From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web10.6629.1672874137498250542 for ; Wed, 04 Jan 2023 15:15:37 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Uunijjew; spf=pass (domain: intel.com, ip: 134.134.136.100, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672874137; x=1704410137; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=UL4lO6Sv/qmO4xqWsmJtcvsCMki/GT9B3QpFqZ29Ako=; b=UunijjewDkvDXswCxwUbV2KQkB1ois7nc81fOaUzT52ELFDy6o2gW4Zv dUApr4WqCxfeNijM1tSICi3Hx2Ye8hEYy5G3LZwyT4sRxzJ6YoN9J+b0j 51mks6Zs/0VNrse9HGYul+K55PbXS20PGxSoxX2D0CmCgZSxlpXYGVKci SWneZT0rhcOTHL1rnGRh56vkojFjLUyFzVvIe8buYdwdy5s9l4/VFM0NQ K6jpOj1IS9X+AHUgkA/czCOF3rRm871S/VX+YV1ndi/SH4os0cInEj1Ci 5Wb+MAmKGN257UjqVCdTLnkKCup65Yj9rjwSxF6KMBgMy65Z6I87d/C63 g==; X-IronPort-AV: E=McAfee;i="6500,9779,10580"; a="386506088" X-IronPort-AV: E=Sophos;i="5.96,301,1665471600"; d="scan'208";a="386506088" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Jan 2023 15:15:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10580"; a="779362905" X-IronPort-AV: E=Sophos;i="5.96,301,1665471600"; d="scan'208";a="779362905" Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by orsmga004.jf.intel.com with ESMTP; 04 Jan 2023 15:15:37 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Wed, 4 Jan 2023 15:15:36 -0800 Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Wed, 4 Jan 2023 15:15:36 -0800 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.172) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Wed, 4 Jan 2023 15:15:36 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b9qzqB2ABGJPGIYAR8OE2aHv/CgT/e4YvcwwwShkUJ+4dgEFGxMEYqGfu34eb7wi1JmsnJXIv+pfKfTPXgs2TjyyIrEQjildxDlfETRd3muT0VWG2OYkCgM1I5vT8DeyzJAVaZSnDKtIwr8i13/5Khm/KYfK+7xi78b4qRSCaq4M1ziO4I7c09qNXnvuYVsXJ2XPWf5tluJDutw9dn8BPrYAP2IOla9aS/KPTK+4GruoFIqG77IFCKfdpOOi9nYYBIUMXkTOh/qE71oUDoxLtujEXis3Y7aS4/VOoegVcOX2lF6jLfGA1o4Rw6XVvnlLilU4htczW1o2k0cubA+rxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rSwMfIDxu2pR5wBDcXqnS55qzAb5J70zPSwlUEXYKtE=; b=EbS+3ZJ+/Ev9/bjHeCWsUeHKMPnndzZiHGluXQvn0XTpoVgSt2yXEwB8hvY93kWpO0fHh0JjU4Ruqh7u/Vc2A+brRPUFaPODc9QCP9RFtIWASQWWetYhEKsCVu/uaQq1KJIg4Kke3y6Xr2pOG9dyK4Inold9lpjfAxfh5YBopaUu29Wpdpw/DlQYPdtZ04/apgnIISlePXCbWMJIjB41awwOoee0Aa5fJhqEI+kVKES7Y50dvQ2eL6hOAg+tUMkiikwtbtxnUXRdhGlW+AH+3NcoGj6ES8lf2/lMGGTGHI5zPR31cplrtagmFKf2gqa4lrDXHTfixjEKX4cF1nzHEw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from CY5PR11MB6260.namprd11.prod.outlook.com (2603:10b6:930:23::16) by DM4PR11MB5502.namprd11.prod.outlook.com (2603:10b6:5:39e::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Wed, 4 Jan 2023 23:15:34 +0000 Received: from CY5PR11MB6260.namprd11.prod.outlook.com ([fe80::aad9:3808:e1e5:246e]) by CY5PR11MB6260.namprd11.prod.outlook.com ([fe80::aad9:3808:e1e5:246e%6]) with mapi id 15.20.5944.019; Wed, 4 Jan 2023 23:15:33 +0000 From: "Guo