From nobody Wed May 8 06:39:18 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+93187+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93187+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=arm.com ARC-Seal: i=1; a=rsa-sha256; t=1662449976; cv=none; d=zohomail.com; s=zohoarc; b=cGdcZ/hFT+t9qMzvbtfjf1G9K8k4LCPAFS1WGMvWdczd3rYbBNVONBCHh9c1H5AluVX7YxMZFDIOvkHRx5+Gc0bJURYPQk242xBeoQgET276me49kebB6wc892pGFHbq/IlbtadOIuZ855H8PKFmZsOvulRbSp+AEXvDJLWfjWk= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1662449976; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:Message-ID:Reply-To:References:Sender:Subject:To; bh=u/BYwB9FPSjFk6bzvU4zyA0hHu7rfnyVoZehb1lvkHc=; b=lCMn6bRc++I7bw6PhskhmwvwhKF535aF5nXC2llE6n9K+2w6imegpbSmmc2WmLY2zn/xOZ22xBMpnfDeWS8i3QQvTi25MjCcL2Q1EpNU/lj6XGwGVdvf9HzhMrPhH32FJtSFunV2EdyXS0f58Ln+vmhdbbLPfSk9604mYDOCGRI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93187+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1662449976046762.5955451642551; Tue, 6 Sep 2022 00:39:36 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 7M72YY1788612xEnWPWH33nu; Tue, 06 Sep 2022 00:39:35 -0700 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web09.1276.1662449974574033186 for ; Tue, 06 Sep 2022 00:39:35 -0700 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 71E3D176A; Tue, 6 Sep 2022 00:39:40 -0700 (PDT) X-Received: from entos-thunderx2-desktop.shanghai.arm.com (entos-thunderx2-desktop.shanghai.arm.com [10.169.212.232]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id B52D43F73D; Tue, 6 Sep 2022 00:40:00 -0700 (PDT) From: "Jianyong Wu" To: devel@edk2.groups.io, Sami.Mujawar@arm.com Cc: ardb+tianocore@kernel.org, justin.he@arm.com, jianyong.wu@arm.com Subject: [edk2-devel] [PATCH v4 1/2] CloudHv/arm: add PeiMemInfoLib Date: Tue, 6 Sep 2022 15:39:20 +0800 Message-Id: <20220906073921.90729-2-jianyong.wu@arm.com> In-Reply-To: <20220906073921.90729-1-jianyong.wu@arm.com> References: <20220906073921.90729-1-jianyong.wu@arm.com> Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jianyong.wu@arm.com X-Gm-Message-State: ehv9yTJg1BDpRLV5cmErYU2vx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1662449975; bh=iBT70fe84kjQVIBKinoklw0yVDIdQD1yr7M+R+rEtIo=; h=Cc:Date:From:Reply-To:Subject:To; b=nvSUjQHzN+xuD4r0W1AnuJLgCRtl/7RCZuUaKShB8y3OZobIdJPrEZrKLXO+r+Ji/28 StDtCxOPTlPrkPjyarcGb3l7fSQQkfVY1lFQw+FE1X2z3V2jvzL4lEw/ngRGoY0CrbQGq wheXUA9GkmDbHaVnaCrYWW7rFbaCB5q7w54= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1662449977351100011 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Memory layout in CLoud Hypervisor for arm is changed and is different with Qemu, thus we should build its own PeiMemInfoLib. The main change in the memory layout is that normal ram may not contiguous under 4G. The top 64M under 4G is reserved for 32bit device. What this patch does: 1. get all of the memory node from DT; 2. Init page table for each memory node; 3. Add all of the memory nodes to Hob; Reviewed-by: Sami Mujawar Signed-off-by: Jianyong Wu --- .../CloudHvVirtMemInfoLib.c | 243 ++++++++++++++++++ .../CloudHvVirtMemInfoLib.h | 42 +++ .../CloudHvVirtMemInfoPeiLib.inf | 47 ++++ 3 files changed, 332 insertions(+) create mode 100644 ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMem= InfoLib.c create mode 100644 ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMem= InfoLib.h create mode 100644 ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMem= InfoPeiLib.inf diff --git a/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib= .c b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib.c new file mode 100644 index 0000000000..28a0c0b078 --- /dev/null +++ b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib.c @@ -0,0 +1,243 @@ +/** @file + + Copyright (c) 2022, Arm Limited. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include + +#include +#include +#include +#include +#include +#include +#include + +#include + +#include "CloudHvVirtMemInfoLib.h" + +CLOUDHV_MEM_NODE_INFO CloudHvMemNode[CLOUDHV_MAX_MEM_NODE_NUM]; + +/** + Get all of memory nodes info from DT. Store all of them into + CloudHvMemNode which will be consumed by ArmVirtGetMemoryMap. + + @retval RETURN_SUCCESS Success. + @retval EFI_NOT_FOUND DT or the first memory node not found. + +**/ +RETURN_STATUS +EFIAPI +CloudHvVirtMemInfoPeiLibConstructor ( + VOID + ) +{ + VOID *DeviceTreeBase; + EFI_RESOURCE_ATTRIBUTE_TYPE ResourceAttributes; + INT32 Node, Prev; + UINT64 FirMemNodeBase, FirMemNodeSize; + UINT64 CurBase, MemBase; + UINT64 CurSize; + CONST CHAR8 *Type; + INT32 Len; + CONST UINT64 *RegProp; + RETURN_STATUS PcdStatus; + UINT8 Index; + + ZeroMem (CloudHvMemNode, sizeof (CloudHvMemNode)); + + FirMemNodeBase =3D 0; + FirMemNodeSize =3D 0; + Index =3D 0; + MemBase =3D FixedPcdGet64 (PcdSystemMemoryBase); + ResourceAttributes =3D ( + EFI_RESOURCE_ATTRIBUTE_PRESENT | + EFI_RESOURCE_ATTRIBUTE_INITIALIZED | + EFI_RESOURCE_ATTRIBUTE_WRITE_BACK_CACHEABLE | + EFI_RESOURCE_ATTRIBUTE_TESTED + ); + DeviceTreeBase =3D (VOID *)(UINTN)PcdGet64 (PcdDeviceTreeInitialBaseAddr= ess); + if (DeviceTreeBase =3D=3D NULL) { + return EFI_NOT_FOUND; + } + + // + // Make sure we have a valid device tree blob + // + if (fdt_check_header (DeviceTreeBase) !=3D 0) { + return EFI_NOT_FOUND; + } + + // + // Look for the lowest memory node + // + for (Prev =3D 0; ; Prev =3D Node) { + Node =3D fdt_next_node (DeviceTreeBase, Prev, NULL); + if (Node < 0) { + break; + } + + // + // Check for memory node + // + Type =3D fdt_getprop (DeviceTreeBase, Node, "device_type", &Len); + if ((Type !=3D 0) && (AsciiStrnCmp (Type, "memory", Len) =3D=3D 0)) { + // + // Get the 'reg' property of this node. For now, we will assume + // two 8 byte quantities for base and size, respectively. + // + RegProp =3D fdt_getprop (DeviceTreeBase, Node, "reg", &Len); + if ((RegProp !=3D 0) && (Len =3D=3D (2 * sizeof (UINT64)))) { + CurBase =3D fdt64_to_cpu (ReadUnaligned64 (RegProp)); + CurSize =3D fdt64_to_cpu (ReadUnaligned64 (RegProp + 1)); + + DEBUG (( + DEBUG_INFO, + "%a: System RAM @ 0x%lx - 0x%lx\n", + __FUNCTION__, + CurBase, + CurBase + CurSize - 1 + )); + + // We should build Hob seperately for the memory node except the f= irst one + if (CurBase !=3D MemBase) { + BuildResourceDescriptorHob ( + EFI_RESOURCE_SYSTEM_MEMORY, + ResourceAttributes, + CurBase, + CurSize + ); + } else { + FirMemNodeBase =3D CurBase; + FirMemNodeSize =3D CurSize; + } + + CloudHvMemNode[Index].Base =3D CurBase; + CloudHvMemNode[Index].Size =3D CurSize; + Index++; + + if (Index >=3D CLOUDHV_MAX_MEM_NODE_NUM) { + DEBUG (( + DEBUG_WARN, + "%a: memory node larger than %d will not be included into Memo= ry System\n", + __FUNCTION__, + CLOUDHV_MAX_MEM_NODE_NUM + )); + break; + } + } else { + DEBUG (( + DEBUG_ERROR, + "%a: Failed to parse FDT memory node\n", + __FUNCTION__ + )); + } + } + } + + // + // Make sure the start of DRAM matches our expectation + // + if (FixedPcdGet64 (PcdSystemMemoryBase) !