From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 1FFD3D801A7 for ; Mon, 18 Mar 2024 23:17:22 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=dknArJ7NknEKNsnau+C6mORcBWB2mJqAx44Szabs2M8=; c=relaxed/simple; d=groups.io; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:To:Cc:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Type; s=20240206; t=1710803841; v=1; b=yMWG/lHnWdu0FyMiCK1KpHgQJbK+jm9+aXgZCTlARaKBdiV+MPkjWTeR4p87u5tzwrr/MLG9 FYHT9+eZyLDp5xeSzng+rGqF8UvyYRTatErQLNJHdF78nCS7NA1TBSB2U5y2njpC3GnYY2UWjfM u4fiMIfgqVhRNfTRd01sCIKTndqzeS3NPRL+9KXXl8gyzMmxLzqWHs4kBwcCZsGitCzVMwFbaFo wkTs8ClAEjiK4Ku07WGy9FqhoJBGlEJKy5xbQ0ejZ6EwZbjOELG+R+LmgJx/N7520SbUOA5cL36 ZtEYH28ggOHTHNuJEe3i4vWclY9jBOOQDqtRf/bUqWvFg== X-Received: by 127.0.0.2 with SMTP id CPL3YY7687511x6rXL1MK8QM; Mon, 18 Mar 2024 16:17:21 -0700 X-Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mx.groups.io with SMTP id smtpd.web11.10358.1710416608747737803 for ; Thu, 14 Mar 2024 04:43:29 -0700 X-Received: from mail-lf1-f71.google.com (mail-lf1-f71.google.com [209.85.167.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-664-KfcMaPPsMpuT7GpGRctJ-w-1; Thu, 14 Mar 2024 07:43:25 -0400 X-MC-Unique: KfcMaPPsMpuT7GpGRctJ-w-1 X-Received: by mail-lf1-f71.google.com with SMTP id 2adb3069b0e04-513d125058eso472651e87.2 for ; Thu, 14 Mar 2024 04:43:25 -0700 (PDT) X-Gm-Message-State: IEYUdbBlxfXW6EtnJO5oFUv7x7686176AA= X-Received: by 2002:a05:6512:32b7:b0:513:c408:b2af with SMTP id q23-20020a05651232b700b00513c408b2afmr971477lfe.46.1710416604265; Thu, 14 Mar 2024 04:43:24 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHUq8vk0fdOGkCSgBpAeoGJmFiPR6dIp8hKuWlrZ1965ZcWEpijxvEnXwhXbJc7AEGImkZYEZpiUziZrztGL10= X-Received: by 2002:a05:6512:32b7:b0:513:c408:b2af with SMTP id q23-20020a05651232b700b00513c408b2afmr971469lfe.46.1710416603901; Thu, 14 Mar 2024 04:43:23 -0700 (PDT) MIME-Version: 1.0 References: <20240314102447.24313-1-kkostiuk@redhat.com> <20240314102447.24313-2-kkostiuk@redhat.com> In-Reply-To: From: Konstantin Kostiuk Date: Thu, 14 Mar 2024 13:43:12 +0200 Message-ID: Subject: Re: [edk2-devel] [PATCH 1/2] OvmfPkg: Add VirtHstiDxe driver To: "Yao, Jiewen" Cc: "devel@edk2.groups.io" , Yan Vugenfirer , Ard Biesheuvel , Gerd Hoffmann X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Mon, 18 Mar 2024 16:17:21 -0700 Reply-To: devel@edk2.groups.io,kkostiuk@redhat.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Type: multipart/alternative; boundary="00000000000018061206139d66d3" X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b="yMWG/lHn"; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=redhat.com (policy=none) --00000000000018061206139d66d3 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Mar 14, 2024 at 12:28=E2=80=AFPM Yao, Jiewen = wrote: > Question: What is the value to provide an *empty* HSTI table? > > IMHO, If the goal is to perform some security check, I think we need > provide a *real* HSTI table. > HSTI is very vendor-specific and depends on features that a vendor supports. Looking at the HSTI spec a lot of the bits don't make sense for virtual machines. Some feature depends on hardware configuration and this check is a dummy in a virtual environment. So, the main goal is to pass Microsoft SVVP with OVMF+QEMU. Best Regards, Konstantin Kostiuk. > > Thank you > Yao, Jiewen > > > -----Original Message----- > > From: Konstantin Kostiuk > > Sent: Thursday, March 14, 2024 6:25 PM > > To: devel@edk2.groups.io > > Cc: Yan Vugenfirer ; Ard Biesheuvel > > ; Yao, Jiewen ; Gerd > > Hoffmann > > Subject: [PATCH 