From nobody Tue Apr 30 22:13:40 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101308+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679035825430705.5505294612595; Thu, 16 Mar 2023 23:50:25 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id ozXPYY1788612xMUugiaQ8Pl; Thu, 16 Mar 2023 23:50:25 -0700 X-Received: from NAM11-CO1-obe.outbound.protection.outlook.com (NAM11-CO1-obe.outbound.protection.outlook.com [40.107.220.81]) by mx.groups.io with SMTP id smtpd.web11.13509.1679035824362138078 for ; Thu, 16 Mar 2023 23:50:24 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QGbjhvyXhzed8o6YgFHyEX2R1XJPxWcEnFNOhs/FfUnQezXrZq6TdeR6W7xNQRrm8yrR08Z3sRY5iTFyTvkM2wEFmL1DU1Mt0kUhOWqBxEIrAtSB/qOXQlTPA6IoOoioobk+bYfITFUtsxcPBfBoPOBfVTeiDwzvoFlLdaymCOKYohZKPC3IDkoICAo5UwdIiAHnzcUA2VOWBFs3pxIbSz2PNh3du2QVRlNOLXt5la89TyOkUFlP4WDl2d9R24pPnUiQQHaf4g+4Yl8QrAGcLHxU9d9OsR21V/HpFAk4mBGv6EXOCpt14Zd3EOaDFOlTKCg+T+cJsbJO5i97O8tpEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0UYqeEhweyt14NkFPZL4uYbMpkq0JCWLXxKge9KvVJ4=; b=Tb0qrPwTcszk5xl5AdKfRpCDcCANkSBYJl6tpT20o015SKEOJtYGIGhFJdSn6TMmx7hxVagVeIInBV7LKz+q3G2qZA4SRdcLYsqo+gUhoErefJuWdAhZzi9IDoFB5jRVmlYoG0PDmm0bkGaXf44+2WyUyhpxA2qckPX8iIKMoeq7jHrmMcU+yGipINUzLmWyu6LbQ7W8LYZuBp/6sD92Rn3HLYmgVI5FJotlJIXUAd//b3DAuUXcDlCqIiyuD2FGHf1NCWqnv/ch3eckxYJwkZQY+fkUiCObFVFhG3g58BhMRjPMM+sqVpE37iSSRPXVFb2IKmD/Yx+l0mOCJmYZRw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DM6PR06CA0043.namprd06.prod.outlook.com (2603:10b6:5:54::20) by DS0PR12MB7851.namprd12.prod.outlook.com (2603:10b6:8:14a::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.24; Fri, 17 Mar 2023 06:50:22 +0000 X-Received: from DS1PEPF0000E64F.namprd02.prod.outlook.com (2603:10b6:5:54:cafe::51) by DM6PR06CA0043.outlook.office365.com (2603:10b6:5:54::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.33 via Frontend Transport; Fri, 17 Mar 2023 06:50:22 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101308+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E64F.mail.protection.outlook.com (10.167.18.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.30 via Frontend Transport; Fri, 17 Mar 2023 06:50:21 +0000 X-Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:19 -0500 X-Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:18 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:50:17 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Abner Chang , Michael D Kinney Subject: [edk2-devel] [PATCH v2 RESEND 1/4] Platform/AMD: Adds BoardPkg and PlatformPkg Date: Fri, 17 Mar 2023 12:20:04 +0530 Message-ID: In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E64F:EE_|DS0PR12MB7851:EE_ X-MS-Office365-Filtering-Correlation-Id: 10db7d30-bc5a-495e-d5a5-08db26b3e0fd X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: t7c+Qr119mvqLHPtTvv3lMcBm5ayHo0cKRvRKiGCiz7UmwXDOLBEk0nxwKxG2yKkHk0yNKIeeJoUlUPfMdPdJSFfIV0do4EkN/r90kU1d8VW50iIinXvLJOkyYw+pxKzHOO0rFdfnpJ7WBfsIJA3P2iot4yC00jQAlgKpAX9lnIYiw/VmHf4jk1v3JgMx3wPlNfrcT1sRhqacdXtaAzJRK9bVRJIC0AEfVMv/Ugbmonk+yu2DM5BCAb5oOTm5NR+Bz6HTGztmiNEMs/WrO5z8tAnfT2paCAg+rP4Jsfuzc1zwy0+GEE4vT8QnF+3f5Nh89JytAMFGyscBZ6+UBdUl2NcmO0x7bSq06TVI/BLv70k7LrZaMB/EppvA8jLvDAsvx5DkzGQXm/Y6LvDajxiqAQp6LA2ng7kW4qNgDOPl+xSHKeukm8YiuIJryN3fSy3JwKZnSb07Zm4vYq/UTsqjDgdknFiHFpZ1VmdQJoYSmlSHGIxzJnn/kO7L0P8Kkp864FJ94GoMa4Cf/4PEeGCcbuNw8dGzHtjfHytpqsJcUizoM9T0N+SK0hGsazAxqtWz0io6s/ToTfPi3YHj+s/i4s/Jk5faZrdYlv79lOsPbERXbli/AcjXlUSgMaJ4xdriITFnrbBV8wrywlluaxvRHeWQOlX9ZwZZ+SoDOfUmwXUCbkEjAJYm4nww5avSqZTJhUD4GPQHfbpH0ySu2r0utqoVdJib3UhJZEz60YJCWs= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:50:21.8009 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 10db7d30-bc5a-495e-d5a5-08db26b3e0fd X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E64F.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7851 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: uotNbW6zdhT7SVgySRPs4jLUx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679035825; bh=M+hA3GOKZ+UCWW21o1dXErUnWnBkLw6XmPIMWh9pLfk=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=XsZ284u6XFWn508Pv8VOMop2/yyEFVDLkKsbVZsBr8j24ns+Ct2N/saysFq40s8Ef4G cVCuK/bYTwQAYMaixPTcBLFkIK9x1Y8qp1IunV3m7l/v6AffMVsHshjHPxlW6qynoFRB1 +vHMhrM0qZJqzRJzzUSbjUXRDa3s8DZQY9I= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679035826184100001 Content-Type: text/plain; charset="utf-8" Adds initial DEC and DSC file for BoardPkg and PlatformPkg packages, which supports AMD processor family based boards and platforms. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang Cc: Michael D Kinney Reviewed-by: Abner Chang Reviewed-by: Leif Lindholm --- Platform/AMD/BoardPkg/BoardPkg.dec | 18 ++++++++++++++++++ Platform/AMD/PlatformPkg/PlatformPkg.dec | 15 +++++++++++++++ Platform/AMD/BoardPkg/BoardPkg.dsc | 20 ++++++++++++++++++++ Platform/AMD/PlatformPkg/PlatformPkg.dsc | 20 ++++++++++++++++++++ 4 files changed, 73 insertions(+) create mode 100644 Platform/AMD/BoardPkg/BoardPkg.dec create mode 100644 Platform/AMD/PlatformPkg/PlatformPkg.dec create mode 100644 Platform/AMD/BoardPkg/BoardPkg.dsc create mode 100644 Platform/AMD/PlatformPkg/PlatformPkg.dsc diff --git a/Platform/AMD/BoardPkg/BoardPkg.dec b/Platform/AMD/BoardPkg/Boa= rdPkg.dec new file mode 100644 index 000000000000..3ceff33f4fc1 --- /dev/null +++ b/Platform/AMD/BoardPkg/BoardPkg.dec @@ -0,0 +1,18 @@ +## @file BoardPkg.dec +# Declaration file for AMD's BoardPkg. +# +# This package supports AMD processor family based board as per the MinPl= atform +# Arch specification. +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +# @par Specification Reference: +# -https://tianocore-docs.github.io/edk2-MinimumPlatformSpecification/dr= aft/ 0.7 +## + +[Defines] + DEC_SPECIFICATION =3D 1.27 + PACKAGE_NAME =3D BoardPkg + PACKAGE_GUID =3D 44F9D761-9ECB-43DD-A5AC-177E5048701B + PACKAGE_VERSION =3D 0.1 diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dec b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dec new file mode 100644 index 000000000000..6155860979cb --- /dev/null +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dec @@ -0,0 +1,15 @@ +## @file PlatformPkg.dec +# Declaration file for AMD's PlatformPkg. +# +# This package supports AMD processory family based platform. +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + DEC_SPECIFICATION =3D 1.27 + PACKAGE_NAME =3D PlatformPkg + PACKAGE_GUID =3D 38FBA311-E2AA-4620-9A90-9A23753D1878 + PACKAGE_VERSION =3D 0.1 diff --git a/Platform/AMD/BoardPkg/BoardPkg.dsc b/Platform/AMD/BoardPkg/Boa= rdPkg.dsc new file mode 100644 index 000000000000..cb4065b86c60 --- /dev/null +++ b/Platform/AMD/BoardPkg/BoardPkg.dsc @@ -0,0 +1,20 @@ +## @file +# BoardPkg.dsc +# +# Description file for AMD BoardPkg +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + DSC_SPECIFICATION =3D 1.30 + PLATFORM_GUID =3D 88F8A9AE-2FA0-4D58-A6F9-05F635C05F4E + PLATFORM_NAME =3D BoardPkg + PLATFORM_VERSION =3D 0.1 + OUTPUT_DIRECTORY =3D Build/$(PLATFORM_NAME) + BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT + SUPPORTED_ARCHITECTURES =3D IA32 | X64 + +[Packages] + BoardPkg/BoardPkg.dec diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dsc b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dsc new file mode 100644 index 000000000000..704566b9ea73 --- /dev/null +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dsc @@ -0,0 +1,20 @@ +## @file +# PlatformPkg.dsc +# +# Description file for AMD PlatformPkg +# +# Copyright (c) 2023, Advanced Micro Devices, Inc. All rights reserved. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + DSC_SPECIFICATION =3D 1.30 + PLATFORM_GUID =3D 2F7C29F2-7F35-4B49-B97D-F0E61BD42FC0 + PLATFORM_NAME =3D PlatformPkg + PLATFORM_VERSION =3D 0.1 + OUTPUT_DIRECTORY =3D Build/$(PLATFORM_NAME) + BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT + SUPPORTED_ARCHITECTURES =3D IA32 | X64 + +[Packages] + PlatformPkg/PlatformPkg.dec --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101308): https://edk2.groups.io/g/devel/message/101308 Mute This Topic: https://groups.io/mt/97667942/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Tue Apr 30 22:13:40 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101309+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679035827584102.65981306981371; Thu, 16 Mar 2023 23:50:27 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id PyhLYY1788612xfRwBt9318T; Thu, 16 Mar 2023 23:50:27 -0700 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com [40.107.237.42]) by mx.groups.io with SMTP id smtpd.web11.13510.1679035826163398287 for ; Thu, 16 Mar 2023 23:50:26 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Mo/j94DRbqUFbS5nJx0UxAiMwPdMny729a1hZ86kFjMfi2nHOhIBREWmqwI+ZOJe6XUBOSoCt0+5BRnqwEe4Fn7KEmoz3phjtFw9UJNgbPlVqa5XxtSl/dxt3BEesRofrHNPTZroWOBYOfWPwXtd9fKWF+MXWhYbXi00KSly02A7bY92tjOMKC9BzlDOQihhJFz4sI+rSc6hFcnL5L5aMeleJUNGWkUrraAUPh/TEup6mqoBB2EoeOjTZR7OZZJux3NG6zfx7METLFovrujX6eihwtom4MS/wakP+gJW2jFCCy1reyRKHN5wVWErZXjRKFG0uFeXhAkyth4OOn7irQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=k8Eh3X0tV1tGHNZV5gon6bWQOOLOgZvBH3YZA3NXtVI=; b=P6aJH3OLkCkNmk5qtUJMzCFcBo4c7lRU8kfHLclwVXK72/ICNmqxLP4PHUntiZqNH9qHvV9aOFvJg+eH5bvGWY1OwjO9zEu0fj4g1mnE93J6tm5qsqbwIqjVlaSSQmxnffkGQJWbah6WjY+N1LJN/kMjSdXcR5fr2KPcBraE0wwFyVkgXX05rLCCYNjvKFNnHIjmn8deoxOqtC9CuzimFmwj4cRhwKrxmRi6vWVawtkWDCAqPJHzItP31KPZRvEZs1DijHagf78k0NNsBlUN5bnqJf72sjolX8wKRynSf7l2CCigY72JmxReLc7ldbRi35XKm2+iCnqm32qsDP1Mww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DM6PR06CA0066.namprd06.prod.outlook.com (2603:10b6:5:54::43) by PH7PR12MB7187.namprd12.prod.outlook.com (2603:10b6:510:203::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35; Fri, 17 Mar 2023 06:50:22 +0000 X-Received: from DS1PEPF0000E64F.namprd02.prod.outlook.com (2603:10b6:5:54:cafe::eb) by DM6PR06CA0066.outlook.office365.com (2603:10b6:5:54::43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35 via Frontend Transport; Fri, 17 Mar 2023 06:50:22 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101309+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E64F.mail.protection.outlook.com (10.167.18.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.30 via Frontend Transport; Fri, 17 Mar 2023 06:50:22 +0000 X-Received: from SATLEXMB08.amd.com (10.181.40.132) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:21 -0500 X-Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB08.amd.com (10.181.40.