[*] Ignoring unsupported platform warning and continue execution
################################################################
##                                                            ##
##  CHIPSEC: Platform Hardware Security Assessment Framework  ##
##                                                            ##
################################################################
[CHIPSEC] Version 1.8.5
[CHIPSEC] Arguments: -i --log 1.txt

[CHIPSEC] API mode: using CHIPSEC kernel module API
[-] ERROR: Chipset requires a supported PCH to be loaded. Unknown PCH: VID = 0x8086, DID = 0x7A87, RID = 0x11
ERROR: Platform is not supported (Unknown PCH: VID = 0x8086, DID = 0x7A87, RID = 0x11).
WARNING: Platform dependent functionality is likely to be incorrect
[CHIPSEC] OS      : uefi   
[CHIPSEC] Python  : 3.6.8 (64-bit)
[CHIPSEC] Helper  : EfiHelper (None)
[CHIPSEC] Platform: ADL-S LGA 6+0
[CHIPSEC]      VID: 8086
[CHIPSEC]      DID: 4650
[CHIPSEC]      RID: 05
[CHIPSEC] PCH     : Default PCH
[CHIPSEC]      VID: 8086
[CHIPSEC]      DID: 7A87
[CHIPSEC]      RID: 11
 
[*] loading common modules from ".\chipsec\modules\common" ..
[*] No platform specific modules to load
[*] loading modules from ".\chipsec\modules" ..
[+] loaded chipsec.modules.common.bios_kbrd_buffer
[+] loaded chipsec.modules.common.bios_smi
[+] loaded chipsec.modules.common.bios_ts
[+] loaded chipsec.modules.common.bios_wp
[+] loaded chipsec.modules.common.cpu.cpu_info
[+] loaded chipsec.modules.common.cpu.ia_untrusted
[+] loaded chipsec.modules.common.cpu.spectre_v2
[+] loaded chipsec.modules.common.debugenabled
[+] loaded chipsec.modules.common.ia32cfg
[+] loaded chipsec.modules.common.me_mfg_mode
[+] loaded chipsec.modules.common.memconfig
[+] loaded chipsec.modules.common.memlock
[+] loaded chipsec.modules.common.remap
[+] loaded chipsec.modules.common.rtclock
[+] loaded chipsec.modules.common.secureboot.variables
[+] loaded chipsec.modules.common.sgx_check
[+] loaded chipsec.modules.common.smm
[+] loaded chipsec.modules.common.smm_code_chk
[+] loaded chipsec.modules.common.smm_dma
[+] loaded chipsec.modules.common.smrr
[+] loaded chipsec.modules.common.spd_wd
[+] loaded chipsec.modules.common.spi_access
[+] loaded chipsec.modules.common.spi_desc
[+] loaded chipsec.modules.common.spi_fdopss
[+] loaded chipsec.modules.common.spi_lock
[+] loaded chipsec.modules.common.uefi.access_uefispec
[+] loaded chipsec.modules.common.uefi.s3bootscript
[+] loaded chipsec.modules.common.wsmt
[*] running loaded modules ..

[*] running module: chipsec.modules.common.bios_kbrd_buffer
[x][ =======================================================================
[x][ Module: Pre-boot Passwords in the BIOS Keyboard Buffer
[x][ =======================================================================
[*] Keyboard buffer head pointer = 0x0 (at 0x41A), tail pointer = 0x0 (at 0x41C)
[*] Keyboard buffer contents (at 0x41E):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |                 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |                 
[*] Checking contents of the keyboard buffer..

[+] PASSED: Keyboard buffer looks empty. Pre-boot passwords don't seem to be exposed

[*] running module: chipsec.modules.common.bios_smi
[x][ =======================================================================
[x][ Module: SMI Events Configuration
[x][ =======================================================================
[+] SMM BIOS region write protection is enabled (SMM_BWP is used)

[*] Checking SMI enables..
ERROR: Exception occurred during chipsec.modules.common.bios_smi.run(): 'IOBAR (ABASE) base address is 0'

[*] running module: chipsec.modules.common.bios_ts
[x][ =======================================================================
[x][ Module: BIOS Interface Lock (including Top Swap Mode)
[x][ =======================================================================
ERROR: Exception occurred during chipsec.modules.common.bios_ts.run(): '[mmio] Base address was determined to be 0'

[*] running module: chipsec.modules.common.bios_wp
[x][ =======================================================================
[x][ Module: BIOS Region Write Protection
[x][ =======================================================================
[*] BC = 0xA6 << BIOS Control (b:d.f 00:31.0 + 0xDC)
    [00] BIOSWE           = 0 << BIOS Write Enable 
    [01] BLE              = 1 << BIOS Lock Enable 
    [02] SRC              = 1 << SPI Read Configuration 
    [04] TSS              = 0 << Top Swap Status 
    [05] SMM_BWP          = 1 << SMM BIOS Write Protection 
[+] BIOS region write protection is enabled (writes restricted to SMM)

[*] BIOS Region: Base = 0x008CE000, Limit = 0x00084FFF
SPI Protected Ranges
------------------------------------------------------------
PRx (offset) | Value    | Base     | Limit    | WP? | RP?
------------------------------------------------------------
PR0 (74)     | 0E0E0E0E | 00E0E000 | 00E0E000 | 0   | 0 
PR1 (78)     | 967FD27F | 0127F000 | 0167FFFF | 1   | 1 
PR2 (7C)     | D87FD65E | 0165E000 | 0187FFFF | 1   | 1 
PR3 (80)     | 9A8D9885 | 01885000 | 01A8DFFF | 1   | 1 
PR4 (84)     | D8859885 | 01885000 | 01885FFF | 1   | 1 

[!] None of the SPI protected ranges write-protect BIOS region

[+] PASSED: BIOS is write protected

[*] running module: chipsec.modules.common.cpu.cpu_info
[x][ =======================================================================
[x][ Module: Current Processor Information:
[x][ =======================================================================
[*] Thread 0000
[*] Processor: 12th Gen Intel(R) Core(TM) i5-12400
[*]            Family: 06 Model: 97 Stepping: 5
[*]            Microcode: 0000001F
[*]
[#] INFORMATION: Processor information displayed

[*] running module: chipsec.modules.common.cpu.ia_untrusted
[x][ =======================================================================
[x][ Module: IA_UNTRUSTED Check
[x][ =======================================================================
[*] Check that untrusted mode has been set.
[+] SoC_BIOS_DONE set.

