From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 02E73AC1004 for ; Tue, 25 Jul 2023 10:31:43 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=LisCyv6Qff8aVr0YLYPbtNCYXcJ3YVJs65l42Yc7kec=; c=relaxed/simple; d=groups.io; h=X-Received:X-Received:X-Received:X-Received:X-MS-Exchange-Authentication-Results:Received-SPF:X-Received:X-Received:X-CheckRecipientChecked:X-CR-MTA-CID:X-CR-MTA-TID:X-Received:X-Received:ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:X-Received:X-Received:X-MS-Exchange-Authentication-Results:Received-SPF:X-Received:X-Received:X-Received:From:To:CC:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:X-EOPAttributedMessage:X-MS-TrafficTypeDiagnostic:X-MS-Office365-Filtering-Correlation-Id:x-checkrecipientrouted:NoDisclaimer:X-MS-Exchange-SenderADCheck:X-MS-Exchange-AntiSpam-Relay:X-Microsoft-Antispam-Untrusted:X-Microsoft-Antispam-Message-Info-Original:X-Forefront-Antispam-Report-Untrusted:X-MS-Exchange-Transport-CrossTenantHeadersStamped:X-MS-Exchange-Transport-CrossTenantHeadersStripped:X-MS-PublicTrafficType:X-MS-Office365-Filtering-Correlation-Id-Prvs:X-Microsoft-Antispam-Message-Info:X-OriginatorOrg:X-MS-Exchange-CrossTenant-OriginalArrivalTime:X-MS-Exchange -CrossTenant-Network-Message-Id:X-MS-Exchange-CrossTenant-Id:X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp:X-MS-Exchange-CrossTenant-AuthSource:X-MS-Exchange-CrossTenant-AuthAs:X-MS-Exchange-CrossTenant-FromEntityHeader:X-MS-Exchange-Transport-CrossTenantHeadersStamped:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:X-Gm-Message-State:Content-Type; s=20140610; t=1690281102; v=1; b=Uv9iTpp6vSXNbi5ZzLVaEarYYYDKkCM9/sosHZwi/FNv+kTRLqiMg9yrKbFYMdQHk9UzS5eu oezjcpd6Eg6PgJ2pViPqgA9/wj0Z87FBJDQPzlQCCteKurYCfwvdmQBymocXiLiBHgsGLsv9Jna oEOrF8vstHU3zWHmQeD2czdw= X-Received: by 127.0.0.2 with SMTP id auYiYY7687511xebfE59Owoc; Tue, 25 Jul 2023 03:31:42 -0700 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.88]) by mx.groups.io with SMTP id smtpd.web11.17235.1690281101821601004 for ; Tue, 25 Jul 2023 03:31:42 -0700 X-Received: from AM9P192CA0028.EURP192.PROD.OUTLOOK.COM (2603:10a6:20b:21d::33) by DU0PR08MB8113.eurprd08.prod.outlook.com (2603:10a6:10:3e9::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.32; Tue, 25 Jul 2023 10:31:38 +0000 X-Received: from AM7EUR03FT015.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:21d:cafe::3c) by AM9P192CA0028.outlook.office365.com (2603:10a6:20b:21d::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.33 via Frontend Transport; Tue, 25 Jul 2023 10:31:38 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM7EUR03FT015.mail.protection.outlook.com (100.127.140.173) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.25 via Frontend Transport; Tue, 25 Jul 2023 10:31:38 +0000 X-Received: ("Tessian outbound f5de790fcf89:v145"); Tue, 25 Jul 2023 10:31:38 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: d99ed310c40b36ba X-CR-MTA-TID: 64aa7808 X-Received: from b713bfa03e47.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 85368A83-684D-485E-9025-4AEA3543C0CC.1; Tue, 25 Jul 2023 10:31:30 +0000 X-Received: from EUR02-AM0-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b713bfa03e47.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 25 Jul 2023 10:31:30 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AQt5diE+8DLA0lmXml0uixbfazshMJ/NE0O2gEGvWAmoeZec4tWIujCeVjmZ1XnunB4vSh5vX7nJ+ptQc1iPmONqBQFABde1ZfSpCFOQqflVYLRuXq/fWikHrjYsdDnydZ1dd2llMiWmZhf2gDt0wh1bDbQgbaey7WjVN9TmoI6VsFY+8CPBA3YpdhnPyGXLfmaQS6HZ8vymH6SvcD5oZ0FcGzu7LMcdv8BpZhZ3M6k0qc2lBpWfJJdnqeHnfwIzcyQf9Yzsb7+/dfQ+yxetCbzwgrjCv3iaQbH3M9MdEXS6WbLUJd7CbiX6XVzzBZ7ScVYzcCG2HnFY0B7HshrnHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FSmsfBWu/ylNAV9/I5eLEszYwaWAIRl64Ql4NfBAgFs=; b=lP1CArGj9tn+wDV5NYZlCg5fM+GFwPNXDCr2Z53yC+GzmvXvFM5gu9InYAgsraX8xgW/27zYGTXdTI8+7Nb/P1s8MGvcxtWvI0AAdH59bV+Q5t+ZVc9K4ndXeLjpBMJ5lryYW3BT/5HaAhOPhCaZxD73YbJ5BCXS3MNExyLmAAsBTsOQLrhPUrNfYqG/8ImnXn3/Y5Ia0QaK4zb2NaHgiTiVZPfEYyPwfVSU/zwudt943SJxPBVlqRSyCLRZlP4KdmPW/x2/icDEfzSzJoQIi++cJEyg92IOO1T2tISBdeYwOkmbBGqujhx/nmp6WJz9aX+LueGO18CChD/OdTFQvw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DUZPR01CA0341.eurprd01.prod.exchangelabs.com (2603:10a6:10:4b8::11) by GV2PR08MB8318.eurprd08.prod.outlook.com (2603:10a6:150:b5::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.33; Tue, 25 Jul 2023 10:31:25 +0000 X-Received: from DBAEUR03FT039.