=3D FirMemNodeBase) { + return EFI_NOT_FOUND; + } + + PcdStatus =3D PcdSet64S (PcdSystemMemorySize, FirMemNodeSize); + ASSERT_RETURN_ERROR (PcdStatus); + ASSERT ( + (((UINT64)PcdGet64 (PcdFdBaseAddress) + + (UINT64)PcdGet32 (PcdFdSize)) <=3D FirMemNodeBase) || + ((UINT64)PcdGet64 (PcdFdBaseAddress) >=3D (FirMemNodeBase + FirMemNode= Size)) + ); + + return RETURN_SUCCESS; +} + +/** + Return the Virtual Memory Map of your platform + + This Virtual Memory Map is used by MemoryInitPei Module to initialize th= e MMU + on your platform. + + @param[out] VirtualMemoryMap Array of ARM_MEMORY_REGION_DESCRIPTOR + describing a Physical-to-Virtual Memory + mapping. This array must be ended by a + zero-filled entry. The allocated memory + will not be freed. + +**/ +VOID +ArmVirtGetMemoryMap ( + OUT ARM_MEMORY_REGION_DESCRIPTOR **VirtualMemoryMap + ) +{ + ARM_MEMORY_REGION_DESCRIPTOR *VirtualMemoryTable; + UINT8 Index, MemNodeIndex; + + ASSERT (VirtualMemoryMap !=3D NULL); + + VirtualMemoryTable =3D AllocatePool ( + sizeof (ARM_MEMORY_REGION_DESCRIPTOR) * + MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS + ); + + if (VirtualMemoryTable =3D=3D NULL) { + DEBUG ((DEBUG_ERROR, "%a: Error: Failed AllocatePool()\n", __FUNCTION_= _)); + return; + } + + Index =3D 0; + MemNodeIndex =3D 0; + // System DRAM + while ((MemNodeIndex < CLOUDHV_MAX_MEM_NODE_NUM) && (CloudHvMemNode[MemN= odeIndex].Size !=3D 0)) { + VirtualMemoryTable[Index].PhysicalBase =3D CloudHvMemNode[MemNodeIndex= ].Base; + VirtualMemoryTable[Index].VirtualBase =3D CloudHvMemNode[MemNodeIndex= ].Base; + VirtualMemoryTable[Index].Length =3D CloudHvMemNode[MemNodeIndex= ].Size; + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE= _WRITE_BACK; + + DEBUG (( + DEBUG_INFO, + "%a: Dumping System DRAM Memory Node%d Map:\n" + "\tPhysicalBase: 0x%lX\n" + "\tVirtualBase: 0x%lX\n" + "\tLength: 0x%lX\n", + __FUNCTION__, + MemNodeIndex, + VirtualMemoryTable[Index].PhysicalBase, + VirtualMemoryTable[Index].VirtualBase, + VirtualMemoryTable[Index].Length + )); + Index++; + MemNodeIndex++; + } + + // Memory mapped peripherals (UART, RTC, GIC, virtio-mmio, etc) + VirtualMemoryTable[Index].PhysicalBase =3D MACH_VIRT_PERIPH_BASE; + VirtualMemoryTable[Index].VirtualBase =3D MACH_VIRT_PERIPH_BASE; + VirtualMemoryTable[Index].Length =3D MACH_VIRT_PERIPH_SIZE; + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_D= EVICE; + Index++; + + // Map the FV region as normal executable memory + VirtualMemoryTable[Index].PhysicalBase =3D PcdGet64 (PcdFvBaseAddress); + VirtualMemoryTable[Index].VirtualBase =3D VirtualMemoryTable[Index].Phy= sicalBase; + VirtualMemoryTable[Index].Length =3D FixedPcdGet32 (PcdFvSize); + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_W= RITE_BACK; + Index++; + + // Memory mapped for 32bit device (like TPM) + VirtualMemoryTable[Index].PhysicalBase =3D TOP_32BIT_DEVICE_BASE; + VirtualMemoryTable[Index].VirtualBase =3D TOP_32BIT_DEVICE_BASE; + VirtualMemoryTable[Index].Length =3D TOP_32BIT_DEVICE_SIZE; + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_D= EVICE; + Index++; + + // End of Table + ZeroMem (&VirtualMemoryTable[Index], sizeof (ARM_MEMORY_REGION_DESCRIPTO= R)); + + *VirtualMemoryMap =3D VirtualMemoryTable; +} diff --git a/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib= .h b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib.h new file mode 100644 index 0000000000..32d3379bf1 --- /dev/null +++ b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoLib.h @@ -0,0 +1,42 @@ +/** @file + + Copyright (c) 2022, Arm Limited. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef CLOUDHV_VIRT_MEM_INFO_LIB_H_ +#define CLOUDHV_VIRT_MEM_INFO_LIB_H_ + +// +// Cloud Hypervisor may have more than one memory nodes. Even there is no = limit for that, +// I think 10 is enough in general. +// +#define CLOUDHV_MAX_MEM_NODE_NUM 10 + +// Record memory node info (base address and size) +typedef struct { + UINT64 Base; + UINT64 Size; +} CLOUDHV_MEM_NODE_INFO; + +// Number of Virtual Memory Map Descriptors +#define MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS (4 + CLOUDHV_MAX_MEM_NODE_NUM) + +// +// Core peripherals such as the UART, the GIC and the RTC are +// all mapped in the 'miscellaneous device I/O' region, which we just map +// in its entirety rather than device by device. Note that it does not +// cover any of the NOR flash banks or PCI resource windows. +// +#define MACH_VIRT_PERIPH_BASE 0x00400000 +#define MACH_VIRT_PERIPH_SIZE 0x0FC00000 + +// +// The top of the 64M memory region under 4GB reserved for device +// +#define TOP_32BIT_DEVICE_BASE 0xFC000000 +#define TOP_32BIT_DEVICE_SIZE 0x04000000 + +#endif // CLOUDHV_VIRT_MEM_INFO_LIB_H_ diff --git a/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoPei= Lib.inf b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoPeiLib= .inf new file mode 100644 index 0000000000..666b5d9711 --- /dev/null +++ b/ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMemInfoPeiLib.inf @@ -0,0 +1,47 @@ +## @file +# Cloud Hypervisor virtual memory map library. +# +# Copyright (c) 2022, Arm Limited. All rights reserved. +# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D CloudHvVirtMemInfoPeiLib + FILE_GUID =3D c7ada233-d35b-49c3-aa51-e2b5cd80c910 + MODULE_TYPE =3D BASE + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D ArmVirtMemInfoLib|PEIM + CONSTRUCTOR =3D CloudHvVirtMemInfoPeiLibConstructor + +[Sources] + CloudHvVirtMemInfoLib.c + CloudHvVirtMemInfoLib.h + +[Packages] + ArmPkg/ArmPkg.dec + ArmVirtPkg/ArmVirtPkg.dec + EmbeddedPkg/EmbeddedPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses] + ArmLib + BaseMemoryLib + DebugLib + FdtLib + MemoryAllocationLib + PcdLib + +[Pcd] + gArmTokenSpaceGuid.PcdFdBaseAddress + gArmTokenSpaceGuid.PcdFvBaseAddress + gArmTokenSpaceGuid.PcdSystemMemoryBase + gArmTokenSpaceGuid.PcdSystemMemorySize + +[FixedPcd] + gArmTokenSpaceGuid.PcdFdSize + gArmTokenSpaceGuid.PcdFvSize + gArmVirtTokenSpaceGuid.PcdDeviceTreeInitialBaseAddress --=20 2.17.