1/2] OvmfPkg: Add VirtHstiDxe driver > > > > The driver provides empty HSTI table. > > > > Signed-off-by: Konstantin Kostiuk > > --- > > OvmfPkg/VirtHstiDxe/VirtHstiDxe.c | 75 +++++++++++++++++++++++++++++ > > OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf | 64 ++++++++++++++++++++++++ > > 2 files changed, 139 insertions(+) > > create mode 100644 OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > > create mode 100644 OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > > > > diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > > b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > > new file mode 100644 > > index 0000000000..b9ed189f33 > > --- /dev/null > > +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > > @@ -0,0 +1,75 @@ > > +/** @file > > > > + This file contains DXE driver for publishing empty HSTI table > > > > + > > > > +Copyright (c) 2017, Intel Corporation. All rights reserved.
> > > > +Copyright (c) 2024, Red Hat. Inc > > > > + > > > > +SPDX-License-Identifier: BSD-2-Clause-Patent > > > > + > > > > +**/ > > > > + > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > + > > > > +#define HSTI_PLATFORM_NAME L"Intel(R) 9-Series v1" > > > > +#define HSTI_SECURITY_FEATURE_SIZE 1 > > > > + > > > > +ADAPTER_INFO_PLATFORM_SECURITY mHstiBase =3D { > > > > + PLATFORM_SECURITY_VERSION_VNEXTCS, > > > > + PLATFORM_SECURITY_ROLE_PLATFORM_REFERENCE, > > > > + { HSTI_PLATFORM_NAME }, > > > > + HSTI_SECURITY_FEATURE_SIZE, > > > > +}; > > > > + > > > > +/** > > > > + The driver's entry point. > > > > + > > > > + @param[in] ImageHandle The firmware allocated handle for the EFI > image. > > > > + @param[in] SystemTable A pointer to the EFI System Table. > > > > + > > > > + @retval EFI_SUCCESS The entry point is executed successfully. > > > > + @retval other Some error occurs when executing this entry > point. > > > > +**/ > > > > +EFI_STATUS > > > > +EFIAPI > > > > +VirtHstiDxeEntrypoint ( > > > > + IN EFI_HANDLE ImageHandle, > > > > + IN EFI_SYSTEM_TABLE *SystemTable > > > > + ) > > > > +{ > > > > + EFI_STATUS Status; > > > > + > > > > + // Allocate memory for HSTI struct > > > > + // 3 * sizeof (UINT8) * HSTI_SECURITY_FEATURE_SIZE is for the 3 arra= ys > > > > + // UINT8 SecurityFeaturesRequired[]; > > > > + // UINT8 SecurityFeaturesImplemented[]; > > > > + // UINT8 SecurityFeaturesVerified[]; > > > > + // sizeof (CHAR16) is for the NULL terminator of ErrorString > > > > + // CHAR16 ErrorString[] > > > > + UINTN HstiSize =3D sizeof (ADAPTER_INFO_PLATFORM_SECURITY) + > > > > + 3 * sizeof (UINT8) * HSTI_SECURITY_FEATURE_SIZE + > > > > + sizeof (CHAR16); > > > > + VOID *HstiStruct =3D AllocateZeroPool (HstiSize); > > > > + > > > > + if (HstiStruct =3D=3D NULL) { > > > > + return EFI_OUT_OF_RESOURCES; > > > > + } > > > > + > > > > + CopyMem (HstiStruct, &mHstiBase, sizeof > > (ADAPTER_INFO_PLATFORM_SECURITY)); > > > > + > > > > + Status =3D HstiLibSetTable (HstiStruct, HstiSize); > > > > + if (EFI_ERROR (Status)) { > > > > + if (Status !=3D EFI_ALREADY_STARTED) { > > > > + ASSERT_EFI_ERROR (Status); > > > > + } > > > > + } > > > > + > > > > + return EFI_SUCCESS; > > > > +} > > > > diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > > b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > > new file mode 100644 > > index 0000000000..270aa60026 > > --- /dev/null > > +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > > @@ -0,0 +1,64 @@ > > +## @file > > > > +# Component description file for Virt Hsti Driver > > > > +# > > > > +# Copyright (c) 2017, Intel Corporation. All rights reserved.
