From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web10.968.1600473237561372557 for ; Fri, 18 Sep 2020 16:53:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=rGby2c12; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: ray.ni@intel.com) IronPort-SDR: FRQmzOnhMtQpj1qGIRZPg9n7+TkKD/P+yVTtTjVGjVGuBjrodh3Sd+SNxdD0iBu+HRGJHiVmwC o87ld6vcpDNg== X-IronPort-AV: E=McAfee;i="6000,8403,9748"; a="160115005" X-IronPort-AV: E=Sophos;i="5.77,276,1596524400"; d="scan'208,217";a="160115005" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Sep 2020 16:53:46 -0700 IronPort-SDR: 1DiN3hwYeewqPBTT33rxSLmq3rU6OSrwMbElVgXt8WWxf7MZJpX/ZX+j5slaN3RvM397XZMV16 jAravo8loVmQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,276,1596524400"; d="scan'208,217";a="332845591" Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19]) by fmsmga004.fm.intel.com with ESMTP; 18 Sep 2020 16:53:44 -0700 Received: from orsmsx601.amr.corp.intel.com (10.22.229.14) by ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 18 Sep 2020 16:53:43 -0700 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Fri, 18 Sep 2020 16:53:43 -0700 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.177) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 18 Sep 2020 16:53:43 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lxoOEmczo2e4SKbKZIvrr3V8WVYDvhdHKArhl80VFDw7pQWkFNs7LJVhFKl/zXpCf4DTUUFCAg7/azd6NfmIW1GUyjJ38IHeTVzoiJXQFUkgKkNVDSHrrRtME9rsd6rkrVpUMnpQ+5EZf0nUDCCzAG3My538AhMOjeqP5F6gJDAYvp/k1RXXiAqnOkgBBoZjjwZIpk6pLEcw0qyYwHusM0VNQCDX9eJVsSPFts50QMYxJKi3vd34xHylcfQDbz7hrkRxvJyp5H8XU06hEQtryo0im5W0+wRe3zI+/UhsMvRgRj3qLcWhzQfdxqTLkirt5P9/9Lhl6FkX8jxXXbSbAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C1I83iKMGHnDxaQ6Ug1KKR5HPYWM0Pdz6KghQiX6VSM=; b=jWS3I2JKDgdpn4eQ7DU/YN38aXf838AawRTRwHYpHSscO/LUau4eCTOeoM3fMMj0YIvpscvD6AJHrD/8w+DSFSvnubUhaFfTGt28mzLsiNd4uPnLSZrheldZ6fwxyVNcrtaR3B0tCuu0/uAsqcvm8rVs0ObNIpsmXYl73kY/2LHFmB1irEffz97wZAB849QJHUmwkWzimVTJEq83DIWhR3B6086wR/j4eIUue9IAutYBcJA11AtT6lfk6QYTiJdf4Fg65ERL+1ULdWCTb1JRvuFuC5leYHCNNQJmXcOLm04Jgjt1GrgR4HMX+I/QdUmQfyefRpR5KgBojS5w4fu3IA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C1I83iKMGHnDxaQ6Ug1KKR5HPYWM0Pdz6KghQiX6VSM=; b=rGby2c123NuoMargvUZTq47t7R1jiv6DZCpme/0fAVR3heeIMnxvi+zXm0dCnlq0SnNIWJcoZtU3O9H4+U090GRxDm0/9qiR37usT7jgnHb/qEbYDlNG8pgiE7NeFqPl2jmKaKz1YJKI4TheTZdiK3A7HAuJ677Y4BKwladA0fs= Received: from BY5PR11MB4007.namprd11.prod.outlook.com (2603:10b6:a03:189::28) by BYAPR11MB2728.namprd11.prod.outlook.com (2603:10b6:a02:ca::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3391.11; Fri, 18 Sep 2020 23:53:42 +0000 Received: from BY5PR11MB4007.namprd11.prod.outlook.com ([fe80::1533:4053:1c45:3596]) by BY5PR11MB4007.namprd11.prod.outlook.com ([fe80::1533:4053:1c45:3596%6]) with mapi id 15.20.3370.019; Fri, 18 Sep 2020 23:53:42 +0000 From: "Ni, Ray" To: "devel@edk2.groups.io" , "michael.kubacki@outlook.com" CC: "Kinney, Michael D" , Liming Gao , "Liu, Zhiguang" Subject: Re: [edk2-devel] [PATCH v1 1/1] MdePkg: Correct EFI_BLOCK_IO_PROTOCOL_REVISION3 value Thread-Topic: [edk2-devel] [PATCH v1 1/1] MdePkg: Correct EFI_BLOCK_IO_PROTOCOL_REVISION3 value Thread-Index: AQHWisKVFkCAgrThqk+NfHdplcaY3altnzLggAElrACAAFKJCQ== Date: Fri, 18 Sep 2020 23:53:42 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=intel.com; x-originating-ip: [180.171.153.78] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 69d588b6-4d3e-49e6-ff87-08d85c2e12d4 x-ms-traffictypediagnostic: BYAPR11MB2728: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7219; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: qEDYKw5/Qr2VLQcJN+VkXyysKehm9XaS/x6XpuZD17oorI6Odvmd9LtInJ7r1EkP2QvrVA54uQlv17bKErSAHRKZZVK+q3MvRu5Aglo7SU0eJdmnPnyLLCPGPzEBdr/4TmEZdjr78P8km3qWyh7K+sVefBb/1AsymRLVGFFxxkyFbsSSVuSuMdJYeV/yjoVkKJ+S9vgmeq0c7LT8KQPIPgyKvcuHWsxoPoriIyQ4RmlkvMmVhmB2uUQAzD4+AORLtlBE1gfKYndkKNBQ5975+I6eJ5PJA1jedRPei5uXVr9ECrgLQmeon2hPjLlP7UPT666ymuEDOzzMSDgeQNpaR6uAFuXA1C0a8s75P4lS01RklCypRZ0JOG+mzsPK9IdnyZQ45L1514ossUWsz6O3yg== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BY5PR11MB4007.