From nobody Fri Apr 26 19:44:12 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101303+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679034540278383.5449786241172; Thu, 16 Mar 2023 23:29:00 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id o7SdYY1788612x6rXxkQzOQa; Thu, 16 Mar 2023 23:28:59 -0700 X-Received: from NAM11-CO1-obe.outbound.protection.outlook.com (NAM11-CO1-obe.outbound.protection.outlook.com [40.107.220.68]) by mx.groups.io with SMTP id smtpd.web10.13424.1679034538916651738 for ; Thu, 16 Mar 2023 23:28:59 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HINH/kS6DFdOtsS9cTdX4oS3aMrCXfbBYZZrp5U47pWKDoT6bfrtjKXdISm5/PkZFD8BqJXH08RHKWgmg/TAgMls4SdUn1XNo+en66itQO9BwWlq9UwrhsLoGCS9zTKx1QZ4bUZETMxZMikdJJ4UUkAYfMNpYt8Cpns++8s3Zm4SqZukaJxtFMA5Kf5NZDmXciD5yc8GO8bhYmtGxG1I/8uxLWRBo84SRrxZDsjlI8wbQVrvoMRYyHsOWZOFxoVVYyKOcpB7rNPgCiljnYPf+3RPRQOh9dVpR8HWI0YzaZK34ctYW6jiM/BIhyc+Gkq30miQgxuzmngFn9elZCNTpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0UYqeEhweyt14NkFPZL4uYbMpkq0JCWLXxKge9KvVJ4=; b=J3yo1J7kalmVK6sLFdbSYkY233Zlu9tZEsQHr09TiV3BHdFMHUc8r2VZUKL89PFBdwAB1OUhTHz4T1hincknoYr/KRrZJgE6i0bquV4mcqWsgIn6+HHvM/Zw7W1BFATwbo95l/U0uB16wiWeVODnfBcYrSPSGt4s383wnbPoz4kX+F0WqMWEy71AV4rjPBnS6WGMAJhG1Txk6yt45eypfSZs5izTUY2Ddt5zltb56C4cyU/ydEmvNSggTKS7azMwDLELcRDRVvh1VDj8T5mJOgxsTkB2lMF/95TQ664BsWqGimrca7uCFSk9zLqYKdKZNYCVBhQRjxREQGTC9NR2Ew== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DM6PR11CA0041.namprd11.prod.outlook.com (2603:10b6:5:14c::18) by SA0PR12MB7091.namprd12.prod.outlook.com (2603:10b6:806:2d5::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35; Fri, 17 Mar 2023 06:28:56 +0000 X-Received: from DS1PEPF0000E642.namprd02.prod.outlook.com (2603:10b6:5:14c:cafe::8) by DM6PR11CA0041.outlook.office365.com (2603:10b6:5:14c::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.33 via Frontend Transport; Fri, 17 Mar 2023 06:28:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101303+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E642.mail.protection.outlook.com (10.167.17.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.13 via Frontend Transport; Fri, 17 Mar 2023 06:28:56 +0000 X-Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:28:56 -0500 X-Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:28:55 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:28:53 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Abner Chang , Michael D Kinney Subject: [edk2-devel] [PATCH v2 1/4] Platform/AMD: Adds BoardPkg and PlatformPkg Date: Fri, 17 Mar 2023 11:58:45 +0530 Message-ID: In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E642:EE_|SA0PR12MB7091:EE_ X-MS-Office365-Filtering-Correlation-Id: 1b17801f-d165-41d3-1094-08db26b0e2df X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:28:56.4645 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1b17801f-d165-41d3-1094-08db26b0e2df X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E642.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB7091 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: 4raOU3ufs5LgsP7apwaRI29ax1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679034539; bh=ITWLgAba0BWlql+WP0GgXoAvv49on7iaZHxNT3CkoMo=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=shVSPL0JRugfNSHdDxubKgmYchVSCYPH8NOyR3uVh1vLwWJTrl7ZuVHTWiTE3rjvXgO uY5+Ywhh7MbTyNsG4/6C6wqwU5AQuqcYLuJLXzSdezLb/MVfOAZbQGk53CWRzKpgclEUH U5dkGWDmEYAj1+/Lbg2aJpXs/q7XIiFVnI0= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679034542016100005 Content-Type: text/plain; charset="utf-8" Adds initial DEC and DSC file for BoardPkg and PlatformPkg packages, which supports AMD processor family based boards and platforms. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang Cc: Michael D Kinney Reviewed-by: Abner Chang --- Platform/AMD/BoardPkg/BoardPkg.dec | 18 ++++++++++++++++++ Platform/AMD/PlatformPkg/PlatformPkg.dec | 15 +++++++++++++++ Platform/AMD/BoardPkg/BoardPkg.dsc | 20 ++++++++++++++++++++ Platform/AMD/PlatformPkg/PlatformPkg.dsc | 20 ++++++++++++++++++++ 4 files changed, 73 insertions(+) create mode 100644 Platform/AMD/BoardPkg/BoardPkg.dec create mode 100644 Platform/AMD/PlatformPkg/PlatformPkg.dec create mode 100644 Platform/AMD/BoardPkg/BoardPkg.dsc create mode 100644 Platform/AMD/PlatformPkg/PlatformPkg.dsc diff --git a/Platform/AMD/BoardPkg/BoardPkg.dec b/Platform/AMD/BoardPkg/Boa= rdPkg.dec new file mode 100644 index 000000000000..3ceff33f4fc1 --- /dev/null +++ b/Platform/AMD/BoardPkg/BoardPkg.dec @@ -0,0 +1,18 @@ +## @file BoardPkg.dec +# Declaration file for AMD's BoardPkg. +# +# This package supports AMD processor family based board as per the MinPl= atform +# Arch specification. +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +# @par Specification Reference: +# -https://tianocore-docs.github.io/edk2-MinimumPlatformSpecification/dr= aft/ 0.7 +## + +[Defines] + DEC_SPECIFICATION =3D 1.27 + PACKAGE_NAME =3D BoardPkg + PACKAGE_GUID =3D 44F9D761-9ECB-43DD-A5AC-177E5048701B + PACKAGE_VERSION =3D 0.1 diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dec b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dec new file mode 100644 index 000000000000..6155860979cb --- /dev/null +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dec @@ -0,0 +1,15 @@ +## @file PlatformPkg.dec +# Declaration file for AMD's PlatformPkg. +# +# This package supports AMD processory family based platform. +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + DEC_SPECIFICATION =3D 1.27 + PACKAGE_NAME =3D PlatformPkg + PACKAGE_GUID =3D 38FBA311-E2AA-4620-9A90-9A23753D1878 + PACKAGE_VERSION =3D 0.1 diff --git a/Platform/AMD/BoardPkg/BoardPkg.dsc b/Platform/AMD/BoardPkg/Boa= rdPkg.dsc new file mode 100644 index 000000000000..cb4065b86c60 --- /dev/null +++ b/Platform/AMD/BoardPkg/BoardPkg.dsc @@ -0,0 +1,20 @@ +## @file +# BoardPkg.dsc +# +# Description file for AMD BoardPkg +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + DSC_SPECIFICATION =3D 1.30 + PLATFORM_GUID =3D 88F8A9AE-2FA0-4D58-A6F9-05F635C05F4E + PLATFORM_NAME =3D BoardPkg + PLATFORM_VERSION =3D 0.1 + OUTPUT_DIRECTORY =3D Build/$(PLATFORM_NAME) + BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT + SUPPORTED_ARCHITECTURES =3D IA32 | X64 + +[Packages] + BoardPkg/BoardPkg.dec diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dsc b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dsc new file mode 100644 index 000000000000..704566b9ea73 --- /dev/null +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dsc @@ -0,0 +1,20 @@ +## @file +# PlatformPkg.dsc +# +# Description file for AMD PlatformPkg +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + DSC_SPECIFICATION =3D 1.30 + PLATFORM_GUID =3D 2F7C29F2-7F35-4B49-B97D-F0E61BD42FC0 + PLATFORM_NAME =3D PlatformPkg + PLATFORM_VERSION =3D 0.1 + OUTPUT_DIRECTORY =3D Build/$(PLATFORM_NAME) + BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT + SUPPORTED_ARCHITECTURES =3D IA32 | X64 + +[Packages] + PlatformPkg/PlatformPkg.dec --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101303): https://edk2.groups.io/g/devel/message/101303 Mute This Topic: https://groups.io/mt/97667840/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Fri Apr 26 19:44:12 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101304+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679034542413900.494944669411; Thu, 16 Mar 2023 23:29:02 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id tvnIYY1788612xlN6Fz8yxrN; Thu, 16 Mar 2023 23:29:02 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (NAM11-BN8-obe.outbound.protection.outlook.com [40.107.236.41]) by mx.groups.io with SMTP id smtpd.web10.13425.1679034541325218692 for ; Thu, 16 Mar 2023 23:29:01 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Brwh+pKyZ67TCvT1iuLH/YiNXCx3DcgzEGCodhl0ioCHIZcrgAUJJSPeq4ZwzNOBg1ev418M0U2W5QrR7wKN/u4vG+JGoDoNE3mk4ckgYiGhEh3aTAnYqAcx6lsGs0t0QB7EvKcLEL4ZwML4r9DGAQOKTd2DeoOXRLsryO5N+C418GXJP7wtlUBcSpdtGXItP5HF5NvBzQbYPLDuvvxHHabP7biUcosSklKZ8cZZsDhT+AvjYc9cLG8PbQGnKWBiLF/8sDVQYPQzwkufZccPlsKpOVXNyLs3AOe9pi9+i5xChiXRnrF9cf0kKviuy34rSZFOLqOQLYaSpKWtktHN/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g7PlSISi4Ty1tC6eYd4XAXvYIeSo9JXZvUU39vPSeBg=; b=HO7L0JmG33tcfJaXEXpfjRXkhQZeJfUPdvakERkKdXxWeZYjnA+tufOm6Y07mh19t0ZBz+2cmkyMLTLjR51dF793FpeSrWU3JT6UOUSz1G3pkzidHpbxUP7OWVTWbaIMAIQKw0sofm7y3i8u3WDBC2EtclOiVi+Ov9vXwsHVCeZxbuWvcbbthii1xJq4VgKPs6r7AQpuG1kSrVTOwr1CBbETDNO4Yu2wRdthNzC0EBKy0aU6SKQsBnTkuDfy4jU0lbRe8ugF0Xmaxuij8mnyo6N99KmxIXjAcfKEPj3GDxFoEJ4xKh7YzAHDZFEk6dyFg4nbCULxj3H9OfbTQwzUiA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DM6PR10CA0002.namprd10.prod.outlook.com (2603:10b6:5:60::15) by SA0PR12MB7092.namprd12.prod.outlook.com (2603:10b6:806:2d5::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35; Fri, 17 Mar 2023 06:28:58 +0000 X-Received: from DS1PEPF0000E640.namprd02.prod.outlook.com (2603:10b6:5:60:cafe::e5) by DM6PR10CA0002.outlook.office365.com (2603:10b6:5:60::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.31 via Frontend Transport; Fri, 17 Mar 2023 06:28:58 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101304+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E640.mail.protection.outlook.com (10.167.17.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.30 via Frontend Transport; Fri, 17 Mar 2023 06:28:58 +0000 X-Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:28:57 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:28:56 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Michael D Kinney Subject: [edk2-devel] [PATCH v2 2/4] Platform/AMD/PlatformPkg: Adds PciHotPlug init protocol implementation Date: Fri, 17 Mar 2023 11:58:46 +0530 Message-ID: <24db6fa295d16423257c47bdb6af6c25b9134ac5.1679034315.git.abdattar@amd.com> In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E640:EE_|SA0PR12MB7092:EE_ X-MS-Office365-Filtering-Correlation-Id: 1f35ef2d-49fd-4de1-2c51-08db26b0e3f3 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:28:58.2740 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1f35ef2d-49fd-4de1-2c51-08db26b0e3f3 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E640.