6002.19 via Frontend Transport; Wed, 18 Jan 2023 17:01:38 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CO1NAM11FT006.mail.protection.outlook.com (10.13.174.246) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6002.13 via Frontend Transport; Wed, 18 Jan 2023 17:01:38 +0000 Received: from SATLEXMB07.amd.com (10.181.41.45) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Wed, 18 Jan 2023 11:01:37 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB07.amd.com (10.181.41.45) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Wed, 18 Jan 2023 09:01:26 -0800 Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Wed, 18 Jan 2023 11:01:24 -0600 From: "Abdul Lateef Attar" To: CC: Abdul Lateef Attar , Abner Chang , Garrett Kirkendall , "Paul Grimes" , Eric Dong , Ray Ni , Rahul Kumar Subject: [PATCH v3 4/6] UefiCpuPkg/SmmCpuFeaturesLib: Restructure arch-dependent code Date: Wed, 18 Jan 2023 22:31:06 +0530 Message-ID: <9ba1dc9ff9a63abab8d8dc9fabb67662c8fc20b6.1674060385.git.abdattar@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Return-Path: AbdulLateef.Attar@amd.com X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1NAM11FT006:EE_|IA1PR12MB8192:EE_ X-MS-Office365-Filtering-Correlation-Id: c614e70b-f0ea-40ca-ec72-08daf975aa01 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: fudVopGG+C/r1qP5fmzkvu6xHYehQPVPggYQvINh3bNBThsAa3r0ET8gPbN1eVIWEiS5RvqfTDVawEUf2swOR4hMN/yCVFoj9GNY1qKjLnHL1lNDjiI9rQxVUkbGaj3KfK9Hz4b79TnmWDAnFjm2JZ1TF5MXfVN4aoVgVHSoVkJ0N7QGwuTPqw1+oz6ZxcvTqmptFUHf91oEmQ7j7dCGvv7VsDVvPxKw5yeeIAK/RVBC7rh6HyIz6EC4LHMYIUTrxwxz30nbBW6vXCF/P6DNySGqVRUkdrP6SObWxhyATS5EE32tLr9iBeHd4ltHev1rxIdN9VhtXLFQQXEwn+TVE2evMFl4AxoFXZpssvwpzklOuN3uykhe9S0gUMRM07sC1W/sW4Opi/BZYINQCRxyN3mabNYNg06pAIR/JEFBO7WjepIp24vA0XJkM7fNmPkQiH7kxVpxSXyHzdm1qC9C+kAcCEv2Z9WSOwWYRP98nJzDzwg0ksHNeX0dqgBIPOgz3SXIpS7W6sjDyvuv5uGWEQAujZSzrCpZX66YCiUGE85ojmDH1rnvl8wW/tOCAE14Ktrz5lDyyUNbdbq2T1VqoCc2XR7o3sf2JccDMcQxkowLG44fHeIzDjWLwfDCejP3J2T2TTiXp6iE2ETQf7zfMYdF2ywbM6MWnmdLgaIA61WfkGzsdhaZCckT1eE52ZeFszVow3gcxwJljmKbX8mFhPIlxiBZWVK+21l6yNaPe++XkONyxs7VNmQT841BxDFAWEbYyKL7jVnogRVLnCvPaA== X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(39860400002)(376002)(396003)(136003)(346002)(451199015)(40470700004)(46966006)(36840700001)(26005)(356005)(426003)(54906003)(186003)(7696005)(966005)(2906002)(8676002)(6916009)(336012)(4326008)(2616005)(47076005)(82310400005)(36756003)(19627235002)(316002)(40480700001)(83380400001)(41300700001)(81166007)(8936002)(30864003)(70586007)(70206006)(478600001)(5660300002)(82740400003)(6666004)(36860700001)(40460700003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Jan 2023 17:01:38.3214 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c614e70b-f0ea-40ca-ec72-08daf975aa01 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT006.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB8192 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain From: Abdul Lateef Attar BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4182 moves Intel-specific code to the arch-dependent file. Other processor families might have different implementation of these functions. Hence, moving out of the common file. Cc: Abner Chang Cc: Garrett Kirkendall Cc: Paul Grimes Cc: Eric Dong Cc: Ray Ni Cc: Rahul Kumar Signed-off-by: Abdul Lateef Attar --- .../IntelSmmCpuFeaturesLib.c | 128 ++++++++++++++++++ .../SmmCpuFeaturesLibCommon.c | 128 ------------------ 2 files changed, 128 insertions(+), 128 deletions(-) diff --git a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c = b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c index