From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web11.32457.1654896024421653587 for ; Fri, 10 Jun 2022 14:20:25 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=GwzKKDrE; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: nathaniel.l.desimone@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1654896024; x=1686432024; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=9grxy2rnBnZ7gm1qn/aMd4T+Uymkre6JWglE7InrfGc=; b=GwzKKDrEbq6nIMrrooWLTu6AWgIb29yggaEEpNdmEKWZ6ycOWk0yzjO2 ogFQHHttBVhayNYvpO/R0sAMQ5ZQNfYKwAF6ergadbpAfy/X2VGNW1MSp xKXOrYSeBN3SPRqIkt3idIeeR5V5RF1NhOzUR0eO714hpYWddMa/aiXz7 APQdjK4SWpfPKFqd9JOfe51on76d1DLdObRUQmrKE3gqPwi14KFEO+bnW B6+dNMMk1Qpm8kHhF5oDuf5CfLpEuVrJXeoaV1IjVpSEy/AN6XPaHd8rc fSnITWRiQbjUr4O2+qM1nI6hxc+prmQl/Tt1He8eCzyzUpjt0RuQnYb/s Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10374"; a="258186699" X-IronPort-AV: E=Sophos;i="5.91,291,1647327600"; d="scan'208";a="258186699" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jun 2022 14:20:23 -0700 X-IronPort-AV: E=Sophos;i="5.91,291,1647327600"; d="scan'208";a="760670591" Received: from nldesimo-desk1.amr.corp.intel.com ([10.7.159.54]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jun 2022 14:20:23 -0700 From: "Nate DeSimone" To: devel@edk2.groups.io Cc: Jian J Wang , Liming Gao , Michael D Kinney , Isaac Oram , Chasel Chiu , Gao Cheng , Di Zhang , Daocheng Bu , Michael Kubacki Subject: [PATCH V2 0/1] Add EDKII_PEI_VARIABLE_PPI Date: Fri, 10 Jun 2022 14:20:09 -0700 Message-Id: <20220610212010.5283-1-nathaniel.l.desimone@intel.com> X-Mailer: git-send-email 2.27.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Changes in V2: - Fixed instances where the new PPI was incorrectly reffered to as "EDKII PEI Variable Protocol" - Added OPTIONAL to the Attributes argument of GetVariable() - Added description of initial calling conditions to GetNextVariableName() - Clarified the function and format of EFI_AUTHENTICATED_VARIABLE_HOB This patch series proposes a new architectural PPI: EDKII_PEI_VARIABLE_PPI This PPI provides services to read and write to UEFI variables during the PEI environment. While an implementation of this PPI does not exist yet, Intel is working on a new implementation of the PEI variable services that includes write support. As this is essentially a PEI version of the EFI_SMM_VARIABLE_PROTOCOL, I don't expect it to be immensely controversial. Regardless, before this implementation is done, we would like to provide the community with an opportunity to provide input the on new architectural PPI. Cc: Jian J Wang Cc: Liming Gao Cc: Michael D Kinney Cc: Isaac Oram Cc: Chasel Chiu Cc: Gao Cheng Cc: Di Zhang Cc: Daocheng Bu Cc: Michael Kubacki Signed-off-by: Nate DeSimone Nathaniel L Desimone (1): MdeModulePkg: Add Definition of EDKII_PEI_VARIABLE_PPI MdeModulePkg/Include/Ppi/Variable.h | 195 ++++++++++++++++++++++++++++ MdeModulePkg/MdeModulePkg.dec | 3 + 2 files changed, 198 insertions(+) create mode 100644 MdeModulePkg/Include/Ppi/Variable.h -- 2.27.0.windows.1