[+] IA_UNTRUSTED set on thread 0.

[+] PASSED: IA_UNTRUSTED set on all threads

[*] running module: chipsec.modules.common.cpu.spectre_v2
[x][ =======================================================================
[x][ Module: Checks for Branch Target Injection / Spectre v2 (CVE-2017-5715)
[x][ =======================================================================
[*] CPUID.7H:EDX[26] = 1 Indirect Branch Restricted Speculation (IBRS) & Predictor Barrier (IBPB)
[*] CPUID.7H:EDX[27] = 1 Single Thread Indirect Branch Predictors (STIBP)
[*] CPUID.7H:EDX[29] = 1 IA32_ARCH_CAPABILITIES
[+] CPU supports IBRS and IBPB
[+] CPU supports STIBP
[*] Checking enhanced IBRS support in IA32_ARCH_CAPABILITIES...
[*]   cpu0: IBRS_ALL = 1
[+] CPU supports enhanced IBRS (on all logical CPU)
[*] Checking if OS is using Enhanced IBRS...
[*]   cpu0: IA32_SPEC_CTRL[IBRS] = 0
[*]   cpu0: IA32_SPEC_CTRL[STIBP] = 0
[-] OS doesn't seem to use Enhanced IBRS
[#] INFORMATION: Unable to determine if the OS uses STIBP
[!] WARNING: CPU supports mitigation (enhanced IBRS) but OS is not using it
[!] OS may be using software based mitigation (eg. retpoline)
[!] WARNING: Retpoline check not implemented in current environment

[*] running module: chipsec.modules.common.debugenabled
[x][ =======================================================================
[x][ Module: Debug features test
[x][ =======================================================================

[*] Checking IA32_DEBUG_INTERFACE MSR status
[+] CPU debug interface state is correct.

[*] Module Results:
[+] PASSED: All checks have successfully passed

[*] running module: chipsec.modules.common.ia32cfg
[x][ =======================================================================
[x][ Module: IA32 Feature Control Lock
[x][ =======================================================================
[*] Verifying IA32_Feature_Control MSR is locked on all logical CPUs..
[*] cpu0: IA32_FEATURE_CONTROL Lock = 1
[+] PASSED: IA32_FEATURE_CONTROL MSR is locked on all logical CPUs

[*] running module: chipsec.modules.common.me_mfg_mode
[x][ =======================================================================
[x][ Module: ME Manufacturing Mode
[x][ =======================================================================
[+] PASSED: ME is not in Manufacturing Mode

[*] running module: chipsec.modules.common.memconfig
[x][ =======================================================================
[x][ Module: Host Bridge Memory Map Locks
[x][ =======================================================================
[*]
[*] Checking legacy register lock state:
[+] PCI0.0.0_BDSM        = 0x        7C800001 - LOCKED   - Base Data of Stolen Memory
[+] PCI0.0.0_BGSM        = 0x        7C000001 - LOCKED   - Base of GTT Stolen Memory
[+] PCI0.0.0_DPR         = 0x        7B000007 - LOCKED   - DMA Protected Range
[+] PCI0.0.0_GGC         = 0x             2C1 - LOCKED   - Graphics Control
[!] Skipping Validation: Register PCI0.0.0_MESEG_MASK or field MELCK was not defined for this platform.
[+] PCI0.0.0_PAVPC       = 0x        80600087 - LOCKED   - Protected Audio Video Path Control
[!] Skipping Validation: Register PCI0.0.0_REMAPBASE or field LOCK was not defined for this platform.
[!] Skipping Validation: Register PCI0.0.0_REMAPLIMIT or field LOCK was not defined for this platform.
[+] PCI0.0.0_TOLUD       = 0x        80800001 - LOCKED   - Top of Low Usable DRAM
[+] PCI0.0.0_TOM         = 0x       800000001 - LOCKED   - Top of Memory
[+] PCI0.0.0_TOUUD       = 0x       87F800001 - LOCKED   - Top of Upper Usable DRAM
[+] PCI0.0.0_TSEGMB      = 0x        7B000001 - LOCKED   - TSEG Memory Base
[*]
[*] Checking if IA Untrusted mode is used to lock registers
[+] IA Untrusted mode set
[*]
[+] PASSED: All memory map registers seem to be locked down

[*] running module: chipsec.modules.common.memlock
[!] 'MSR_LT_LOCK_MEMORY.LT_LOCK' not defined for platform.  Skipping module.
Skipping module chipsec.modules.common.memlock since it is not supported in this platform

[*] running module: chipsec.modules.common.remap
[x][ =======================================================================
[x][ Module: Memory Remapping Configuration
[x][ =======================================================================
[*] Registers:
[*]   TOUUD     : 0x000000087F800001
[*]   REMAPLIMIT: 0x0000000000000000
[*]   REMAPBASE : 0x0000007FFFF00000
[*]   TOLUD     : 0x80800001
[*]   TSEGMB    : 0x7B000001

