From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on062a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe4a::62a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id D568821A04820 for ; Wed, 12 Apr 2017 19:27:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=ZRtI/TecJsvuuAR0YL6i1ttE508qwVKSAAQtg+liZKU=; b=kPvQvWpjnrdEG7bosyIlj6swgzAcpfwtGToJYNoI/Y+kOB6jdqhhs1kVQm8rvNLjkaKrsDg6htoMdv0eYG5IazfxaeH2oAgSxzKJJ8BaRo3Y2/AuJpSBZkOfsavZrhCm8XS7/D9PRDXvBkx9zF8r4WAcf2jeGrj0hZWNM/ybGQc= Received: from DM5PR12MB1243.namprd12.prod.outlook.com (10.168.237.22) by BN6PR1201MB0130.namprd12.prod.outlook.com (10.174.114.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1019.17; Thu, 13 Apr 2017 02:27:39 +0000 Received: from DM5PR12MB1243.namprd12.prod.outlook.com ([10.168.237.22]) by DM5PR12MB1243.namprd12.prod.outlook.com ([10.168.237.22]) with mapi id 15.01.1019.027; Thu, 13 Apr 2017 02:27:38 +0000 From: "Duran, Leo" To: "Kinney, Michael D" , Laszlo Ersek , "edk2-devel@ml01.01.org" CC: "Tian, Feng" , "Singh, Brijesh" , "Zeng, Star" Thread-Topic: [edk2] [PATCH] MdeModulePkg: Add EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL Thread-Index: AQHSs76MLkQIdnpq4U2h4aFYdb9TEqHCFYwAgAAL9oCAAA7ggIAASkIAgAAV+mA= Date: Thu, 13 Apr 2017 02:27:37 +0000 Message-ID: References: <1492023400-16132-1-git-send-email-leo.duran@amd.com> <1492023400-16132-2-git-send-email-leo.duran@amd.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=amd.com; x-originating-ip: [2605:6000:e7cd:8500:acd9:e9b8:2c56:6204] x-microsoft-exchange-diagnostics: 1; BN6PR1201MB0130; 7:l9BEUmv9yfMNZZ9BVbRs2owBF6uA2luGXTCBwB+T9Mm+4jYEkmu5vYyMjVdzknfCpLlcnd1Do1NBjOMekENLQWSOwergJmyP1S2huLGJsPvi4kgC9Nbf0qmS921iiE2bqiOGrcQ6uCEMiXHdTRb+losZW60j9cxavS0SiMLFpz74pN7TscysSVTtjk6t1pzacKcog9LMK1ctogakJ7ijXQMHu8o71veSu5iD0j+7Vnoj36mifoMAmw/DRJJqO+5UOR4CyjNaBI29p+AvrrDIofryWnwtjbo5CEKhTmcLMTxFt/mRfoGHwWTpMS1GZ4H0ja1xObuVi7VMCjxMvY13XA==; 20:UgrORtNMLS8TxFmbarlMeugpXhZxKsktSvZ3j8JtjMhqM3Zz1OG4VdFcmEkua5jtTpE5jW05sXfl620evdl7PX3z42KSW2XkwQnusJqUUQQPB0ZsgidyFU4P+aJku236xrf8ZsiTIDB2dA82Af5mU6WYRQx/Iwc4X+mdnXAfalgTEISMFyDgdtTsOA7z4RdqTjynl+c8iLJxezLeMXFYniV8G8fUinE2RQSRW1WJGv8b+bHakLdkEa5d7BApGhsI x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39410400002)(39860400002)(39400400002)(39850400002)(39450400003)(24454002)(377454003)(575784001)(93886004)(54075001)(86362001)(2906002)(81166006)(8936002)(6116002)(2950100002)(2900100001)(76176999)(122556002)(3280700002)(189998001)(8676002)(3660700001)(6506006)(54356999)(99286003)(102836003)(7696004)(50986999)(305945005)(53376002)(5660300001)(38730400002)(15188155005)(53936002)(7736002)(54906002)(53946003)(966004)(25786009)(6436002)(77096006)(2501003)(9686003)(229853002)(6306002)(16799955002)(55016002)(53546009)(74316002)(33656002)(19627235001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR1201MB0130; H:DM5PR12MB1243.namprd12.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; x-ms-office365-filtering-correlation-id: 462eb156-e93e-4097-f2cf-08d48214a722 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081); SRVR:BN6PR1201MB0130; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(767451399110)(162533806227266)(228905959029699); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(20161123560025)(20161123555025)(20161123562025)(6072148); SRVR:BN6PR1201MB0130; BCL:0; PCL:0; RULEID:; SRVR:BN6PR1201MB0130; x-forefront-prvs: 02760F0D1C spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM MIME-Version: 1.0 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2017 02:27:37.8542 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1201MB0130 Subject: Re: [PATCH] MdeModulePkg: Add EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Apr 2017 02:27:41 -0000 