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Thu, 16 Mar 2023 23:50:21 -0700 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:50:19 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Abner Chang , Michael D Kinney Subject: [edk2-devel] [PATCH v2 RESEND 2/4] Platform/AMD/PlatformPkg: Adds PciHotPlug init protocol implementation Date: Fri, 17 Mar 2023 12:20:05 +0530 Message-ID: <3eb1b035c0ffc64045065beae4c0adebf88a38cf.1679035605.git.abdattar@amd.com> In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E64F:EE_|PH7PR12MB7187:EE_ X-MS-Office365-Filtering-Correlation-Id: 7ae80b6a-b924-4275-3237-08db26b3e17c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:50:22.6134 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7ae80b6a-b924-4275-3237-08db26b3e17c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E64F.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB7187 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: e4R4NoKqsU2KbORJMWTbFFRLx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679035827; bh=WX3TIduMpPoymYyEDgiNNhAvJC5H9yF6MkE5zHMecuE=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=eL0acwmxKyBwf2fafv0yxTKNFpqwKEUwwnGxo3eSqGzn2lpNUB82LCKdbAPEdNk73X0 RDrRL6JQgHdhEqpnkb5IgqIjljwPSEn2BXQwb/6x5bKpyDR2b3xpIvbkS2FZKXOVjqczv mmyzOljA2RrxDryfz15js4RwJ6NwerHB+7o= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679035828231100001 Content-Type: text/plain; charset="utf-8" Adds PCI hotplug init protocol implementation. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang Cc: Michael D Kinney Reviewed-by: Abner Chang --- Platform/AMD/PlatformPkg/PlatformPkg.dec | 16 + Platform/AMD/PlatformPkg/PlatformPkg.dsc | 23 ++ .../PlatformPkg/PciHotPlug/PciHotPlugInit.inf | 41 +++ .../PlatformPkg/PciHotPlug/PciHotPlugInit.c | 340 ++++++++++++++++++ 4 files changed, 420 insertions(+) create mode 100644 Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf create mode 100644 Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dec b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dec index 6155860979cb..1bc38d6025c3 100644 --- a/Platform/AMD/PlatformPkg/PlatformPkg.dec +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dec @@ -13,3 +13,19 @@ [Defines] PACKAGE_NAME =3D PlatformPkg PACKAGE_GUID =3D 38FBA311-E2AA-4620-9A90-9A23753D1878 PACKAGE_VERSION =3D 0.1 + +[Guids] + gPlatformPkgTokenSpaceGuid =3D { 0x95ECA58D, 0x09B6, 0x4420, { 0xB4,= 0xE7, 0x01, 0x7F, 0x6A, 0x5B, 0x26, 0x0F }} + +[PcdsDynamic, PcdsDynamicEx] + # + # PCI HotPlug Resource Padding + # + # IO Resource padding in bytes, default 4KB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadIO|0x00001000|UINT64|= 0x10000000 + # PreFetch Memory padding in bytes, default 2MB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadPMem|0x00200000|UINT6= 4|0x10000001 + # Non-PreFetch Memory padding in bytes, default 1MB + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadMem|0x00100000|UINT64= |0x10000002 + # PCI bus padding, number of bus to reserve, default 2 bus + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadBus|2|UINT8|0x10000003 diff --git a/Platform/AMD/PlatformPkg/PlatformPkg.dsc b/Platform/AMD/Platfo= rmPkg/PlatformPkg.dsc index 704566b9ea73..9a693070ab3f 100644 --- a/Platform/AMD/PlatformPkg/PlatformPkg.dsc +++ b/Platform/AMD/PlatformPkg/PlatformPkg.dsc @@ -16,5 +16,28 @@ [Defines] BUILD_TARGETS =3D DEBUG | RELEASE | NOOPT SUPPORTED_ARCHITECTURES =3D IA32 | X64 =20 + [Packages] PlatformPkg/PlatformPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses.Common] + UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntry= Point.inf + UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBoo= tServicesTableLib.inf + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf + RegisterFilterLib|MdePkg/Library/RegisterFilterLibNull/RegisterFilterLib= Null.inf + SerialPortLib|MdeModulePkg/Library/BaseSerialPortLib16550/BaseSerialPort= Lib16550.inf + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseD= ebugPrintErrorLevelLib.inf + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf + PlatformHookLib|MdeModulePkg/Library/BasePlatformHookLibNull/BasePlatfor= mHookLibNull.inf + PciLib|MdePkg/Library/BasePciLibPciExpress/BasePciLibPciExpress.inf + PciExpressLib|MdePkg/Library/BasePciExpressLib/BasePciExpressLib.inf + +[Components.X64] + PlatformPkg/PciHotPlug/PciHotPlugInit.inf diff --git a/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf b/Platf= orm/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf new file mode 100644 index 000000000000..0079c4acf14e --- /dev/null +++ b/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.inf @@ -0,0 +1,41 @@ +## @file +# This driver implements EFI_PCI_HOT_PLUG_INIT_PROTOCOL. +# Adds resource padding information, for PCIe hotplug purposes. +# +# Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 1.29 + BASE_NAME =3D PciHotPlugInit + FILE_GUID =3D 8B67D95F-78B7-484F-8F16-5F22AB388B0C + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 0.1 + ENTRY_POINT =3D PciHotPlugInitialize + +[Sources] + PciHotPlugInit.c + +[Packages] + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + PlatformPkg/PlatformPkg.dec + +[LibraryClasses] + UefiDriverEntryPoint + UefiBootServicesTableLib + DebugLib + MemoryAllocationLib + +[Protocols] + gEfiPciHotPlugInitProtocolGuid + +[Pcd] + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadIO + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadPMem + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadMem + gPlatformPkgTokenSpaceGuid.PcdPciHotPlugResourcePadBus + +[Depex] + TRUE diff --git a/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c b/Platfor= m/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c new file mode 100644 index 000000000000..b977406bbcae --- /dev/null +++ b/Platform/AMD/PlatformPkg/PciHotPlug/PciHotPlugInit.c @@ -0,0 +1,340 @@ +/** @file + This file declares EFI PCI Hot Plug Init Protocol. + + This protocol provides the necessary functionality to initialize the Hot= Plug + Controllers (HPCs) and the buses that they control. This protocol also p= rovides + information regarding resource padding. + + @par Note: + This source has the reference of OVMF PciHotPluginit.c and Intel platf= orm PciHotPlug.c. + + This protocol is required only on platforms that support one or more P= CI Hot + Plug* slots or CardBus sockets. + + The EFI_PCI_HOT_PLUG_INIT_PROTOCOL provides a mechanism for the PCI bus = enumerator + to properly initialize the HPCs and CardBus sockets that require initial= ization. + The HPC initialization takes place before the PCI enumeration process is= complete. + There cannot be more than one instance of this protocol in a system. Thi= s protocol + is installed on its own separate handle. + + Because the system may include multiple HPCs, one instance of this proto= col + should represent all of them. The protocol functions use the device path= of + the HPC to identify the HPC. When the PCI bus enumerator finds a root HP= C, it + will call EFI_PCI_HOT_PLUG_INIT_PROTOCOL.InitializeRootHpc(). If Initial= izeRootHpc() + is unable to initialize a root HPC, the PCI enumerator will ignore that = root HPC + and continue the enumeration process. If the HPC is not initialized, the= devices + that it controls may not be initialized, and no resource padding will be= provided. + + From the standpoint of the PCI bus enumerator, HPCs are divided into the= following + two classes: + + - Root HPC: + These HPCs must be initialized by calling InitializeRootHpc() duri= ng the + enumeration process. These HPCs will also require resource padding= . The + platform code must have a priori knowledge of these devices and mu= st know + how to initialize them. There may not be any way to access their P= CI + configuration space before the PCI enumerator programs all the ups= tream + bridges and thus enables the path to these devices. The PCI bus en= umerator + is responsible for determining the PCI bus address of the HPC befo= re it + calls InitializeRootHpc(). + - Nonroot HPC: + These HPCs will not need explicit initialization during enumeratio= n process. + These HPCs will require resource padding. The platform code does n= ot have + to have a priori knowledge of these devices. + + Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.
+ Copyright (C) 2016, Red Hat, Inc.
+ Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent + + @par Revision Reference: + This Protocol is defined in UEFI Platform Initialization Specification 1= .2 + Volume 5: Standards + +**/ + +#include +#include +#include +#include +#include +#include + +// +// The protocol interface this driver produces. +// +STATIC EFI_PCI_HOT_PLUG_INIT_PROTOCOL mPciHotPlugInit; + +/** + Returns a list of root Hot Plug Controllers (HPCs) that require initiali= zation + during the boot process. + + This procedure returns a list of root HPCs. The PCI bus driver must init= ialize + these controllers during the boot process. The PCI bus driver may or may= not be + able to detect these HPCs. If the platform includes a PCI-to-CardBus bri= dge, it + can be included in this list if it requires initialization. The HpcList= must be + self consistent. An HPC cannot control any of its parent buses. Only one= HPC can + control a PCI bus. Because this list includes only root HPCs, no HPC in = the list + can be a child of another HPC. This policy must be enforced by the + EFI_PCI_HOT_PLUG_INIT_PROTOCOL. The PCI bus driver may not check for s= uch + invalid conditions. The callee allocates the buffer HpcList + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCOL ins= tance. + @param[out] HpcCount The number of root HPCs that were returned. + @param[out] HpcList The list of root HPCs. HpcCount defines the numbe= r of + elements in this list. + + @retval EFI_SUCCESS HpcList was returned. + @retval EFI_OUT_OF_RESOURCES HpcList was not returned due to insuffic= ient + resources. + @retval EFI_INVALID_PARAMETER HpcCount is NULL or HpcList is NULL. + +**/ +EFI_STATUS +EFIAPI +GetRootHpcList ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + OUT UINTN *HpcCount, + OUT EFI_HPC_LOCATION **HpcList + ) +{ + if ((HpcCount =3D=3D NULL) || (HpcList =3D=3D NULL)) { + return EFI_INVALID_PARAMETER; + } + + // + // Platform BIOS not doing any extra/special HPC initialization + // Hence returning the HpcCount as zero and HpcList as NULL + // + *HpcCount =3D 0; + *HpcList =3D NULL; + + return EFI_SUCCESS; +} + +/** + Initializes one root Hot Plug Controller (HPC). This process may causes + initialization of its subordinate buses. + + This function initializes the specified HPC. At the end of initializatio= n, + the hot-plug slots or sockets (controlled by this HPC) are powered and a= re + connected to the bus. All the necessary registers in the HPC are set up.