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB7092 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: hLss4cneUkbJ8Td7WEHiWcAvx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679034542; bh=Q4Oen4Cbs3sIDniw4pXR8HjAsmgHbxtbfhHHnw4g3DE=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=gRoMbHg9Agfy0bmiJQ091bNfOW82LmG12C9z3rP+6Oy20T+lQz3RBnCXkRgN+l6vAVu Tr96L9sxVgI1Sf1EJ7TfLLXVP5n0IYNLg7Zb2K5/mn1/xNZqMyxUXV4UtTnQTwfE4AdZg 1vQ8EygOto03iu1NGfPR+JKPxwzboRzkNR8= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679034544127100011 Content-Type: text/plain; charset="utf-8" Adds PCI hotplug init protocol implementation. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang --- Platform/AMD/PlatformPkg/PlatformPkg.dec | 16 + Platform/AMD/PlatformPkg/PlatformPkg.dsc | 23 ++ .../PlatformPkg/PciHotPlug/PciHotPlugInit.inf | 41 +++ .../PlatformPkg/PciHotPlug/PciHotPlugInit.c | 340 ++++++++++++++++++ 4 files changed, 420 insertions(+) create mode 100644 Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf create mode 100644 Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dec b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dec index 6155860979cb..1bc38d6025c3 100644 --- a/Platform/AMD/PlatformPkg/PlatformPkg.dec +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dec @@ -13,3 +13,19 @@ [Defines] PACKAGE_NAME =3D PlatformPkg PACKAGE_GUID =3D 38FBA311-E2AA-4620-9A90-9A23753D1878 PACKAGE_VERSION =3D 0.1 + +[Guids] + gPlatformPkgTokenSpaceGuid =3D { 0x95ECA58D, 0x09B6, 0x4420, { 0xB4,= 0xE7, 0x01, 0x7F, 0x6A, 0x5B, 0x26, 0x0F }} + +[PcdsDynamic, PcdsDynamicEx] + # + # PCI HotPlug Resource Padding + # + # IO Resource padding in bytes, default 4KB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadIO|0x00001000|UINT64|= 0x10000000 + # PreFetch Memory padding in bytes, default 2MB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadPMem|0x00200000|UINT6= 4|0x10000001 + # Non-PreFetch Memory padding in bytes, default 1MB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadMem|0x00100000|UINT64= |0x10000002 + # PCI bus padding, number of bus to reserve, default 2 bus + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadBus|2|UINT8|0x10000003 diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dsc b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dsc index 704566b9ea73..9a693070ab3f 100644 --- a/Platform/AMD/PlatformPkg/PlatformPkg.dsc +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dsc @@ -16,5 +16,28 @@ [Defines] BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT SUPPORTED_ARCHITECTURES =3D IA32 | X64 =20 + [Packages] PlatformPkg/PlatformPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses.Common] + UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntry= Point.inf + UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBoo= tServicesTableLib.inf + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf + RegisterFilterLib|MdePkg/Library/RegisterFilterLibNull/RegisterFilterLib= Null.inf + SerialPortLib|MdeModulePkg/Library/BaseSerialPortLib16550/BaseSerialPort= Lib16550.inf + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseD= ebugPrintErrorLevelLib.inf + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf + PlatformHookLib|MdeModulePkg/Library/BasePlatformHookLibNull/BasePlatfor= mHookLibNull.inf + PciLib|MdePkg/Library/BasePciLibPciExpress/BasePciLibPciExpress.inf + PciExpressLib|MdePkg/Library/BasePciExpressLib/BasePciExpressLib.inf + +[Components.X64] + PlatformPkg/PciHotPlug/PciHotPlugInit.inf diff --git a/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf b/Platf= orm/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf new file mode 100644 index 000000000000..0079c4acf14e --- /dev/null +++ b/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf @@ -0,0 +1,41 @@ +## @file +# This driver implements EFI_PCI_HOT_PLUG_INIT_PROTOCOL. +# Adds resource padding information, for PCIe hotplug purposes. +# +# Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 1.29 + BASE_NAME =3D PciHotPlugInit + FILE_GUID =3D 8B67D95F-78B7-484F-8F16-5F22AB388B0C + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 0.1 + ENTRY_POINT =3D PciHotPlugInitialize + +[Sources] + PciHotPlugInit.c + +[Packages] + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + PlatformPkg/PlatformPkg.dec + +[LibraryClasses] + UefiDriverEntryPoint + UefiBootServicesTableLib + DebugLib + MemoryAllocationLib + +[Protocols] + gEfiPciHotPlugInitProtocolGuid + +[Pcd] + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadIO + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadPMem + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadMem + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadBus + +[Depex] + TRUE diff --git a/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c b/Platfor= m/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c new file mode 100644 index 000000000000..b977406bbcae --- /dev/null +++ b/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c @@ -0,0 +1,340 @@ +/** @file + This file declares EFI PCI Hot Plug Init Protocol. + + This protocol provides the necessary functionality to initialize the Hot= Plug + Controllers (HPCs) and the buses that they control. This protocol also p= rovides + information regarding resource padding. + + @par Note: + This source has the reference of OVMF PciHotPluginit.c and Intel platf= orm PciHotPlug.c. + + This protocol is required only on platforms that support one or more P= CI Hot + Plug* slots or CardBus sockets. + + The EFI_PCI_HOT_PLUG_INIT_PROTOCOL provides a mechanism for the PCI bus = enumerator + to properly initialize the HPCs and CardBus sockets that require initial= ization. + The HPC initialization takes place before the PCI enumeration process is= complete. + There cannot be more than one instance of this protocol in a system. Thi= s protocol + is installed on its own separate handle. + + Because the system may include multiple HPCs, one instance of this proto= col + should represent all of them. The protocol functions use the device path= of + the HPC to identify the HPC. When the PCI bus enumerator finds a root HP= C, it + will call EFI_PCI_HOT_PLUG_INIT_PROTOCOL.InitializeRootHpc(). If Initial= izeRootHpc() + is unable to initialize a root HPC, the PCI enumerator will ignore that = root HPC + and continue the enumeration process. If the HPC is not initialized, the= devices + that it controls may not be initialized, and no resource padding will be= provided. + + From the standpoint of the PCI bus enumerator, HPCs are divided into the= following + two classes: + + - Root HPC: + These HPCs must be initialized by calling InitializeRootHpc() duri= ng the + enumeration process. These HPCs will also require resource padding= . The + platform code must have a priori knowledge of these devices and mu= st know + how to initialize them. There may not be any way to access their P= CI + configuration space before the PCI enumerator programs all the ups= tream + bridges and thus enables the path to these devices. The PCI bus en= umerator + is responsible for determining the PCI bus address of the HPC befo= re it + calls InitializeRootHpc(). + - Nonroot HPC: + These HPCs will not need explicit initialization during enumeratio= n process. + These HPCs will require resource padding. The platform code does n= ot have + to have a priori knowledge of these devices. + + Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.
+ Copyright (C) 2016, Red Hat, Inc.
+ Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent + + @par Revision Reference: + This Protocol is defined in UEFI Platform Initialization Specification 1= .2 + Volume 5: Standards + +**/ + +#include +#include +#include +#include +#include +#include + +// +// The protocol interface this driver produces. +// +STATIC EFI_PCI_HOT_PLUG_INIT_PROTOCOL mPciHotPlugInit; + +/** + Returns a list of root Hot Plug Controllers (HPCs) that require initiali= zation + during the boot process. + + This procedure returns a list of root HPCs. The PCI bus driver must init= ialize + these controllers during the boot process. The PCI bus driver may or may= not be + able to detect these HPCs. If the platform includes a PCI-to-CardBus bri= dge, it + can be included in this list if it requires initialization. The HpcList= must be + self consistent. An HPC cannot control any of its parent buses. Only one= HPC can + control a PCI bus. Because this list includes only root HPCs, no HPC in = the list + can be a child of another HPC. This policy must be enforced by the + EFI_PCI_HOT_PLUG_INIT_PROTOCOL. The PCI bus driver may not check for s= uch + invalid conditions. The callee allocates the buffer HpcList + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCOL ins= tance. + @param[out] HpcCount The number of root HPCs that were returned. + @param[out] HpcList The list of root HPCs. HpcCount defines the numbe= r of + elements in this list. + + @retval EFI_SUCCESS HpcList was returned. + @retval EFI_OUT_OF_RESOURCES HpcList was not returned due to insuffic= ient + resources. + @retval EFI_INVALID_PARAMETER HpcCount is NULL or HpcList is NULL. + +**/ +EFI_STATUS +EFIAPI +GetRootHpcList ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + OUT UINTN *HpcCount, + OUT EFI_HPC_LOCATION **HpcList + ) +{ + if ((HpcCount =3D=3D NULL) || (HpcList =3D=3D NULL)) { + return EFI_INVALID_PARAMETER; + } + + // + // Platform BIOS not doing any extra/special HPC initialization + // Hence returning the HpcCount as zero and HpcList as NULL + // + *HpcCount =3D 0; + *HpcList =3D NULL; + + return EFI_SUCCESS; +} + +/** + Initializes one root Hot Plug Controller (HPC). This process may causes + initialization of its subordinate buses. + + This function initializes the specified HPC. At the end of initializatio= n, + the hot-plug slots or sockets (controlled by this HPC) are powered and a= re + connected to the bus. All the necessary registers in the HPC are set up.