From nobody Mon Feb 9 16:19:30 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+61669+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 159300573350677.41832710174833; Wed, 24 Jun 2020 06:35:33 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 3oCUYY1788612xhliOjERrkc; Wed, 24 Jun 2020 06:35:33 -0700 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.43]) by mx.groups.io with SMTP id smtpd.web10.13572.1593005730460556922 for ; Wed, 24 Jun 2020 06:35:31 -0700 X-Received: from DBBPR09CA0038.eurprd09.prod.outlook.com (2603:10a6:10:d4::26) by VI1PR08MB4223.eurprd08.prod.outlook.com (2603:10a6:803:b5::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22; Wed, 24 Jun 2020 13:35:26 +0000 X-Received: from DB5EUR03FT025.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:d4:cafe::cb) by DBBPR09CA0038.outlook.office365.com (2603:10a6:10:d4::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.21 via Frontend Transport; Wed, 24 Jun 2020 13:35:26 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+61669+1787277+3901457@groups.io; helo=web01.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT025.mail.protection.outlook.com (10.152.20.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22 via Frontend Transport; Wed, 24 Jun 2020 13:35:26 +0000 X-Received: ("Tessian outbound 147ff5d152c1:v59"); Wed, 24 Jun 2020 13:35:26 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: a206f9056f95f475 X-CR-MTA-TID: 64aa7808 X-Received: from 669ced7f55e9.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 0D7BD23D-E033-47B9-9E1C-F8DADE8B66FE.1; Wed, 24 Jun 2020 13:35:21 +0000 X-Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 669ced7f55e9.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 24 Jun 2020 13:35:21 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=deBXuAagfmltxGWQQhQ0XfcG0b/HF9xJT6oznvF3Q/Y36Lpabdbls7H7DrWOT4QOyAYOSJU1Huco7j9hV6ShNlOGK2RHrKhRLLHjVBxI5FfSHcCpDuUMfPTEd6XKqJU3FMRckszjNxDoWm9CiBDgcEmzeK/W1ZxKFtc4qOD/GaMYeYxMZXquOzO4ybeVO8Qi24In8aAppp5gs17+Yedf6D6PLqMFLeNg1zsc6M5N+H9lIO27JZRJo9yrcNB07mJuCjyskMnVD7p+2jSY8+MvNjE7xcRkEd5lDOQfjR+BNgH/g6r0aDV5LIGK5KirpcVGpt8vHMrFr+xuVrT8WBqTaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MWlXve2slNkgr+bHEvVtY8mi021in63dDwrjyWJDTyQ=; b=XTAQDGG6pU4oBNmdV92JokEq0Zq/NCK65W4CDh30HjhPR+oPgH9/1/6IrJN2O1NVujPTp4OhjP3f/51ILejyKTlgowQ9f+XMNH3aCnkzincT5WxgVE3rQkqv3eTvG3b/TtCba+Hwd9E0+CPo2dC7vV8QpfRpjU9EB+CWbvYtBjBSoM+SXmvnQeOnnvQEPK4nhRD4ywDA62yiNp8RMc3/RzNi63dJaz0HuIOUtDUEPyHZdxRwVkE+ty+Xy5/MEhFWLJl35eO4BQ7JuLdt6m8JOwYj6BBNDhbWYD7e5cgGTJXnmUI/42cRcjhr9SFcJ/DigkHQZfAH9oTjuylLf9Jc3A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=bestguesspass action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from AM6P194CA0072.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::49) by VI1PR0802MB2445.eurprd08.prod.outlook.com (2603:10a6:800:bb::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22; Wed, 24 Jun 2020 13:35:19 +0000 X-Received: from AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:84:cafe::81) by AM6P194CA0072.outlook.office365.com (2603:10a6:209:84::49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.21 via Frontend Transport; Wed, 24 Jun 2020 13:35:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT060.mail.protection.outlook.com (10.152.16.