[*] Memory Map:
[*]   Top Of Upper Memory: 0x000000087F800000
[*]   Remap Limit Address: 0x00000000000FFFFF
[*]   Remap Base Address : 0x0000007FFFF00000
[*]   4GB                : 0x0000000100000000
[*]   Top Of Low Memory  : 0x0000000080800000
[*]   TSEG (SMRAM) Base  : 0x000000007B000000

[*] Checking memory remap configuration..
[*]   Memory Remap is disabled
[+]   All addresses are 1MB aligned
[*] Checking if memory remap configuration is locked..
[+]   TOUUD is locked
[+]   TOLUD is locked
[+]   REMAPBASE and REMAPLIMIT are locked
[+] PASSED: Memory Remap is configured correctly and locked

[*] running module: chipsec.modules.common.rtclock
[x][ =======================================================================
[x][ Module: Protected RTC memory locations
[x][ =======================================================================
ERROR: Exception occurred during chipsec.modules.common.rtclock.run(): '[mmio] Base address was determined to be 0'

[*] running module: chipsec.modules.common.secureboot.variables
[x][ =======================================================================
[x][ Module: Attributes of Secure Boot EFI Variables
[x][ =======================================================================
[*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:SecureBoot
[*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:SetupMode
[*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK
[+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK
[+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[*] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db
[+] Variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[*] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:dbx
[+] Variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:dbx is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)

[*] Secure Boot appears to be disabled
[+] PASSED: All Secure Boot UEFI variables are protected

[*] running module: chipsec.modules.common.sgx_check
[!] Currently this module cannot run within the EFI Shell. Exiting.
Skipping module chipsec.modules.common.sgx_check since it is not supported in this platform

[*] running module: chipsec.modules.common.smm
Either not a Core (client) platform or 'PCI0.0.0_SMRAMC' not defined for platform. Skipping module.
Skipping module chipsec.modules.common.smm since it is not supported in this platform

[*] running module: chipsec.modules.common.smm_code_chk
[x][ =======================================================================
[x][ Module: SMM_Code_Chk_En (SMM Call-Out) Protection
[x][ =======================================================================
[*] MSR_SMM_FEATURE_CONTROL = 0x00000005 << Enhanced SMM Feature Control (MSR 0x4E0 Thread 0x0)
    [00] LOCK             = 1 << Lock bit 
    [02] SMM_Code_Chk_En  = 1 << Prevents SMM from executing code outside the ranges defined by the SMRR 
[+] PASSED: SMM_Code_Chk_En is enabled and locked down

[*] running module: chipsec.modules.common.smm_dma
[x][ =======================================================================
[x][ Module: SMM TSEG Range Configuration Check
[x][ =======================================================================
[*] TSEG      : 0x000000007B000000 - 0x000000007BFFFFFF (size = 0x01000000)
[*] SMRR range: 0x000000007B000000 - 0x000000007BFFFFFF (size = 0x01000000)

[*] Checking TSEG range configuration..
[+] TSEG range covers entire SMRAM
[+] TSEG range is locked
[+] PASSED: TSEG is properly configured. SMRAM is protected from DMA attacks

[*] running module: chipsec.modules.common.smrr
[x][ =======================================================================
[x][ Module: CPU SMM Cache Poisoning / System Management Range Registers
[x][ =======================================================================
[+] OK. SMRR range protection is supported

[*] Checking SMRR range base programming..
[*] IA32_SMRR_PHYSBASE = 0x7B000006 << SMRR Base Address MSR (MSR 0x1F2 Thread 0x0)
    [00] Type             = 6 << SMRR memory type 
    [12] PhysBase         = 7B000 << SMRR physical base address 
[*] SMRR range base: 0x000000007B000000
[*] SMRR range memory type is Writeback (WB)
[+] OK so far. SMRR range base is programmed

[*] Checking SMRR range mask programming..
[*] IA32_SMRR_PHYSMASK = 0xFF000C00 << SMRR Range Mask MSR (MSR 0x1F3 Thread 0x0)
    [11] Valid            = 1 << SMRR valid 
    [12] PhysMask         = FF000 << SMRR address range mask 
[*] SMRR range mask: 0x00000000FF000000
[+] OK so far. SMRR range is enabled

[*] Verifying that SMRR range base & mask are the same on all logical CPUs..
[CPU0] SMRR_PHYSBASE = 000000007B000006, SMRR_PHYSMASK = 00000000FF000C00
[+] OK so far. SMRR range base/mask match on all logical CPUs
[*] Trying to read memory at SMRR base 0x7B000000..
[+] PASSED: SMRR reads are blocked in non-SMM mode

[+] PASSED: SMRR protection against cache attack is properly configured

[*] running module: chipsec.modules.common.spd_wd
[x][ =======================================================================
[x][ Module: SPD Write Disable
[x][ =======================================================================

[*] SMBUS_HCFG = 0x00 << Host Configuration (b:d.f 00:31.3 + 0x40)
    [00] HST_EN           = 0
    [01] SMB_SMI_EN       = 0
    [02] I2C_EN           = 0
    [03] SSRESET          = 0
    [04] SPD_WD           = 0
ERROR: Exception occurred during chipsec.modules.common.spd_wd.run(): 'IOBAR (SMBUS_BASE) base address is 0'

[*] running module: chipsec.modules.common.spi_access
[x][ =======================================================================
[x][ Module: SPI Flash Region Access Control
[x][ =======================================================================
SPI Flash Region Access Permissions
------------------------------------------------------------