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(366004)(346002)(376002)(136003)(39860400002)(54906003)(316002)(83380400001)(8936002)(33656002)(8676002)(186003)(7696005)(86362001)(52536014)(55016002)(166002)(76116006)(2906002)(91956017)(5660300002)(9686003)(110136005)(66946007)(64756008)(966005)(6506007)(66446008)(4326008)(71200400001)(53546011)(26005)(66476007)(45080400002)(107886003)(478600001)(66556008);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: 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 MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4007.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 69d588b6-4d3e-49e6-ff87-08d85c2e12d4 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Sep 2020 23:53:42.5156 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: NwYap8IOAJmBRLEU/fyr+iA0XhRucd2nk7hpTFy6HpTeqjCzDaEQvGMSPY/r6SmDCcFI4WxAmMBeR8620CRw5w== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2728 Return-Path: ray.ni@intel.com X-OriginatorOrg: intel.com Content-Language: zh-CN Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4007A92AF62AA92A6D16FD788C3F0BY5PR11MB4007namp_" --_000_BY5PR11MB4007A92AF62AA92A6D16FD788C3F0BY5PR11MB4007namp_ Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: base64 QXMgZmFyIGFzIEkga25vdywgRUZJIGRpc2sgdXRpbGl0eSBjb25zdW1lcyB0aGlzIG5ldyBmaWVs ZCBmb3IgcGVyZm9ybWFuY2UuIFRoZSB1dGlsaXR5IGlzIGluIEludGVsIHdlYnNpdGUgZm9yIGV4 dGVybmFsIGRvd25sb2Fkcy4NCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCrei vP7IyzogZGV2ZWxAZWRrMi5ncm91cHMuaW8gPGRldmVsQGVkazIuZ3JvdXBzLmlvPiC0+rHtIE1p Y2hhZWwgS3ViYWNraSA8bWljaGFlbC5rdWJhY2tpQG91dGxvb2suY29tPg0Kt6LLzcqxvOQ6IFNh dHVyZGF5LCBTZXB0ZW1iZXIgMTksIDIwMjAgMjo1NDo1NCBBTQ0KytW8/sjLOiBkZXZlbEBlZGsy Lmdyb3Vwcy5pbyA8ZGV2ZWxAZWRrMi5ncm91cHMuaW8+OyBOaSwgUmF5IDxyYXkubmlAaW50ZWwu Y29tPg0Ks63LzTogS2lubmV5LCBNaWNoYWVsIEQgPG1pY2hhZWwuZC5raW5uZXlAaW50ZWwuY29t PjsgTGltaW5nIEdhbyA8Z2FvbGltaW5nQGJ5b3NvZnQuY29tLmNuPjsgTGl1LCBaaGlndWFuZyA8 emhpZ3VhbmcubGl1QGludGVsLmNvbT4NCtb3zOI6IFJlOiBbZWRrMi1kZXZlbF0gW1BBVENIIHYx IDEvMV0gTWRlUGtnOiBDb3JyZWN0IEVGSV9CTE9DS19JT19QUk9UT0NPTF9SRVZJU0lPTjMgdmFs dWUNCg0KSGkgUmF5LA0KDQpSZXYzIGFkZHMgdGhlIFVJTlQzMiBmaWVsZCBPcHRpbWFsVHJhbnNm ZXJMZW5ndGhHcmFudWxhcml0eSBmaWVsZCB0bw0KRUZJX0JMT0NLX0lPX01FRElBLiBBIHByZWV4 aXN0aW5nIGJpbmFyeSBCbG9jayBJL08gcHJvZHVjZXIgdGhhdCB1c2VzDQp0aGlzIGZpZWxkIHdp