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:4b8:cafe::8a) by DUZPR01CA0341.outlook.office365.com (2603:10a6:10:4b8::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.33 via Frontend Transport; Tue, 25 Jul 2023 10:31:25 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C X-Received: from nebula.arm.com (40.67.248.234) by DBAEUR03FT039.mail.protection.outlook.com (100.127.142.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6631.25 via Frontend Transport; Tue, 25 Jul 2023 10:31:25 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Tue, 25 Jul 2023 10:31:06 +0000 X-Received: from E114225.Arm.com (10.1.196.36) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.27 via Frontend Transport; Tue, 25 Jul 2023 10:31:06 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 2/3] Platform/ARM: FVP: Specify TRBE interrupt in MADT GICC Date: Tue, 25 Jul 2023 11:31:04 +0100 Message-ID: <20230725103105.8068-3-sami.mujawar@arm.com> In-Reply-To: <20230725103105.8068-1-sami.mujawar@arm.com> References: <20230725103105.8068-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DBAEUR03FT039:EE_|GV2PR08MB8318:EE_|AM7EUR03FT015:EE_|DU0PR08MB8113:EE_ X-MS-Office365-Filtering-Correlation-Id: 5fb5fcf1-aa8a-4a41-1034-08db8cfa53f9 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230028)(4636009)(39860400002)(136003)(346002)(396003)(376002)(451199021)(82310400008)(46966006)(36840700001)(40470700004)(44832011)(8676002)(8936002)(5660300002)(41300700001)(316002)(2906002)(4326008)(6916009)(54906003)(70206006)(70586007)(7696005)(26005)(186003)(336012)(478600001)(966005)(40460700003)(1076003)(40480700001)(86362001)(36756003)(426003)(2616005)(47076005)(36860700001)(83380400001)(82740400003)(356005)(81166007)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR08MB8318 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM7EUR03FT015.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 559bce0b-12e3-4455-63c4-08db8cfa4c61 X-Microsoft-Antispam-Message-Info: 5tV6Gz1opyKCuSoJRK6rMYHCOaCI/FdVdrc/+gHppyHBQUMcbEr2aq+q87MmKkTvenxngvzKXBXP1fAs/LfytP5hY+AfmG3L9XXLEavC/w1gSjjOQkxyJQEGEQTLbLNotmuJb+uqnvstBs1tIe2Ey8QImiOhvntVFxFwVXvY9yz0ptVTzjq2IYEeMApiZafNJTVsrgK1UT2bbz6/ndrXzdskb5GXLL/cfJjlTX5PGPul47tIbuVH3p4BN+lYPNaVXvkTw87XVlDvS1SRA5RB2LgJyZnRJ9DPKFySmNohCy1+wC6DxyUsc6PPAVwK9asJqhaKpulrOZuL02SLJbHB6Qusb5D4FlE6IxjAxi10QwVaEm/rwATOaLiyPBDcA0L0u4JfyIAL6Y6j/A+5a+qND17GJxQ602+ChU3/w9DeUvZ5fGkMY7AZGUMwixjRZarXQhI+ZJJpb1nNo3jfLWscFKh/0RdGEoHEnQFjU5+AG6yK75d722ULKNX1bFY6tJ1/WjBLq4CaNoS4Qxb34e1EIpnRGeGUceUk6ppwCoPIFfJ7vlCXm2k0HHkfoYqIvd2BJG+ww722GN5/OcjnbjRI34cQrZorjBzZ8u+nZ42RaqcPWMQlWRLWUP5FbuYOa8RYAAKqp4RLo4dVuQhQLMwoqVrydggSoZGA6wG/KlD1cc/otutUM3tngb0hQJdIFg2OdLvYvqnwhe6KDcEj+67siAPb7ibk0np/MoI9x6pp5F8= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Jul 2023 10:31:38.0976 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5fb5fcf1-aa8a-4a41-1034-08db8cfa53f9 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM7EUR03FT015.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR08MB8113 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: LRohK86ESDFwMjeRkeRn2hjzx7686176AA= Content-Type: text/plain X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=Uv9iTpp6; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=arm.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io When TRBE is enabled the FVP model uses the PPI 15 (i.e. INT ID 31) as the TRBE interrupt. Ref: https://www.kernel.org/doc/Documentation/ devicetree/bindings/arm/arm,trace-buffer-extension.yaml Therefore, check the debug feature register ID_AA64DFR0_EL1.TraceBuffer field to see if TRBE is enabled and configure the TRBE interrupt in the GICC structure in the MADT ACPI table. Note: To enable TRBE support in the FVP REvC model 1. Build TF-A with the CTX_INCLUDE_AARCH32_REGS=0 build flag set, otherwise this results in an exception when booting TF-A. 2. Set the model parameters to enable TRBE -C cluster0.has_trbe=1 -C cluster1.has_trbe=1 Signed-off-by: Sami Mujawar --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManager.c | 39 ++++++++++++++++---- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf | 3 +- 2 files changed, 33 insertions(+), 9 deletions(-) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManager.c b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManager.c index 4df2d6cdae58df344804a8b41208a3adb8ee0110..03393905be1c627b7cdbaa0efed33e920072c8cb 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManager.c +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManager.c @@ -1,7 +1,7 @@ /** @file Configuration Manager Dxe - Copyright (c) 2017 - 2021, Arm Limited. All rights reserved.
