From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.2550.1646451424116271971 for ; Fri, 04 Mar 2022 19:37:04 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=fHnFLxAK; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1646451424; x=1677987424; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=l+I3W9VQdOXzWIWYUXe0bjBp8s+iAqcZ+qi48Rsxgfw=; b=fHnFLxAK4I2ZUP/2h8QH0F0sKHB1sKUdWfWMpllhWD7i20YIkxyBswcT RmL+NUr4ssoebWgCxWGYn7NAOqwq0evRA4XEgIENqjbmfctcBRFx7uAh+ Blp5RDaP9l9NxKgXoj5h8AwxFwgn8/HRM50t7fly3BJmfYd3PskTKp/ZW 0V6/YLyRUsrww1YdmjluF8sJUCkrrC5dFBVCI/pS1rux5uFdjWXGZxv5f nnhqxqiVq6oJi1LOErWxFaIER9z4mndtV+oT25gULP6c0S8OALT624CMF vxJgoF8quZSPS/30s2rYOI+RysHmvrgFPTV8lKaRJrECoOUpjWC8yxtwV w==; X-IronPort-AV: E=McAfee;i="6200,9189,10276"; a="251685865" X-IronPort-AV: E=Sophos;i="5.90,157,1643702400"; d="scan'208";a="251685865" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Mar 2022 19:37:03 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,157,1643702400"; d="scan'208";a="710549617" Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by orsmga005.jf.intel.com with ESMTP; 04 Mar 2022 19:37:03 -0800 Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Fri, 4 Mar 2022 19:37:02 -0800 Received: from fmsmsx602.amr.corp.intel.com (10.18.126.82) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Fri, 4 Mar 2022 19:37:02 -0800 Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21 via Frontend Transport; Fri, 4 Mar 2022 19:37:02 -0800 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.101) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.21; Fri, 4 Mar 2022 19:37:02 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZFdhGuHLnAoO7rEb/qSCqjF208UmMjqAtJVE9j9qit37skAftVVkIQa4THTVV01c3RAQecJw5LJpTIJ6B3WZ0rwsXygJBPhlKeS5aT/2C8euBMHhFcGQRTvDX4xJ9gG+HeE1Uam8fV4E85p8LM7WuRAylDlUatHqhCLUl8dm6mAJpnOKsTtKfVLVdknB3YMj/BgVc4poBaL7WxIMAjh7w2n6bxSX6+Do/l8D5gb6cEtp+jLjhtBrY+XV8a8LDmIl9/6zbCrl0bhIMg/ZE/5rJDXBDgOk8IaHmo8e2c2ncSMJnuHMiVoS49Bmgj3350a0gPP9xUnq8tVqcIy4FoAITw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vFaWkZPrUKxs2E/YyPPiSXlXAsFxBhQL6mA4QPbvdxE=; b=Ng67Ukw19MfDRhC0+niBF6X50wU0r7sgGutsm0uwkpOibCGTJiwTo6hFDBfvSYQ+DwmdMHm23nlRifvFcNK5ZZwUoy9x5fr+5+NOkFYd0UZzqy3jTAANl7azWR1vBnPKCdCsHGv2cJBBbmSfYrAKDNDzkAk/nymmXTBdoF8LQBN4mFnwOo2SgJLGUYdK2vj8ogOQjvbhIcv7FdcnSK4WjEeuH+j1EjrwmTF/vwhLUes9mJnZ8LZyoTlthBrEOGmnL+ryw/IEzDBfbWwL8JJSndlE/T36xsA68WiuRaZlCgX5iKbIAmG7yHGY+uRKQ3NBFADTKs2EdXMI/Kzw1NwSwQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by MN2PR11MB4517.namprd11.prod.outlook.com (2603:10b6:208:24e::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Sat, 5 Mar 2022 03:36:59 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::45c8:c9c6:42a:a43d]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::45c8:c9c6:42a:a43d%4]) with mapi id 15.20.5038.014; Sat, 5 Mar 2022 03:36:59 +0000 From: "Guo Dong" To: "Ni, Ray" , "devel@edk2.groups.io" , "Rhodes, Sean" CC: "Ma, Maurice" , "You, Benjamin" Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Provide option to use Boot Splash Thread-Topic: [edk2-devel] [PATCH] UefiPayloadPkg: Provide option to use Boot