From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 161E3940F3B for ; Mon, 13 May 2024 02:07:40 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=mtgaVdgdfn6dxVgv3EnPG6K7Km4sq2/jVj9ovZcIN44=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:msip_labels:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type; s=20240206; t=1715566059; v=1; b=gOw6UWsiNgXtOI6ZWw3gQC5LTLT0jA6cLu1elC0Ev7oQvaWHUEwulj2W4Sf3NiedPtwqF5Yd 9DCyYlpoeBaIpGKJIQmiPQ3A+IWHYOQvwvi4DZpZPFMvTLfOg8SwOEn20GJUgRC9ksNtDHmNHNO tsoxBBXodrYXSawPEbFOKetVHKdvKjhpvA648Rt4ICVxKKRrL0mR2Ul2SHJUjiBOB0cnlzCN4bm wjmHWCyOdsnj9nHvGqH4IKwNYu1Ijj9HaqeSkPygC6nqS9qokLu5uPhtkuU4G5pXSya6w1VZUFw ZV50es96qYl2LEcx1wQGADBKAVWEt+Q9lXmF0GNQ5tfow== X-Received: by 127.0.0.2 with SMTP id Hay0YY7687511xDRkeinEPNq; Sun, 12 May 2024 19:07:39 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.17]) by mx.groups.io with SMTP id smtpd.web11.51052.1715566058623694061 for ; Sun, 12 May 2024 19:07:38 -0700 X-CSE-ConnectionGUID: zz8KtsKiQoiGu6Pl56lCTA== X-CSE-MsgGUID: lCetyfBOSS6lkgVBf5AUgw== X-IronPort-AV: E=McAfee;i="6600,9927,11071"; a="11618397" X-IronPort-AV: E=Sophos;i="6.08,157,1712646000"; d="scan'208,217";a="11618397" X-Received: from orviesa007.jf.intel.com ([10.64.159.147]) by orvoesa109.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 May 2024 19:07:39 -0700 X-CSE-ConnectionGUID: TuRBacZ8Sd+ywmdxoDiocA== X-CSE-MsgGUID: d9cd8W0lQrG95I6wAE7MNQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,157,1712646000"; d="scan'208,217";a="30752315" X-Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orviesa007.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 12 May 2024 19:07:39 -0700 X-Received: from orsmsx602.amr.corp.intel.com (10.22.229.15) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Sun, 12 May 2024 19:07:37 -0700 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Sun, 12 May 2024 19:07:37 -0700 X-Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.101) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Sun, 12 May 2024 19:07:37 -0700 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com (2603:10b6:208:470::14) by MN2PR11MB4584.namprd11.prod.outlook.com (2603:10b6:208:264::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.55; Mon, 13 May 2024 02:07:36 +0000 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::41a4:c775:32e6:76a8]) by MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::41a4:c775:32e6:76a8%4]) with mapi id 15.20.7544.052; Mon, 13 May 2024 02:07:36 +0000 From: "Ni, Ray" To: "Tan, Dun" , "devel@edk2.groups.io" CC: Ard Biesheuvel , "Yao, Jiewen" , Gerd Hoffmann , "Wu, Jiaxin" Subject: Re: [edk2-devel] [PATCH 02/18] OvmfPkg: Save MTRR by lockbox in CpuS3DataDxe Thread-Topic: [PATCH 02/18] OvmfPkg: Save MTRR by lockbox in CpuS3DataDxe Thread-Index: AQHaosIVWX7XiF2ZOk64NItuBcqkobGUbxOl Date: Mon, 13 May 2024 02:07:36 +0000 Message-ID: References: <20240510100827.1903-1-dun.tan@intel.com> <20240510100827.1903-3-dun.tan@intel.com> In-Reply-To: <20240510100827.1903-3-dun.tan@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN6PR11MB8244:EE_|MN2PR11MB4584:EE_ x-ms-office365-filtering-correlation-id: 1e91a418-a624-4990-23c7-08dc72f17550 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?yoIhwKelVy4YOGPFmHd40bQlv+sLdugn/0119q0suOqQC1PoFT9JVK6uPMqv?= =?us-ascii?Q?COK8iCJxhErRrlWbVJCHAe3iyRk91xnwb3DMTtJ/4Kok+QwIy2cllk+/ZjRC?= =?us-ascii?Q?Cs0hRW8kKNeHe3iAEaXMHK55pXnYhaSD3x8zcrbgr95X1ETnVvGJk7KXQWCJ?= =?us-ascii?Q?hLOYgIFuibnnwXugQ1KTmt+Bmst2MuaUKX0fko/UqTRDP4vciAbroTYibgAm?= =?us-ascii?Q?xVsz0MT+reLPmqRm+QFJ23JPt8yO4IcqS5gR7j8A35WyUSo/V7rdniQQhoP2?= =?us-ascii?Q?8B1RvQYI/Km2DblDj6hPFOB5ylDvL9gKAZe0xCs7bImyt8yH2mRL+vIrJCbw?= =?us-ascii?Q?OAYj1snRam3aZ8PFaAQOD9PNQcUu+c+s8hOMtOV2J5gQxhoM3hY40Expe8VT?= =?us-ascii?Q?3g5FUeHJpEfb6zWKKvfkR4sVu/qGxVYj9fKdLZazJOvyobz8w/GLzGgCXCmo?= =?us-ascii?Q?wscQFY6Iz9qe8Hd3rW74GAKpslV9LYT+lW2Tc2YcAXe+nMNupV8eV9AlJnG6?= =?us-ascii?Q?sc5e0+LZ13EAZEJl6iYFCsk7XIz1erJoyVhABW3h+8pHbQuosc5IIdHBYd61?= =?us-ascii?Q?62eMq3GyWdFRIgHnuQPOZLC/q1VMQlVCY0BkufciQurNxCWO/yIm5UyWiTqz?= =?us-ascii?Q?qnuBesancyRrNGOLqXCRHmZBUnczbckkQB3CoMJwVAhqEgp2DbmrgyuuB9f3?= =?us-ascii?Q?zJ9MSjMn2MJsr+ktbXCkH5PNx1Qb+RYZnWYfd0QuDijiJnjjsmDlYEnteO7c?= =?us-ascii?Q?7qkdT+fIj5YvoLLh1XlgVe3tuiDkoeTkcsMbwEmjaigUB3MKLaHfHpcfx+dc?= =?us-ascii?Q?2ho2GJyOZIng+ckcMwpjMNT7I9+215G/jLB/grsMmheLhuccOOFabGfu+5Zs?= =?us-ascii?Q?fJRBTLLQJJxmjLq4P9yawBw1kvDsgLoE5gTMwUV7sA5c7fTFvplXvDha1C7m?= =?us-ascii?Q?pJh1VwpTjSJGeZQyAdww0hvhM3c09ndfwj3WYA2pDsQZRAOw4rnD0yCZR+xG?= =?us-ascii?Q?Uf9Bz2GWYqQhEco01+GoDA9aTEP+5nY1Ex2Z4o35tz8cZ+bmGz5WOIYjvwiF?= =?us-ascii?Q?tJHrDrrfTLBfJc72S4dhz59rObNfPkIfm/H6yXhUfed9zT3GB9ejsHY4EviB?= =?us-ascii?Q?C6nwHhLWAsSOyOIsjHXdEuuQq83fc5Aqf09kZ91McqcXTwzqVw8AYSwUcHeg?= =?us-ascii?Q?4bBSEkNQ5BiLk/5F8UmM/lRfjo+CzkcYZAOO7ytcRGMth4gliznizTFyqZvM?= =?us-ascii?Q?//Cy//i1SJ5BXUrBFz4RrZRMamUCOp1ePL+yfUhWGzqEh6wRE0WxynwlAzrf?= =?us-ascii?Q?kY+2sLuwPwuha6HFmLN8hdegLl2BUQhQma+xtGFA84hyAw=3D=3D?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?detritKyp47X1rr6U0A0nGXnqBuI2i0xZ5uXbwE2ItUMdjZnVJf+v5bzfNsa?= =?us-ascii?Q?15XJDE7rUyXt/jLYk+KpdBowJdzZoWVxQK7KfJKsQ0qD8ils8g3SRaoNAnjn?