From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web12.4892.1617944723604321867 for ; Thu, 08 Apr 2021 22:05:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=h1qnqnDC; spf=pass (domain: intel.com, ip: 134.134.136.31, mailfrom: ray.ni@intel.com) IronPort-SDR: buGJ1i2BbkKNfFHj7UJFNkIre0Bz3FaE/2GE+pceh2LN9DII4JFU7z345zSA5I9o8NhxtVFZR6 1dhzQotn85qg== X-IronPort-AV: E=McAfee;i="6000,8403,9948"; a="255023162" X-IronPort-AV: E=Sophos;i="5.82,208,1613462400"; d="scan'208";a="255023162" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Apr 2021 22:05:22 -0700 IronPort-SDR: +n1dsHLzrouWkbLDhEOe/92zsnT3S183ldi9wouw3z+T8sNdPMmfoPh1J5A9NUs/8yetWqn+N1 1yw9vXCOonhw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.82,208,1613462400"; d="scan'208";a="599035043" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga005.jf.intel.com with ESMTP; 08 Apr 2021 22:05:20 -0700 Received: from orsmsx606.amr.corp.intel.com (10.22.229.19) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2106.2; Thu, 8 Apr 2021 22:05:18 -0700 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2106.2 via Frontend Transport; Thu, 8 Apr 2021 22:05:18 -0700 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (104.47.36.57) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2106.2; Thu, 8 Apr 2021 22:05:18 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I+PlST5TW5TLSkroNGrIQRpSWAE8cM0ivwy0fhbr+Q/ld97LSOwqMAgyPhUeiBPzQvdBA3igWZSqqrWnTxzkPz7uWz3u45RXwBT/XpHmrxHaltO9Za9TGpGR4byKoXv/mRwDrGdVET6lSzVynI1LeztQDfPbdsskw7E3opfkKYlcIWpnYd1WXsmKYQUDatMxDQMqbLLAD57YtQ0Qar7bILanlWFg7YFGTk2XlTBa77S7amsWbQyIaJkoTE/PJ8EC7TMmeuyTGh6Ci+SgXk/vycvIBaMQMQGqEfM2WSKlR9sZSt0Lx6CynEiFoY4M/WH26v99exsBIDeXAl9pcnIIlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3RveXu4sF5cjuCREIRyY5aYf0/WCAfz0g6J0E6qlW/c=; b=UVtaWfBkIBqIUXJ2SbfuswECDH5ccFnDnpuYcw+MYaKKtx6+E7jHYYKWGigMjpvMpMaaxkbMugwOx3yTT2BBmda12W1ZChzOvMonk0+POF0jNarLXvHmhRAuVwZZe8wIygtxL6PfZLVIOiJJby74QSeuIzintbQfoatxJ5ShDSbhARzrKJAjU8LBbJgzuK9PE+3eaKORTqb6gcz5DrdYtqHDeH0IkpiPTs+C5tt5f/8dO6vCEal+ma06wmsqzKmU618OFCvS/HNjVxv4/VRPoem6cQSCuH8dYVxj/iQbnZfZX4Hj5JB7AGtAMABx++J0mhq9Z6z0MpBvGtnr7nYJbQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3RveXu4sF5cjuCREIRyY5aYf0/WCAfz0g6J0E6qlW/c=; b=h1qnqnDC98SYo6ItvOL0EJb/3duGiBJ0cTP8tJkRPYHe3d7D0rU+01zJE4ueyGlHVWi2nH+nFKrPDMPQ/c9infRF4LwHrssgcVDTO1+q+r2DsyRM5Ro9E1ushN1Od/pU8WAOJ62i9HUsOhRg+QfCs3raxz92tb6umE85v7AteUE= Received: from CO1PR11MB4930.namprd11.prod.outlook.com (2603:10b6:303:9b::11) by CO1PR11MB4915.namprd11.prod.outlook.com (2603:10b6:303:93::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.16; Fri, 9 Apr 2021 05:05:17 +0000 Received: from CO1PR11MB4930.namprd11.prod.outlook.com ([fe80::59d6:8b94:55bf:36e7]) by CO1PR11MB4930.namprd11.prod.outlook.com ([fe80::59d6:8b94:55bf:36e7%5]) with mapi id 15.20.4020.018; Fri, 9 Apr 2021 05:05:17 +0000 From: "Ni, Ray" To: "devel@edk2.groups.io" , "lersek@redhat.com" , "Yao, Jiewen" , "Sheng, W" CC: "Dong, Eric" , "Kumar, Rahul1" , "Feng, Roger" Subject: Re: [edk2-devel] [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support detect SMM shadow stack overflow Thread-Topic: [edk2-devel] [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support detect SMM shadow stack overflow Thread-Index: AQHXIgXgZBjKk8GCg0y9zT26EfJDOKqVylGAgAAFdgCABKDIAIANLRuAgAQaGYA= Date: Fri, 9 Apr 2021 05:05:17 +0000 Message-ID: References: <20210326060413.7760-1-w.sheng@intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-reaction: no-action dlp-product: dlpe-windows authentication-results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.198.147.207] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: ca2b334a-d711-4209-9506-08d8fb151104 x-ms-traffictypediagnostic: CO1PR11MB4915: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: nCIxWT1Z3LkZ0vlHIQ0L/SfZjZxmDpZWBRZFguYopWNM7B0/RCCToDemDm8o9amobWCsLiVm+QYEVm2N0ShMEOOuZi4kPRAUmmCfJHTFUj9SgI0YEJyp2J9/T/Hq9Zzwd3SPtYxrxryfBVuQK3xT5oN85t90XCq2CTnUCE6Zt+2EiQ+KSbZuvS1a7h+szIqQ3EZUA2Zu00tqmo/aj0yd7SRpDzMZ02L/7gow3+3QMCxcCkvXJiUoT1+ZFRvD3vsrARJWcdLFX3QN0Kw97fZOWz31nKFIsrMCkqD1U/qXhgDsx2AsrsRhfLC5VfYGdUanwUMbQRLoQ9WmE6hlD/g5o1AtjKQWKqGl0W7OpnO8XnE5FWm3n6PyzRhSc1mkU4M9sRfpIgK9MYbqiupr97Cq8clEwGt++zE6fird43NRpS8qrTWlhO0r5JkQogv7Mi1NKJmCu5cQqTEJyWwI8oPXd0krhPbmgHARSeZFdTM61pN2tjz5UT85Qi3P/J0vw849XYMN1DMFQujQtWb8bEZd8whkgeMyYymB/OxRS4WjPZXgBIDL2BoBY1ohKL/oc7OPz9I0lY/VVulPd4IxivS8BFExCalzg1Crd+SKA3+JRcRhbHxOPV8oQO2K9Nx++qEJ9LfPdx5DsCZPuf7tBAAZt0GRgWBs2zdqcxBk8RpFqJMLc7Y5dgCwbuWvtd5u7PnEZsbE6bgPsUkFTa7IZlwwkyhpDZHUZyVJScdlhRTeS+hybyX664cP0buCJFEVnsfx x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR11MB4930.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(6029001)(376002)(366004)(136003)(396003)(39860400002)(346002)(33656002)(19627235002)(7696005)(71200400001)(966005)(4326008)(66556008)(478600001)(83380400001)(38100700001)(110136005)(8676002)(8936002)(66476007)(9686003)(76116006)(55016002)(54906003)(86362001)(186003)(5660300002)(2906002)(6506007)(53546011)(26005)(6636002)(52536014)(107886003)(66946007)(66446008)(64756008)(316002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: =?iso-2022-jp?B?NC9sTzNoTnRkenZGL1ZLUTF2SG9Ea294YTVuOVp4RlovQXZ2RDdUQkJm?= =?iso-2022-jp?B?cFZZcGhLQlRBUTZtNXBkQXhPOTMzaDdKaDdZS0dJd253NmhYRFdYYjJp?= =?iso-2022-jp?B?emM5K3I2WE5mZzY2M0lyREFhUXRQRk45aWFsZ0hvNWc0WkV0RjFGNzBs?= =?iso-2022-jp?B?aERLKzFNWnV3bmRRNVR5L0JyY3kvWUV4ak5TekZEb080cWtJekQrdDB3?