Dong" To: "Lin, MarsX" , "devel@edk2.groups.io" CC: "Ni, Ray" , "Rhodes, Sean" , "Lu, James" , "Guo, Gua" Subject: Re: [PATCH] UefiPayloadPkg: remove the change that get platform specific logic Thread-Topic: [PATCH] UefiPayloadPkg: remove the change that get platform specific logic Thread-Index: AQHZH0c/GKyUOgVA+ke1kKeIN5fAm66O5haA Date: Wed, 4 Jan 2023 23:15:33 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CY5PR11MB6260:EE_|DM4PR11MB5502:EE_ x-ms-office365-filtering-correlation-id: 024ea62c-66cb-43ad-929d-08daeea994ac x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: R+3IE4QJdkoRScTtBQPT5XZkGQlGn7vC8AxDs/QkHw5EtVtcCCAIM/IhySh4oya5m3Py8ruHlWyql4lFTIGqS0Pjzy5F+Ai6hdh6KF94yyuux71ycssyJrssq+WAaGEWE1zGtpkQyjeezL2gmAC63qAuoqcXHdkEzMxMSf1VS1sVABdjJY35YuW1vndgVIy0QbaKw7ErxnZf/6QyH2F6kjHavurZ6qqN4Pou97Gy0oPUaD/qhvrfRmz9e8zhrVHr2azgEYrdIjFTXZtgCIFCxKNc9IugS+I6pOdeqcuNNfVBeU6S6eHMl7d3Us7CKgTAI59AjLL35zJDH+nryxRxy9AUpiim/Q8ecSAlrzsu7l25LBbPiFUApKc9LcHwPJ8uCLWS57IdTiM5G3EsZJ1e+wtUFumvsrCVEE4JzM51OLqnFE3J1/K80hK+oqgkVtstnurx2j/UQWLmidwYWk2LgURFuEXsNJpcD6UwLef7ejmq170+DC2CCUKs4K5NbZ4oQR2rKGgL+G9K1YC+valvkTP5Mw9FeEVn3gzHbOl4bgovThM4c+4MbizvJKhhmVT6um2+B05y7bYd8cnV51Znf/mJW6WaAf/JY2QMtAZ0F6ev/cazWzKAQWtFXDPEz0/N2XkTt3tXtTo2HX0vJ1HyWE+Lv0EomyS82kZROqTRkrs85IUxGFAvVHc+CkBXpg0jYTYrB+p+R0xP+OtH3rzbIZVcJj4LA1LTsdrrQ3TJ99E= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY5PR11MB6260.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(39860400002)(346002)(376002)(136003)(396003)(366004)(451199015)(83380400001)(186003)(53546011)(9686003)(7696005)(107886003)(33656002)(55016003)(6506007)(86362001)(122000001)(38070700005)(82960400001)(38100700002)(4326008)(8676002)(41300700001)(2906002)(5660300002)(8936002)(52536014)(71200400001)(478600001)(316002)(66556008)(966005)(66946007)(66476007)(19627235002)(54906003)(66446008)(76116006)(64756008)(110136005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?IVhOkzJFC123fHr/gzKtDyj4G/Bo25aRa0/uBMVjnJOwnBfIfd+psXZygqa7?= =?us-ascii?Q?cDd8/KkRXv9PWLH6dAWgk0cHMH1ptHAytUxTzLvO+TIWHaXV8KJaef/VXj3e?= =?us-ascii?Q?1542dbXpSQtQB6MsQw/FnxV+nNyjMf68qjFlO4HmLbmWyYwNY1ynAEV/IS1Q?= =?us-ascii?Q?FfCPvvQn/PRoF+bmovdP4O9hJJmGbyo7QQMHcy8sNGzwMr1h8/hdcuiI8VSl?= =?us-ascii?Q?K3TIiXt5GWHFMSRoWwaEPQCx8OLi0MyLl+1+0jp4Y6XOXlh0uF+C2GR2KyPj?= =?us-ascii?Q?gsluIJdUp2j2tknr0dVNziX7OgvSwUCR0eobspsluE3lHt+knlLZK3kPq5f1?= =?us-ascii?Q?mpLKSvWkNSqu+funlxQoXxHC4ylq1FjkW7zWVRus0SDek35iLrYOC7NkVzKB?= =?us-ascii?Q?p/y5ZpTEuiTve85F7hJ03QlwK8fBJ+fr6R4GKKBseX6uOsBqoOTe/xXqhbl8?= =?us-ascii?Q?E+PlA+/b0JGiUOp7uobfh9QofcUhkrlYt5swQPlJdiO2EmUwcrqAfvg7aS06?= =?us-ascii?Q?D9E+r0wjEHvYu8DNIzTt3KaGuhLTs4jxVbH1CUrlYIUCiQthF43T+NH9Pk8N?= =?us-ascii?Q?zOPfcQ9sCzcmGGb3ZUT+yB9nH9lrWfA1XwC+bQcIb6p7TkW/hi2E8RuhPCbw?= =?us-ascii?Q?3fAqKqRVcHIbUKa/kN+/27UzhX2u6X0l9dp5WTjdACJ/10xVh6jqsNLlOmuk?= =?us-ascii?Q?qnx9n8yrw9Jdc3kW4XNo7yzhM6EJG+Di7d4VEPk/06pRZivuKCxhDJHdEMTs?