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Mike, The a ranges we're interest in are those that invoke GCD with an 'Add' requ= est for MMIO. Before any DXE drivers are dispatched the 'Add' requests are simply the MMI= O regions reported by resource descriptor HOB's built prior to DxeIpl. However, once DXE drivers are dispatched GCD may get other 'Add' requests f= or MMIO (e.g., from PciHostBridgeDxe), so we'd interested in those as well. So it seems like by having GCD issue a notify on 'Add' requests would cover= all cases, without requiring any surgery in DXE components that may issue = 'Add' requests. Leo. > -----Original Message----- > From: Kinney, Michael D [mailto:michael.d.kinney@intel.com] > Sent: Wednesday, April 12, 2017 7:59 PM > To: Laszlo Ersek ; Duran, Leo ; > edk2-devel@ml01.01.org; Kinney, Michael D > Cc: Tian, Feng ; Singh, Brijesh > ; Zeng, Star > Subject: RE: [edk2] [PATCH] MdeModulePkg: Add > EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL >=20 > Hi Laszlo and Leo, >=20 > If you look at the CpuSetMemoryAttributes() function in > UefiCpuPkg/CpuDxe/CpuDxe.c, you will see it now calls > AssignMemoryPageAttributes() at the end. This function is implemented in > UefiCpuPkg/CpuDxe/CpuPageTable.c and it updates page table attributes > based on the request. >=20 > This looks like a very similar action to update PTEs. >=20 > What MMIO areas are we discussing here? MMIO ranges associated with PCI > BARs allocated through PCI Bus Driver and PCI Host Bridge driver? >=20 > Mike >=20 > > -----Original Message----- > > From: Laszlo Ersek [mailto:lersek@redhat.com] > > Sent: Wednesday, April 12, 2017 1:33 PM > > To: Kinney, Michael D ; Leo Duran > > ; edk2-devel@ml01.01.org > > Cc: Tian, Feng ; Brijesh Singh > > ; Zeng, Star > > Subject: Re: [edk2] [PATCH] MdeModulePkg: Add > > EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL > > > > Mike, > > > > On 04/12/17 21:39, Kinney, Michael D wrote: > > > Hi Leo, > > > > > > DXE Main is supposed to use Arch Protocols for platform specific > behavior. > > > > > > In this case, can the CPU Arch Protocol SetMemoryAttributes() > > > function be used to customize behavior? > > > > > > In other modules that add/remove/modify MMIO, > > > gDS->SetMemorySpaceAttributes() Is called to set memory space > > > attributed such as cachability. Can the module that is > > > adding/removing memory regions from GCD also call > > > gDS-> SetMemorySpaceAttributes() so a CPU specific module can > > > gDS-> perform > > > extra actions? > > > > The goal is to clear the "C" bit in the PTEs (--> disable encryption > > in SEV guests) for all MMIO areas in the GCD memory space map, when > > they are added, and to re-set the "C" bit when the area is removed (or > > the area's GCD type is changed to something non-MMIO). > > > > This behavior should cover all possible gDS->AddMemorySpace() calls > > (for the MMIO type), regardless of what driver calls gDS- > >AddMemorySpace(). > > In other words, drivers that add MMIO space should remain unaware of > > SEV / the "C" bit in PTEs. Otherwise we'd have to enable SEV detection > > and "C" bit massaging in every affected driver individually (even > > future ones, possibly pulled in from under MdeModulePkg or UefiCpuPkg). > > Cacheability and similar attributes for memory ranges are quite > > universal on all architectures, and it is okay to expect all drivers > > to manage those attributes manually (whenever that's necessary), but > > (a) SEV / memory encryption is not that universal, and (b) clearing > > "C" for MMIO ranges affects all drivers alike, so it would be good to > > generalize it at a low level. > > > > What would be the best general location or API to hook the "C" bit > > manipulation into MMIO GCD memory space