> > > > +# Copyright (c) Microsoft Corporation.
> > > > +# Copyright (c) 2024, Red Hat. Inc > > > > +# > > > > +# SPDX-License-Identifier: BSD-2-Clause-Patent > > > > +# > > > > +## > > > > + > > > > +[Defines] > > > > + INF_VERSION =3D 0x00010005 > > > > + BASE_NAME =3D VirtHstiDxe > > > > + FILE_GUID =3D 60740CF3-D428-4500-80E6-04A579824= 1ED > > > > + MODULE_TYPE =3D DXE_DRIVER > > > > + VERSION_STRING =3D 1.0 > > > > + ENTRY_POINT =3D VirtHstiDxeEntrypoint > > > > + > > > > +################################################################ > > ################ > > > > +# > > > > +# Sources Section - list of files that are required for the build to > succeed. > > > > +# > > > > +################################################################ > > ################ > > > > + > > > > +[Sources] > > > > + VirtHstiDxe.c > > > > + > > > > +################################################################ > > ################ > > > > +# > > > > +# Package Dependency Section - list of Package files that are required > for > > > > +# this module. > > > > +# > > > > +################################################################ > > ################ > > > > + > > > > +[Packages] > > > > + MdePkg/MdePkg.dec > > > > + > > > > +################################################################ > > ################ > > > > +# > > > > +# Library Class Section - list of Library Classes that are required fo= r > > > > +# this module. > > > > +# > > > > +################################################################ > > ################ > > > > + > > > > +[LibraryClasses] > > > > + UefiDriverEntryPoint > > > > + UefiLib > > > > + BaseLib > > > > + BaseMemoryLib > > > > + MemoryAllocationLib > > > > + DebugLib > > > > + HstiLib > > > > + UefiBootServicesTableLib > > > > + > > > > +################################################################ > > ################ > > > > +# > > > > +# Protocol C Name Section - list of Protocol and Protocol Notify C Nam= es > > > > +# that this module uses or produces. > > > > +# > > > > +################################################################ > > ################ > > > > + > > > > +[Depex] > > > > + TRUE > > > > -- > > 2.44.0 > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#116860): https://edk2.groups.io/g/devel/message/116860 Mute This Topic: https://groups.io/mt/104923813/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --00000000000018061206139d66d3 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


=
On Thu, Mar 14, 2024 at 12:28=E2=80= =AFPM Yao, Jiewen <jiewen.yao@intel.com> wrote:
Question: What is the value to provide an *empty* = HSTI table?

IMHO, If the goal is to perform some security check, I think we need provid= e a *real* HSTI table.

HSTI is very vendor-specifi= c and depends on features that a vendor supports. Looking at
the = HSTI spec a lot of the bits don't make sense for virtual machines. Some= feature depends on
hardware configuration and this check is a du= mmy in a virtual environment.

So, the main goal is t= o pass Microsoft SVVP with OVMF+QEMU.

Best Rega= rds,
Konstantin Kostiuk.
= =C2=A0

Thank you
Yao, Jiewen

> -----Original Message-----
> From: Konstantin Kostiuk <kkostiuk@redhat.com>
> Sent: Thursday, March 14, 2024 6:25 PM
> To: devel@ed= k2.groups.io
> Cc: Yan Vugenfirer <yvugenfi@redhat.com>; Ard Biesheuvel
> <a= rdb+tianocore@kernel.org>; Yao, Jiewen <jiewen.yao@intel.com>; Gerd
> Hoffmann <kr= axel@redhat.com>
> Subject: [PATCH 1/2] OvmfPkg: Add VirtHstiDxe driver
>
> The driver provides empty HSTI table.