+ Copyright (c) 2017 - 2023, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent @@ -15,6 +15,7 @@ #include #include #include +#include #include #include #include @@ -37,8 +38,8 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryInfo = { { // FADT Table { - EFI_ACPI_6_3_FIXED_ACPI_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_3_FIXED_ACPI_DESCRIPTION_TABLE_REVISION, + EFI_ACPI_6_5_FIXED_ACPI_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_5_FIXED_ACPI_DESCRIPTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdFadt), NULL }, @@ -51,8 +52,8 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryInfo = { }, // MADT Table { - EFI_ACPI_6_3_MULTIPLE_APIC_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_3_MULTIPLE_APIC_DESCRIPTION_TABLE_REVISION, + EFI_ACPI_6_5_MULTIPLE_APIC_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_5_MULTIPLE_APIC_DESCRIPTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdMadt), NULL }, @@ -109,15 +110,15 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryInfo = { }, // Boot architecture information - { EFI_ACPI_6_3_ARM_PSCI_COMPLIANT }, // BootArchFlags + { EFI_ACPI_6_5_ARM_PSCI_COMPLIANT }, // BootArchFlags #ifdef HEADLESS_PLATFORM // Fixed feature flag information - { EFI_ACPI_6_3_HEADLESS }, // Fixed feature flags + { EFI_ACPI_6_5_HEADLESS }, // Fixed feature flags #endif // Power management profile information - { EFI_ACPI_6_3_PM_PROFILE_ENTERPRISE_SERVER }, // PowerManagement Profile + { EFI_ACPI_6_5_PM_PROFILE_ENTERPRISE_SERVER }, // PowerManagement Profile /* GIC CPU Interface information GIC_ENTRY (CPUInterfaceNumber, Mpidr, PmuIrq, VGicIrq, EnergyEfficiency) @@ -474,6 +475,9 @@ InitializePlatformRepository ( ) { EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + UINT64 DbgFeatures; + UINTN Index; + UINT16 TrbeInterrupt; PlatformRepo = This->PlatRepoInfo; @@ -491,6 +495,25 @@ InitializePlatformRepository ( PlatformRepo->GicCInfo[6].MPIDR = GET_MPID_MT (1, 2, 0); PlatformRepo->GicCInfo[7].MPIDR = GET_MPID_MT (1, 3, 0); } + + TrbeInterrupt = 0; + DbgFeatures = ArmReadIdAA64Dfr0 (); + DEBUG (( + DEBUG_INFO, + "Debug Feature Register 0 - ID_AA64DFR0_EL1 = 0x%lx\n", + DbgFeatures + )); + + // The ID_AA64DFR0_EL1.TraceBuffer field identifies support for FEAT_TRBE. + if (((DbgFeatures >> 44) & 0xF) != 0) { + // TRBE Interrupt is PPI 13 on FVP model. + TrbeInterrupt = 31; + } + + for (Index = 0; Index < PLAT_CPU_COUNT; Index++) { + PlatformRepo->GicCInfo[Index].TrbeInterrupt = TrbeInterrupt; + } + return EFI_SUCCESS; } diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf index b53daf51d4b1afd45e41d0debb0b9f084f135f6a..dd08f8597768d4de62941c5fd74e329c431582b0 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf @@ -1,7 +1,7 @@ ## @file # Configuration Manager Dxe # -# Copyright (c) 2017 - 2021, Arm Limited. All rights reserved.
+# Copyright (c) 2017 - 2023, Arm Limited. All rights reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent ## @@ -34,6 +34,7 @@ [Packages] Platform/ARM/VExpressPkg/ArmVExpressPkg.dec [LibraryClasses] + ArmLib ArmPlatformLib PrintLib UefiBootServicesTableLib -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107242): https://edk2.groups.io/g/devel/message/107242 Mute This Topic: https://groups.io/mt/100347409/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-