Splash Thread-Index: AQHYJqGjMLuZIqkRX0CDJEaM89uXwaydeXoAgBK82fA= Date: Sat, 5 Mar 2022 03:36:59 +0000 Message-ID: References: <6cbb9bafc1e86568eeb1912d9fa40bdaab519ac4.1645392848.git.sean@starlabs.systems> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.401.20 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: fb2c0b76-6c12-4dff-973a-08d9fe596798 x-ms-traffictypediagnostic: MN2PR11MB4517:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(53546011)(76116006)(7696005)(66946007)(66556008)(66446008)(54906003)(64756008)(66476007)(33656002)(82960400001)(110136005)(508600001)(8676002)(4326008)(86362001)(316002)(107886003)(71200400001)(55016003)(38070700005)(9686003)(122000001)(966005)(83380400001)(5660300002)(2906002)(38100700002)(8936002)(186003)(52536014);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?GPoet333gwjlWQ8LNjjx3HF0dursbTjYOlAQDODRVB+wLscltjn+tNrJlt0t?= =?us-ascii?Q?0UIKcRdb2+cPwfaYxnpi+rIzK4yqKy6XTM+5YiO4w9thR/+Qoj1CheZLVKSU?= =?us-ascii?Q?b926BIGzzP0WUKGVtotnceloGUgoNuGaXDt7uOoVFMIkXlEShW8V/DrMpHtS?= =?us-ascii?Q?BF4R4nJqeSxDpVxgB4RKiTAJmTFnhUSjBtZ6oKAH16ixnmyNqq5rmhoxZ+y+?= =?us-ascii?Q?Egeunh311NP1A2N+QzpsvbfV0gU7rs26g5NfVwzPHcsk5UEb0NG9n1KU05xI?= =?us-ascii?Q?dN7PDS/3usZ50hKQVpPlgBP8KBN8h6E+mOjV8e244rJG8KqD73sZlsCy31LF?= =?us-ascii?Q?+DEXOWhGgGUHlRcGMwdukE8iKehjRqHVSk+KyaW5lznczN/uORYTi7R2jAro?= =?us-ascii?Q?9YpfigcbB+YGxNMtQjNcUJHZBLzoLwKdnFgJtk4sx49NhZOrMq5lWD39rzfK?= =?us-ascii?Q?cbY8tR2tBT/scATketAhwklh7ztfStdBS3XiL25oax3/duvgHmw4lh741+gt?= =?us-ascii?Q?jxEfZUK+STNuhra5xDSzud3ugyV7FQ48G5vLJwqx50pUm5HhmTcnNnFZAa30?= =?us-ascii?Q?VIUmSyykUo2b3/AnQkFX8lgZjg6rq/M17limESqgvCxE8VTBQ5+2x/3047j0?= =?us-ascii?Q?fw4Ka8Jfj+KOYQZNITmSpDAoiMsbMqnlm/vuSFJ3kV3Vtmr40gygXX5odcHj?= =?us-ascii?Q?WaFMSUdLacNUCZ9uMkNwRy647OsDLKb49c+Jjr0BvoXt+IiKX3t/jQXKEDE9?= =?us-ascii?Q?CPbexIq7BfirWx6KnI9AdmIHde/7FWHJVtLGrd7aW7U4mQXbiNEW5onb2t3W?= =?us-ascii?Q?mg7Brn15DATmaif7aw5RFCBFcarhJ5rHOBglPaQgb8ChoKmTxZPR5r17Pe8A?= =?us-ascii?Q?HEtzoC+DCs5/USRD+ko9UJWwAP8sO+M9KN/c+gWgp3XNBESgkeqPBiel0rDe?= =?us-ascii?Q?JFQ1Sv3rIrWZCqmnyRf6gm9yD97g/N33pkdm+jiOem34J7RAg+iNJhyEfggL?= =?us-ascii?Q?uQu35MTK7C5ymklv1nropxHRWXEKl1Oe3/K3tiShEOPUedQSThH2GQVmrkf5?= =?us-ascii?Q?o6lavEiojVLZTmsLbU2x5DKYiO7uPtEGsqB4yCkWu1KYUbgnXIwjP78nJ07B?= =?us-ascii?Q?XwdAAAlCEcBsw6YH6hNXAoV+X2HcEdMnRES9Sl040eOjsukJZmS24T4/IL35?= =?us-ascii?Q?FXcrPwYKnYbYa75o3v2PboCpvxuA8tJHnSNJlQbFRGB57QOdhEQ0t8nyenKo?= =?us-ascii?Q?mfKeGPbN5aXvHI0RPp++gymPeknW74yy8MH/VUu+rpcr8An+7wer5oT72nrv?= =?us-ascii?Q?auIovVJAY29dQVcTQ2yo3nrKCtYhn2Z3uIZ82woknBjL6ZaqEZSzZH+Z3W8o?= =?us-ascii?Q?yh0QpF6lgXVSY4/rhgI4b4g0d513pxx/aEzP8e/7vv2eyIjXzwKz/SQ6bFIU?= =?us-ascii?Q?Vg+XD93XpCdaPB7NGUB8oZ9liVFL9Vt8J4ekXntELDbxsy4pYYUMomA2JeXp?= =?us-ascii?Q?yZ9g3xk9mLaXSaKxmdleE1aoEu2XixnvwTHq5MpWNbHUMEfIDavcmk455yDE?= =?us-ascii?Q?qYrzQkUFhRC+1Rgjf5v+xpaMuuFds5o/XqL/9P+7YX/q1TF81dhlqofwn6R4?= =?us-ascii?Q?QKOuEcAT9l0JjdkNAUfmyzxYuyrasY+/rYijLvTpK+XaOu0DJCwOnwG+bA3w?