From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web12.1725.1643843400250822447 for ; Wed, 02 Feb 2022 15:10:00 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=irMzh1Gj; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643843400; x=1675379400; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=HmtjWQ5j0SC4c0ZT7g2V7BnzjnxdNKjBn30gyhOI1cM=; b=irMzh1Gj3P4mkco9uaXwGSsQLvy8kuu8ljPnqhnJHrSzXb5CMLxLmx9R OHHLwVlQPF6Z2Ac4WG2NBrpeAuNWnC5lcO/Qq94rcXLTXKq/SBfTmQFbL Mz0yOlp9LbTA90JP9P4yEHgWGA9CWBwwi3YR3fxeMwg0LJEYcpY/Ql2Ln vZ51HwMV5jkQNBFSIcDY28eMARFzV6evWRuOscJFNcJdD4KbaDm9FS3RP OuQw3WVQlITNt8zLm5i7Ik8MDewXFAiEmJwmynpL8vVQdHOccWExfzwTO +hhbaqP9AvTVHVUqw2Tfd700XEHO5VCGskhoJYE1MPeMPDyO6J6vUg4tn A==; X-IronPort-AV: E=McAfee;i="6200,9189,10246"; a="245634356" X-IronPort-AV: E=Sophos;i="5.88,338,1635231600"; d="scan'208";a="245634356" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2022 15:09:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,338,1635231600"; d="scan'208";a="631147928" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga004.jf.intel.com with ESMTP; 02 Feb 2022 15:09:58 -0800 Received: from orsmsx612.amr.corp.intel.com (10.22.229.25) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Wed, 2 Feb 2022 15:09:58 -0800 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx612.amr.corp.intel.com (10.22.229.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Wed, 2 Feb 2022 15:09:58 -0800 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.102) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Wed, 2 Feb 2022 15:09:57 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Rn+ZAMfmx0LS/DLA07MrOpJSHoP0JBIKRydv7ZMi2ggmOUh6cHqcAWbjjKUjKYwzZxpay+cbRVaks+xj1PZts3yF9kbyc5gXbHbKzAtlk4odzSiYQaT6Q64pgEivYt9aTs8AQRr9wLc3wYrRCy4BOLI1KOnbVkr0gLPmRijtl6h3z5bqKEqDfWq7IFCF48DUDyXVAI4VSrfoe6I1GPyAkjKqw7ZDhZl/TY1buSn7tydQeBqwZ84bLdLpg3aLK7LfBSrfvVlJe9N4yio0zu8OrGRb4+IW6x8m8lx0zjqPSpQ34aY7u7T+gdkn4VVImjkHl6+zaZcyH0UstWbIgLLVDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Tv7kPdrHGXlmTRir0WaPuOXuPb3oAMs2NG1/Lp2GZtk=; b=WnGMl5I5HG8F79IQXnj9492kScAP1oULflUyTo9dIi8irE9el3SJfFgUpf6OOHd70TRS6PowTrSFK9IB/QBUunCpbJoIJkzIM2NhKxyVkHiIMchpsJybp/6Cy4EFjsh+T59j3Qw49VnScTHMyRxWVptHP0sByhPgPBHiiqbIy3l9cAnKYYbioRyRt0X6tdIPysHKVTM7RwUV4p81Skch+4+uY9kw2XMMbxQL8Kx0HeyjGH9LMsVICkTo2YRSuXK6Rw4mUJb3AyjK5ngby4/xtkm4+gEK8ASzBeFvNIhPD+V5KCUwP4DcZkWguO6tb4dhKtPXhFF/oiR/6drjMv+YVw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by SJ0PR11MB5789.namprd11.prod.outlook.com (2603:10b6:a03:424::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.11; Wed, 2 Feb 2022 23:09:54 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf%7]) with mapi id 15.20.4930.022; Wed, 2 Feb 2022 23:09:54 +0000 From: "Guo Dong" To: "devel@edk2.groups.io" , "Dong, Guo" , "Rhodes, Sean" Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Topic: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Index: AQHYGATbdgXZAz2BAEeSGeVP0O6ql6yA4oPQgAABMaA= Date: Wed, 2 Feb 2022 23:09:54 +0000 Message-ID: References: <16D01AB93063E02C.13770@groups.io> In-Reply-To: <16D01AB93063E02C.13770@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 8a9e4505-5a49-4e80-c5d3-08d9e6a11faa x-ms-traffictypediagnostic: SJ0PR11MB5789:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:2150; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: uQASE3KBxdBkqQ+zo4LxJDieZBL78egD8djbE0RO7M35fAuQ/wRFOnthntp7vOQ/fGcVK+EgDyXSmiw9jUH0nDP7hym5/BZWx6NlUYV5Z0/cYnxIGZYq0dhIddmIsSsKPWsQdIHxuy+9X9o4YaoWTNAxiA0OCop+aut585y4Hhl6/31vXed1jkHwJ2TlhWoYRzeROdLIPn76cx6Zm6fUfhQPrD7AyGsbpvEwuyVQwxYCFPElynY4rU7qpO8CHDvz2kLhWgaLCfojkp3SLTl/DzHhdPGiZL894I51/ekO3K915j3xpuJDo6MrkLvjLr9PPf/xFcFS0BCkVj8vutvZ2+8YWrzDzZ3Rwililany/iDWYG5oJF4h69ZP47TVKqrooaMs6/Eu0AA5/tQY4pnoM1bpu5gHxRhMBYMCmYMjYbo9GbkGrcEw8xfLDT6w/kZCHXhuKKqqrP5w4NfTk2SBx5bw0fZIpIeIxDrKKJWE4np8vo9slKPK82d30ql6gOg4zjLgMCUDULfk7N0MYHIzlrA200OsGUx4cqlK60gUxFSImC20ZsTNYnaL60G5y68uvohntVS0sb3cKqYsm+PdQ3yMVDVvpWYCCxFL3/IInhyqxQwUQ+iZBtip6tHeCe2DfOMJ0ESW6W/zjp18gCZ7IG/4uJQJVzCcBQatevsW3yJF3xlw46uEsGHF17Up1BGefBapxMRCvdf58upu1gtjbLppfUN/s1Iee29BZoPBYyWVSSyOPqWE14N5mSZv9Xv3PazejL2MPmweCPk+H3qRnWGZ/h4StRh0xe7ErWWy1IonlhmYLtGMpb8MueDv+mS6/0j6jXBX6mTooWPI1yfOmw== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(52536014)(5660300002)(316002)(76116006)(8936002)(64756008)(66556008)(66476007)(8676002)(38100700002)(122000001)(33656002)(110136005)(86362001)(55016003)(66446008)(38070700005)(7696005)(9686003)(2906002)(82960400001)(53546011)(6506007)(966005)(71200400001)(508600001)(83380400001)(186003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?lXRYIvOCxVlmULxP9ZgmV4uXKdpQ6sYvE6yZWqRLkPzkkphwvAsTJ7EeXvWe?= =?us-ascii?Q?+0ThQBc6HWhl+T0xeF5c+ZYug15RO9jPRzYayTVzTlofNDP4pG2CEJt/q0gj?= =?us-ascii?Q?OzdiWYLuoGQQrG+0f7t872EtzPegfrV9KIBdtAjJkV6z3M/ViUkGv/ahHDBL?= =?us-ascii?Q?8xSHLTiCK8xTYN6mZn9f5qiWn89kVp/3h7U+9BNFeEdyosqzD+uhiWJwjULF?= =?us-ascii?Q?HPf35s7xPxMtFr84cYmTuJeKWq50kz46N/Zd7fMO+Bw6suDLOzlIWBAZpBU0?= =?us-ascii?Q?+ZEbe3r1BP+NiruTlW93NkU0yxILNbzLZ+bOlgwWBicUF8K3HkS39HeRT/Kf?= =?us-ascii?Q?SvqeqO8dFP8rsL/pih6wXYZ8a6CrFWv6Hd23KO64TNYvTva3zf00CYeSA0id?= =?us-ascii?Q?oaMXf57Siv+pg4tDFnYKWjWtbs8S1yAM0vQnpoqKHIFNMflMRjFG4Nk/XZk+?= =?us-ascii?Q?u0ZuuM56PfTHBLna8mjVHz9RTO5uy2fl4LYkLSUBboqU98TZGmum/R+jur9t?= =?us-ascii?Q?GVvzpb8WcvS4uqg3EEIUwMujf5hEaFTlEkFPIx3i8dnzV2nzOBXPF/C6SHFr?= =?us-ascii?Q?nvfdy+WQsTw7IpoC83+v5UjHL2LVf94RVQtru0anxaRhbK0ve8JN1F9UsoyC?= =?us-ascii?Q?sITI6pi32cbEwMn/4UCeQN2KOAczY/+6CTiQAAmPp6EG9rEiu35gwhLllp8M?= =?us-ascii?Q?j3n5WBW0PEmbD7+XT9NlwAdnI39ti0jrgSFVA2aPcc/BfsVvJWd/s2V6NDw5?= =?us-ascii?Q?DNtqUOma2KzKrWzlCwGiT0NPDl3xp3UdwKs1UT0Cgn1SHTKrP8LkVDSHhWjV?= =?us-ascii?Q?SyKoG/V/Am/WZUuXVu8yFbqYDVzYwWwJ+TuYS0ZjT+wEAfyc7G4lASsJEWNk?= =?us-ascii?Q?j3FLx3UE8+3hgpJJM+F+O0wGyHXTWSgx7y2uzwyGumcHTfrMO4dHOmfSrImg?= =?us-ascii?Q?XGpsCk88tkI76w3y7TC4c0At7RB/x3IGiF6yW74HX/wZrGu8rckfED3A7Wk3?= =?us-ascii?Q?k5ZS4NLzxIkBENow6IlpH5gsHegevLmzxeEIW0Su2HJAsoRsC5SIydvZpRO4?= =?us-ascii?Q?1rrU8LM5KlRQUKiC2xVnVtPWfCWfSbxU1bVZGGGu6ag3nG1QyCyyGk9uGYxt?= =?us-ascii?Q?2hDWE8Gz+hDBNsgJrmVsC2iKZXZrxAQp9aqfsX2fIzATCBAC7l3KPeHZspuN?= =?us-ascii?Q?Q6PqPr1PzyQF0XAiXIft7wIBc+YYnOPkw0N03nKwaYj9kGDz9olLreHEaykM?