= =?us-ascii?Q?nJ02r9TURqI6yYtuT5iAW2mpFw5BRAucuK1wGkulDMEYmtYMF5/8WwhtRZYp?= =?us-ascii?Q?0ll0bdcmfjyHkxJ+M9rjtM9h5LHMFcvvE4eMZPqMft820i+86PKmp3NzgUPu?= =?us-ascii?Q?jaRiway8d9G/gatAUaEXUgTTY1WD0hpNgHI3lKPtE69ace/caoS4N4eJT7WV?= =?us-ascii?Q?LoBkuFshlAoMLx8N5LmnkolOdTifJGGNSjvKqmq/QH4IPzrGv810/7CqVWev?= =?us-ascii?Q?j+FB7S8fmn/4IJ5TbIn0dT/ocSBQcsbG4vb4HqqaA691vjl/b0A0RIoqzKtk?= =?us-ascii?Q?Ap5RLag9KC9/hIkQn51iJ1Xvv1sJchpr5LFnkjZ8vElIDg75B+uq3shp3ocO?= =?us-ascii?Q?OM6BBgMvl08uHX+BVeS7EIJ9AvW6+ZAwgbTLLRXqi/ioAdV3MPWe5HmgLEgV?= =?us-ascii?Q?J9leSOz6NOF+ImIspMY+QieY372sMduvjHH2K+Wng0kpXbwtLJ6qPiHNU0mi?= =?us-ascii?Q?ngTHlmpGr0yFBAMPyWj0oinj0NgETPOODnHGQl37BCDywS1CsVUwyIQ2OWcr?= =?us-ascii?Q?3PN+KI2JCK4WscJY8WoBoBaD2HTM8ZMpz8irmxcCMGSitrpohbzpCLpMHzVb?= =?us-ascii?Q?5lbhxZ04MrWUVHqwZy/BdsndlPzyl1SS1I484wDBJY1ZTMOgZLoNh5JUChGE?= =?us-ascii?Q?2vOZeHlYdupHgBroU7yt+/5VNV/0fz0aDhfXivp7NXRxewpD0P0JzjdP/wd2?= =?us-ascii?Q?f6ppkDhHUiC0XOorwjgzSu9RQq4R1GLLP/Jcxg0iW1h+CdtlxROk9O+DLlux?= =?us-ascii?Q?ZwQJx6F5xVZSAevETyC0P4cpedFPRWBuyXY3Se7IQEvhutkMF34X6KW9pcuI?= =?us-ascii?Q?lbnh9VeSexoZ9lG6sU5455xLgrlqcIelL1lmg4KUS2WFhwrrc27D/HGJY8bD?= =?us-ascii?Q?85jrHKDz6pTCmo4YWMs+oVhFpYYfT80xWLV8k3NxAbViVUT3S0IVWfrHghSY?= =?us-ascii?Q?pAOcu/qgZKyiCoFFv9uxK4NLlyogQpIvs91lkz7y/6Q9Gily9ykJvUD0gkB6?= =?us-ascii?Q?ALWJApkLmkJ66aVnb1NP/7PfTBhDnlcXrwsueucB8W9/h1oL8RfnMpfvpgLx?= =?us-ascii?Q?HfZx/6yC+sMjEHe1EydPKCCWobmNk/mXy6luC5Y1MT0XBFYL/Xtfl2nwZr0V?= =?us-ascii?Q?ZHQ9p8l5MVyamKCk4NbTLRA8VEPIsvPPfmOVKcxeJK0yJt1TqM+Jo8F6/7Kr?= =?us-ascii?Q?aU86yE+dvrEm4Pa1PybjYa9T1smeCwevcxvhAM6ed+bLGO1oRnZEy+A9S1Nh?= =?us-ascii?Q?pwndaFHBX6opr+DkPhZHnTnsdlywjMdDS0n+x49lf3Nbpyf3PcMgV/NU9vPd?= =?us-ascii?Q?7UtM5SPdGE2LziGPdhfNbNAkOGsNQnqP+sudpKpZdh85UF8TVrTNQ5od0YYh?= =?us-ascii?Q?a+qYPJUHFuo8SHMLw+R8rQhVvPttg2YkbveE14hk3G1NOoKhPlIH+1ZUTxde?= =?us-ascii?Q?i9d76HrN4/6SIlNUzIg=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN6PR11MB8244.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1e91a418-a624-4990-23c7-08dc72f17550 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 May 2024 02:07:36.0353 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: CikGwpU7n3wVzuvZIUcGA1mg5RebQdonyS5uhpCBmONR6zukCQTR7g0U/sUVdCpOhAFSOIP+L2fuANPuxhTfpA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4584 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Sun, 12 May 2024 19:07:38 -0700 Resent-From: ray.ni@intel.com Reply-To: devel@edk2.groups.io,ray.ni@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: FVBvWzGNWH2TikfsTEZ6M6cFx7686176AA= Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_MN6PR11MB8244B9C634A430D5B4239A318CE22MN6PR11MB8244namp_" X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=gOw6UWsi; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io --_000_MN6PR11MB8244B9C634A430D5B4239A318CE22MN6PR11MB8244namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Ray Ni Thanks, Ray ________________________________ From: Tan, Dun Sent: Friday, May 10, 2024 18:08 To: devel@edk2.groups.io Cc: Ard Biesheuvel ; Yao, Jiewen ; Gerd Hoffmann ; Ni, Ray ; Wu,= Jiaxin Subject: [PATCH 02/18] OvmfPkg: Save MTRR by lockbox in CpuS3DataDxe Save MTRR by lockbox in CpuS3DataDxe. In S3 boot, The MTRR setting will be restored in S3Resume.c in following patches. Then S3Resume.c will wakeup all APs to load the MTRR setting. This can avoid waking up APs in CpuS3.c. Signed-off-by: Dun Tan Cc: Ard Biesheuvel Cc: Jiewen Yao Cc: Gerd Hoffmann Cc: Ray Ni Cc: Jiaxin Wu --- OvmfPkg/CpuS3DataDxe/CpuS3Data.c | 11 +++++++++++ OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf | 2 ++ 2 files changed, 13 insertions(+) diff --git a/OvmfPkg/CpuS3DataDxe/CpuS3Data.c b/OvmfPkg/CpuS3DataDxe/CpuS3D= ata.c index 289048b75d..d1aba32842 100644 --- a/OvmfPkg/CpuS3DataDxe/CpuS3Data.c +++ b/OvmfPkg/CpuS3DataDxe/CpuS3Data.c @@ -26,6 +26,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include #include #include +#include #include #include @@ -130,6 +131,16 @@ CpuS3DataOnEndOfDxe ( DEBUG ((DEBUG_VERBOSE, "%a\n", __func__)); MtrrGetAllMtrrs (&AcpiCpuDataEx->MtrrTable); + // + // Save MTRR in lockbox + // + Status =3D SaveLockBox ( + &gEdkiiS3MtrrSettingGuid, + &AcpiCpuDataEx->MtrrTable, + sizeof (MTRR_SETTINGS) + ); + ASSERT_EFI_ERROR (Status); + // // Close event, so it will not be invoked again. // diff --git a/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf b/OvmfPkg/CpuS3DataDxe/C= puS3DataDxe.inf index 228d5ae1b2..f5032a9222 100644 --- a/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf +++ b/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf @@ -46,9 +46,11 @@ MtrrLib UefiBootServicesTableLib UefiDriverEntryPoint + LockBoxLib [Guids] gEfiEndOfDxeEventGroupGuid ## CONSUMES ## Event + gEdkiiS3MtrrSettingGuid [Protocols] gEfiMpServiceProtocolGuid ## CONSUMES -- 2.31.1.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118835): https://edk2.groups.io/g/devel/message/118835 Mute This Topic: https://groups.io/mt/106018122/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --_000_MN6PR11MB8244B9C634A430D5B4239A318CE22MN6PR11MB8244namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
Reviewed-by: Ray Ni <ray.ni@intel.com>