= For + a Standard (PCI) Hot Plug Controller (SHPC), the registers that must be = set + up are defined in the PCI Standard Hot Plug Controller and Subsystem + Specification. + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCO= L instance. + @param[in] HpcDevicePath The device path to the HPC that is being ini= tialized. + @param[in] HpcPciAddress The address of the HPC function on the PCI b= us. + @param[in] Event The event that should be signaled when the H= PC + initialization is complete. Set to NULL if = the + caller wants to wait until the entire initia= lization + process is complete. + @param[out] HpcState The state of the HPC hardware. The state is + EFI_HPC_STATE_INITIALIZED or EFI_HPC_STATE_E= NABLED. + + @retval EFI_SUCCESS If Event is NULL, the specific HPC was s= uccessfully + initialized. If Event is not NULL, Event= will be + signaled at a later time when initializa= tion is complete. + @retval EFI_UNSUPPORTED This instance of EFI_PCI_HOT_PLUG_INIT_P= ROTOCOL + does not support the specified HPC. + @retval EFI_OUT_OF_RESOURCES Initialization failed due to insufficient + resources. + @retval EFI_INVALID_PARAMETER HpcState is NULL. + +**/ +EFI_STATUS +EFIAPI +InitializeRootHpc ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + IN EFI_DEVICE_PATH_PROTOCOL *HpcDevicePath, + IN UINT64 HpcPciAddress, + IN EFI_EVENT Event, OPTIONAL + OUT EFI_HPC_STATE *HpcState + ) +{ + if (HpcState =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + // + // This Platform doesnt have any non-enumerated HPC. + // Hence no extra initialization required from Platform BIOS. + // + return EFI_UNSUPPORTED; +} + +/** + Returns the resource padding that is required by the PCI bus that is con= trolled + by the specified Hot Plug Controller (HPC). + + This function returns the resource padding that is required by the PCI b= us that + is controlled by the specified HPC. This member function is called for a= ll the + root HPCs and nonroot HPCs that are detected by the PCI bus enumerator. = This + function will be called before PCI resource allocation is completed. Thi= s function + must be called after all the root HPCs, with the possible exception of a + PCI-to-CardBus bridge, have completed initialization. + + @param[in] This Pointer to the EFI_PCI_HOT_PLUG_INIT_PROTOCO= L instance. + @param[in] HpcDevicePath The device path to the HPC. + @param[in] HpcPciAddress The address of the HPC function on the PCI b= us. + @param[out] HpcState The state of the HPC hardware. + @param[out] Padding The amount of resource padding that is requi= red by the + PCI bus under the control of the specified H= PC. + @param[out] Attributes Describes how padding is accounted for. The = padding + is returned in the form of ACPI 2.0 resource= descriptors. + + @retval EFI_SUCCESS The resource padding was successfully re= turned. + @retval EFI_UNSUPPORTED This instance of the EFI_PCI_HOT_PLUG_IN= IT_PROTOCOL + does not support the specified HPC. + @retval EFI_NOT_READY This function was called before HPC init= ialization + is complete. + @retval EFI_INVALID_PARAMETER HpcState or Padding or Attributes is NUL= L. + @retval EFI_OUT_OF_RESOURCES ACPI 2.0 resource descriptors for Padding + cannot be allocated due to insufficient = resources. + +**/ +EFI_STATUS +EFIAPI +GetResourcePadding ( + IN EFI_PCI_HOT_PLUG_INIT_PROTOCOL *This, + IN EFI_DEVICE_PATH_PROTOCOL *HpcDevicePath, + IN UINT64 HpcPciAddress, + OUT EFI_HPC_STATE *HpcState, + OUT VOID **Padding, + OUT EFI_HPC_PADDING_ATTRIBUTES *Attributes + ) +{ + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *PaddingResource; + + // + // Need total 5 resources + // 1 - IO resource + // 2 - Mem resource + // 3 - PMem resource + // 4 - Bus resource + // 5 - end tag resource + PaddingResource =3D AllocateZeroPool (4 * sizeof (EFI_ACPI_ADDRESS_SPACE= _DESCRIPTOR) + sizeof (EFI_ACPI_END_TAG_DESCRIPTOR)); + if (PaddingResource =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + *Padding =3D (VOID *)PaddingResource; + + // + // Padding for bus + // + *Attributes =3D EfiPaddingPciBus; + + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_BUS; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->SpecificFlag =3D 0; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrRangeMax =3D 0; + PaddingResource->AddrLen =3D PcdGet8 (PcdPciHotPlugResourcePadBus); + + // + // Padding for non-prefetchable memory + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_MEM; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->AddrSpaceGranularity =3D 32; + PaddingResource->SpecificFlag =3D