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#93187): https://edk2.groups.io/g/devel/message/93187 Mute This Topic: https://groups.io/mt/93496216/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Wed May 8 06:39:18 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+93188+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93188+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=arm.com ARC-Seal: i=1; a=rsa-sha256; t=1662449979; cv=none; d=zohomail.com; s=zohoarc; b=RWJ3aAdn58OVajy+ijhgZ9dzPLnYfV5MUnmdwTyC/G6lzMCc3+XVnt4sy4CQp/y/XB2m5/ylrA/QPecS5+VBb/RVoaAOIOv4m8kOff0XyNBAGHRLr7c0xnwUAqISm0+6j/Ww4aoKE496xj0sl9ggedh9kJXFRQNkhBpVqJtkO/s= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1662449979; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:Message-ID:Reply-To:References:Sender:Subject:To; bh=QjyGh8jByOKlycjZs99sdubTfo0E8l/1eOQi3+HpS6A=; b=NWW8nQNf8QGb5XIXAyTPsXmcZ35OfNNJFKx0Llux9RbX3jC33F8Nk3SUZX2RLtNSz3zMKWOvHevH35uRJdxq2e2Nirl0e6GRFhGzbudOMxa9Kb401hM0EdlFEq7YwPiUKRb37DGD9L+WpSmDDKpncXEzsb/g9LJ2QnZQuz9hHJY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93188+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1662449979148759.0737840174822; Tue, 6 Sep 2022 00:39:39 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 9tXHYY1788612xVVvJ4ToIuA; Tue, 06 Sep 2022 00:39:37 -0700 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web08.1335.1662449976881302138 for ; Tue, 06 Sep 2022 00:39:37 -0700 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C81B6139F; Tue, 6 Sep 2022 00:39:42 -0700 (PDT) X-Received: from entos-thunderx2-desktop.shanghai.arm.com (entos-thunderx2-desktop.shanghai.arm.com [10.169.212.232]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 0E9C83F7D8; Tue, 6 Sep 2022 00:40:02 -0700 (PDT) From: "Jianyong Wu" To: devel@edk2.groups.io, Sami.Mujawar@arm.com Cc: ardb+tianocore@kernel.org, justin.he@arm.com, jianyong.wu@arm.com Subject: [edk2-devel] [PATCH v4 2/2] CloudHv/arm: switch PeiMemLib to its own Date: Tue, 6 Sep 2022 15:39:21 +0800 Message-Id: <20220906073921.90729-3-jianyong.wu@arm.com> In-Reply-To: <20220906073921.90729-1-jianyong.wu@arm.com> References: <20220906073921.90729-1-jianyong.wu@arm.com> Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jianyong.wu@arm.com X-Gm-Message-State: k194nAOsrBAkEY9pDIYjOOaRx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1662449977; bh=jz2NCgTuS7Dkf/JeFg9gNGwa9OJ6/2+h/5elRlLLaBc=; h=Cc:Date:From:Reply-To:Subject:To; b=kXapfH72mIlObm6AKpWL7uhgzwRjS1NmdJ+V4OXvSOtVxH2Sk43hpOhdbY4To2+1zIv IYThX8ayNwYMzfzm7u68bS33GSZ3555Z48FK6ZVdvi/RwCPUyfQoB69xXxYhrZeszS31v E/b1CNU2UVjYJVN+LDk2mMKrbjiPrQ1R1TY= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1662449979338100015 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" As Cloud Hypervisor has its own PeiMemLib, change it in dsc file accordingly. Reviewed-by: Sami Mujawar Signed-off-by: Jianyong Wu --- ArmVirtPkg/ArmVirtCloudHv.dsc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ArmVirtPkg/ArmVirtCloudHv.dsc b/ArmVirtPkg/ArmVirtCloudHv.dsc index 7559386a1d..7ca7a391d9 100644 --- a/ArmVirtPkg/ArmVirtCloudHv.dsc +++ b/ArmVirtPkg/ArmVirtCloudHv.dsc @@ -60,7 +60,7 @@ !include MdePkg/MdeLibs.dsc.inc =20 [LibraryClasses.common.PEIM] - ArmVirtMemInfoLib|ArmVirtPkg/Library/QemuVirtMemInfoLib/QemuVirtMemInfoP= eiLib.inf + ArmVirtMemInfoLib|ArmVirtPkg/Library/CloudHvVirtMemInfoLib/CloudHvVirtMe= mInfoPeiLib.inf =20 [LibraryClasses.common.DXE_DRIVER] ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/DxeRepor= tStatusCodeLib.inf --=20 2.17.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#93188): https://edk2.groups.io/g/devel/message/93188 Mute This Topic: https://groups.io/mt/93496218/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-