= For + a Standard (PCI) Hot Plug Controller (SHPC), the registers that must be = set + up are defined in the PCI Standard Hot Plug Controller and Subsystem + Specification. + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCO= L instance. + @param[in] HpcDevicePath The device path to the HPC that is being ini= tialized. + @param[in] HpcPciAddress The address of the HPC function on the PCI b= us. + @param[in] Event The event that should be signaled when the H= PC + initialization is complete. Set to NULL if = the + caller wants to wait until the entire initia= lization + process is complete. + @param[out] HpcState The state of the HPC hardware. The state is + EFI_HPC_STATE_INITIALIZED or EFI_HPC_STATE_E= NABLED. + + @retval EFI_SUCCESS If Event is NULL, the specific HPC was s= uccessfully + initialized. If Event is not NULL, Event= will be + signaled at a later time when initializa= tion is complete. + @retval EFI_UNSUPPORTED This instance of EFI_PCI_HOT_PLUG_INIT_P= ROTOCOL + does not support the specified HPC. + @retval EFI_OUT_OF_RESOURCES Initialization failed due to insufficient + resources. + @retval EFI_INVALID_PARAMETER HpcState is NULL. + +**/ +EFI_STATUS +EFIAPI +InitializeRootHpc ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + IN EFI_DEVICE_PATH_PROTOCOL *HpcDevicePath, + IN UINT64 HpcPciAddress, + IN EFI_EVENT Event, OPTIONAL + OUT EFI_HPC_STATE *HpcState + ) +{ + if (HpcState =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // + // This Platform doesnt have any non-enumerated HPC. + // Hence no extra initialization required from Platform BIOS. + // + return EFI_UNSUPPORTED; +} + +/** + Returns the resource padding that is required by the PCI bus that is con= trolled + by the specified Hot Plug Controller (HPC). + + This function returns the resource padding that is required by the PCI b= us that + is controlled by the specified HPC. This member function is called for a= ll the + root HPCs and nonroot HPCs that are detected by the PCI bus enumerator. = This + function will be called before PCI resource allocation is completed. Thi= s function + must be called after all the root HPCs, with the possible exception of a + PCI-to-CardBus bridge, have completed initialization. + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCO= L instance. + @param[in] HpcDevicePath The device path to the HPC. + @param[in] HpcPciAddress The address of the HPC function on the PCI b= us. + @param[out] HpcState The state of the HPC hardware. + @param[out] Padding The amount of resource padding that is requi= red by the + PCI bus under the control of the specified H= PC. + @param[out] Attributes Describes how padding is accounted for. The = padding + is returned in the form of ACPI 2.0 resource= descriptors. + + @retval EFI_SUCCESS The resource padding was successfully re= turned. + @retval EFI_UNSUPPORTED This instance of the EFI_PCI_HOT_PLUG_IN= IT_PROTOCOL + does not support the specified HPC. + @retval EFI_NOT_READY This function was called before HPC init= ialization + is complete. + @retval EFI_INVALID_PARAMETER HpcState or Padding or Attributes is NUL= L. + @retval EFI_OUT_OF_RESOURCES ACPI 2.0 resource descriptors for Padding + cannot be allocated due to insufficient = resources. + +**/ +EFI_STATUS +EFIAPI +GetResourcePadding ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + IN EFI_DEVICE_PATH_PROTOCOL *HpcDevicePath, + IN UINT64 HpcPciAddress, + OUT EFI_HPC_STATE *HpcState, + OUT VOID **Padding, + OUT EFI_HPC_PADDING_ATTRIBUTES *Attributes + ) +{ + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *PaddingResource; + + // + // Need total 5 resources + // 1 - IO resource + // 2 - Mem resource + // 3 - PMem resource + // 4 - Bus resource + // 5 - end tag resource + PaddingResource =3D AllocateZeroPool (4 * sizeof (EFI_ACPI_ADDRESS_SPACE= _DESCRIPTOR) + sizeof (EFI_ACPI_END_TAG_DESCRIPTOR)); + if (PaddingResource =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + *Padding =3D (VOID *)PaddingResource; + + // + // Padding for bus + // + *Attributes =3D EfiPaddingPciBus; + + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_BUS; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->SpecificFlag =3D 0; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrRangeMax =3D 0; + PaddingResource->AddrLen =3D PcdGet8 (PcdPciHotPlugResourcePadBus); + + // + // Padding for non-prefetchable memory + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_MEM; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->AddrSpaceGranularity =3D 32; + PaddingResource->SpecificFlag =3D EFI_ACPI_MEMORY_RESOURCE_SPECI= FIC_FLAG_NON_CACHEABLE; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourc= ePadMem); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Padding for prefetchable memory + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_MEM; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->AddrSpaceGranularity =3D 32; + PaddingResource->SpecificFlag =3D EFI_ACPI_MEMORY_RESOURCE_SPECI= FIC_FLAG_CACHEABLE_PREFETCHABLE; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourc= ePadPMem); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Padding for I/O + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_IO; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->SpecificFlag =3D 0; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourcePadIO); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Terminate the entries. + // + PaddingResource++; + ((EFI_ACPI_END_TAG_DESCRIPTOR *)PaddingResource)->Desc =3D ACPI_END_= TAG_DESCRIPTOR; + ((EFI_ACPI_END_TAG_DESCRIPTOR *)PaddingResource)->Checksum =3D 0x0; + + *HpcState =3D EFI_HPC_STATE_INITIALIZED | EFI_HPC_STATE_ENABLED; + + return EFI_SUCCESS; +} + +/** + Entry point for this driver. + + @param[in] ImageHandle Image handle of this driver. + @param[in] SystemTable Pointer to SystemTable. + + @retval EFI_SUCESS Driver has loaded successfully. + @return Error codes from lower level functions. + +**/ +EFI_STATUS +EFIAPI +PciHotPlugInitialize ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + mPciHotPlugInit.GetRootHpcList =3D GetRootHpcList; + mPciHotPlugInit.InitializeRootHpc =3D InitializeRootHpc; + mPciHotPlugInit.GetResourcePadding =3D GetResourcePadding; + return gBS->InstallMultipleProtocolInterfaces ( + &ImageHandle, + &gEfiPciHotPlugInitProtocolGuid, + &mPciHotPlugInit, + NULL + ); +} --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101304): https://edk2.groups.io/g/devel/message/101304 Mute This Topic: https://groups.io/mt/97667843/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Fri Apr 26 19:44:12 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101305+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679034543784423.3261998015314; Thu, 16 Mar 2023 23:29:03 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 8zBXYY1788612x4SG3rSApdI; Thu, 16 Mar 2023 23:29:03 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (NAM11-BN8-obe.outbound.protection.outlook.com [40.107.236.41]) by mx.groups.io with SMTP id smtpd.web11.13342.1679034542552373694 for ; Thu, 16 Mar 2023 23:29:02 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GNHmx6gQlvw5o2IjIaXjG7SXlvYDGJFuzeczbp1vCJdF+tzzMr3rLTevPXxHDhFIbHAu0x9oNhddKg1LdbOcFaTtJFbAfIMI9lJ5ChQ92qohARF5QbiANZJJ4XGM7AMLFmbeuof0q57vdSn84ZmbsQ2o4WpBbl5lKd8jin9NZIyJshSuG/uuO+q4AcUJ7u68bb2sBW/sZASZLcAEetWm/wvB/BAC8LrUZmqrrJQugFR2U4RGOsoIxdgywPpu+a0klMg7ONZYdiO2l7pfpWAn7hc/Y6ePpxbE6VrHGMs8XZt3xCwhhCltO3rAaSHPfDIa5l9vy6wjYq9c7oC71wv33A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IO9AIugg52yy5/dMCjZ6fQKt3oiYgHfaNCctRcr6Cfc=; b=YN7LzYVBKFHs8yPcppV2zb1kLW+OVJ8AjpPBzSJ5n80kswgB9sq7WR2rAAwXdpuUkJuErL0DeQ8TpYd1lyCzWr4xgl6Hj3ouFIvlMD1d6E2VCUvMc2Lz/hecjwbEM7FsY18pljdCPdPpOKrUwzUo7Ndh307qyCQvVIThMTkmSb4Uqo0EG7w93iLnl9hTg7wEwHD5hxDahuGWJtsd4q7rkM4gXzQ3JYNsRcUabbLXsJEww9XYmtvNpy7pzf4vUv4VLpG9uQd222UWFU8f8P354PAqsIm6LQzQKVP3Ey50YArves468myNOzVNr8jKYGfdv+vQIxIDvc4GuKYhYJo6tg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DM6PR11CA0053.namprd11.prod.outlook.com (2603:10b6:5:14c::30) by SA1PR12MB6871.namprd12.prod.outlook.com (2603:10b6:806:25f::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.31; Fri, 17 Mar 2023 06:29:00 +0000 X-Received: from DS1PEPF0000E642.namprd02.prod.outlook.com (2603:10b6:5:14c:cafe::73) by DM6PR11CA0053.outlook.office365.com (2603:10b6:5:14c::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35 via Frontend Transport; Fri, 17 Mar 2023 06:29:00 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101305+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E642.mail.protection.outlook.com (10.167.17.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.13 via Frontend Transport; Fri, 17 Mar 2023 06:29:00 +0000 X-Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:28:59 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:28:58 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Michael D Kinney Subject: [edk2-devel] [PATCH v2 3/4] Platform/AMD/BoarkPkg: Adds SetCacheMtrrLib library Date: Fri, 17 Mar 2023 11:58:47 +0530 Message-ID: In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E642:EE_|SA1PR12MB6871:EE_ X-MS-Office365-Filtering-Correlation-Id: 4e539316-985a-4ba0-9399-08db26b0e529 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:29:00.3082 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4e539316-985a-4ba0-9399-08db26b0e529 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E642.