>
> Signed-off-by: Konstantin Kostiuk <kkostiuk@redhat.com>
> ---
>=C2=A0 OvmfPkg/VirtHstiDxe/VirtHstiDxe.c=C2=A0 =C2=A0| 75 +++++++++++++= ++++++++++++++++
>=C2=A0 OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf | 64 +++++++++++++++++++++++= +
>=C2=A0 2 files changed, 139 insertions(+)
>=C2=A0 create mode 100644 OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
>=C2=A0 create mode 100644 OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
>
> diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
> b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
> new file mode 100644
> index 0000000000..b9ed189f33
> --- /dev/null
> +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
> @@ -0,0 +1,75 @@
> +/** @file
>
> +=C2=A0 This file contains DXE driver for publishing empty HSTI table<= br> >
> +
>
> +Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>=
>
> +Copyright (c) 2024, Red Hat. Inc
>
> +
>
> +SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +
>
> +**/
>
> +
>
> +#include <PiDxe.h>
>
> +#include <Library/BaseLib.h>
>
> +#include <Library/DebugLib.h>
>
> +#include <Library/BaseMemoryLib.h>
>
> +#include <Library/MemoryAllocationLib.h>
>
> +#include <Library/UefiBootServicesTableLib.h>
>
> +#include <Library/UefiLib.h>
>
> +#include <IndustryStandard/Hsti.h>
>
> +#include <Library/HstiLib.h>
>
> +
>
> +#define HSTI_PLATFORM_NAME=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 L"I= ntel(R) 9-Series v1"
>
> +#define HSTI_SECURITY_FEATURE_SIZE=C2=A0 1
>
> +
>
> +ADAPTER_INFO_PLATFORM_SECURITY=C2=A0 mHstiBase =3D {
>
> +=C2=A0 PLATFORM_SECURITY_VERSION_VNEXTCS,
>
> +=C2=A0 PLATFORM_SECURITY_ROLE_PLATFORM_REFERENCE,
>
> +=C2=A0 { HSTI_PLATFORM_NAME },
>
> +=C2=A0 HSTI_SECURITY_FEATURE_SIZE,
>
> +};
>
> +
>
> +/**
>
> +=C2=A0 The driver's entry point.
>
> +
>
> +=C2=A0 @param[in] ImageHandle=C2=A0 The firmware allocated handle for= the EFI image.
>
> +=C2=A0 @param[in] SystemTable=C2=A0 A pointer to the EFI System Table= .
>
> +
>
> +=C2=A0 @retval EFI_SUCCESS=C2=A0 =C2=A0 =C2=A0The entry point is exec= uted successfully.
>
> +=C2=A0 @retval other=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Some err= or occurs when executing this entry point.
>
> +**/
>
> +EFI_STATUS
>
> +EFIAPI
>
> +VirtHstiDxeEntrypoint (
>
> +=C2=A0 IN EFI_HANDLE=C2=A0 =C2=A0 =C2=A0 =C2=A0 ImageHandle,
>
> +=C2=A0 IN EFI_SYSTEM_TABLE=C2=A0 *SystemTable
>
> +=C2=A0 )
>
> +{
>
> +=C2=A0 EFI_STATUS=C2=A0 Status;
>
> +
>
> +=C2=A0 // Allocate memory for HSTI struct
>
> +=C2=A0 // 3 * sizeof (UINT8) * HSTI_SECURITY_FEATURE_SIZE is for the = 3 arrays
>
> +=C2=A0 //=C2=A0 =C2=A0UINT8=C2=A0 =C2=A0SecurityFeaturesRequired[]; >
> +=C2=A0 //=C2=A0 =C2=A0UINT8=C2=A0 =C2=A0SecurityFeaturesImplemented[]= ;
>
> +=C2=A0 //=C2=A0 =C2=A0UINT8=C2=A0 =C2=A0SecurityFeaturesVerified[]; >
> +=C2=A0 // sizeof (CHAR16) is for the NULL terminator of ErrorString >
> +=C2=A0 //=C2=A0 =C2=A0CHAR16 ErrorString[]
>
> +=C2=A0 UINTN=C2=A0 HstiSize =3D sizeof (ADAPTER_INFO_PLATFORM_SECURIT= Y) +
>
> +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= 3 * sizeof (UINT8) * HSTI_SECURITY_FEATURE_SIZE +
>
> +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= sizeof (CHAR16);
>
> +=C2=A0 VOID=C2=A0 *HstiStruct =3D AllocateZeroPool (HstiSize);
>
> +
>
> +=C2=A0 if (HstiStruct =3D=3D NULL) {
>
> +=C2=A0 =C2=A0 return EFI_OUT_OF_RESOURCES;
>
> +=C2=A0 }
>
> +
>
> +=C2=A0 CopyMem (HstiStruct, &mHstiBase, sizeof