bGwgc2V0IHRoZWlyIHJldmlzaW9uIHRvIHRoZSBoaWdoZXIgdmFsdWUgYW5kIHRoZSBvbmx5DQpj aGVjayBJIHNlZSBpbiBlZGsyIChQYXJ0aXRpb25EeGUpIG9uIHRoZSByZXZpc2lvbiB0byBhY2Nl c3MgdGhpcyBmaWVsZA0KY2hlY2tzIGZvciA+PSBFRklfQkxPQ0tfSU9fUFJPVE9DT0xfUkVWSVNJ T04zLg0KDQpJZiBhIGJpbmFyeSBCbG9jayBJL08gcHJvZHVjZXIgaXMgYnVpbHQgd2l0aCB0aGUg bmV3IHZhbHVlIHRoYXQgaXMNCmNvbnN1bWVkIGJ5IGEgbW9kdWxlIGJ1aWx0IHdpdGggdGhlIG9s ZGVyIHZhbHVlIGl0IG1pZ2h0IGlnbm9yZSB0aGUNCk9wdGltYWxUcmFuc2Zlckxlbmd0aEdyYW51 bGFyaXR5IGZpZWxkLiBJIGRvIG5vdCBzZWUgd2hlcmUgdGhpcyBpcyB0aGUNCmNhc2UgaW4gZWRr MiBvdGhlciB0aGFuIFBhcnRpdGlvbkR4ZSB3aGljaCBzZXRzIHRoZQ0KT3B0aW1hbFRyYW5zZmVy TGVuZ3RoR3JhbnVsYXJpdHkgZmllbGQgdG8gemVybyBmb3IgUmV2My4NCg0KWW91IGhhdmUgY29u dHJpYnV0ZWQgdG8gdGhpcyBjb2RlIGluIHRoZSBwYXN0IHNvIGZlZWwgZnJlZSB0byBwcm92aWRl DQphbnkgZnVydGhlciBpbnNpZ2h0IGlmIG5lZWRlZC4NCg0KVGhhdCBzYWlkLCB0aGlzIGNoYW5n ZSB3YXMgbWFkZSB0byBmaXggYSBidWcgaW4gdGhlIGVkazIgaW1wbGVtZW50YXRpb24NCnRvIHJl bW92ZSBhIGNvbmZsaWN0IHdpdGggdGhlIFVFRkkgU3BlYywgdGhlIHR3byBzaG91bGQgYmUgaW4g YWdyZWVtZW50Lg0KDQpJIHN1Z2dlc3QgdGhlIGNoYW5nZSBiZSBhZGRlZCB0byB0aGUgbmV4dCBz dGFibGUgdGFnIHJlbGVhc2Ugbm90ZXMgc28NCmF1dGhvcnMgb2Ygc3VjaCBtb2R1bGVzIGFyZSBt YWRlIGF3YXJlIHRoZXkgc2hvdWxkIHJlbGVhc2UgYW4gdXBkYXRlDQp3aXRoIHRoZSBuZXcgcmV2 aXNpb24gdmFsdWUuDQoNClRoYW5rcywNCk1pY2hhZWwNCg0KT24gOS8xNy8yMDIwIDY6MjUgUE0s IE5pLCBSYXkgd3JvdGU6DQo+IE1pa2UsDQo+IEhhdmUgeW91IGV2YWx1YXRlZCB0aGUgaW1wYWN0 IHRvIHRoZSBhbHJlYWR5LXJlbGVhc2VkIG1vZHVsZSB0aGF0IHJlbGllcyBvbiB0aGUgbWFjcm8g dmFsdWU/DQo+DQo+IEJhc2ljYWxseSwgeW91IGNoYW5nZWQgdG8gYSBzbWFsbGVyIHZhbHVlIHRo YXQgbWF5IGNhdXNlIGEgcmV2aXNpb24zIGNoZWNrIGZhaWw6DQo+IGEgcmVsZWFzZWQgbW9kdWxl IGV4cGVjdHMgdGhlIHJldmlzaW9uIGlzIGJpZ2dlciB0aGFuIDB4MzEsIGJ1dCB0aGUgdmFsdWUg aXMgMHgxZi4NCj4NCj4gVGhhbmtzLA0KPiBSYXkNCj4NCj4+IC0tLS0tT3JpZ2luYWwgTWVzc2Fn ZS0tLS0tDQo+PiBGcm9tOiBkZXZlbEBlZGsyLmdyb3Vwcy5pbyA8ZGV2ZWxAZWRrMi5ncm91cHMu aW8+IE9uIEJlaGFsZiBPZiBNaWNoYWVsIEt1YmFja2kNCj4+IFNlbnQ6IFR1ZXNkYXksIFNlcHRl bWJlciAxNSwgMjAyMCAyOjExIEFNDQo+PiBUbzogZGV2ZWxAZWRrMi5ncm91cHMuaW8NCj4+IENj OiBLaW5uZXksIE1pY2hhZWwgRCA8bWljaGFlbC5kLmtpbm5leUBpbnRlbC5jb20+OyBMaW1pbmcg R2FvIDxnYW9saW1pbmdAYnlvc29mdC5jb20uY24+OyBMaXUsIFpoaWd1YW5nDQo+PiA8emhpZ3Vh