= =?iso-2022-jp?B?ZFFSK1hwZzlIaGFPbkM0VzNacEViRURHT2FHSXM2cUh4RDh5dVNjTXN3?= =?iso-2022-jp?B?ci9xSDNnbjJlaDljdWJYVmsrRU5vcXZXQm5zVEx0eGpIU0hRTnlLdmpK?= =?iso-2022-jp?B?RzU5YkQ0b0k4cGVuNmh2MHJuWG9PVU9PVVphVFY4SlFaVXQva2xuZ1Bj?= =?iso-2022-jp?B?aTVKVEtuYXN0MFM5U2VGUUhmcmc1UVhlY2Y3UTJLNkgrTEkwQThJYmE1?= =?iso-2022-jp?B?ZTQ4WXpPdG9WU3BxQXd5OXZSNGhTQkdQTHo2Mnh1L0dMcmZ4eWo2aldw?= =?iso-2022-jp?B?V1c3WjN6aFpxSm5sNCt6MjlQRHU5Ymp5d1F2eGplcFY1QkRrZjNTL2hT?= =?iso-2022-jp?B?cU5taGRSUThLNyt6ZjF0d3BuOE9vMkZ4OERhemc2WnNZK2E4VjBsbHRT?= =?iso-2022-jp?B?YUJoMStwU1pnNDR5NnNpSzlMZUpRb043anBCNlNReTVYbW5iN2UvWENk?= =?iso-2022-jp?B?aG5IR2xzbllXQ01SVTY3YVdaaDFBVU1sTG1KYkJsUTloMkVrbTdpMTdL?= =?iso-2022-jp?B?NFNVQnpFQnVpWkJ0enFIcXM1dFhTdk4zSEo1VTRSL0pFeWZpSXpHcUdZ?= =?iso-2022-jp?B?eU1NaTV1UE8rbTErZmYrQTZoNlJJL0JEOFJydmtDYytaVnJpR0VLU1R0?= =?iso-2022-jp?B?M3RXbkRNTW9CYmcxR1VNQlhYbVhkN1JDQllZMU1xMHljUGZBYXRUazZt?= =?iso-2022-jp?B?UytBbTlmR0NvTzcrVFZsRnpiMmR4WmNndHN5OVM5Szhlc2RWUXVocE9h?= =?iso-2022-jp?B?NFRlS0FzQXYyUWM1b1J2OFlVU091bEdualZzMGJhODRsOGpiN2JWcTFz?= =?iso-2022-jp?B?ZDd0dVlrSmNqdUZJY2svZFZDTVBuZ1ZNa1VDVE5EaDJvbGJyazM2THgz?= =?iso-2022-jp?B?ODNuZXVYVXFXMVZTdkhUdFBvSFRMdzAwdkN2RTBLQWdYTHRsNFIxT2NS?= =?iso-2022-jp?B?cy8yeHdDU1pqdHM0OE1vRmZnUlJ6MHkvUHVZMjcyd2UwYzV4VlRBeHg3?= =?iso-2022-jp?B?aG4zVkFnSmFBRGt2K0o1NE8rTWFCc0l2SDl5NXNuN0xRSndxSmdKbjVJ?= =?iso-2022-jp?B?MlpHRzZ5TCtSUCtiMS9zTnVnWFd3d0YrK0FRK3oyaDAxeFdERTdKU3RB?= =?iso-2022-jp?B?NHBKUmpmUXpTSVpHcHpYaEs4OEpaWWp6WDFiMUxXcWU4S2pQdGJPN0VE?= =?iso-2022-jp?B?UmE1Z2krMGsyOFhRYnBUeFI4Vm1lOGNxWXFha3hsdGlSeDl6Um5MczVS?= =?iso-2022-jp?B?SFp2eFNXcWNXT2QxOWZ2TUFzVkdkc0lpYjNDZ0dnZ0d3L3FsOWRMWnNR?= =?iso-2022-jp?B?SEJ6VXRSUWJVM1Y0Zm5WdHBHb1UrT0xSeHlQWEFha0dNTzBvZnVHVE9F?= =?iso-2022-jp?B?VHZWZVhadDBqVXhvNzErUVlZYzJyRDZLd0tRaDJGVHB6ZjBsSXlPa1dE?= =?iso-2022-jp?B?aU1qajArczhMYUlxUWxET3Uxc1lyc1dtTCtmU1NNNmpRTmJWMGM3d2Z0?= =?iso-2022-jp?B?Z29RZzBDV0NwWXZNejNBc2RiSzM0NEZQM3kvcDU2OHpIZExGVTVtSlpX?= =?iso-2022-jp?B?NXdPV0ZEajRwSnFzQjVvVnpZSTZIMHhldU1uSlFQcDJKdmpwZFg0a0lu?= =?iso-2022-jp?B?RlN3cjRkLzhITElYdFZOQ1VmNElFYWVDQWZXT0QydXd2UGNOREtER1ZU?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4930.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: ca2b334a-d711-4209-9506-08d8fb151104 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2021 05:05:17.0327 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: qkKIWJ+CT0c+ivuvxM2Acqp6SQIFz4inLxWqbkEH3aAq3+LLEqOmC1Sde06uwiZ+oT4wUASgTTvjkMl8BwcMzQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4915 Return-Path: ray.ni@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="iso-2022-jp" Content-Transfer-Encoding: quoted-printable Reviewed-by: Ray Ni > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Laszlo Er= sek > Sent: Tuesday, April 6, 2021 10:27 PM > To: devel@edk2.groups.io; Yao, Jiewen ; Sheng, W <= w.sheng@intel.com>; Ni, Ray > Cc: Dong, Eric ; Kumar, Rahul1 ; Feng, Roger > Subject: Re: [edk2-devel] [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support det= ect SMM shadow stack overflow >=20 > Ray, >=20 > On 03/29/21 07:13, Yao, Jiewen wrote: > > Thank you very much! > > > > Reviewed-by: Jiewen Yao >=20 > can you please review and merge this patch? You were the UefiCpuPkg > reviewer on the following two commits as well: >=20 > 3eb69b081c68 ("UefiCpuPkg/PiSmmCpu: Add Shadow Stack Support for X86 > SMM.", 2019-02-28) >=20 > ef91b07388e1 ("UefiCpuPkg/PiSmmCpuDxeSmm: Fix SMM stack offset is not > correct", 2021-03-02) >=20 > Thanks > Laszlo >=20 > > > >> -----Original Message----- > >> From: Sheng, W > >> Sent: Friday, March 26, 2021 2:33 PM > >> To: Yao, Jiewen ; devel@edk2.groups.io > >> Cc: Dong, Eric ; Ni, Ray ; Las= zlo Ersek > >> ; Kumar, Rahul1 ; Feng, Ro= ger > >> > >> Subject: RE: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support detect SMM > >> shadow stack overflow > >> > >> Hi Jiewen, > >> In current code, if SMM stack guard is enabled, there is a guard page= at the top > >> of SMM shadow stack. > >> If SMM shadow stack overflow Happens, it will touch the guard page, a= nd > >> trigger the #PF exception. > >> In this patch, I will check the PFAddress in SmiPFHandler(), if it be= longs to the > >> range of SMM shadow stack guard page, I will show the error message. > >> > >> unit test: > >> I use recursive function to do the test. In each function call, it wi= ll push the > >> return address to the SMM shadow stack. > >> When the loop reaches to a certain amount, it will finally touch the = guard page, > >> and trigger #PF exception. > >> > >> Thank you > >> BR > >> Sheng Wei > >> > >>> -----Original Message----- > >>> From: Yao, Jiewen > >>> Sent: 2021=1B$BG/=1B(B3=1B$B7n=1B(B26=1B$BF|=1B(B 14:14 > >>> To: Sheng, W ; devel@edk2.groups.io > >>> Cc: Dong, Eric ; Ni, Ray ; La= szlo > >>> Ersek ; Kumar, Rahul1 ; > >>> Feng, Roger > >>> Subject: RE: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support detect SMM > >>> shadow stack overflow > >>> > >>> Hi > >>> Would you please share the info on how you do unit test for the new = added > >>> code? > >>> > >>> Thank you > >>> > >>>> -----Original Message----- > >>>> From: Sheng, W > >>>> Sent: Friday, March 26, 2021 2:04 PM > >>>> To: devel@edk2.groups.io > >>>> Cc: Dong, Eric ; Ni, Ray ; > >>>> Laszlo Ersek ; Kumar, Rahul1 > >>>> ; Yao, Jiewen ; Feng, > >>>> Roger > >>>> Subject: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Support