EFI_ACPI_MEMORY_RESOURCE_SPECI= FIC_FLAG_NON_CACHEABLE; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourc= ePadMem); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Padding for prefetchable memory + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_MEM; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->AddrSpaceGranularity =3D 32; + PaddingResource->SpecificFlag =3D EFI_ACPI_MEMORY_RESOURCE_SPECI= FIC_FLAG_CACHEABLE_PREFETCHABLE; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourc= ePadPMem); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Padding for I/O + // + PaddingResource++; + PaddingResource->Desc =3D ACPI_ADDRESS_SPACE_DESCRIPTOR; + PaddingResource->Len =3D (UINT16)( + sizeof (EFI_ACPI_ADDRESS_SPACE_DESCRIPT= OR) - + OFFSET_OF ( + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR, + ResType + ) + ); + PaddingResource->ResType =3D ACPI_ADDRESS_SPACE_TYPE_IO; + PaddingResource->GenFlag =3D 0x0; + PaddingResource->SpecificFlag =3D 0; + PaddingResource->AddrRangeMin =3D 0; + PaddingResource->AddrLen =3D PcdGet64 (PcdPciHotPlugResourcePadIO); + PaddingResource->AddrRangeMax =3D PaddingResource->AddrLen - 1; + + // + // Terminate the entries. + // + PaddingResource++; + ((EFI_ACPI_END_TAG_DESCRIPTOR *)PaddingResource)->Desc =3D ACPI_END_= TAG_DESCRIPTOR; + ((EFI_ACPI_END_TAG_DESCRIPTOR *)PaddingResource)->Checksum =3D 0x0; + + *HpcState =3D EFI_HPC_STATE_INITIALIZED | EFI_HPC_STATE_ENABLED; + + return EFI_SUCCESS; +} + +/** + Entry point for this driver. + + @param[in] ImageHandle Image handle of this driver. + @param[in] SystemTable Pointer to SystemTable. + + @retval EFI_SUCESS Driver has loaded successfully. + @return Error codes from lower level functions. + +**/ +EFI_STATUS +EFIAPI +PciHotPlugInitialize ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + mPciHotPlugInit.GetRootHpcList =3D GetRootHpcList; + mPciHotPlugInit.InitializeRootHpc =3D InitializeRootHpc; + mPciHotPlugInit.GetResourcePadding =3D GetResourcePadding; + return gBS->InstallMultipleProtocolInterfaces ( + &ImageHandle, + &gEfiPciHotPlugInitProtocolGuid, + &mPciHotPlugInit, + NULL + ); +} --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101309): https://edk2.groups.io/g/devel/message/101309 Mute This Topic: https://groups.io/mt/97667943/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Tue Apr 30 22:13:40 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101311+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679035828474202.93484621918583; Thu, 16 Mar 2023 23:50:28 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id RI0zYY1788612x3BpBqvojkY; Thu, 16 Mar 2023 23:50:28 -0700 X-Received: from NAM04-DM6-obe.outbound.protection.outlook.com (NAM04-DM6-obe.outbound.protection.outlook.com [40.107.102.84]) by mx.groups.io with SMTP id smtpd.web11.13512.1679035827039270176 for ; Thu, 16 Mar 2023 23:50:27 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SeybqWVd4SIbQJ/CJrBqCTuQ5TgkDhAgFcNz8iqM0Nc5yS44otamAymwQ5e2N/EAAayX2pMXRnic+DYrV/gh6EclVSGFoHoQzyidETwKuPLCiInHD1Z1klv1N7EduGkWZNAKn2VBsQzFj9dPpzGiPaNZgKvzMJVheIvd8e7uob949BMExErrUjDOP6zuJ0hRLQ/V03Blq32taxvI8mxAjtEjD0qrGb3CKaHxj/HGmiPLRgLQFvLjzHZ5nV+FQsAfHS/UIaWzNsQC7DNK56xtPY9jN7WuDwQrHdTECGNFN76oBTG0mrqG5hU2+LcytN6cXsRXafDI55JwffShjLFQoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7kOPACWySzJwCxjwiix8wG99gJycLOilDU7ZdE/KRW4=; b=oMSDTiSmNstfoRVO/GuYG2AlJ53vvNx2/88Z45/lhPAVLOlLmUTUyAhIMX3tZwICnKhVB3Eb4j5UZxOJd/h6/FEyUWIxofzZh3JhbYYGPPYvUTRctdW4gxKXKYwiojFqArY+1Hjxv/9j+tg1yZgfDSvRPl6olK+ThFWZO5BsvoD+iRF32M7Zh2eMaJcWtQO+NNuYurt6oa2rnj/b9+g7Y4jU4dERO2LS7OlClyoRy9K5qqFa8H6qUuQftfXVvEWL1CdUxDutwGyp3j9mBIAhQa65zh5tLTX2FVj5o3r0V5AIZ0gkIddH6N+E7Dj+g5f0y1iGIuzJcu+Kt7Vw1x5ooA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DS7PR05CA0086.namprd05.prod.outlook.com (2603:10b6:8:56::7) by SJ2PR12MB9007.namprd12.prod.outlook.com (2603:10b6:a03:541::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.31; Fri, 17 Mar 2023 06:50:24 +0000 X-Received: from DM6NAM11FT029.eop-nam11.prod.protection.outlook.com (2603:10b6:8:56:cafe::30) by DS7PR05CA0086.outlook.office365.com (2603:10b6:8:56::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6222.8 via Frontend Transport; Fri, 17 Mar 2023 06:50:24 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101311+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C X-Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT029.mail.protection.outlook.com (10.13.173.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6199.20 via Frontend Transport; Fri, 17 Mar 2023 06:50:24 +0000 X-Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:24 -0500 X-Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:23 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:50:21 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Abner Chang , Michael D Kinney Subject: [edk2-devel] [PATCH v2 RESEND 3/4] Platform/AMD/BoarkPkg: Adds SetCacheMtrrLib library Date: Fri, 17 Mar 2023 12:20:06 +0530 Message-ID: <60ddb8be3b32bc6ff9745a51eef1f857c428a0f4.1679035605.git.abdattar@amd.com> In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT029:EE_|SJ2PR12MB9007:EE_ X-MS-Office365-Filtering-Correlation-Id: 9acf3261-d316-458a-5523-08db26b3e2b2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:50:24.6615 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9acf3261-d316-458a-5523-08db26b3e2b2 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT029.