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB6871 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: LIKYp7gYP82WfCjpMmdr7y09x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679034543; bh=3oDSM4ARkprAS+AQKmIiHLH6LIJu5T4lV4YjbU/mb14=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=nVCvRw9ZZPgjbMbN2NL7S/s7W8xnOEK8U2t22g80Jw4zTPLrq1QBzVbFo34CxDz9oAg 18r85tuceP8BHqGa10AC0l9+1sVKZL1jmg3dsIJk5iAp6IzEGapU6705Qrce1cf7jocM0 cMqIGpXYtY5VqKXwszY/YcFY5iwgkn1451E= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679034544088100009 Content-Type: text/plain; charset="utf-8" Adds SetCacheMtrrLib library for AMD processor based boards. This library sets MTRR value or various memory ranges. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang --- Platform/AMD/BoardPkg/BoardPkg.dsc | 10 ++ .../SetCacheMtrrLib/SetCacheMtrrLib.inf | 37 +++++ .../Library/SetCacheMtrrLib/SetCacheMtrrLib.c | 132 ++++++++++++++++++ 3 files changed, 179 insertions(+) create mode 100644 Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheM= trrLib.inf create mode 100644 Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheM= trrLib.c diff --git a/Platform/AMD/BoardPkg/BoardPkg.dsc b/Platform/AMD/BoardPkg/Boa= rdPkg.dsc index cb4065b86c60..aa0ee8287cd8 100644 --- a/Platform/AMD/BoardPkg/BoardPkg.dsc +++ b/Platform/AMD/BoardPkg/BoardPkg.dsc @@ -18,3 +18,13 @@ [Defines] =20 [Packages] BoardPkg/BoardPkg.dec + MinPlatformPkg/MinPlatformPkg.dec + MdePkg/MdePkg.dec + UefiCpuPkg/UefiCpuPkg.dec + +[LibraryClasses.common.PEIM] + SetCacheMtrrLib|BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf + +[Components.IA32] + BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf + diff --git a/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.= inf b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf new file mode 100644 index 000000000000..c66661d3f8dc --- /dev/null +++ b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf @@ -0,0 +1,37 @@ +## @file +# Component information file for Platform SetCacheMtrr Library. +# This library implementation is for AMD processor based platforms. +# +# Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 1.29 + BASE_NAME =3D PeiSetCacheMtrrLib + FILE_GUID =3D 1E8468E0-5EB4-4088-9B52-BFDC6E4DAE87 + MODULE_TYPE =3D PEIM + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D SetCacheMtrrLib + +[LibraryClasses] + BaseLib + DebugLib + MtrrLib + +[Packages] + MinPlatformPkg/MinPlatformPkg.dec + MdePkg/MdePkg.dec + UefiCpuPkg/UefiCpuPkg.dec + +[Sources] + SetCacheMtrrLib.c + +[Guids] + +[Pcd] + gMinPlatformPkgTokenSpaceGuid.PcdFlashAreaBaseAddress + gMinPlatformPkgTokenSpaceGuid.PcdFlashAreaSize + diff --git a/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.= c b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.c new file mode 100644 index 000000000000..18404405d9fa --- /dev/null +++ b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.c @@ -0,0 +1,132 @@ +/** @file + +SetCacheMtrr library functions. +This library implementation is for AMD processor based platforms. + +Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+ +SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include +#include +#include +#include + +/** + This function sets the cache MTRR values for PEI phase. +**/ +VOID +EFIAPI +SetCacheMtrr ( + VOID + ) +{ + EFI_STATUS Status; + + Status =3D MtrrSetMemoryAttribute ( + 0, + 0xA0000, + CacheWriteBack + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteBack for 0-0x9FFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0xA0000, + 0x20000, + CacheUncacheable + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheUncacheable for 0xA0000-0xBFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0xC0000, + 0x40000, + CacheWriteProtected + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteProtected for 0xC0000-0xFFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0x100000, + 0xAFF00000, + CacheWriteBack + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteBack for 0x100000-0xAFFFFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaSize), + CacheWriteProtected + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteProtected for 0x%X-0x%X\n", + Status, + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaBaseAddress) + PcdGet32 (PcdFlashAreaSize) + )); + } + + MtrrDebugPrintAllMtrrs (); + return; +} + +/** + Update MTRR setting in EndOfPei phase. + This function will set the MTRR value as CacheUncacheable + for Flash address. + + @retval EFI_SUCCESS The function completes successfully. + @retval Others Some error occurs. +**/ +EFI_STATUS +EFIAPI +SetCacheMtrrAfterEndOfPei ( + VOID + ) +{ + EFI_STATUS Status; + + Status =3D MtrrSetMemoryAttribute ( + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaSize), + CacheUncacheable + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheUncacheable for 0x%X-0x%X\n", + Status, + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaBaseAddress) + PcdGet32 (PcdFlashAreaSize) + )); + } + + MtrrDebugPrintAllMtrrs (); + return EFI_SUCCESS; +} --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101305): https://edk2.groups.io/g/devel/message/101305 Mute This Topic: https://groups.io/mt/97667844/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Fri Apr 26 19:44:12 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101306+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679034560991906.5685146765394; Thu, 16 Mar 2023 23:29:20 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id c3mGYY1788612xiodKo8JyZN; Thu, 16 Mar 2023 23:29:20 -0700 X-Received: from NAM12-DM6-obe.outbound.protection.outlook.com (NAM12-DM6-obe.outbound.protection.outlook.com [40.107.243.74]) by mx.groups.io with SMTP id smtpd.web11.13344.1679034559774534025 for ; Thu, 16 Mar 2023 23:29:20 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b3TXm+piFdyxA8p7PH35OJc/w7J6nLeSADPg9LU0hhLP3cYZ6k23PW8CieH38P25CvT2HEg22EvRkAw1MFUKltV3NNr/GwV2c7FPt8SysQpKHKctuvPnl1DZSncjeKdG8LPDLImlsbO4lgwPTtZM8cFfbllDHmNZhQgv8D2+/N5zA0JagUtZ8NmWQAa2nwO8ZVGb0RbaQw2oxh11JTR/ucYvTou3/V3Pe4PJglhq5o0ZXnUOFbeWlROkxd8NdQR6Vnrz/SIgDFA5DK512B8w+Jzflas2VislpuQKl1gsbUSHhKVfmIEplWWmr2jkcT0yZ9n8sRYHyEIDnEfYNhT77Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kjns06Ke1v2pk2MbThrXX36Sqv3TeTJbD4lykuHEKZw=; b=huxy7n5zeou0Pzec+asctNvXsoJAR14CCuiOmyXGCYNz83YHY0SD6Czc9rw5YHG9K90hxSkp6ztH3Bbi2D8gQ5ySTPT9wBMAJs662mjB+6KAhwsgP7CXP8M6CLq2BWz+vB7CtMcQqev3JVYI+IWPnpsBOn+S7IlJbvQzJ56CZZCguuDZ49JMl7gZHzWt5Wp9RDx2jZUNxNHdPRDZ7Q+ER34AMagY+C6/ww82EtPTdRz5xsQnv7syUcQHqFabCRjYobGsHZ21YrCYvVFlVIfnYYXRiAJNf+ImTGzLisF4D+NFMoAs0DWwNoqlFH4f5BazlINVvcaIHxZgouSqVpdg9w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from BN9PR03CA0786.namprd03.prod.outlook.com (2603:10b6:408:13f::11) by BY5PR12MB4114.namprd12.prod.outlook.com (2603:10b6:a03:20c::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35; Fri, 17 Mar 2023 06:29:03 +0000 X-Received: from BN8NAM11FT094.eop-nam11.prod.protection.outlook.com (2603:10b6:408:13f:cafe::3d) by BN9PR03CA0786.outlook.office365.com (2603:10b6:408:13f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.31 via Frontend Transport; Fri, 17 Mar 2023 06:29:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101306+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C X-Received: from SATLEXMB04.amd.com (165.204.84.17) by BN8NAM11FT094.mail.protection.outlook.com (10.13.176.131) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6199.16 via Frontend Transport; Fri, 17 Mar 2023 06:29:04 +0000 X-Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:29:02 -0500 X-Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:29:02 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:29:00 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Michael D Kinney Subject: [edk2-devel] [PATCH v2 4/4] Maintainers.txt: Adds AMD/BoardPkg and AMD/PlatformPkg maintainers Date: Fri, 17 Mar 2023 11:58:48 +0530 Message-ID: In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT094:EE_|BY5PR12MB4114:EE_ X-MS-Office365-Filtering-Correlation-Id: 30414c15-9aee-4898-88fe-08db26b0e75c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:29:04.0289 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 30414c15-9aee-4898-88fe-08db26b0e75c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT094.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4114 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: VkHAGFXRAATIoct1GQrBPmbgx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679034560; bh=9QRwhEN7FqkCm48jMlrWE4E4/7hqWNgaQjT1Zh9mF8M=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=XU9WpcJ5NG1Yiia15w1EjR/L30AwGkc1K65wvtWZdN8BZQYRKjzHy8s1cbJzeIaX5mw ke4bw12fkfVFbJebvJXeTdbh364dznns4tYIYJjGwkkGXdR31ss/L47IqQIxr+s7kWJm7 1v4cNvGQIHThxful4WsQTpALQReyB0lj4dk= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679034562119100002 Content-Type: text/plain; charset="utf-8" From: Abdul Lateef Attar Adds maintainers for AMD/BoardPkg and AMD/PlatformPkg. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang --- Maintainers.txt | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Maintainers.txt b/Maintainers.txt index 747191366070..bb8ab643e090 100644 --- a/Maintainers.txt +++ b/Maintainers.txt @@ -91,6 +91,12 @@ F: Silicon/AMD/Styx/ M: Ard Biesheuvel M: Leif Lindholm =20 +AMD Platform +F: Platform/AMD/BoardPkg +F: Platform/AMD/PlatformPkg +M: Abner Chang +M: Abdul Lateef Attar + Ampere Computing F: Platform/Ampere F: Silicon/Ampere --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101306): https://edk2.groups.io/g/devel/message/101306 Mute This Topic: https://groups.io/mt/97667845/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-