> (ADAPTER_INFO_PLATFORM_SECURITY));
>
> +
>
> +=C2=A0 Status =3D HstiLibSetTable (HstiStruct, HstiSize);
>
> +=C2=A0 if (EFI_ERROR (Status)) {
>
> +=C2=A0 =C2=A0 if (Status !=3D EFI_ALREADY_STARTED) {
>
> +=C2=A0 =C2=A0 =C2=A0 ASSERT_EFI_ERROR (Status);
>
> +=C2=A0 =C2=A0 }
>
> +=C2=A0 }
>
> +
>
> +=C2=A0 return EFI_SUCCESS;
>
> +}
>
> diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
> b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
> new file mode 100644
> index 0000000000..270aa60026
> --- /dev/null
> +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
> @@ -0,0 +1,64 @@
> +## @file
>
> +#=C2=A0 Component description file for Virt Hsti Driver
>
> +#
>
> +# Copyright (c) 2017, Intel Corporation. All rights reserved.<BR&g= t;
>
> +# Copyright (c) Microsoft Corporation.<BR>
>
> +# Copyright (c) 2024, Red Hat. Inc
>
> +#
>
> +# SPDX-License-Identifier: BSD-2-Clause-Patent
>
> +#
>
> +##
>
> +
>
> +[Defines]
>
> +=C2=A0 INF_VERSION=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =3D 0x00010005
>
> +=C2=A0 BASE_NAME=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =3D VirtHstiDxe
>
> +=C2=A0 FILE_GUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =3D 60740CF3-D428-4500-80E6-04A5798241ED
>
> +=C2=A0 MODULE_TYPE=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =3D DXE_DRIVER
>
> +=C2=A0 VERSION_STRING=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0 =C2=A0=3D 1.0
>
> +=C2=A0 ENTRY_POINT=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =3D VirtHstiDxeEntrypoint
>
> +
>
> +################################################################
> ################
>
> +#
>
> +# Sources Section - list of files that are required for the build to = succeed.
>
> +#
>
> +################################################################
> ################
>
> +
>
> +[Sources]
>
> +=C2=A0 VirtHstiDxe.c
>
> +
>
> +################################################################
> ################
>
> +#
>
> +# Package Dependency Section - list of Package files that are require= d for
>
> +#=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 this module.
>
> +#
>
> +################################################################
> ################
>
> +
>
> +[Packages]
>
> +=C2=A0 MdePkg/MdePkg.dec
>
> +
>
> +################################################################
> ################
>
> +#
>
> +# Library Class Section - list of Library Classes that are required f= or
>
> +#=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0this module.
>
> +#
>
> +################################################################
> ################
>
> +
>
> +[LibraryClasses]
>
> +=C2=A0 UefiDriverEntryPoint
>
> +=C2=A0 UefiLib
>
> +=C2=A0 BaseLib
>
> +=C2=A0 BaseMemoryLib
>
> +=C2=A0 MemoryAllocationLib
>
> +=C2=A0 DebugLib
>
> +=C2=A0 HstiLib
>
> +=C2=A0 UefiBootServicesTableLib
>
> +
>
> +################################################################
> ################
>
> +#
>
> +# Protocol C Name Section - list of Protocol and Protocol Notify C Na= mes
>
> +#=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0that this module uses or produces.
>
> +#
>
> +################################################################
> ################
>
> +
>
> +[Depex]
>
> +=C2=A0 TRUE
>
> --
> 2.44.0

_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#116860) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--00000000000018061206139d66d3--