detect SMM > >>> shadow > >>>> stack overflow > >>>> > >>>> Use SMM stack guard feature to detect SMM shadow stack overflow. > >>>> > >>>> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3280 > >>>> > >>>> Signed-off-by: Sheng Wei > >>>> Cc: Eric Dong > >>>> Cc: Ray Ni > >>>> Cc: Laszlo Ersek > >>>> Cc: Rahul Kumar > >>>> Cc: Jiewen Yao > >>>> Cc: Roger Feng > >>>> --- > >>>> UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c | 9 ++++++++- > >>>> 1 file changed, 8 insertions(+), 1 deletion(-) > >>>> > >>>> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c > >>>> b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c > >>>> index 07e7ea70de..6902584b1f 100644 > >>>> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c > >>>> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c > >>>> @@ -1016,6 +1016,7 @@ SmiPFHandler ( > >>>> { > >>>> UINTN PFAddress; > >>>> UINTN GuardPageAddress; > >>>> + UINTN ShadowStackGuardPageAddress; > >>>> UINTN CpuIndex; > >>>> > >>>> ASSERT (InterruptType =3D=3D EXCEPT_IA32_PAGE_FAULT); @@ -1032,7 > >>>> +1033,7 @@ SmiPFHandler ( > >>>> } > >>>> > >>>> // > >>>> - // If a page fault occurs in SMRAM range, it might be in a SMM > >>>> stack guard page, > >>>> + // If a page fault occurs in SMRAM range, it might be in a SMM > >>>> + stack/shadow > >>>> stack guard page, > >>>> // or SMM page protection violation. > >>>> // > >>>> if ((PFAddress >=3D mCpuHotPlugData.SmrrBase) && @@ -1040,10 +10= 41,16 > >>>> @@ SmiPFHandler ( > >>>> DumpCpuContext (InterruptType, SystemContext); > >>>> CpuIndex =3D GetCpuIndex (); > >>>> GuardPageAddress =3D (mSmmStackArrayBase + EFI_PAGE_SIZE + > >>> CpuIndex > >>>> * (mSmmStackSize + mSmmShadowStackSize)); > >>>> + ShadowStackGuardPageAddress =3D (mSmmStackArrayBase + > >>> mSmmStackSize > >>>> + EFI_PAGE_SIZE + CpuIndex * (mSmmStackSize + > >>> mSmmShadowStackSize)); > >>>> if ((FeaturePcdGet (PcdCpuSmmStackGuard)) && > >>>> (PFAddress >=3D GuardPageAddress) && > >>>> (PFAddress < (GuardPageAddress + EFI_PAGE_SIZE))) { > >>>> DEBUG ((DEBUG_ERROR, "SMM stack overflow!\n")); > >>>> + } else if ((FeaturePcdGet (PcdCpuSmmStackGuard)) && > >>>> + (mSmmShadowStackSize > 0) && > >>>> + (PFAddress >=3D ShadowStackGuardPageAddress) && > >>>> + (PFAddress < (ShadowStackGuardPageAddress + EFI_PAGE_SIZE)= )) { > >>>> + DEBUG ((DEBUG_ERROR, "SMM shadow stack overflow!\n")); > >>>> } else { > >>>> if ((SystemContext.SystemContextX64->ExceptionData & > >>>> IA32_PF_EC_ID) !=3D > >>>> 0) { > >>>> DEBUG ((DEBUG_ERROR, "SMM exception at execution (0x%lx)\n= ", > >>>> PFAddress)); > >>>> -- > >>>> 2.16.2.windows.1 > > > > > > > > > > > > >=20 >=20 >=20 >=20 >=20