d5eaaa7a991e..33b1ddf8cfa9 100644 --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c @@ -400,3 +400,131 @@ SmmCpuFeaturesSetSmmRegister ( AsmWriteMsr64 (SMM_FEATURES_LIB_SMM_FEATURE_CONTROL, Value);=0D }=0D }=0D +=0D +/**=0D + This function updates the SMRAM save state on the currently executing CP= U=0D + to resume execution at a specific address after an RSM instruction. Thi= s=0D + function must evaluate the SMRAM save state to determine the execution m= ode=0D + the RSM instruction resumes and update the resume execution address with= =0D + either NewInstructionPointer32 or NewInstructionPoint. The auto HALT re= start=0D + flag in the SMRAM save state must always be cleared. This function retu= rns=0D + the value of the instruction pointer from the SMRAM save state that was= =0D + replaced. If this function returns 0, then the SMRAM save state was not= =0D + modified.=0D +=0D + This function is called during the very first SMI on each CPU after=0D + SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution mo= de=0D + to signal that the SMBASE of each CPU has been updated before the defaul= t=0D + SMBASE address is used for the first SMI to the next CPU.=0D +=0D + @param[in] CpuIndex The index of the CPU to hook. The v= alue=0D + must be between 0 and the NumberOfCp= us=0D + field in the System Management Syste= m Table=0D + (SMST).=0D + @param[in] CpuState Pointer to SMRAM Save State Map for = the=0D + currently executing CPU.=0D + @param[in] NewInstructionPointer32 Instruction pointer to use if resumi= ng to=0D + 32-bit execution mode from 64-bit SM= M.=0D + @param[in] NewInstructionPointer Instruction pointer to use if resumi= ng to=0D + same execution mode as SMM.=0D +=0D + @retval 0 This function did modify the SMRAM save state.=0D + @retval > 0 The original instruction pointer value from the SMRAM save = state=0D + before it was replaced.=0D +**/=0D +UINT64=0D +EFIAPI=0D +SmmCpuFeaturesHookReturnFromSmm (=0D + IN UINTN CpuIndex,=0D + IN SMRAM_SAVE_STATE_MAP *CpuState,=0D + IN UINT64 NewInstructionPointer32,=0D + IN UINT64 NewInstructionPointer=0D + )=0D +{=0D + return 0;=0D +}=0D +=0D +/**=0D + Read an SMM Save State register on the target processor. If this functi= on=0D + returns EFI_UNSUPPORTED, then the caller is responsible for reading the= =0D + SMM Save Sate register.=0D +=0D + @param[in] CpuIndex The index of the CPU to read the SMM Save State. = The=0D + value must be between 0 and the NumberOfCpus field= in=0D + the System Management System Table (SMST).=0D + @param[in] Register The SMM Save State register to read.=0D + @param[in] Width The number of bytes to read from the CPU save stat= e.=0D + @param[out] Buffer Upon return, this holds the CPU register value rea= d=0D + from the save state.=0D +=0D + @retval EFI_SUCCESS The register was read from Save State.=0D + @retval EFI_INVALID_PARAMETER Buffer is NULL.=0D + @retval EFI_UNSUPPORTED This function does not support reading Reg= ister.=0D +=0D +**/=0D +EFI_STATUS=0D +EFIAPI=0D +SmmCpuFeaturesReadSaveStateRegister (=0D + IN UINTN CpuIndex,=0D + IN EFI_SMM_SAVE_STATE_REGISTER Register,=0D + IN UINTN Width,=0D + OUT VOID *Buffer=0D + )=0D +{=0D + return EFI_UNSUPPORTED;=0D +}=0D +=0D +/**=0D + Writes an SMM Save State register on the target processor. If this func= tion=0D + returns EFI_UNSUPPORTED, then the caller is responsible for writing the= =0D + SMM Save Sate register.=0D +=0D + @param[in] CpuIndex The index of the CPU to write the SMM Save State. = The=0D + value must be between 0 and the NumberOfCpus field = in=0D + the System Management System Table (SMST).