BIOS Region Write Access Grant (3A):
  FREG0_FLASHD: 0
  FREG1_BIOS  : 1
  FREG2_ME    : 0
  FREG3_GBE   : 1
  FREG4_PD    : 1
  FREG5       : 1
BIOS Region Read Access Grant (78):
  FREG0_FLASHD: 0
  FREG1_BIOS  : 0
  FREG2_ME    : 0
  FREG3_GBE   : 1
  FREG4_PD    : 1
  FREG5       : 1
BIOS Region Write Access (5A):
  FREG0_FLASHD: 0
  FREG1_BIOS  : 1
  FREG2_ME    : 0
  FREG3_GBE   : 1
  FREG4_PD    : 1
  FREG5       : 0
BIOS Region Read Access (FB):
  FREG0_FLASHD: 1
  FREG1_BIOS  : 1
  FREG2_ME    : 0
  FREG3_GBE   : 1
  FREG4_PD    : 1
  FREG5       : 1
[*] Software has write access to Platform Data region in SPI flash (it's platform specific)
[!] WARNING: Software has write access to GBe region in SPI flash
[!] WARNING: Certain SPI flash regions are writeable by software

[*] running module: chipsec.modules.common.spi_desc
[x][ =======================================================================
[x][ Module: SPI Flash Region Access Control
[x][ =======================================================================
[*] FRAP = 0x3A785AFB << SPI Flash Regions Access Permissions Register (SPIBAR + 0x50)
    [00] BRRA             = FB << BIOS Region Read Access 
    [08] BRWA             = 5A << BIOS Region Write Access 
    [16] BMRAG            = 78 << BIOS Master Read Access Grant 
    [24] BMWAG            = 3A << BIOS Master Write Access Grant 
[*] Software access to SPI flash regions: read = 0xFB, write = 0x5A

[+] PASSED: SPI flash permissions prevent SW from writing to flash descriptor

[*] running module: chipsec.modules.common.spi_fdopss
[x][ =======================================================================
[x][ Module: SPI Flash Descriptor Security Override Pin-Strap
[x][ =======================================================================
[*] HSFS = 0x7D54 << Hardware Sequencing Flash Status Register (SPIBAR + 0x4)
    [00] FDONE            = 0 << Flash Cycle Done 
    [01] FCERR            = 0 << Flash Cycle Error 
    [02] AEL              = 1 << Access Error Log 
    [03] BERASE           = 2 << Block/Sector Erase Size 
    [05] SCIP             = 0 << SPI cycle in progress 
    [13] FDOPSS           = 1 << Flash Descriptor Override Pin-Strap Status 
    [14] FDV              = 1 << Flash Descriptor Valid 
    [15] FLOCKDN          = 0 << Flash Configuration Lock-Down 
[+] PASSED: SPI Flash Descriptor Security Override is disabled

[*] running module: chipsec.modules.common.spi_lock
[x][ =======================================================================
[x][ Module: SPI Flash Controller Configuration Locks
[x][ =======================================================================
[*] HSFS = 0x7D54 << Hardware Sequencing Flash Status Register (SPIBAR + 0x4)
    [00] FDONE            = 0 << Flash Cycle Done 
    [01] FCERR            = 0 << Flash Cycle Error 
    [02] AEL              = 1 << Access Error Log 
    [03] BERASE           = 2 << Block/Sector Erase Size 
    [05] SCIP             = 0 << SPI cycle in progress 
    [13] FDOPSS           = 1 << Flash Descriptor Override Pin-Strap Status 
    [14] FDV              = 1 << Flash Descriptor Valid 
    [15] FLOCKDN          = 0 << Flash Configuration Lock-Down 
[-] SPI Flash Controller configuration is not locked
[-] FAILED: SPI Flash Controller not locked correctly.