= =?us-ascii?Q?EHW/Rxb047J9SNSAn3PTF+0esUA=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: fb2c0b76-6c12-4dff-973a-08d9fe596798 X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Mar 2022 03:36:59.2452 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 7uRvlCF+e3ZhhO74Hii62uebn2Vvkjk7bkTNeFsyr8wdkHwTlQVKuNjL7KdFBGJlVSjboaNqVSjwyMkte9D5PQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4517 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Maybe the build option is required if there is a case that Bootloader has i= ts own logo and doesn't want it be overridden by UEFI payload. Thanks, Guo -----Original Message----- From: Ni, Ray =20 Sent: Sunday, February 20, 2022 10:25 PM To: devel@edk2.groups.io; Rhodes, Sean Cc: Dong, Guo ; Ma, Maurice ; You= , Benjamin Subject: RE: [edk2-devel] [PATCH] UefiPayloadPkg: Provide option to use Boo= t Splash Can you avoid introducing the PCD by always including BootLogo driver? By the way, you changed brotli version. Is that expected? -----Original Message----- From: devel@edk2.groups.io On Behalf Of Sean Rhodes Sent: Monday, February 21, 2022 5:34 AM To: devel@edk2.groups.io Cc: Dong, Guo ; Rhodes, Sean ; N= i, Ray ; Ma, Maurice ; You, Benjami= n Subject: [edk2-devel] [PATCH] UefiPayloadPkg: Provide option to use Boot Sp= lash Provide a build option to use a Boot Splash logo. Cc: Guo Dong Cc: Ray Ni Cc: Maurice Ma Cc: Benjamin You Signed-off-by: Sean Rhodes --- MdeModulePkg/Library/BrotliCustomDecompressLib/brotli | 2 +- .../Library/PlatformBootManagerLib/PlatformBootManager.c | 5 +++++ .../PlatformBootManagerLib/PlatformBootManagerLib.inf | 2 ++ UefiPayloadPkg/UefiPayloadPkg.dec | 3 +++ UefiPayloadPkg/UefiPayloadPkg.dsc | 7 +++++++ UefiPayloadPkg/UefiPayloadPkg.fdf | 3 +++ 6 files changed, 21 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/Library/BrotliCustomDecompressLib/brotli b/MdeMod= ulePkg/Library/BrotliCustomDecompressLib/brotli index f4153a09f8..666c3280cc 160000 --- a/MdeModulePkg/Library/BrotliCustomDecompressLib/brotli +++ b/MdeModulePkg/Library/BrotliCustomDecompressLib/brotli @@ -1 +1 @@ -Subproject commit f4153a09f87cbb9c826d8fc12c74642bb2d879ea +Subproject commit 666c3280cc11dc433c303d79a83d4ffbdd12cc8d diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a8ead775ea..3bded489ef 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c @@ -243,6 +243,11 @@ PlatformBootManagerAfterConsole ( Black.Blue =3D Black.Green =3D Black.Red =3D Black.Reserved =3D 0; White.Blue =3D White.Green =3D White.Red =3D White.Reserved =3D 0xFF; =20 + if (FixedPcdGetBool (PcdBootSplashImage)) { + gST->ConOut->ClearScreen (gST->ConOut); + BootLogoEnableLogo (); + } + EfiBootManagerConnectAll (); EfiBootManagerRefreshAllBootOption (); =20 diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= gerLib.inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= gerLib.inf index 9c4a9da943..306bd33b7a 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf @@ -39,6 +39,7 @@ UefiRuntimeServicesTableLib UefiLib UefiBootManagerLib + BootLogoLib PcdLib DxeServicesLib MemoryAllocationLib @@ -73,3 +74,4 @@ gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity gEfiMdePkgTokenSpaceGuid.PcdUartDefaultStopBits gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile + gUefiPayloadPkgTokenSpaceGuid.PcdBootSplashImage