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3131.20 via Frontend Transport; Wed, 24 Jun 2020 13:35:19 +0000 X-Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1415.2; Wed, 24 Jun 2020 13:35:05 +0000 X-Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Wed, 24 Jun 2020 13:35:04 +0000 X-Received: from E107187.Arm.com (10.57.22.181) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.1415.2 via Frontend Transport; Wed, 24 Jun 2020 13:35:03 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , Subject: [edk2-devel] [PATCH v3 05/15] ArmVirtPkg: kvmtool platform memory map Date: Wed, 24 Jun 2020 14:34:48 +0100 Message-ID: <20200624133458.61920-6-sami.mujawar@arm.com> In-Reply-To: <20200624133458.61920-1-sami.mujawar@arm.com> References: <20200624133458.61920-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFTY:;SFS:(4636009)(136003)(376002)(346002)(39860400002)(396003)(46966005)(70586007)(356005)(83380400001)(70206006)(81166007)(5660300002)(2616005)(82740400003)(47076004)(44832011)(6666004)(1076003)(86362001)(426003)(2906002)(26005)(7696005)(186003)(336012)(4326008)(8676002)(54906003)(82310400002)(966005)(36756003)(316002)(6916009)(8936002)(478600001);DIR:OUT;SFP:1101; X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: df2deb46-e54a-4b7e-70a2-08d81843745a X-MS-TrafficTypeDiagnostic: VI1PR0802MB2445:|VI1PR08MB4223: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:7219;OLM:7219; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: c0ifcTdmjWFe3gSf5bPoyv9hQun2R9y1vvBnhh3nOvUowE9W+u4a5ycVwtrJ1Irfm8Nx+PxyRu46pNaI21lND3MffaO7+rFG/h0JwK4KSX+E8GhbPXmCaGH+IdPdBvxcp0dc6+7qrW+qWWP2/qG+vK8CP+xktaLfGVfySfReEcJLDMGCIfcm/BgZoKAqxIyNUiC8ZMTmNBomVHzCpkMWybDbduV/+ptxoVi4YfQZbAW05TfRdr5NV6dIBPI6HkwQpxXc+8ghNDAb6HY/YYqyDIonKAbF0a8XCwpr8F95cRIKGncdVtfcJwmki+7hr5uDU0wXqwKdzH6Hjlfxm4bN3vVbH1CgOKCrf3zmKTJjEY7w3TKFqaD8bZwA7tzv7GBL8uDXowwGNaeKqA6CYGhomNm72JHzWDV2S1RQj5ipZib0QF9hgC0a/dFkmzDK/EWaQWouai1xj/Av1HRNyfc1E/KLnRe09N0hQ3OQtdoICkU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2445 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT025.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 7572e2ac-3998-473a-36ba-08d818436fd9 X-Microsoft-Antispam-Message-Info: s/gVwr9HyK9hAqvxWyefqozVyFHpA/QU4B7s1llf0dr4VFN6I6tLreXZskv2M45JIdcOEBeXA/MszLzH+huHRA17/nUl/de3PlCNaNVCnK0y/xDGH7w/epi3L+pktxwUridKPdojXrJNorChRRV6FcFvLNJpmUw6wYy0oqK0aSsd1T8Wb9ITqlSPbU4ypAdZE2YqDQxpAUzdPo8/PO5RpQ2mCDvz2pj908NJmKv1y7ppvf3V6j4WcM/zJc5BLxd9NnN32opbIHdfAXz4n4yNkG8ZIYADwEMRGMmd3DsTjUZubdthyRjFj0BJYY1MUeSTpAZpLz6VNa1RmR7e9HMFifNvtoLKB2SiNJYBF5eoYlF2cH0SlmnpZYuzelsWpvJCGUUUK4SqAWFM3japdieVClAwSwULTnGRelxGRvzzdd5PlpSxlWr5rKOSTYFTjhU/7sAm3zpmIJ25A6aqhfblHQSyvZrtsQt8QX8U3bBKtCk= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Jun 2020 13:35:26.6804 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: df2deb46-e54a-4b7e-70a2-08d81843745a X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4223 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: cMoPRj2iWR9XKNWu3tHHtOinx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1593005733; bh=uJgnPvBpQQcM2N/NOuK6oXxkoykEkTjtAXYetRpkIJg=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=BirkZe9vHo0xRj/RNrF3hCDn6K2JkYi/ukJ9dBup9uvntS9mfqAqIQFL7bVGBbIglG/ ssPYBPT50azP8pGFDjXFLg3da3Jd06UycPit2JSDMVMy0HvJH6gNJbYTxG7UmkyW/WxSs