[*] running module: chipsec.modules.common.uefi.access_uefispec
[x][ =======================================================================
[x][ Module: Access Control of EFI Variables
[x][ =======================================================================
[*] Testing UEFI variables ..
[*] Variable StdDefaults (NV+BS+RT) Guid 4599D26F-1A11-49B8-B91F-858745CFF824 Size 0x6f41 
[*] Variable DeploymentModeNv (NV+BS+RT) Guid 97E8965F-C761-4F48-B6E4-9FFA9CB2A2D6 Size 0x1 
[*] Variable VendorKeysNv (NV+BS) Guid 550E42E1-B6FA-4E99-BBD9-1A901F001D7A Size 0x1 
[*] Variable dbx (NV+BS+RT+TBAWS) Guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F Size 0xe8c 
[*] Variable db (NV+BS+RT+TBAWS) Guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F Size 0x18b2 
[*] Variable KEK (NV+BS+RT+TBAWS) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xdf5 
[*] Variable PK (NV+BS+RT+TBAWS) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x376 
[*] Variable AsusSecureVerifyKey (NV+BS+RT) Guid E9ED4E6B-279B-4FBF-82E6-BDFCCAC54FF9 Size 0x10 
[*] Variable MemoryOverwriteRequestControl (NV+BS+RT) Guid E20939BE-32D4-41BE-A150-897F85D49829 Size 0x1 
[*] Variable ConIn (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x88 
[*] Variable CurrentActivePolicy (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1 
[*] Variable CurrentPolicy (NV+BS+RT+TBAWS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1 
[*] Variable BootDebugPolicyApplied (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1 
[*] Variable WindowsBootChainSvn (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x4 
[*] Variable BootingDeviceTypeInfo (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x4 
[*] Variable SecureBootSetup (NV+BS+RT) Guid 7B59104A-C00D-4158-87FF-F04D6396A915 Size 0x7 
[*] Variable SiPolicyOneTimeFix (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x4 
[*] Variable BootOrder (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x6 
[*] Variable Boot0000 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x12c 
[*] Variable Boot0001 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xa8 
[*] Variable FTMActiveFlag (NV+BS+RT) Guid 4034591C-48EA-4CDC-864F-E7CB61CFD0F2 Size 0x1 
[*] Variable MyFav (NV+BS+RT) Guid 4034591C-48EA-4CDC-864F-E7CB61CFD0F2 Size 0xea 
[*] Variable AmiWrapperSetup (NV+BS+RT) Guid C61C31A3-CB5D-46DD-9FE5-8A82BBC72483 Size 0x4 
[*] Variable Setup (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xd08 
[*] Variable PchSetup (NV+BS+RT) Guid 4570B7F1-ADE8-4943-8DC3-406472842384 Size 0x7f7 
[*] Variable HwErrRecSupport (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x2 
[*] Variable MonotonicCounter (NV+BS+RT) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x4 
[*] Variable AmiCspGlobalNvsPtrVar (NV+BS) Guid 1A8C8808-D6AD-46B3-95E4-82461B518601 Size 0x4 
[*] Variable MeSetup (NV+BS+RT) Guid 5432122D-D034-49D2-A6DE-65A829EB4C74 Size 0x37 
[*] Variable CMOSfailflag (NV+BS+RT) Guid C89DC9C7-5105-472C-A743-B1621E142B41 Size 0x2 
[*] Variable AsusRomLayout (NV+BS+RT) Guid 2E0585E9-2B5E-4F1E-BBEB-E632C5EF44B8 Size 0x10 
[*] Variable SmartDisplay (NV+BS+RT) Guid 3FB1E528-ED54-46FB-ACAD-9DA534DD1789 Size 0x1 
[*] Variable SaSetup (NV+BS+RT) Guid 72C5E28C-7783-43A1-8767-FAD73FCCAFA4 Size 0x499 
[*] Variable ReadDownPcieKeyFlag (NV+BS+RT) Guid 90FF5644-DA9A-40AC-A00E-CAF00840634F Size 0x4 
[*] Variable CapsuleLongModeBuffer (NV+BS) Guid 711C703F-C285-4B10-A3B0-36ECBD3C8BE2 Size 0x18 
[*] Variable InitSetupVariable (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x1 
[*] Variable HW_Change_Warning (NV+BS+RT) Guid 0025A1BF-FDC6-420A-8FC6-6CD9E4736A3B Size 0x8 
[*] Variable WdtPersistentData (NV+BS) Guid 78CE2354-CFBC-4643-AEBA-07A27FA892BF Size 0x1 
[*] Variable TPMPERBIOSFLAGS (NV+BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x6 
[*] Variable AMITCGPPIVAR (NV+BS+RT) Guid A8A2093B-FEFA-43C1-8E62-CE526847265E Size 0x18 
[*] Variable AsusFanSetupFeatures (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xd 
[*] Variable VARSTORE_OCMR_SETTINGS_AP_DATA_NAME (NV+BS+RT) Guid A3A3B874-7636-4182-BA1E-F52C584494E3 Size 0xc 
[*] Variable PCRBitmap (NV+BS) Guid 70FFF0FF-A543-45B9-8BE3-1BDB90412080 Size 0x14 
[*] Variable TcgInternalSyncFlag (NV+BS) Guid F3ED95DF-828E-41C7-BCA0-16C41965A634 Size 0x1 
[*] Variable FmpState (NV+BS) Guid 0EAB05C1-766A-4805-A039-3081DE0210C7 Size 0x14 
[*] Variable SysFwMeLsv (NV+BS) Guid 269BD1ED-2BC6-4979-B682-D9C8F5533DDF Size 0x4 
[*] Variable SPLC (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x9 
[*] Variable WAND (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x7 
[*] Variable WRDD (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x3 
[*] Variable WRDS (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0xc 
[*] Variable BRDS (NV+BS+RT) Guid 42780DD5-9A7D-404C-80E4-7F7094360394 Size 0x8 
[*] Variable EWRD (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x21 
[*] Variable WGDS (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x13 
[*] Variable SADS (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0x2 
[*] Variable GPC (NV+BS+RT) Guid 92DAAF2F-C02B-455B-B2EC-F5A3594F4AEA Size 0xd 
[*] Variable EsrtNonFmp (NV+BS) Guid 999BD818-7DF7-4A9A-A502-9B75033E6A0F Size 0x28 
[*] Variable WriteOnceStatus (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x40 
[*] Variable MotherBoardHealth (NV+BS+RT) Guid EA1FCAEE-3A77-4BB8-9B98-518E75D29A99 Size 0x10 
[*] Variable IntelRstFeatures (NV+BS+RT) Guid CA2FC9C8-71E7-4F72-B433-C284456FF72B Size 0x8 
[*] Variable IntelVmdOsVariable (NV+BS+RT) Guid 61A14FE8-4DAB-4A19-B1E3-97FB23D09212 Size 0x40 
[*] Variable UsbTypeC (NV+BS) Guid FC876842-D8F0-4844-AE32-1FF843797B17 Size 0x4 
[*] Variable OsIndications (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8 
[*] Variable BoardInfoSetup (NV+BS) Guid 1E785E1A-8EC4-49E4-8275-FBBDEDED18E7 Size 0xf 
[*] Variable SioSetupData (NV+BS) Guid 6B0CC1BC-910F-411E-B6CB-0E314D0BB8C1 Size 0x1 
[*] Variable NV_SIO0_LD5 (NV+BS) Guid 560BF58A-1E0D-4D7E-953F-2980A261E031 Size 0x3 
[*] Variable S3MemoryVariable (NV+BS) Guid 973218B9-1697-432A-8B34-4884B5DFB359 Size 0x18 