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR12MB9007 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: aOPXwXtYG4YnLXhMSE3I9Zi4x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679035828; bh=jAQzeO38/fu6mnYmOHfyWYwg4lDLDvcg0L/W6CLW+cw=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=Uk7tzSzJOJdg0tMFh46IzH9H1Q5Y2jhVbGeweVs4nLvCflByL78CL5zgt0O/fXn0Xn1 nc+SY55YsHOZhp1C+iCt7fVU9GAZPUUXTzKADYcqWBIcLhhtZ6yb2fcFcsHWYiQ4Rijm4 VZiR939LBfiIS5EWhk8redqYlbTZLgyEpLA= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679035830280100007 Content-Type: text/plain; charset="utf-8" Adds SetCacheMtrrLib library for AMD processor based boards. This library sets MTRR value or various memory ranges. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang Cc: Michael D Kinney Reviewed-by: Abner Chang --- Platform/AMD/BoardPkg/BoardPkg.dsc | 10 ++ .../SetCacheMtrrLib/SetCacheMtrrLib.inf | 37 +++++ .../Library/SetCacheMtrrLib/SetCacheMtrrLib.c | 132 ++++++++++++++++++ 3 files changed, 179 insertions(+) create mode 100644 Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheM= trrLib.inf create mode 100644 Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheM= trrLib.c diff --git a/Platform/AMD/BoardPkg/BoardPkg.dsc b/Platform/AMD/BoardPkg/Boa= rdPkg.dsc index cb4065b86c60..aa0ee8287cd8 100644 --- a/Platform/AMD/BoardPkg/BoardPkg.dsc +++ b/Platform/AMD/BoardPkg/BoardPkg.dsc @@ -18,3 +18,13 @@ [Defines] =20 [Packages] BoardPkg/BoardPkg.dec + MinPlatformPkg/MinPlatformPkg.dec + MdePkg/MdePkg.dec + UefiCpuPkg/UefiCpuPkg.dec + +[LibraryClasses.common.PEIM] + SetCacheMtrrLib|BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf + +[Components.IA32] + BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf + diff --git a/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.= inf b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf new file mode 100644 index 000000000000..c66661d3f8dc --- /dev/null +++ b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.inf @@ -0,0 +1,37 @@ +## @file +# Component information file for Platform SetCacheMtrr Library. +# This library implementation is for AMD processor based platforms. +# +# Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 1.29 + BASE_NAME =3D PeiSetCacheMtrrLib + FILE_GUID =3D 1E8468E0-5EB4-4088-9B52-BFDC6E4DAE87 + MODULE_TYPE =3D PEIM + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D SetCacheMtrrLib + +[LibraryClasses] + BaseLib + DebugLib + MtrrLib + +[Packages] + MinPlatformPkg/MinPlatformPkg.dec + MdePkg/MdePkg.dec + UefiCpuPkg/UefiCpuPkg.dec + +[Sources] + SetCacheMtrrLib.c + +[Guids] + +[Pcd] + gMinPlatformPkgTokenSpaceGuid.PcdFlashAreaBaseAddress + gMinPlatformPkgTokenSpaceGuid.PcdFlashAreaSize + diff --git a/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.= c b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.c new file mode 100644 index 000000000000..18404405d9fa --- /dev/null +++ b/Platform/AMD/BoardPkg/Library/SetCacheMtrrLib/SetCacheMtrrLib.c @@ -0,0 +1,132 @@ +/** @file + +SetCacheMtrr library functions. +This library implementation is for AMD processor based platforms. + +Copyright (C) 2023 Advanced Micro Devices, Inc. All rights reserved.
+ +SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include +#include +#include +#include + +/** + This function sets the cache MTRR values for PEI phase. +**/ +VOID +EFIAPI +SetCacheMtrr ( + VOID + ) +{ + EFI_STATUS Status; + + Status =3D MtrrSetMemoryAttribute ( + 0, + 0xA0000, + CacheWriteBack + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteBack for 0-0x9FFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0xA0000, + 0x20000, + CacheUncacheable + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheUncacheable for 0xA0000-0xBFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0xC0000, + 0x40000, + CacheWriteProtected + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteProtected for 0xC0000-0xFFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + 0x100000, + 0xAFF00000, + CacheWriteBack + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteBack for 0x100000-0xAFFFFFFF\n", + Status + )); + } + + Status =3D MtrrSetMemoryAttribute ( + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaSize), + CacheWriteProtected + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheWriteProtected for 0x%X-0x%X\n", + Status, + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaBaseAddress) + PcdGet32 (PcdFlashAreaSize) + )); + } + + MtrrDebugPrintAllMtrrs (); + return; +} + +/** + Update MTRR setting in EndOfPei phase. + This function will set the MTRR value as CacheUncacheable + for Flash address. + + @retval EFI_SUCCESS The function completes successfully. + @retval Others Some error occurs. +**/ +EFI_STATUS +EFIAPI +SetCacheMtrrAfterEndOfPei ( + VOID + ) +{ + EFI_STATUS Status; + + Status =3D MtrrSetMemoryAttribute ( + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaSize), + CacheUncacheable + ); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "Error(%r) in setting CacheUncacheable for 0x%X-0x%X\n", + Status, + PcdGet32 (PcdFlashAreaBaseAddress), + PcdGet32 (PcdFlashAreaBaseAddress) + PcdGet32 (PcdFlashAreaSize) + )); + } + + MtrrDebugPrintAllMtrrs (); + return EFI_SUCCESS; +} --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101311): https://edk2.groups.io/g/devel/message/101311 Mute This Topic: https://groups.io/mt/97667945/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Tue Apr 30 22:13:40 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101312+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1679035833154825.9710970594307; Thu, 16 Mar 2023 23:50:33 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id CIB5YY1788612xJGyXkBDljm; Thu, 16 Mar 2023 23:50:32 -0700 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com [40.107.237.52]) by mx.groups.io with SMTP id smtpd.web10.13601.1679035831956952571 for ; Thu, 16 Mar 2023 23:50:32 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L2a7Q2AMditgmoy7F7l9rby2q+HP1JfagsmkJtCuyHB0K+I4itDBPiuNZhIuRUsss4IIOJ/1fyQJB1kahhF6O+5wVFQrnC9BlDYGyZVlZ/rXYvaf5DCwRvbNHjrO4rlXJoiRZU8pnOh+FX+xOxOIiL3v1O5mhEf7CcLpplpE7hQpul7g7qZ0ZrbMeUNENA/PwOUq9KLdR5N3bazuDp3jDI7O+h8uKE9aQ6fMKrPu41Xb2HzDl4WxUSFuWJsI1uFn7MN0vONinjvaqA7s/DEhudiKpIkwW9nedvYnyYY1tD7OUP4nzPZkrVainBo9Rv1U7T24m/drQtPQbpHMnJTh8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y0KGGBHzAu4q7pA9g9uCxA6FZcQ1Vl9e/U9vBEqxRPE=; b=KvKzr3boPGCvx+4NzoNMTr728kpoDXilQDNf0yEHnRK12AddlD0sHMYxEULbjb73MkFribu5DEzYNUmfB/r91pEpknlUMtIxO9mxW5Z8VdiXY2KcEC8gjBV+GH5pA+7UdjZTbUonTrJg0qybdU5IOBjjdA3M1O8CT9y5z2fwgUfB4dlaiSUxtHCc8HWAxlnLJwaB6kFnLFhuhA8krywY7mJeEcc6l3oEp0Qsq70aVqfTUykz1U9QUDXDQCGODULoE0WynG7M8RoOeGXlDzCo4BVUTjHNMMJvjB7jLSqFfeUZxIfniEi9Qqtl+ZJSnckpOGwR+6ALaYC0hn8FpC6HgQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none X-Received: from DS7PR03CA0113.namprd03.prod.outlook.com (2603:10b6:5:3b7::28) by DM6PR12MB4401.namprd12.prod.outlook.com (2603:10b6:5:2a9::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35; Fri, 17 Mar 2023 06:50:28 +0000 X-Received: from DS1PEPF0000E64E.namprd02.prod.outlook.com (2603:10b6:5:3b7:cafe::4b) by DS7PR03CA0113.outlook.office365.com (2603:10b6:5:3b7::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.35 via Frontend Transport; Fri, 17 Mar 2023 06:50:28 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101312+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C X-Received: from SATLEXMB03.amd.com (165.204.84.17) by DS1PEPF0000E64E.mail.protection.outlook.com (10.167.18.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6178.30 via Frontend Transport; Fri, 17 Mar 2023 06:50:27 +0000 X-Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 17 Mar 2023 01:50:26 -0500 X-Received: from BLR-LAB-SFW01.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Fri, 17 Mar 2023 01:50:24 -0500 From: "Abdul Lateef Attar via groups.io" To: CC: Abdul Lateef Attar , Abdul Lateef Attar , Ard Biesheuvel , Leif Lindholm , Abner Chang , "Michael D Kinney" Subject: [edk2-devel] [PATCH v2 RESEND 4/4] Maintainers.txt: Adds AMD/BoardPkg and AMD/PlatformPkg maintainers Date: Fri, 17 Mar 2023 12:20:07 +0530 Message-ID: <3c02d9dae4384688b596a6617a8bb05ce84bade7.1679035605.git.abdattar@amd.com> In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0000E64E:EE_|DM6PR12MB4401:EE_ X-MS-Office365-Filtering-Correlation-Id: 1ddb75a5-a443-4374-e6c7-08db26b3e497 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2023 06:50:27.8281 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1ddb75a5-a443-4374-e6c7-08db26b3e497 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0000E64E.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR12MB4401 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,abdattar@amd.com X-Gm-Message-State: xaBzVaOA3AvZGDzllBxVxzGkx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1679035832; bh=a+C53bfgDQb0bLb+TNldojrTJ5OUJ/7qKeRUPR47iuM=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=K1NHUgtXGmC9zq3PrgacPLicdOjS4iJuoa6FG/Rb6tT6SoBlP9vftBrIIZJ1Q3BHMN+ fu73GQg0nyR/49U7pLzsdae/ZRjkucrc2clSk2V0mMkbsKFHeZbA4mbfppwT+/Megv1C/ tzVq96oJ7DtnxTo7I251t4ZH9J7nQ8e382g= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1679035834426100001 Content-Type: text/plain; charset="utf-8" From: Abdul Lateef Attar Adds maintainers for AMD/BoardPkg and AMD/PlatformPkg. Signed-off-by: Abdul Lateef Attar Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Abner Chang Cc: Michael D Kinney Acked-by: Abner Chang --- Maintainers.txt | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Maintainers.txt b/Maintainers.txt index 747191366070..bb8ab643e090 100644 --- a/Maintainers.txt +++ b/Maintainers.txt @@ -91,6 +91,12 @@ F: Silicon/AMD/Styx/ M: Ard Biesheuvel M: Leif Lindholm =20 +AMD Platform +F: Platform/AMD/BoardPkg +F: Platform/AMD/PlatformPkg +M: Abner Chang +M: Abdul Lateef Attar + Ampere Computing F: Platform/Ampere F: Silicon/Ampere --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101312): https://edk2.groups.io/g/devel/message/101312 Mute This Topic: https://groups.io/mt/97667946/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-