addition / removal? > > > > Thank you, > > Laszlo > > > > > > > > > > Thanks, > > > > > > Mike > > > > > > > > > > > >> -----Original Message----- > > >> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf > > >> Of Leo > > Duran > > >> Sent: Wednesday, April 12, 2017 11:57 AM > > >> To: edk2-devel@ml01.01.org > > >> Cc: Laszlo Ersek ; Tian, Feng > > >> ; Leo > > Duran > > >> ; Brijesh Singh ; Zeng, > > >> Star > > >> Subject: [edk2] [PATCH] MdeModulePkg: Add > > >> EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL > > >> > > >> GCD consumes the protocol to issue a Notify() on Add/Remove > operations. > > >> > > >> The intended use-case is to allow OvmfPkg take actions on behalf of > > >> an SEV-enabled guest. > > >> > > >> The new protocol is simply added to the list of optional protocols > > >> handled by DxeMain, and as such leverages the existing > DxeProtocolNotify framework. > > >> > > >> Cc: Feng Tian > > >> Cc: Star Zeng > > >> Cc: Laszlo Ersek > > >> Cc: Brijesh Singh > > >> Contributed-under: TianoCore Contribution Agreement 1.0 > > >> Signed-off-by: Leo Duran > > >> --- > > >> MdeModulePkg/Core/Dxe/DxeMain.h | 10 +++- > > >> MdeModulePkg/Core/Dxe/DxeMain.inf | 4 ++ > > >> MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c | 7 +++ > > >> MdeModulePkg/Core/Dxe/DxeMain/DxeProtocolNotify.c | 9 ++- > > >> MdeModulePkg/Core/Dxe/Gcd/Gcd.c | 8 +++ > > >> .../Include/Protocol/GcdMemorySpaceNotify.h | 65 > > ++++++++++++++++++++++ > > >> MdeModulePkg/MdeModulePkg.dec | 3 + > > >> 7 files changed, 100 insertions(+), 6 deletions(-) create mode > > >> 100644 MdeModulePkg/Include/Protocol/GcdMemorySpaceNotify.h > > >> > > >> diff --git a/MdeModulePkg/Core/Dxe/DxeMain.h > > >> b/MdeModulePkg/Core/Dxe/DxeMain.h index 1a0babb..8a037ff > 100644 > > >> --- a/MdeModulePkg/Core/Dxe/DxeMain.h > > >> +++ b/MdeModulePkg/Core/Dxe/DxeMain.h > > >> @@ -3,6 +3,8 @@ > > >> internal structure and functions used by DxeCore module. > > >> > > >> Copyright (c) 2006 - 2017, Intel Corporation. All rights > > >> reserved.
> > >> +Copyright (c) 2017, AMD Incorporated. All rights reserved.
> > >> + > > >> This program and the accompanying materials are licensed and made > > >> available under the terms and conditions of the BSD License which > > >> accompanies this distribution. The full text of the license may be > > found > > >> at > > >> @@ -17,7 +19,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF > ANY > > >> KIND, EITHER EXPRESS OR IMPLIED. > > >> #define _DXE_MAIN_H_ > > >> > > >> > > >> - > > >> #include > > >> > > >> #include > > >> @@ -53,6 +54,8 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF > ANY > > >> KIND, EITHER EXPRESS OR IMPLIED. > > >> #include > > >> #include #include > > >> > > >> +#include > > >> + > > >> #include #include > > >> #include > > > >> @@ -296,12 +299,13 @@ extern EFI_RUNTIME_ARCH_PROTOCOL > > >> gRuntimeTemplate; > > >> > > >> extern EFI_LOAD_FIXED_ADDRESS_CONFIGURATION_TABLE > > >> gLoadModuleAtFixAddressConfigurationTable; > > >> extern BOOLEAN > > >> gLoadFixedAddressCodeMemoryReady; > > >> + > > >> +extern EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL > *gGcdMemorySpaceNotify; > > >> + > > >> // > > >> // Service Initialization Functions // > > >> > > >> - > > >> - > > >> /** > > >> Called to initialize the pool. > > >> > > >> diff --git a/MdeModulePkg/Core/Dxe/DxeMain.inf > > >> b/MdeModulePkg/Core/Dxe/DxeMain.inf > > >> index 30d5984..888a16f 100644 > > >> --- a/MdeModulePkg/Core/Dxe/DxeMain.inf > > >> +++ b/MdeModulePkg/Core/Dxe/DxeMain.inf > > >> @@ -4,6 +4,8 @@ > > >> # It provides an implementation of DXE Core that is compliant with= DXE > CIS. > > >> # > > >> # Copyright (c) 2006 - 2017, Intel Corporation. All rights > > >> reserved.