= =?us-ascii?Q?Y6kleJIL/qrHGDcj8LcU/0+wNp9n1CoC2CtUOdt23CRvQi/IQ/l9+SRoSiHs?= =?us-ascii?Q?hl9/4AHJm1lJ0uc68+SNF5zbffCIdQuHnfWP8mvRqGYHOaEQ7q1exQU38Bgz?= =?us-ascii?Q?nHJo187v1uoAPkHHPJhbfFAGFulK00U6k5hKjC3Mj1LJOXl20DjA/r/6esnN?= =?us-ascii?Q?KEKUvWtIKxY9OQ8h/uwdnkl144kqUPyAhSH1A5CE8s3YSRWRJORPUGTq/ora?= =?us-ascii?Q?f5s0uuVUF19K8UrNSNjN0tUSv3Dgz9IzNPOcFed1OW0E+tlvo6EVrpveV/I0?= =?us-ascii?Q?MNkCnNqcQJNlq9P4UjuWPk1AG6DFcE4fMJr88U5NzDfTVEKtXMB+ZsS9Gvm+?= =?us-ascii?Q?ob11oZXP4EU8lNQ1rfNU/PsPFo9PFRNo0cKrXuK2YIQ1fvCxLJa5BtUlJaBV?= =?us-ascii?Q?HZRNKRkXv08AsTwT+DrkodUI4f4=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8a9e4505-5a49-4e80-c5d3-08d9e6a11faa X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Feb 2022 23:09:54.3950 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: wWHcOJB/s7P/GI3xWquOP/ulpPwKZPr/MMiOCcGd0DcHFjdIkp4X00876QR1bGQqibisAunjkx+nNCfYLh7Q4w== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5789 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I mean missing gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut |$ (PLATFORM= _BOOT_TIMEOUT) -----Original Message----- From: devel@edk2.groups.io On Behalf Of Guo Dong Sent: Wednesday, February 2, 2022 4:07 PM To: devel@edk2.groups.io; Rhodes, Sean Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key con= figurable + DEFINE PLATFORM_BOOT_TIMEOUT =3D 3 It looks you missed the change to gEfiMdePkgTokenSpaceGuid using PLATFORM_B= OOT_TIMEOUT. Thanks, Guo -----Original Message----- From: devel@edk2.groups.io On Behalf Of Sean Rhodes Sent: Wednesday, February 2, 2022 12:16 AM To: devel@edk2.groups.io Cc: Dong, Guo ; Rhodes, Sean Subject: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configu= rable Provide a build option to use [Esc] instead of [F2] for devices such as Chr= omebooks that don't have F-keys. Signed-off-by: Sean Rhodes --- .../PlatformBootManager.c | 44 +++++++++++++------ .../PlatformBootManagerLib.inf | 1 + UefiPayloadPkg/UefiPayloadPkg.dec | 3 ++ UefiPayloadPkg/UefiPayloadPkg.dsc | 4 ++ 4 files changed, 39 insertions(+), 13 deletions(-) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a8ead775ea..0eb577313a 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -164,7 +164,7 @@ PlatformBootManagerBeforeConsole ( ) { EFI_INPUT_KEY Enter;- EFI_INPUT_KEY = F2;+ EFI_INPUT_KEY CustomKey; EFI_INPUT_KEY = Down; EFI_BOOT_MANAGER_LOAD_OPTION BootOption; EFI_STATUS = Status;@@ -186,13 +186,22 @@ PlatformBootManagerBeforeConsole= ( Enter.UnicodeChar =3D CHAR_CARRIAGE_RETURN; EfiBootManagerRegisterCont= inueKeyOption (0, &Enter, NULL); - //- // Map F2 to Boot Manager Menu- /= /- F2.ScanCode =3D SCAN_F2;- F2.UnicodeChar =3D CHAR_NULL;+ if (Fixed= PcdGetBool (PcdBootManagerEscape)) {+ //+ // Map Esc to Boot Manager = Menu+ //+ CustomKey.ScanCode =3D SCAN_ESC;+ CustomKey.UnicodeCh= ar =3D CHAR_NULL;+ } else {+ //+ // Map Esc to Boot Manager Menu+ = //+ CustomKey.ScanCode =3D SCAN_F2;+ CustomKey.UnicodeChar =3D CH= AR_NULL;+ }+ EfiBootManagerGetBootManagerMenu (&BootOption);- EfiBootMa= nagerAddKeyOptionVariable (NULL, (UINT16)BootOption.OptionNumber, 0, &F2, N= ULL);+ EfiBootManagerAddKeyOptionVariable (NULL, (UINT16)BootOption.Option= Number, 0, &CustomKey, NULL); // // Also add Down key to Boot Manager = Menu since some serial terminals don't support F2 key.