diff --git a/UefiPayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayload= Pkg.dec index 551f0a4915..4f5756d575 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -83,6 +83,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSi= ze|0x04000000|UINT32|0x =20 gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x72, 0xcf, 0x80, 0= xab, 0x87, 0xf9, 0x47, 0xa3, 0xfe, 0xD5, 0x0B, 0x76, 0xd8, 0x95, 0x41 }|VOI= D*|0x00000018 =20 +# BootSplash Image +gUefiPayloadPkgTokenSpaceGuid.PcdBootSplashImage|TRUE|BOOLEAN|0x00000021 + ## FFS filename to find the default variable initial data file. # @Prompt FFS Name of variable initial data file gUefiPayloadPkgTokenSpaceGuid.PcdNvsDataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0= x42, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xdb, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOI= D*|0x00000025 diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayload= Pkg.dsc index 1ce96a51c1..64e9e67d62 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -33,6 +33,7 @@ DEFINE UNIVERSAL_PAYLOAD =3D FALSE DEFINE SECURITY_STUB_ENABLE =3D TRUE DEFINE SMM_SUPPORT =3D FALSE + DEFINE BOOTSPLASH_IMAGE =3D FALSE # # SBL: UEFI payload for Slim Bootloader # COREBOOT: UEFI payload for coreboot @@ -209,6 +210,7 @@ CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf SecurityManagementLib|MdeModulePkg/Library/DxeSecurityManagementLib/DxeS= ecurityManagementLib.inf UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManag= erLib.inf + BootLogoLib|MdeModulePkg/Library/BootLogoLib/BootLogoLib.inf CustomizedDisplayLib|MdeModulePkg/Library/CustomizedDisplayLib/Customize= dDisplayLib.inf FrameBufferBltLib|MdeModulePkg/Library/FrameBufferBltLib/FrameBufferBltL= ib.inf =20 @@ -399,6 +401,8 @@ gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask | 0x1 !endif =20 + gUefiPayloadPkgTokenSpaceGuid.PcdBootSplashImage|$(BOOTSPLASH_IMAGE) + [PcdsPatchableInModule.X64] gPcAtChipsetPkgTokenSpaceGuid.PcdRtcIndexRegister|$(RTC_INDEX_REGISTER) gPcAtChipsetPkgTokenSpaceGuid.PcdRtcTargetRegister|$(RTC_TARGET_REGISTER= ) @@ -545,6 +549,9 @@ !endif UefiCpuPkg/CpuDxe/CpuDxe.inf MdeModulePkg/Universal/BdsDxe/BdsDxe.inf +!if $(BOOTSPLASH_IMAGE) =3D=3D TRUE + MdeModulePkg/Logo/LogoDxe.inf +!endif MdeModulePkg/Application/UiApp/UiApp.inf { NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf diff --git a/UefiPayloadPkg/UefiPayloadPkg.fdf b/UefiPayloadPkg/UefiPayload= Pkg.fdf index c7b04978ad..a71d655687 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.fdf +++ b/UefiPayloadPkg/UefiPayloadPkg.fdf @@ -158,6 +158,9 @@ INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf INF UefiPayloadPkg/BlSupportDxe/BlSupportDxe.inf =20 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf +!if $(BOOTSPLASH_IMAGE) =3D=3D TRUE +INF MdeModulePkg/Logo/LogoDxe.inf +!endif # # PCI Support # --=20 2.32.0 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#86816): https://edk2.groups.io/g/devel/message/86816 Mute This Topic: https://groups.io/mt/89281295/1712937 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [ray.ni@intel.com] -=3D-=3D-=3D-=3D-=3D-=3D