utVQhtnL+iH9Y9vw5IIileYBC8bAIKQGH1w= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Kvmtool is a virtual machine manager that enables hosting KVM guests. Kvmtool allows to vary the hardware configuration of the virtual platform it provides to the guest partition. It provides the current hardware configuration to the firmware by handing off a device tree containing the hardware information. This library parses the kvmtool provided device tree and populates the system memory map for the kvmtool virtual platform. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel Acked-by: Laszlo Ersek --- Notes: v3: - Fix coding style, use "Txt" in LOG_VM_MAP(txt). [Laszlo] - Fixed coding style and also formatted log output. [Sami] Ref: https://edk2.groups.io/g/devel/topic/74200913#59548 v2: - Library to populate Kvmtool system memory map. [Sami] ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.c | 128 += +++++++++++++++++++ ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.inf | 42 += ++++++ 2 files changed, 170 insertions(+) diff --git a/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib= .c b/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.c new file mode 100644 index 0000000000000000000000000000000000000000..981c2b4aa29da2a797206c5770a= df30a761ff55c --- /dev/null +++ b/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.c @@ -0,0 +1,128 @@ +/** @file + + Copyright (c) 2018 - 2020, ARM Limited. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include +#include +#include +#include +#include +#include + +// Number of Virtual Memory Map Descriptors +#define MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS 5 + +#define MAX_REGION_NAME_LEN 32 + +#define LOG_MEM_MAP_HEADER() \ + DEBUG (( \ + DEBUG_ERROR, \ + "%-*a : %-18a : %-18a - %-18a : %-a\n", \ + MAX_REGION_NAME_LEN, \ + "Region", \ + "Physical Address", \ + "Virtual Address", \ + "Size", \ + "Attribute" \ + )); + +#define LOG_MEM_MAP(Txt) \ + DEBUG (( \ + DEBUG_ERROR, \ + "%-*a : 0x%016x : 0x%016x - 0x%016x : 0x%02x\n", \ + MAX_REGION_NAME_LEN, \ + Txt, \ + VirtualMemoryTable[Idx].PhysicalBase, \ + VirtualMemoryTable[Idx].VirtualBase, \ + VirtualMemoryTable[Idx].Length, \ + VirtualMemoryTable[Idx].Attributes \ + )); + +/** + Return the Virtual Memory Map of your platform + + This Virtual Memory Map is used by MemoryInitPei Module to initialize th= e MMU + on your platform. + + @param[out] VirtualMemoryMap Array of ARM_MEMORY_REGION_DESCRIPTOR + describing a Physical-to-Virtual Memory + mapping. This array must be ended by a + zero-filled entry. The allocated memory + will not be freed. + +**/ +VOID +ArmVirtGetMemoryMap ( + OUT ARM_MEMORY_REGION_DESCRIPTOR **VirtualMemoryMap + ) +{ + ARM_MEMORY_REGION_DESCRIPTOR *VirtualMemoryTable; + UINTN Idx =3D 0; + EFI_PHYSICAL_ADDRESS TopOfAddressSpace; + + ASSERT (VirtualMemoryMap !=3D NULL); + + TopOfAddressSpace =3D LShiftU64 (1ULL, ArmGetPhysicalAddressBits ()); + + VirtualMemoryTable =3D (ARM_MEMORY_REGION_DESCRIPTOR*) + AllocatePages ( + EFI_SIZE_TO_PAGES ( + sizeof (ARM_MEMORY_REGION_DESCRIPTOR) * + MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS + ) + ); + if (VirtualMemoryTable =3D=3D NULL) { + DEBUG (( + DEBUG_ERROR, + "%a: Error: Failed to Allocate Pages\n", + __FUNCTION__ + )); + return; + } + + LOG_MEM_MAP_HEADER (); + + // System DRAM + VirtualMemoryTable[Idx].PhysicalBase =3D PcdGet64 (PcdSystemMemoryBase); + VirtualMemoryTable[Idx].VirtualBase =3D VirtualMemoryTable[Idx].Physica= lBase; + VirtualMemoryTable[Idx].Length =3D PcdGet64 (PcdSystemMemorySize); + VirtualMemoryTable[Idx].