[*] Variable SmbiosEntryPointTable (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8 
[*] Variable SmbiosEntryPointTableF000 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8 
[*] Variable SmbiosV3EntryPointTable (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8 
[*] Variable SmbiosScratchBuffer (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8 
[*] Variable MaximumTableSize (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x2 
[*] Variable MemoryOverwriteRequestControlLock (NV+BS+RT) Guid BB983CCF-151D-40E1-A07B-4A17BE168292 Size 0x1 
[*] Variable SetupAPMFeatures (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x2 
[*] Variable BootState (NV+BS) Guid 60B5E939-0FCF-4227-BA83-6BBED45BC0E3 Size 0x1 
[*] Variable PreVgaInfo (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x4 
[*] Variable SIDSUPPORT (NV+BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x1 
[*] Variable PlatformFviSetupDataVar (NV+BS) Guid F375CC65-6065-48F3-8370-6C6533741D3F Size 0x9 
[*] Variable CpuSetup (NV+BS+RT) Guid B08F97FF-E6E8-4193-A997-5E9E9B0ADB32 Size 0x37a 
[*] Variable MeSetupStorage (NV+BS+RT) Guid 5432122D-D034-49D2-A6DE-65A829EB4C74 Size 0x11 
[*] Variable IccAdvancedSetupDataVar (NV+BS) Guid 64192DCA-D034-49D2-A6DE-65A829EB4C74 Size 0x8 
[*] Variable AsusHddSmartInfo (NV+BS+RT) Guid A6F44860-B2E8-4FDA-BD45-78368994B6AE Size 0x2 
[*] Variable PlatformLastLangCodes (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x38 
[*] Variable DefaultBootOrder (NV+BS+RT) Guid 45CF35F6-0D6E-4D04-856A-0370A5B16F53 Size 0x6 
[*] Variable EsrtFmp (NV+BS) Guid 999BD818-7DF7-4A9A-A502-9B75033E6A0F Size 0x50 
[*] Variable NVRAM_Verify (NV+BS+RT) Guid 15A9DD61-E4F8-4A99-80DB-353B13D76490 Size 0x2 
[*] Variable ConstructDefaults4FirstBoot (NV+BS) Guid C5912ED9-83C2-4BFF-9936-231FEB85F3E8 Size 0x8 
[*] Variable EvaluateDefaults4FirstBoot (NV+BS) Guid 4B4D31BE-88C6-446A-A4A9-4AD0F612B32E Size 0x8 
[*] Variable BiosEventLog (NV+BS+RT) Guid 4034591C-48EA-4CDC-864F-E7CB61CFD0F2 Size 0x66 
[*] Variable FPLayoutOrder (NV+BS+RT) Guid 4DB88A62-6721-47A0-9082-280B00323594 Size 0xa 
[*] Variable AsusQFanSetupData (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x48 
[*] Variable NV_SIO0_LD2 (NV+BS+RT) Guid 560BF58A-1E0D-4D7E-953F-2980A261E031 Size 0x3 
[*] Variable AmiHardwareSignatureSetupUpdateCountVar (NV+BS+RT) Guid 81C76078-BFDE-4368-9790-570914C01A65 Size 0x4 
[*] Variable PlatformConfigurationChange (NV+BS) Guid E3CACF62-3062-4E1D-978E-46807AB9747D Size 0x4 
[*] Variable AmiPeiVarStr (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x4f6 
[*] Variable FirstBootFlag (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x1 
[*] Variable BootFromUSB (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x1 
[*] Variable HSTI_RESULTS (NV+BS) Guid 8732B833-5367-422C-A77D-99E5B51039A8 Size 0x32f 
[*] Variable FastBootOption (NV+BS+RT) Guid B540A530-6978-4DA7-91CB-7207D764D262 Size 0x11c 
[*] Variable AcpiResetVar (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x10 
[*] Variable FirmwarePerformance (NV+BS) Guid C095791A-3001-47B2-80C9-EAC7319F2FA4 Size 0x10 
[*] Variable PreviousMemoryTypeInformation (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x40 
[*] Variable MemoryTypeInformation (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x40 
[*] Variable LastBootFailed (NV+BS+RT) Guid B540A530-6978-4DA7-91CB-7207D764D262 Size 0x4 
[*] Variable UnlockID (NV+BS) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x20 
[*] Variable UnlockIDCopy (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x20 
[*] Variable UIT_HEADER (NV+BS+RT) Guid FE47349A-7F0D-4641-822B-34BAA28ECDD0 Size 0x20 
[*] Variable UIT_DATA (NV+BS+RT) Guid FE47349A-7F0D-4641-822B-34BAA28ECDD0 Size 0x7 
[*] Variable VARSTORE_OCMR_SETTINGS_NAME (NV+BS+RT) Guid A3A3B874-7636-4182-BA1E-F52C584494E3 Size 0x4d05 
[*] Variable OemPortVar22 (NV+BS) Guid 1C1EAB81-9229-42AC-B940-757C498A09ED Size 0x7b5 
[*] Variable ProfileName1 (NV+BS+RT) Guid 4B5B31AE-024A-412B-B2F4-5C70632605C7 Size 0x1c 
[*] Variable OfflineUniqueIDRandomSeed (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x20 
[*] Variable OfflineUniqueIDRandomSeedCRC (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x4 
[*] Variable MemoryConfig (NV+BS) Guid C94F8C4D-9B9A-45FE-8A55-238B67302643 Size 0xf6c8 
[*] Variable Boot0002 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xb8 
[*] Variable PlatformLang (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x6 
[*] Variable Timeout (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x2 
[*] Variable AMITSESetup (NV+BS+RT) Guid C811FA38-42C8-4579-A9BB-60E94EDDFB34 Size 0x51 
[*] Variable NhltEndpointsTableConfigurationVariable (NV+BS+RT) Guid A1D89A3A-4A90-429D-4365-1F64C3A29614 Size 0x11 
[*] Variable SiSetup (NV+BS+RT) Guid AAF8E719-48F8-4099-A6F7-645FBD694C3D Size 0x7 
[*] Variable DebugConfigData (NV+BS+RT) Guid DE0A5E74-4E3E-3D96-A440-2C96ECBD3C97 Size 0x11 
[*] Variable PcieSataModVar (NV+BS+RT) Guid 5E9A565F-CDC0-413B-AD13-1FE8713FFDCD Size 0x3 
[*] Variable AsusHwmSetupOneof (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xb 
[*] Variable UsbSupport (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x31 
[*] Variable NetworkStackVar (NV+BS+RT) Guid D1405D16-7AFC-4695-BB12-41459D3695A2 Size 0x8 
[*] Variable SetupLedData (NV+BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xb 
[*] Variable SIBoardItemControl (NV+BS+RT) Guid 0024FD50-3BC1-436C-BDDD-2C92515C1285 Size 0x1f 
[*] Variable SetupMode (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1 
[*] Variable SecureBoot (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1 
[*] Variable SignatureSupport (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x90 
[*] Variable VendorKeys (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1 
[*] Variable AmiCpuSetupFeatures (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x34 
[*] Variable MeInfoSetup (BS) Guid 78259433-7B6D-4DB3-9AE8-36C4C2C3A17D Size 0x11 
[*] Variable BootMediaInfo (BS+RT) Guid 5BD6B672-B6EA-4D6A-B590-18A932B78794 Size 0xc 
[*] Variable UsbControllerNum (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x4 