Thanks,
Ray

From: Tan, Dun <dun.tan@= intel.com>
Sent: Friday, May 10, 2024 18:08
To: devel@edk2.groups.io <devel@edk2.groups.io>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>; Yao, Jiewen &l= t;jiewen.yao@intel.com>; Gerd Hoffmann <kraxel@redhat.com>; Ni, Ra= y <ray.ni@intel.com>; Wu, Jiaxin <jiaxin.wu@intel.com>
Subject: [PATCH 02/18] OvmfPkg: Save MTRR by lockbox in CpuS3DataDxe=
 
Save MTRR by lockbox in CpuS3DataDxe. In S3 boot,<= br> The MTRR setting will be restored in S3Resume.c
in following patches. Then S3Resume.c will wakeup
all APs to load the MTRR setting. This can avoid
waking up APs in CpuS3.c.

Signed-off-by: Dun Tan <dun.tan@intel.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Jiaxin Wu <jiaxin.wu@intel.com>
---
 OvmfPkg/CpuS3DataDxe/CpuS3Data.c      | 11 += ++++++++++
 OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf |  2 ++
 2 files changed, 13 insertions(+)

diff --git a/OvmfPkg/CpuS3DataDxe/CpuS3Data.c b/OvmfPkg/CpuS3DataDxe/CpuS3D= ata.c
index 289048b75d..d1aba32842 100644
--- a/OvmfPkg/CpuS3DataDxe/CpuS3Data.c
+++ b/OvmfPkg/CpuS3DataDxe/CpuS3Data.c
@@ -26,6 +26,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #include <Library/MemoryAllocationLib.h>
 #include <Library/MtrrLib.h>
 #include <Library/UefiBootServicesTableLib.h>
+#include <Library/LockBoxLib.h>
 
 #include <Protocol/MpService.h>
 #include <Guid/EventGroup.h>
@@ -130,6 +131,16 @@ CpuS3DataOnEndOfDxe (
   DEBUG ((DEBUG_VERBOSE, "%a\n", __func__));
   MtrrGetAllMtrrs (&AcpiCpuDataEx->MtrrTable);
 
+  //
+  // Save MTRR in lockbox
+  //
+  Status =3D SaveLockBox (
+             &= amp;gEdkiiS3MtrrSettingGuid,
+             &= amp;AcpiCpuDataEx->MtrrTable,
+             s= izeof (MTRR_SETTINGS)
+             )= ;
+  ASSERT_EFI_ERROR (Status);
+
   //
   // Close event, so it will not be invoked again.
   //
diff --git a/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf b/OvmfPkg/CpuS3DataDxe/C= puS3DataDxe.inf
index 228d5ae1b2..f5032a9222 100644
--- a/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
+++ b/OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
@@ -46,9 +46,11 @@
   MtrrLib
   UefiBootServicesTableLib
   UefiDriverEntryPoint
+  LockBoxLib
 
 [Guids]
   gEfiEndOfDxeEventGroupGuid      =    ## CONSUMES   ## Event
+  gEdkiiS3MtrrSettingGuid
 
 [Protocols]
   gEfiMpServiceProtocolGuid      &= nbsp;   ## CONSUMES
--
2.31.1.windows.1

_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#118835) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--_000_MN6PR11MB8244B9C634A430D5B4239A318CE22MN6PR11MB8244namp_--