=0D + @param[in] Register The SMM Save State register to write.=0D + @param[in] Width The number of bytes to write to the CPU save state.= =0D + @param[in] Buffer Upon entry, this holds the new CPU register value.= =0D +=0D + @retval EFI_SUCCESS The register was written to Save State.=0D + @retval EFI_INVALID_PARAMETER Buffer is NULL.=0D + @retval EFI_UNSUPPORTED This function does not support writing Reg= ister.=0D +**/=0D +EFI_STATUS=0D +EFIAPI=0D +SmmCpuFeaturesWriteSaveStateRegister (=0D + IN UINTN CpuIndex,=0D + IN EFI_SMM_SAVE_STATE_REGISTER Register,=0D + IN UINTN Width,=0D + IN CONST VOID *Buffer=0D + )=0D +{=0D + return EFI_UNSUPPORTED;=0D +}=0D +=0D +/**=0D + Check to see if an SMM register is supported by a specified CPU.=0D +=0D + @param[in] CpuIndex The index of the CPU to check for SMM register supp= ort.=0D + The value must be between 0 and the NumberOfCpus fi= eld=0D + in the System Management System Table (SMST).=0D + @param[in] RegName Identifies the SMM register to check for support.=0D +=0D + @retval TRUE The SMM register specified by RegName is supported by the= CPU=0D + specified by CpuIndex.=0D + @retval FALSE The SMM register specified by RegName is not supported by= the=0D + CPU specified by CpuIndex.=0D +**/=0D +BOOLEAN=0D +EFIAPI=0D +SmmCpuFeaturesIsSmmRegisterSupported (=0D + IN UINTN CpuIndex,=0D + IN SMM_REG_NAME RegName=0D + )=0D +{=0D + if (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName =3D=3D SmmReg= FeatureControl)) {=0D + return TRUE;=0D + }=0D +=0D + return FALSE;=0D +}=0D diff --git a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c= b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c index 5498fda38da4..cbf4b495185b 100644 --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c @@ -17,49 +17,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent =0D #include "CpuFeaturesLib.h"=0D =0D -/**=0D - This function updates the SMRAM save state on the currently executing CP= U=0D - to resume execution at a specific address after an RSM instruction. Thi= s=0D - function must evaluate the SMRAM save state to determine the execution m= ode=0D - the RSM instruction resumes and update the resume execution address with= =0D - either NewInstructionPointer32 or NewInstructionPoint. The auto HALT re= start=0D - flag in the SMRAM save state must always be cleared. This function retu= rns=0D - the value of the instruction pointer from the SMRAM save state that was= =0D - replaced. If this function returns 0, then the SMRAM save state was not= =0D - modified.=0D -=0D - This function is called during the very first SMI on each CPU after=0D - SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution mo= de=0D - to signal that the SMBASE of each CPU has been updated before the defaul= t=0D - SMBASE address is used for the first SMI to the next CPU.=0D -=0D - @param[in] CpuIndex The index of the CPU to hook. The v= alue=0D - must be between 0 and the NumberOfCp= us=0D - field in the System Management Syste= m Table=0D - (SMST).=0D - @param[in] CpuState Pointer to SMRAM Save State Map for = the=0D - currently executing CPU.=0D - @param[in] NewInstructionPointer32 Instruction pointer to use if resumi= ng to=0D - 32-bit execution mode from 64-bit SM= M.=0D - @param[in] NewInstructionPointer Instruction pointer to use if resumi= ng to=0D - same execution mode as SMM.=0D -=0D - @retval 0 This function did modify the SMRAM save state.=0D - @retval > 0 The original instruction pointer value from the SMRAM save = state=0D - before it was replaced.