[*] Variable UsbMassDevNum (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x2 
[*] Variable UsbMassDevValid (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x20 
[*] Variable BiosSettingMappingTableV2 (BS+RT) Guid B57086D5-C2E5-4654-9E3A-0B55830FBB32 Size 0x118 
[*] Variable PasswordMode (BS+RT) Guid 2B2A9752-FEAA-4F86-A313-4D4C7117CEE8 Size 0x3 
[*] Variable NBPlatformData (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xe 
[*] Variable NvmeDynamicSetupVar (BS) Guid BCBF9F27-91AB-4098-A21C-8BC16E089901 Size 0x4 
[*] Variable dbxDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xe8c 
[*] Variable dbDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x18b2 
[*] Variable KEKDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xdf5 
[*] Variable PKDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x376 
[*] Variable TpmServFlags (BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x8 
[*] Variable SetupVolatileData (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x6d 
[*] Variable SetupCpuFeatures (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x34 
[*] Variable SecurePchSmmVariableName (BS) Guid B8A9DE42-DC5B-4529-8C6A-8D89455B4F6E Size 0x4 
[*] Variable WpBufAddr (BS+RT) Guid CBA83C4A-A5FC-48A8-B3A6-D33636166544 Size 0x4 
[*] Variable CpuSetupVolatileData (BS+RT) Guid B08F97FF-E6E8-4193-A997-5E9E9B0ADB32 Size 0xa 
[*] Variable DebugSetupVolatileData (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x4 
[*] Variable IsaIrqMask (BS) Guid FC8BE767-89F1-4D6E-8099-6F021EBC87CC Size 0x2 
[*] Variable IsaDmaMask (BS) Guid FC8BE767-89F1-4D6E-8099-6F021EBC87CC Size 0x1 
[*] Variable PcieSataSetupVar (BS) Guid FAE2664D-C098-4DB5-9CD8-9B429CF93351 Size 0x24 
[*] Variable OsIndicationsSupported (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8 
[*] Variable VV_SIO0_LD2 (BS) Guid 560BF58A-1E0D-4D7E-953F-2980A261E031 Size 0x9 
[*] Variable VV_SIO0_LD5 (BS) Guid 560BF58A-1E0D-4D7E-953F-2980A261E031 Size 0x9 
[*] Variable SIO_DEV_STATUS_VAR (BS) Guid 5820DE98-FC8E-4B0B-A4B9-0A940D162A7E Size 0x2 
[*] Variable ConInDev (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x88 
[*] Variable IDESecDev (BS) Guid 3DD0DE67-02D7-4129-914A-9F377CC34B0D Size 0x92 
[*] Variable BootOptionSupport (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x4 
[*] Variable RstVmdV (BS+RT) Guid 193DFEFA-A445-4302-99D8-EF3AAD1A04C6 Size 0x26 
[*] Variable RstVmdD (BS) Guid 193DFEFA-A445-4302-99D8-EF3AAD1A04C6 Size 0x4 
[*] Variable EnWpData (BS+RT) Guid CBAB171F-F356-4009-BAAA-6628353A0A29 Size 0x40 
[*] Variable PlatformLangCodes (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x38 
[*] Variable CapsuleMax (BS+RT) Guid 39B68C46-F7FB-441B-B6EC-16B0F69821F3 Size 0x16 
[*] Variable BootManager (BS) Guid B4909CF3-7B93-4751-9BD8-5BA8220B9BB2 Size 0x2 
[*] Variable BootNowCount (BS) Guid 052E6EB0-F240-42C5-8309-45874545C6B4 Size 0x2 
[*] Variable DriverManager (BS) Guid C0B4FB05-15E5-4588-9FE9-B3D39C067715 Size 0x2 
[*] Variable BootFlow (BS) Guid EF152FB4-7B2F-427D-BDB4-7E0A05826E64 Size 0x4 
[*] Variable MeBackupStorage (BS) Guid 5432122D-D034-49D2-A6DE-65A829EB4C74 Size 0x11 
[*] Variable ColdReset (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0xd08 
[*] Variable SaColdReset (BS) Guid 72C5E28C-7783-43A1-8767-FAD73FCCAFA4 Size 0x499 
[*] Variable MeColdReset (BS) Guid 5432122D-D034-49D2-A6DE-65A829EB4C74 Size 0x37 
[*] Variable CpuColdReset (BS) Guid B08F97FF-E6E8-4193-A997-5E9E9B0ADB32 Size 0x37a 
[*] Variable PchColdReset (BS) Guid 4570B7F1-ADE8-4943-8DC3-406472842384 Size 0x7f7 
[*] Variable SiColdReset (BS) Guid AAF8E719-48F8-4099-A6F7-645FBD694C3D Size 0x7 
[*] Variable AmiWrapperColdReset (BS) Guid C61C31A3-CB5D-46DD-9FE5-8A82BBC72483 Size 0x4 
[*] Variable AmiGopPolicySetupData (BS) Guid C143929C-BF5D-423B-999B-0F2DD2B61FF7 Size 0x2 
[*] Variable ChildHandleDpVar0 (BS) Guid C143929C-BF5D-423B-999B-0F2DD2B61FF7 Size 0x1e 
[*] Variable NBGopPlatformData (BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x2 
[*] Variable SecureVarPresent (BS) Guid 7B59104A-C00D-4158-87FF-F04D6396A915 Size 0x6 
[*] Variable TcgNvmeVar (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x1 
[*] Variable SystemAccess (BS) Guid E770BB69-BCB4-4D04-9E97-23FF9456FEAC Size 0x1 
[*] Variable BbsPopupCalled (BS) Guid B540A530-6978-4DA7-91CB-7207D764D262 Size 0x4 
[*] Variable BootCurrent (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x2 
[*] Variable SLOTS DATA (BS) Guid E380280C-4C35-4AA3-B961-7AE489A2B926 Size 0xa8 
[*] Variable HiiDB (BS+RT) Guid 1B838190-4625-4EAD-ABC9-CD5E6AF18FE0 Size 0x8 
[*] Variable RsdpAddr (BS+RT) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x8 
[*] Variable path (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x298 
[*] Variable nonesting (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0xa 
[*] Variable cat (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa 
[*] Variable cd.. (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xc 
[*] Variable cd\ (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa 
[*] Variable copy (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6 
[*] Variable del (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6 
[*] Variable dir (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6 
[*] Variable md (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xc 
[*] Variable mem (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa 
[*] Variable mount (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x8 
[*] Variable move (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6 
[*] Variable ren (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6 
[*] Variable profiles (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x56 
[*] Variable uefishellsupport (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x2 
[*] Variable uefishellversion (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x6 
[*] Variable uefiversion (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x8 
[*] Variable cwd (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x18 
[*] Variable lasterror (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x6 

