From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id A8E12941238 for ; Tue, 31 Oct 2023 08:26:20 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=I52sU+tZIhw2X3dvumYqaTKeDwPrHZsrkIdyfzaYNFc=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:msip_labels:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type; s=20140610; t=1698740779; v=1; b=r/8FqBvsdvA4ZGHwM3ThFaJQmsIQ5hpo61x+DpobZIr99VnLCLrQCJdy7f54kQwAikZ4jugU v9cf8+WJazTGkR1ZGX5hJRrrtVWZeIb/3lG5axL77rqdhykUa3BsL06QViHkZkiSIgDhqs8QBEy RWvIhSTuscg4K7qI0BDy1NgA= X-Received: by 127.0.0.2 with SMTP id WYhbYY7687511xVceQDh8Ipc; Tue, 31 Oct 2023 01:26:19 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) by mx.groups.io with SMTP id smtpd.web10.181474.1698740773742238124 for ; Tue, 31 Oct 2023 01:26:13 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10879"; a="373289459" X-IronPort-AV: E=Sophos;i="6.03,265,1694761200"; d="scan'208,217";a="373289459" X-Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 01:26:13 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.03,265,1694761200"; d="scan'208,217";a="8628657" X-Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by fmviesa001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 31 Oct 2023 01:26:13 -0700 X-Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 31 Oct 2023 01:26:12 -0700 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34 via Frontend Transport; Tue, 31 Oct 2023 01:26:12 -0700 X-Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.40) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.34; Tue, 31 Oct 2023 01:26:12 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L5OSo5VgGKh23mUzANvfj4HomVxumCEeyCohXAO+WGXSvYp0b4cIbKN3sXIA2Fjn3ZWIwlY9RVLhoEZQgcp9hqIVmOMAWrCTig2RHbmYLHm3ZmfaLlQhGEPAe7gKA2WnXt8Uh8W5C/siu8EVVr4KC0/SnoadeAXLcJOWBkoeqQ8kjSTvwsB0TBETrGbr3y0dUQ4yDB2ld7yxRffMoOyAUOnOoJ6y/rRWdLpO1dayq5vkgmPaz2RrN15UFFF1GvMEVLopQ2sqhodWZvpt7Pa9bKFQa59FFVdy9Z+908BCXEJiJhWrOySGSyo2Bwov+A2F+mF2XCFfIOfSdhsREPQwhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pmEy3uBIhoHaColpraHBrCpyUHLSIVRRGRAyqQIyeRs=; b=A/ER1S1dQBfWbPPcNWw6ykouPlqKRNe03dpeU8iqGiB8FfHlx1xe9QbopfA1g+ujEU9LkmLHpNIPBzuiahStAKospsA+goMpphNpUU1iS+c+SsN6U0TqrkdbEvhtB4DEzMzeFxrTmsLURsVmKkONkh6t25/r+sX3Em0B8rokbEqddA9kGHNd2CDN1y9GbJpsDKWWmSGMPFcNMUmtDQTNoB8OcBTv1OxCM4iu54mth8Se0ZzHkT3VHyKwU/74bW9JR6jSSYnhyS8K4x6kKf9CbIIvgeG2Wxvttnvpyy1Wo5o4XXyH+eufjLZWLnbkYGuUbU1T0owmFVM5zzdq240Zqg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com (2603:10b6:208:470::14) by DS0PR11MB8207.namprd11.prod.outlook.com (2603:10b6:8:164::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6933.29; Tue, 31 Oct 2023 08:26:10 +0000 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::b614:1f5e:8b0c:9858]) by MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::b614:1f5e:8b0c:9858%4]) with mapi id 15.20.6933.026; Tue, 31 Oct 2023 08:26:10 +0000 From: "Ni, Ray" To: "devel@edk2.groups.io" , "Ni, Ray" CC: "Chiu, Chasel" , "Desimone, Nathaniel L" , "Duggapu, Chinni B" , "Ng, Ray Han Lim" , "Zeng, Star" , "Kuo, Ted" , "S, Ashraf Ali" , "Mohapatra, Susovan" Subject: Re: [edk2-devel] [PATCH] IntelFsp2Pkg/SwitchStack: Reserve 32B when calling C function in 64bit Thread-Topic: [edk2-devel] [PATCH] IntelFsp2Pkg/SwitchStack: Reserve 32B when calling C function in 64bit Thread-Index: AQHaC9N7djijmg8kPEKHV7LmiKoD4bBjj583 Date: Tue, 31 Oct 2023 08:26:10 +0000 Message-ID: References: <1793238D7061082B.20486@groups.io> In-Reply-To: <1793238D7061082B.20486@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN6PR11MB8244:EE_|DS0PR11MB8207:EE_ x-ms-office365-filtering-correlation-id: 213b764a-de2d-4348-7df8-08dbd9eb0964 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: V7Z6D30fxjpdUeZbz4Iw1BdYsB6/jJ1kqpOCt9Sa+9YbNuFtgMvmybRn9F0R0r3ub2+MvzKXDt58oTdOTdnB2bqfhhP5OqNJgpl5ti3WKA1jsjT/Mm4h0Ov8DCb1jjKRweIUqBWEUkQyFr3pndeee7nFxhohxG0+6exfebjGGEENPx+WTpla+86pWDrcCzteqXR6/mUY+hS3zLmuCo2NGvDXAGfTY0UXaz2tUcmJipuPaKussqyt5VUW3RLO3sZsA4ohoUyRvZgClwMA2OUJCILHr4GtSztP3o0eeWKLuvfZPdB49ZvXcDS5zf+99TFiyxUkaBzqpblioMlNqjrtOb7MZ8F2dAf1HxVp14fRSnve4wWUKUoLAoigdNEooqbMjIsY0Wx7kYfXUpKU2d6ZB3HWZGDLvCXVNvbMatK2Slh9kK9ALkS6NFackxwiECuicPjnUnfeJgdMAoPq9rMR9dr89kU9yTN+doGdnZycWpkTpWqZ+Q61u1ACL0MUFxEjqOjc3285CzzxeinF3RuPAo5otrAQdfd4VdU5r+SdvlgHrhLdAe427LAKymXW/EpUtd6Sa6T2wf1QjyJHUA/y3gJDWKXXrMGxX8LAzO1U+qSi0hfexUS5hj8vroC4YI4fU7y1jLelCd2lPZJPpnjyRw== x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?vG2P8Ylgow7WGD2jOmK506xQQe0uzARgZmkm6eNCjR/l383+mjZfLRpd85Hj?= =?us-ascii?Q?My79BSbvWB3ljNKfOD4XuMw3/ubOZRaDQ1ke8t3pTAOHyE8+XtHFTLK/uxNB?= =?us-ascii?Q?dq2/u8tXRaOLkRg7+py8doygfZCEyyspnPIUZcecuSBVlZvXCd5pisA60sth?= =?us-ascii?Q?1/cgla7HLpWbVYFEL6GkFtXGp++o9AnXEII0SXpSL6XdU/K84fH0C9va5Npb?= =?us-ascii?Q?IOCa7T0MjL4CPhkpeicW0aqyeg7Tzpc79ctaegf1Dn+MldJHqxR70RwMOtEj?= =?us-ascii?Q?fzHVe0Rl+ZO5ys7NHkgp0cT9cgqoK1NUeZpf3soqPLvs8KaRqTvJTuRPx745?= =?us-ascii?Q?ZTZ/PlZUuZMiWvib5iQnlCBvOrOcZEb2LI8OQ7p08tR+mbVRqu/MKdBs4eVx?= =?us-ascii?Q?F/Y/JkaIu5Rc6Uvksh/sXkQcDDiex4Nw7vr17/g/DAc3YyGESaUX36iF6wA8?= =?us-ascii?Q?75/CmkaIs6PLvhmIR+3PtjVntVPE3lLBKqVw+GU7qUKAIZiObZ/JKVMD3anL?= =?us-ascii?Q?d0hHuWl1bAwfc6Z1+6neg5FVE0CzZztBXcflMwlvckFOGtdF50ILsHVP/ozz?= =?us-ascii?Q?w3IMr+52ORxjY5TI7DMZN14cWLlPJEaSFspZtCtSyycW9f+jEhp/ShkLsZhq?= =?us-ascii?Q?TcfB3g3Qp1gkX0Pm5h3xxVKiP/fk2oGeEtgUi/cONZIIp0MCLKag1LTpKIAe?= =?us-ascii?Q?TZS9TFTL1N6Zf/7pjSCM7YdZc5xxVuBaRJ/Z5FvCKjL+ZW75mzaYnoAgzH52?= =?us-ascii?Q?iJQxvEgPBVzOMBT59mW+JkX8maPVk2ZL2Nur+yXYdW7biEAlUQbnh1SE31Fo?= =?us-ascii?Q?FAh0stdlY+N1ErIyIEnyLmJi5oh8SVo25+BwzFEXhO2A+qEYzw7TP4AHOG8P?= =?us-ascii?Q?pqL2MQvng/X7Xac6Gsjkp49rHmhnluvn9atns0GHyQCx7mu0KIp41atIX9WR?= =?us-ascii?Q?s7A+6FJsVWvsboLobdjQJldsUArDJtkOhcGSV/ksWpJfIze5ytW07nRet3Ar?= =?us-ascii?Q?SvapLYart6a+Pbn3B9+NFhjSpNQ8FZvk6mb7HImmeo5GEjVU28TpFyVnRwfL?= =?us-ascii?Q?+Sg+rS1fj6OdCRg6X/MUadkayzJoVcA6nXmBUIf3Cz6/UOWIuZzHwwDr/Hhl?= =?us-ascii?Q?TFUgZNMYxuc3/7ezuTqAkrsbSkIZitpl0HmElxN/U0cQ8ahEsiYXeVEKNhtj?= =?us-ascii?Q?MNmW+O2V6MWzNtcFkfcgqZgOFGZAmS6MPQ2Sht4B1Loqwd8bAjsS4oqDFRG+?= =?us-ascii?Q?l3VNLav5QqioLiUDtIqKuGbyGIIzRQY5lICOpW9K7F+uqJSm1zdyc7uRFhMc?= =?us-ascii?Q?H3ovaXvDcLXgjfeqNEYtnm7aTTDG/D6CW8e6LhMD0TyVDkWOGd0VYUt+9D7J?= =?us-ascii?Q?cSi4ov7Y/B5hC75MB+MzZ12ynCq07+ohJEIMfZg39TYZOjut3VndXchENwTj?= =?us-ascii?Q?T1YVCgGI+oa5hIXWekmT/YbczzQi0NRFnsMlvjdcBYVjJgSkj2G7sWJxz/MJ?= =?us-ascii?Q?r3UvOFnsYefBxpWM46V5IO9YSMRq6jqBkH+JuAgxf9PMMdb9d0V4DmIBzi7f?= =?us-ascii?Q?JvJ5C5HrpYQYhwVh0VQ=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN6PR11MB8244.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 213b764a-de2d-4348-7df8-08dbd9eb0964 X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Oct 2023 08:26:10.0631 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rtXiJpA+F595nwim3fOdhtXkf1NmP/7H25lT9lxYwLvFcA7QU4J2HJrgIK5pi2r51DrcL2c4cNLlIG5Cmksv0Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB8207 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ray.ni@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: Nm91Al9aL8wIYvuaWEbTKctlx7686176AA= Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_MN6PR11MB8244C0BE09A0EF77AD64510E8CA0AMN6PR11MB8244namp_" X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b="r/8FqBvs"; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io --_000_MN6PR11MB8244C0BE09A0EF77AD64510E8CA0AMN6PR11MB8244namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Sorry, I copied the maintainers from Maintainers.txt but forgot to change a= ll M/R to "Cc". That caused not all the maintainers/reviewers are CCed. I will fix the commit message before merging. Thanks, Ray ________________________________ From: devel@edk2.groups.io on behalf of Ni, Ray Sent: Tuesday, October 31, 2023 4:22 PM To: devel@edk2.groups.io Cc: Chiu, Chasel Subject: [edk2-devel] [PATCH] IntelFsp2Pkg/SwitchStack: Reserve 32B when ca= lling C function in 64bit When FSP runs in API mode, it saves the IDTR in its own stack then switches to bootloader's stack before it returns from FspMemoryInit. Next time when the bootloader calls TempRamExit, FSP switches to its own stack and restores IDTR from its stack saved earlier. However, due to a bug in BaseFspSwitchStackLib, the IDTR saved on FSP's stack might be corrupted that results the following TempRamExit call fails inside FSP due to PeiServices pointer cannot be retrieved from IDT.base - 8. The bug is the assembly code doesn't reserve 32 bytes before calling the C routine in 64bit. According to the x86-64 calling convention, caller is responsible for allocating 32 bytes of "shadow space" on the stack right before calling the function (regardless of the actual number of parameters used). When FSP is built in optimization-off mode, the C routine makes use of the 32-byte "shadow space" which is not reserved by the assembly caller. That causes the IDTR saved on the stack is corrupted by the C routine. The patch fixes so by reserving the 32 bytes before calling C routine. Signed-off-by: Ray Ni Cc: Chasel Chiu M: Nate DeSimone M: Duggapu Chinni B M: Ray Han Lim Ng R: Star Zeng R: Ted Kuo R: Ashraf Ali S R: Susovan Mohapatra --- IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm b/In= telFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm index 1ea1220608..e3a7cf002f 100644 --- a/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm +++ b/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm @@ -1,6 +1,6 @@ ;-------------------------------------------------------------------------= ----- ; -; Copyright (c) 2022, Intel Corporation. All rights reserved.
+; Copyright (c) 2022 - 2023, Intel Corporation. All rights reserved.
; SPDX-License-Identifier: BSD-2-Clause-Patent ; ; Abstract: @@ -60,7 +60,9 @@ ASM_PFX(FspSwitchStack): ; Load new stack mov rcx, rsp + sub rsp, 0x20 call ASM_PFX(SwapStack) + add rsp, 0x20 mov rsp, rax ; Restore previous contexts -- 2.39.1.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110384): https://edk2.groups.io/g/devel/message/110384 Mute This Topic: https://groups.io/mt/102293342/1712937 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/3759105/1712937/893644498= /xyzzy [ray.ni@intel.com] -=3D-=3D-=3D-=3D-=3D-=3D -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110385): https://edk2.groups.io/g/devel/message/110385 Mute This Topic: https://groups.io/mt/102293342/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/19134562= 12/xyzzy [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --_000_MN6PR11MB8244C0BE09A0EF77AD64510E8CA0AMN6PR11MB8244namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
Sorry, I copied the maintainers from Maintainers.txt but forgot to change a= ll M/R to "Cc". That caused not all the maintainers/reviewers are= CCed.
I will fix the commit message before merging.