bmcubGl1QGludGVsLmNvbT4NCj4+IFN1YmplY3Q6IFtlZGsyLWRldmVsXSBbUEFUQ0ggdjEgMS8x XSBNZGVQa2c6IENvcnJlY3QgRUZJX0JMT0NLX0lPX1BST1RPQ09MX1JFVklTSU9OMyB2YWx1ZQ0K Pj4NCj4+IEZyb206IE1pY2hhZWwgS3ViYWNraSA8bWljaGFlbC5rdWJhY2tpQG1pY3Jvc29mdC5j b20+DQo+Pg0KPj4gUkVGOmh0dHBzOi8vYnVnemlsbGEudGlhbm9jb3JlLm9yZy9zaG93X2J1Zy5j Z2k/aWQ9Mjk2MQ0KPj4NCj4+IFRoZSB2YWx1ZSBvZiBFRklfQkxPQ0tfSU9fUFJPVE9DT0xfUkVW SVNJT04zIGlzIGN1cnJlbnRseQ0KPj4gMHgwMDAyMDAzMS4gSG93ZXZlciwgdGhlIHZhbHVlIGFz c2lnbmVkIGluIHRoZSBVRUZJIFNwZWNpZmljYXRpb24NCj4+IDIuOEIgaXMgKCgyPDwxNikgfCAo MzEpKSB3aGljaCBpcyAweDAwMDIwMDFGLg0KPj4NCj4+IENjOiBNaWNoYWVsIEQgS2lubmV5IDxt aWNoYWVsLmQua2lubmV5QGludGVsLmNvbT4NCj4+IENjOiBMaW1pbmcgR2FvIDxnYW9saW1pbmdA Ynlvc29mdC5jb20uY24+DQo+PiBDYzogWmhpZ3VhbmcgTGl1IDx6aGlndWFuZy5saXVAaW50ZWwu Y29tPg0KPj4gU2lnbmVkLW9mZi1ieTogTWljaGFlbCBLdWJhY2tpIDxtaWNoYWVsLmt1YmFja2lA bWljcm9zb2Z0LmNvbT4NCj4+IC0tLQ0KPj4gICBNZGVQa2cvSW5jbHVkZS9Qcm90b2NvbC9CbG9j a0lvLmggfCAyICstDQo+PiAgIDEgZmlsZSBjaGFuZ2VkLCAxIGluc2VydGlvbigrKSwgMSBkZWxl dGlvbigtKQ0KPj4NCj4+IGRpZmYgLS1naXQgYS9NZGVQa2cvSW5jbHVkZS9Qcm90b2NvbC9CbG9j a0lvLmggYi9NZGVQa2cvSW5jbHVkZS9Qcm90b2NvbC9CbG9ja0lvLmgNCj4+IGluZGV4IDdiMzMy NjkxZWRlMy4uM2JkNzY4ODVlMTFjIDEwMDY0NA0KPj4gLS0tIGEvTWRlUGtnL0luY2x1ZGUvUHJv dG9jb2wvQmxvY2tJby5oDQo+PiArKysgYi9NZGVQa2cvSW5jbHVkZS9Qcm90b2NvbC9CbG9ja0lv LmgNCj4+IEBAIC0yMDEsNyArMjAxLDcgQEAgdHlwZWRlZiBzdHJ1Y3Qgew0KPj4NCj4+ICAgI2Rl ZmluZSBFRklfQkxPQ0tfSU9fUFJPVE9DT0xfUkVWSVNJT04gIDB4MDAwMTAwMDANCj4+ICAgI2Rl ZmluZSBFRklfQkxPQ0tfSU9fUFJPVE9DT0xfUkVWSVNJT04yIDB4MDAwMjAwMDENCj4+IC0jZGVm aW5lIEVGSV9CTE9DS19JT19QUk9UT0NPTF9SRVZJU0lPTjMgMHgwMDAyMDAzMQ0KPj4gKyNkZWZp bmUgRUZJX0JMT0NLX0lPX1BST1RPQ09MX1JFVklTSU9OMyAweDAwMDIwMDFGDQo+Pg0KPj4gICAv Ly8NCj4+ICAgLy8vIFJldmlzaW9uIGRlZmluZWQgaW4gRUZJMS4xLg0KPj4gLS0NCj4+IDIuMjgu MC53aW5kb3dzLjENCj4+DQo+Pg0KPj4NCj4NCj4NCj4NCj4NCj4NCj4NCg0KDQoNCg0KDQo= --_000_BY5PR11MB4007A92AF62AA92A6D16FD788C3F0BY5PR11MB4007namp_ Content-Type: text/html; charset="gb2312" Content-Transfer-Encoding: quoted-printable
As far as I know, EFI disk utility consumes= this new field for performance. = The utility is in Intel website for external downloads.