@@ -251,12 +260,21 @@= PlatformBootManagerAfterConsole ( // PlatformRegisterFvBootOption (PcdGetPtr (PcdShellFile), L"UEFI Shel= l", LOAD_OPTION_ACTIVE); - Print (- L"\n"- L"F2 or Down to ente= r Boot Manager Menu.\n"- L"ENTER to boot directly.\n"- L"\n= "- );+ if (FixedPcdGetBool (PcdBootManagerEscape)) {+ Print (+ = L"\n"+ L"Esc or Down to enter Boot Manager Menu.\n"+ L"ENTER= to boot directly.\n"+ L"\n"+ );+ } else {+ Print (= + L"\n"+ L"F2 or Down to enter Boot Manager Menu.\n"+ L= "ENTER to boot directly.\n"+ L"\n"+ );+ } } /**diff -= -git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf index 9c4a9da943..80390e0d98 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -73,3 +73,4 @@ gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity gEfiMdePkgTokenSpaceGuid= .PcdUartDefaultStopBits gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenu= File+ gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscapediff --git a/UefiP= ayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayloadPkg.dec index 551f0a4915..f2fcdf6a74 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -83,6 +83,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSi= ze|0x04000000|UINT32|0x gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x72, 0xcf, 0x80, = 0xab, 0x87, 0xf9, 0x47, 0xa3, 0xfe, 0xD5, 0x0B, 0x76, 0xd8, 0x95, 0x41 }|VO= ID*|0x00000018 +# Boot Manager Key+gUefiPayloadPkgTokenSpaceGuid.PcdBootMan= agerEscape|FALSE|BOOLEAN|0x00000020+ ## FFS filename to find the default va= riable initial data file. # @Prompt FFS Name of variable initial data file = gUefiPayloadPkgTokenSpaceGuid.PcdNvsDataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0x= 42, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xdb, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOID= *|0x00000025diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg= /UefiPayloadPkg.dsc index 1ce96a51c1..5e1892458e 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -33,6 +33,8 @@ DEFINE UNIVERSAL_PAYLOAD =3D FALSE DEFINE SECURITY_STUB_ENA= BLE =3D TRUE DEFINE SMM_SUPPORT =3D FALSE+ DEFI= NE BOOT_MANAGER_ESCAPE =3D FALSE+ DEFINE PLATFORM_BOOT_TIMEOUT = =3D 3 # # SBL: UEFI payload for Slim Bootloader # COREBOOT:= UEFI payload for coreboot@@ -399,6 +401,8 @@ gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask | 0x1 != endif + gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|$(BOOT_MANAGER_= ESCAPE)+ [PcdsPatchableInModule.X64] gPcAtChipsetPkgTokenSpaceGuid.PcdRtc= IndexRegister|$(RTC_INDEX_REGISTER) gPcAtChipsetPkgTokenSpaceGuid.PcdRtcT= argetRegister|$(RTC_TARGET_REGISTER)--=20 2.32.0 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#86327): https://edk2.groups.io/g/devel/message/86327 Mute This Topic: https://groups.io/mt/88853648/1781375 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [guo.dong@intel.com] -=3D= -=3D-=3D-=3D-=3D-=3D