Thanks,
Ray

From: devel@edk2.groups.io = <devel@edk2.groups.io> on behalf of Ni, Ray <ray.ni@intel.com><= br> Sent: Tuesday, October 31, 2023 4:22 PM
To: devel@edk2.groups.io <devel@edk2.groups.io>
Cc: Chiu, Chasel <chasel.chiu@intel.com>
Subject: [edk2-devel] [PATCH] IntelFsp2Pkg/SwitchStack: Reserve 32B = when calling C function in 64bit
 
When FSP runs in API mode, it saves the IDTR in it= s own stack then
switches to bootloader's stack before it returns from FspMemoryInit.
Next time when the bootloader calls TempRamExit, FSP switches to
its own stack and restores IDTR from its stack saved earlier.

However, due to a bug in BaseFspSwitchStackLib, the IDTR saved on
FSP's stack might be corrupted that results the following TempRamExit
call fails inside FSP due to PeiServices pointer cannot be retrieved
from IDT.base - 8.

The bug is the assembly code doesn't reserve 32 bytes before calling
the C routine in 64bit. According to the x86-64 calling convention,
caller is responsible for allocating 32 bytes of "shadow space" o= n the
stack right before calling the function (regardless of the actual
number of parameters used).

When FSP is built in optimization-off mode, the C routine makes use
of the 32-byte "shadow space" which is not reserved by the assemb= ly
caller. That causes the IDTR saved on the stack is corrupted by the
C routine.
The patch fixes so by reserving the 32 bytes before calling C routine.

Signed-off-by: Ray Ni <ray.ni@intel.com>
Cc: Chasel Chiu <chasel.chiu@intel.com>
M: Nate DeSimone <nathaniel.l.desimone@intel.com>
M: Duggapu Chinni B <chinni.b.duggapu@intel.com>
M: Ray Han Lim Ng <ray.han.lim.ng@intel.com>
R: Star Zeng <star.zeng@intel.com>
R: Ted Kuo <ted.kuo@intel.com>
R: Ashraf Ali S <ashraf.ali.s@intel.com>
R: Susovan Mohapatra <susovan.mohapatra@intel.com>
---
 IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm | 4 +++-  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm b/In= telFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm
index 1ea1220608..e3a7cf002f 100644
--- a/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm
+++ b/IntelFsp2Pkg/Library/BaseFspSwitchStackLib/X64/Stack.nasm
@@ -1,6 +1,6 @@
 ;--------------------------------------------------------------------= ----------

 ;

-; Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
+; Copyright (c) 2022 - 2023, Intel Corporation. All rights reserved.<BR= >

 ; SPDX-License-Identifier: BSD-2-Clause-Patent

 ;

 ; Abstract:

@@ -60,7 +60,9 @@ ASM_PFX(FspSwitchStack):
 

     ; Load new stack

     mov     rcx, rsp

+    sub     rsp, 0x20

     call    ASM_PFX(SwapStack)

+    add     rsp, 0x20

     mov     rsp, rax

 

     ; Restore previous contexts

--
2.39.1.windows.1



-=3D-=3D-=3D-=3D-=3D-=3D
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#110384): https://edk2.groups.io/g/devel/message/110384
Mute This Topic: https:/= /groups.io/mt/102293342/1712937
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/leave/3759105/1712937/893644498/xyzzy [r= ay.ni@intel.com]
-=3D-=3D-=3D-=3D-=3D-=3D


_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#110385) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--_000_MN6PR11MB8244C0BE09A0EF77AD64510E8CA0AMN6PR11MB8244namp_--