= =?us-ascii?Q?QtK9am0rZx2OKqv/7P3ytCHXKeLMvSOXA9WeO1bvcVfzqNs0GdZ5zrE539MU?= =?us-ascii?Q?cV1TzSHRbVf+4yIVQYniVjWZk0OdKABfUf9CTYkdkEt4dy6TMV2dWD7Zahq7?= =?us-ascii?Q?qNEee+bnSTulUhrDKevK0UYJN4OuPghZ/WRDOcDk4F7wbyuRnTQ5iEcI8Ff3?= =?us-ascii?Q?8d8ekieJRnqjoMVKdblRulrD3kH0vL0BNAhQiyf04umxhQGsm7yWivow9V7H?= =?us-ascii?Q?TJG1fd0PMYE07jDmIVcXh6ep2hai16tR73k8jo1B2eiO4kSrcu26H9D72XHZ?= =?us-ascii?Q?ca3OEzZNMelO0sOnKlMzkJlm4fXhSJqFXnZbW4TncmY2qkGsnWrNX671GfQ/?= =?us-ascii?Q?sZlCkvgl98KLHFqlES+d1zVvwodRvNaZsvhKyqqKLGzxkvhNH5hfQfUScQ1a?= =?us-ascii?Q?KvEt6GNC0GeNCMM0YJlrLESAtWAM/ukhVTXXF3IiKlKt5mOArQxcDyDXVZmC?= =?us-ascii?Q?8x6pYqVPJIuRqVwoh6HGRJDNYisaP3+q3Kz+g5nO689BZWnh0io+RzIYEz/N?= =?us-ascii?Q?JkuywFT+sSDqSbmw0Bd8/AMaNSIl95KtTWqyj6YD9OzxPArES0TQ0B015xdL?= =?us-ascii?Q?cxSkQGL1xwfFuEF9DRo5H+Vf+VpDj19C7U0X7BbjwY/NJrAwNpXJSW8GUJw6?= =?us-ascii?Q?fFUZNLI4SPdof3XKrZcMxZ4d7Bw1EsI9TOWe9LOc0rQsDg/Lh42lzU9mUFZ0?= =?us-ascii?Q?wMmaQKFq/aMQJ9qR4NA6i4ZtL2CsadEEO4OEVPthQqySrJ0wH83AaH6EfYtP?= =?us-ascii?Q?yYJpfD/Zy0ST9WUygiq6Jhm5CtkRs5C/fKXNNHn+6mHUqY2MTZWMXUYeVJke?= =?us-ascii?Q?zIBo7ff1GzuRPEBdGE+VIAoW14hR0FZ1Me/dJnjbV7Z6?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CY5PR11MB6260.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 024ea62c-66cb-43ad-929d-08daeea994ac X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2023 23:15:33.7399 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0Jx9sPa+PTWOz3c3MseJIROXS4mKnaUJZ3XrPbo36g/A0Re3ruSxgyWD5Ql5DbVhVp6ncq5oo+Yi0PvocuM/kQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5502 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Guo Dong -----Original Message----- From: Lin, MarsX =20 Sent: Tuesday, January 3, 2023 12:45 AM To: devel@edk2.groups.io Cc: Lin, MarsX ; Dong, Guo ; Ni, R= ay ; Rhodes, Sean ; Lu, James ; Guo, Gua Subject: [PATCH] UefiPayloadPkg: remove the change that get platform specif= ic logic From: MarsX Lin REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4241 Since UefiPayloadPkg had supported multiple firmware volume, remove the pla= tform specific logic via protocol Cc: Guo Dong Cc: Ray Ni Cc: Sean Rhodes Cc: James Lu Cc: Gua Guo Signed-off-by: MarsX Lin --- .../Protocol/PlatformBootManagerOverride.h | 84 ------------------- .../PlatformBootManager.c | 27 ------ .../PlatformBootManagerLib.inf | 1 - UefiPayloadPkg/UefiPayloadPkg.dec | 2 - 4 files changed, 114 deletions(-) delete mode 100644 UefiPayloadPkg/Include/Protocol/PlatformBootManagerOver= ride.h diff --git a/UefiPayloadPkg/Include/Protocol/PlatformBootManagerOverride.h = b/UefiPayloadPkg/Include/Protocol/PlatformBootManagerOverride.h deleted file mode 100644 index 878ddc044b..0000000000 --- a/UefiPayloadPkg/Include/Protocol/PlatformBootManagerOverride.h +++ /dev/null @@ -1,84 +0,0 @@ -/** @file- This file defines the Univeral Payload Platform BootManager Pr= otocol.-- Copyright (c) 2021, Intel Corporation. All rights reserved.