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_WRI= TE_BACK; + LOG_MEM_MAP ("System DRAM Memory Map"); + + // Peripheral space before DRAM + VirtualMemoryTable[++Idx].PhysicalBase =3D 0x0; + VirtualMemoryTable[Idx].VirtualBase =3D 0x0; + VirtualMemoryTable[Idx].Length =3D PcdGet64 (PcdSystemMemoryBase= ); + VirtualMemoryTable[Idx].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_D= EVICE; + LOG_MEM_MAP ("Peripheral space before DRAM"); + + // Peripheral space after DRAM + VirtualMemoryTable[++Idx].PhysicalBase =3D PcdGet64 (PcdSystemMemoryBase= ) + + PcdGet64 (PcdSystemMemorySize); + VirtualMemoryTable[Idx].VirtualBase =3D VirtualMemoryTable[Idx].Physi= calBase; + VirtualMemoryTable[Idx].Length =3D TopOfAddressSpace - + VirtualMemoryTable[Idx].Physica= lBase; + VirtualMemoryTable[Idx].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_D= EVICE; + LOG_MEM_MAP ("Peripheral space after DRAM"); + + // Map the FV region as normal executable memory + VirtualMemoryTable[++Idx].PhysicalBase =3D PcdGet64 (PcdFvBaseAddress); + VirtualMemoryTable[Idx].VirtualBase =3D VirtualMemoryTable[Idx].Physica= lBase; + VirtualMemoryTable[Idx].Length =3D FixedPcdGet32 (PcdFvSize); + VirtualMemoryTable[Idx].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_WRI= TE_BACK; + LOG_MEM_MAP ("FV region"); + + // End of Table + VirtualMemoryTable[++Idx].PhysicalBase =3D 0; + VirtualMemoryTable[Idx].VirtualBase =3D 0; + VirtualMemoryTable[Idx].Length =3D 0; + VirtualMemoryTable[Idx].Attributes =3D (ARM_MEMORY_REGION_ATTRIBUTE= S)0; + + ASSERT((Idx + 1) <=3D MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS); + + *VirtualMemoryMap =3D VirtualMemoryTable; +} diff --git a/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib= .inf b/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.inf new file mode 100644 index 0000000000000000000000000000000000000000..dbf4ceabe3ae0db5e743e1d9a57= 5542dca32ed0a --- /dev/null +++ b/ArmVirtPkg/Library/KvmtoolVirtMemInfoLib/KvmtoolVirtMemInfoLib.inf @@ -0,0 +1,42 @@ +#/* @file +# +# Copyright (c) 2018, ARM Limited. All rights reserved. +# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +#*/ + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D KvmtoolVirtMemInfoLib + FILE_GUID =3D B752E953-394F-462C-811C-F8BE35C8C071 + MODULE_TYPE =3D BASE + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D ArmVirtMemInfoLib + +[Sources] + KvmtoolVirtMemInfoLib.c + +[Packages] + ArmPkg/ArmPkg.dec + ArmVirtPkg/ArmVirtPkg.dec + EmbeddedPkg/EmbeddedPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses] + ArmLib + BaseLib + BaseMemoryLib + DebugLib + MemoryAllocationLib + PcdLib + +[Pcd] + gArmTokenSpaceGuid.PcdFvBaseAddress + gArmTokenSpaceGuid.PcdSystemMemoryBase + gArmTokenSpaceGuid.PcdSystemMemorySize + +[FixedPcd] + gArmTokenSpaceGuid.PcdFvSize + --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#61669): https://edk2.groups.io/g/devel/message/61669 Mute This Topic: https://groups.io/mt/75081481/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-