[+] PASSED: All checked EFI variables are protected according to spec.

[*] running module: chipsec.modules.common.uefi.s3bootscript
[x][ =======================================================================
[x][ Module: S3 Resume Boot-Script Protections
[x][ =======================================================================
[*] SMRAM: Base = 0x000000007B000000, Limit = 0x000000007BFFFFFF, Size = 0x01000000
[+] Didn't find any S3 boot-scripts in EFI variables
[!] WARNING: S3 Boot-Script was not found. Firmware may be using other ways to store/locate it, or OS might be blocking access.

[*] running module: chipsec.modules.common.wsmt
[x][ =======================================================================
[x][ Module: WSMT Configuration
[x][ =======================================================================
------------------------------------------------------------------
Windows SMM Mitigations Table (WSMT) Contents
------------------------------------------------------------------
FIXED_COMM_BUFFERS                  : True
COMM_BUFFER_NESTED_PTR_PROTECTION   : True
SYSTEM_RESOURCE_PROTECTION          : True
    
[+] PASSED: WSMT table is present and reports all supported mitigations.

[CHIPSEC] ***************************  SUMMARY  ***************************
[CHIPSEC] Time elapsed            6.000
[CHIPSEC] Modules total           28
[CHIPSEC] Modules failed to run   4:
ERROR: chipsec.modules.common.bios_smi
ERROR: chipsec.modules.common.bios_ts
ERROR: chipsec.modules.common.rtclock
ERROR: chipsec.modules.common.spd_wd
[CHIPSEC] Modules passed          16:
[+] PASSED: chipsec.modules.common.bios_kbrd_buffer
[+] PASSED: chipsec.modules.common.bios_wp
[+] PASSED: chipsec.modules.common.cpu.ia_untrusted
[+] PASSED: chipsec.modules.common.debugenabled
[+] PASSED: chipsec.modules.common.ia32cfg
[+] PASSED: chipsec.modules.common.me_mfg_mode
[+] PASSED: chipsec.modules.common.memconfig
[+] PASSED: chipsec.modules.common.remap
[+] PASSED: chipsec.modules.common.secureboot.variables
[+] PASSED: chipsec.modules.common.smm_code_chk
[+] PASSED: chipsec.modules.common.smm_dma
[+] PASSED: chipsec.modules.common.smrr
[+] PASSED: chipsec.modules.common.spi_desc
[+] PASSED: chipsec.modules.common.spi_fdopss
[+] PASSED: chipsec.modules.common.uefi.access_uefispec
[+] PASSED: chipsec.modules.common.wsmt
[CHIPSEC] Modules information     1:
[#] INFORMATION: chipsec.modules.common.cpu.cpu_info
[CHIPSEC] Modules failed          1:
[-] FAILED: chipsec.modules.common.spi_lock
[CHIPSEC] Modules with warnings   3:
[!] WARNING: chipsec.modules.common.cpu.spectre_v2
[!] WARNING: chipsec.modules.common.spi_access
[!] WARNING: chipsec.modules.common.uefi.s3bootscript
[CHIPSEC] Modules not implemented 0:
[CHIPSEC] Modules not applicable  3:
[*] NOT APPLICABLE: chipsec.modules.common.memlock
[*] NOT APPLICABLE: chipsec.modules.common.sgx_check
[*] NOT APPLICABLE: chipsec.modules.common.smm
[CHIPSEC] Modules with exceptions 4:
ERROR: chipsec.modules.common.bios_smi
ERROR: chipsec.modules.common.bios_ts
ERROR: chipsec.modules.common.rtclock
ERROR: chipsec.modules.common.spd_wd
[CHIPSEC] *****************************************************************