-= SPDX-License-Identifier: BSD-2-Clause-Patent-**/--#ifndef __PLATFORM_BOOT= _MANAGER_OVERRIDE_H__-#define __PLATFORM_BOOT_MANAGER_OVERRIDE_H__--/**- D= o the platform specific action before the console is connected.-- Such as:= - Update console variable;- Register new Driver#### or Boot####;- = Signal ReadyToLock event.-- This function will override the default behavi= or in PlatformBootManagerLib-**/-typedef-VOID-(EFIAPI *UNIVERSAL_PAYLOAD_PL= ATFORM_BOOT_MANAGER_OVERRIDE_BEFORE_CONSOLE)(- VOID- );--/**- Do the pla= tform specific action after the console is connected.-- Such as:- Dynam= ically switch output mode;- Signal console ready platform customized eve= nt;- Run diagnostics like memory testing;- Connect certain devices;- = Dispatch aditional option roms.-- This function will override the defau= lt behavior in PlatformBootManagerLib-**/-typedef-VOID-(EFIAPI *UNIVERSAL_P= AYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_AFTER_CONSOLE)(- VOID- );--/**- Th= is function is called each second during the boot manager waits the timeout= .- This function will override the default behavior in PlatformBootManager= Lib-- @param TimeoutRemain The remaining timeout.-**/-typedef-VOID-(EFIAP= I *UNIVERSAL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_WAIT_CALLBACK)(- UINT1= 6 TimeoutRemain- );--/**- The function is called when no boot op= tion could be launched,- including platform recovery options and options p= ointing to applications- built into firmware volumes.-- If this function = returns, BDS attempts to enter an infinite loop.- This function will overr= ide the default behavior in PlatformBootManagerLib-**/-typedef-VOID-(EFIAPI= *UNIVERSAL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_UNABLE_TO_BOOT)(- VOID-= );--///-/// Provides an interface to override the default behavior in Pla= tformBootManagerLib,-/// so platform can provide its own platform specific = logic through this protocol-///-typedef struct {- UNIVERSAL_PAYLOAD_PLATFO= RM_BOOT_MANAGER_OVERRIDE_BEFORE_CONSOLE BeforeConsole;- UNIVERSAL_PAYLO= AD_PLATFORM_BOOT_MANAGER_OVERRIDE_AFTER_CONSOLE AfterConsole;- UNIVERS= AL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_WAIT_CALLBACK WaitCallback;- = UNIVERSAL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_UNABLE_TO_BOOT UnableT= oBoot;-} UNIVERSAL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE_PROTOCOL;--extern= GUID gUniversalPayloadPlatformBootManagerOverrideProtocolGuid;--#endifdif= f --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager= .c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a92a260a6e..62637ae6aa 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -9,12 +9,9 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include "PlatformBootManager.h" #include "PlatformConsole.h"-#include #include #i= nclude -UNIVERSAL_PAYLOAD_PLATFORM_BOOT_MANAGER_OVERRIDE= _PROTOCOL *mUniversalPayloadPlatformBootManagerOverrideInstance =3D NULL;-= /** Signal EndOfDxe event and install SMM Ready to lock protocol. @@ -16= 7,17 +164,6 @@ PlatformBootManagerBeforeConsole ( EFI_INPUT_KEY CustomKey; EFI_INPUT_KEY = Down; EFI_BOOT_MANAGER_LOAD_OPTION BootOption;- EFI_STATUS = Status;-- Status =3D gBS->LocateProtocol (&gUniversalPayloadPlatfo= rmBootManagerOverrideProtocolGuid, NULL, (VOID **)&mUniversalPayloadPlatfor= mBootManagerOverrideInstance);- if (EFI_ERROR (Status)) {- mUniversalPa= yloadPlatformBootManagerOverrideInstance =3D NULL;- }-- if (mUniversalPay= loadPlatformBootManagerOverrideInstance !=3D NULL) {- mUniversalPayloadP= latformBootManagerOverrideInstance->BeforeConsole ();- return;- } //= // Register ENTER as CONTINUE key@@ -246,11 +232,6 @@ PlatformBootManage= rAfterConsole ( EDKII_PLATFORM_LOGO_PROTOCOL *PlatformLogo; EFI_STATUS = Status; - if (mUniversalPayloadPlatformBootManagerOverrideInstance = !=3D NULL) {- mUniversalPayloadPlatformBootManagerOverrideInstance->Afte= rConsole ();- return;- }- Black.Blue =3D Black.Green =3D Black.Red = =3D Black.Reserved =3D 0; White.Blue =3D White.Green =3D White.Red =3D Wh= ite.Reserved =3D 0xFF; @@ -297,10 +278,6 @@ PlatformBootManagerWaitCallback= ( UINT16 TimeoutRemain ) {- if (mUniversalPayloadPlatformBootManagerOv= errideInstance !=3D NULL) {- mUniversalPayloadPlatformBootManagerOverrid= eInstance->WaitCallback (TimeoutRemain);- }- return; } @@ -317,10 +294,6= @@ PlatformBootManagerUnableToBoot ( VOID ) {- if (mUniversalPayloadPlatformBootManagerOverrideInstance != =3D NULL) {- mUniversalPayloadPlatformBootManagerOverrideInstance->Unabl= eToBoot ();- }- return; } diff --git a/UefiPayloadPkg/Library/PlatformBo= otManagerLib/PlatformBootManagerLib.inf b/UefiPayloadPkg/Library/PlatformBo= otManagerLib/PlatformBootManagerLib.inf index 7ec93420f2..f9626175e2 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -60,7 +60,6 @@ gEfiBootLogoProtocolGuid ## CONSUMES gEfiDxeSmmReadyToLockProto= colGuid gEfiSmmAccess2ProtocolGuid- gUniversalPayloadPlatformBootManager= OverrideProtocolGuid gEfiSerialIoProtocolGuid gEfiPciRootBridgeIoProtoc= olGuid diff --git a/UefiPayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/Uefi= PayloadPkg.dec index 1ccfc32548..7d61d6eeae 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -52,8 +52,6 @@ # gPlatformGOPPolicyGuid =3D { 0xec2e931b, 0x3281, 0x= 48a5, { 0x81, 0x07, 0xdf, 0x8a, 0x8b, 0xed, 0x3c, 0x5d } } - gUniversalPay= loadPlatformBootManagerOverrideProtocolGuid =3D { 0xdb3fc2df, 0x7376, 0x4a8= d, { 0x82, 0xab, 0x91, 0x54, 0xa1, 0x36, 0xa6, 0x5a } }- ##################= ############################################################## # # PCD Decl= arations section - list of all PCDs Declared by this Package--=20 2.33.0.windows.2