=0D -**/=0D -UINT64=0D -EFIAPI=0D -SmmCpuFeaturesHookReturnFromSmm (=0D - IN UINTN CpuIndex,=0D - IN SMRAM_SAVE_STATE_MAP *CpuState,=0D - IN UINT64 NewInstructionPointer32,=0D - IN UINT64 NewInstructionPointer=0D - )=0D -{=0D - return 0;=0D -}=0D -=0D /**=0D Hook point in normal execution mode that allows the one CPU that was ele= cted=0D as monarch during System Management Mode initialization to perform addit= ional=0D @@ -90,91 +47,6 @@ SmmCpuFeaturesRendezvousExit ( {=0D }=0D =0D -/**=0D - Check to see if an SMM register is supported by a specified CPU.=0D -=0D - @param[in] CpuIndex The index of the CPU to check for SMM register supp= ort.=0D - The value must be between 0 and the NumberOfCpus fi= eld=0D - in the System Management System Table (SMST).=0D - @param[in] RegName Identifies the SMM register to check for support.=0D -=0D - @retval TRUE The SMM register specified by RegName is supported by the= CPU=0D - specified by CpuIndex.=0D - @retval FALSE The SMM register specified by RegName is not supported by= the=0D - CPU specified by CpuIndex.=0D -**/=0D -BOOLEAN=0D -EFIAPI=0D -SmmCpuFeaturesIsSmmRegisterSupported (=0D - IN UINTN CpuIndex,=0D - IN SMM_REG_NAME RegName=0D - )=0D -{=0D - if (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName =3D=3D SmmReg= FeatureControl)) {=0D - return TRUE;=0D - }=0D -=0D - return FALSE;=0D -}=0D -=0D -/**=0D - Read an SMM Save State register on the target processor. If this functi= on=0D - returns EFI_UNSUPPORTED, then the caller is responsible for reading the= =0D - SMM Save Sate register.=0D -=0D - @param[in] CpuIndex The index of the CPU to read the SMM Save State. = The=0D - value must be between 0 and the NumberOfCpus field= in=0D - the System Management System Table (SMST).=0D - @param[in] Register The SMM Save State register to read.=0D - @param[in] Width The number of bytes to read from the CPU save stat= e.=0D - @param[out] Buffer Upon return, this holds the CPU register value rea= d=0D - from the save state.=0D -=0D - @retval EFI_SUCCESS The register was read from Save State.=0D - @retval EFI_INVALID_PARAMETER Buffer is NULL.=0D - @retval EFI_UNSUPPORTED This function does not support reading Reg= ister.=0D -=0D -**/=0D -EFI_STATUS=0D -EFIAPI=0D -SmmCpuFeaturesReadSaveStateRegister (=0D - IN UINTN CpuIndex,=0D - IN EFI_SMM_SAVE_STATE_REGISTER Register,=0D - IN UINTN Width,=0D - OUT VOID *Buffer=0D - )=0D -{=0D - return EFI_UNSUPPORTED;=0D -}=0D -=0D -/**=0D - Writes an SMM Save State register on the target processor. If this func= tion=0D - returns EFI_UNSUPPORTED, then the caller is responsible for writing the= =0D - SMM Save Sate register.=0D -=0D - @param[in] CpuIndex The index of the CPU to write the SMM Save State. = The=0D - value must be between 0 and the NumberOfCpus field = in=0D - the System Management System Table (SMST).=0D - @param[in] Register The SMM Save State register to write.=0D - @param[in] Width The number of bytes to write to the CPU save state.= =0D - @param[in] Buffer Upon entry, this holds the new CPU register value.= =0D -=0D - @retval EFI_SUCCESS The register was written to Save State.=0D - @retval EFI_INVALID_PARAMETER Buffer is NULL.=0D - @retval EFI_UNSUPPORTED This function does not support writing Reg= ister.=0D -**/=0D -EFI_STATUS=0D -EFIAPI=0D -SmmCpuFeaturesWriteSaveStateRegister (=0D - IN UINTN CpuIndex,=0D - IN EFI_SMM_SAVE_STATE_REGISTER Register,=0D - IN UINTN Width,=0D - IN CONST VOID *Buffer=0D - )=0D -{=0D - return EFI_UNSUPPORTED;=0D -}=0D -=0D /**=0D This function is hook point called after the gEfiSmmReadyToLockProtocolG= uid=0D notification is completely processed.=0D --=20 2.25.1