=B7=A2=BC=FE=C8=CB: devel@= edk2.groups.io <devel@edk2.groups.io> =B4=FA=B1=ED Michael Kubacki &l= t;michael.kubacki@outlook.com>
=B7=A2=CB=CD=CA=B1=BC=E4: Saturday, September 19, 2020 2:54:54 AM =CA=D5=BC=FE=C8=CB: devel@edk2.groups.io <devel@edk2.groups.io&g= t;; Ni, Ray <ray.ni@intel.com>
=B3=AD=CB=CD: Kinney, Michael D <michael.d.kinney@intel.com>;= Liming Gao <gaoliming@byosoft.com.cn>; Liu, Zhiguang <zhiguang.li= u@intel.com>
=D6=F7=CC=E2: Re: [edk2-devel] [PATCH v1 1/1] MdePkg: Correct EFI_B= LOCK_IO_PROTOCOL_REVISION3 value
 
Hi Ray,

Rev3 adds the UINT32 field OptimalTransferLengthGranularity field to
EFI_BLOCK_IO_MEDIA. A preexisting binary Block I/O producer that uses
this field will set their revision to the higher value and the only
check I see in edk2 (PartitionDxe) on the revision to access this field checks for >=3D EFI_BLOCK_IO_PROTOCOL_REVISION3.

If a binary Block I/O producer is built with the new value that is
consumed by a module built with the older value it might ignore the
OptimalTransferLengthGranularity field. I do not see where this is the case in edk2 other than PartitionDxe which sets the
OptimalTransferLengthGranularity field to zero for Rev3.

You have contributed to this code in the past so feel free to provide
any further insight if needed.

That said, this change was made to fix a bug in the edk2 implementation to remove a conflict with the UEFI Spec, the two should be in agreement.
I suggest the change be added to the next stable tag release notes so
authors of such modules are made aware they should release an update
with the new revision value.

Thanks,
Michael

On 9/17/2020 6:25 PM, Ni, Ray wrote:
> Mike,
> Have you evaluated the impact to the already-released module that rel= ies on the macro value?
>
> Basically, you changed to a smaller value that may cause a revision3 = check fail:
> a released module expects the revision is bigger than 0x31, but the v= alue is 0x1f.
>
> Thanks,
> Ray
>
>> -----Original Message-----
>> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf= Of Michael Kubacki
>> Sent: Tuesday, September 15, 2020 2:11 AM
>> To: devel@edk2.groups.io
>> Cc: Kinney, Michael D <michael.d.kinney@intel.com>; Liming = Gao <gaoliming@byosoft.com.cn>; Liu, Zhiguang
>> <zhiguang.liu@intel.com>
>> Subject: [edk2-devel] [PATCH v1 1/1] MdePkg: Correct EFI_BLOCK_IO= _PROTOCOL_REVISION3 value
>>
>> From: Michael Kubacki <michael.kubacki@microsoft.com>
>>
>> REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D2961
>>
>> The value of EFI_BLOCK_IO_PROTOCOL_REVISION3 is currently
>> 0x00020031. However, the value assigned in the UEFI Specification=
>> 2.8B is ((2<<16) | (31)) which is 0x0002001F.
>>
>> Cc: Michael D Kinney <michael.d.kinney@intel.com>
>> Cc: Liming Gao <gaoliming@byosoft.com.cn>
>> Cc: Zhiguang Liu <zhiguang.liu@intel.com>
>> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com&= gt;
>> ---
>>   MdePkg/Include/Protocol/BlockIo.h | 2 +-
>>   1 file changed, 1 insertion(+), 1 deletion(-)
>>
>> diff --git a/MdePkg/Include/Protocol/BlockIo.h b/MdePkg/Include/P= rotocol/BlockIo.h
>> index 7b332691ede3..3bd76885e11c 100644
>> --- a/MdePkg/Include/Protocol/BlockIo.h
>> +++ b/MdePkg/Include/Protocol/BlockIo.h
>> @@ -201,7 +201,7 @@ typedef struct {
>>
>>   #define EFI_BLOCK_IO_PROTOCOL_REVISION  0x000100= 00
>>   #define EFI_BLOCK_IO_PROTOCOL_REVISION2 0x00020001 >> -#define EFI_BLOCK_IO_PROTOCOL_REVISION3 0x00020031
>> +#define EFI_BLOCK_IO_PROTOCOL_REVISION3 0x0002001F
>>
>>   ///
>>   /// Revision defined in EFI1.1.
>> --
>> 2.28.0.windows.1
>>
>>
>>
>
>
>
>
>
>





--_000_BY5PR11MB4007A92AF62AA92A6D16FD788C3F0BY5PR11MB4007namp_--