> > >> +# Copyright (c) 2017, AMD Incorporated. All rights reserved.
> > >> +# > > >> # This program and the accompanying materials # are licensed > > >> and made available under the terms and conditions of the BSD > > >> License # which accompanies this distribution. The full text of > > >> the license may be found at @@ -162,6 +164,8 @@ > > >> gEfiSmmBase2ProtocolGuid ## SOMETIMES_CONSUM= ES > > >> gEfiBlockIoProtocolGuid ## SOMETIMES_CONSUM= ES > > >> > > >> + gEfiGcdMemorySpaceNotifyProtocolGuid ## CONSUMES > > >> + > > >> # Arch Protocols > > >> gEfiBdsArchProtocolGuid ## CONSUMES > > >> gEfiCpuArchProtocolGuid ## CONSUMES > > >> diff --git a/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c > > >> b/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c > > >> index 91e94a7..46b68da 100644 > > >> --- a/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c > > >> +++ b/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c > > >> @@ -2,6 +2,8 @@ > > >> DXE Core Main Entry Point > > >> > > >> Copyright (c) 2006 - 2017, Intel Corporation. All rights > > >> reserved.
> > >> +Copyright (c) 2017, AMD Incorporated. All rights reserved.
> > >> + > > >> This program and the accompanying materials are licensed and made > > >> available under the terms and conditions of the BSD License which > > >> accompanies this distribution. The full text of the license may be > > found > > >> at > > >> @@ -42,6 +44,11 @@ EFI_GUID *gDxeCoreFileN= ame; > > >> EFI_LOADED_IMAGE_PROTOCOL *gDxeCoreLoadedImage; > > >> > > >> // > > >> +// DXE Core global for GCD notification protocol // > > >> +EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL > *gGcdMemorySpaceNotify =3D > > >> +NULL; > > >> + > > >> +// > > >> // DXE Core Module Variables > > >> // > > >> EFI_BOOT_SERVICES mBootServices =3D { diff --git > > >> a/MdeModulePkg/Core/Dxe/DxeMain/DxeProtocolNotify.c > > >> b/MdeModulePkg/Core/Dxe/DxeMain/DxeProtocolNotify.c > > >> index ea7c610..2314e34 100644 > > >> --- a/MdeModulePkg/Core/Dxe/DxeMain/DxeProtocolNotify.c > > >> +++ b/MdeModulePkg/Core/Dxe/DxeMain/DxeProtocolNotify.c > > >> @@ -4,6 +4,8 @@ > > >> events that represent the Architectural Protocols. > > >> > > >> Copyright (c) 2006 - 2014, Intel Corporation. All rights > > >> reserved.
> > >> +Copyright (c) 2017, AMD Incorporated. All rights reserved.
> > >> + > > >> This program and the accompanying materials are licensed and made > > >> available under the terms and conditions of the BSD License which > > >> accompanies this distribution. The full text of the license may be > > found > > >> at > > >> @@ -45,9 +47,10 @@ EFI_CORE_PROTOCOL_NOTIFY_ENTRY > mArchProtocols[] > > >> =3D { // Optional protocols that the DXE Core will use if they are > > >> present // EFI_CORE_PROTOCOL_NOTIFY_ENTRY > mOptionalProtocols[] =3D > > >> { > > >> - { &gEfiSecurity2ArchProtocolGuid, (VOID **)&gSecurity2, = NULL, > > NULL, > > >> FALSE }, > > >> - { &gEfiSmmBase2ProtocolGuid, (VOID **)&gSmmBase2, > NULL, > > NULL, > > >> FALSE }, > > >> - { NULL, (VOID **)NULL, = NULL, > > NULL, > > >> FALSE } > > >> + { &gEfiSecurity2ArchProtocolGuid, (VOID **)&gSecurity2, > > >> NULL, NULL, FALSE }, > > >> + { &gEfiSmmBase2ProtocolGuid, (VOID **)&gSmmBase2, > > >> NULL, NULL, FALSE }, > > >> + { &gEfiGcdMemorySpaceNotifyProtocolGuid, (VOID > > >> + **)&gGcdMemorySpaceNotify, > > >> NULL, NULL, FALSE }, > > >> + { NULL, (VOID **)NULL, > > >> NULL, NULL, FALSE } > > >> }; > > >> > > >> // > > >> diff --git a/MdeModulePkg/Core/Dxe/Gcd/Gcd.c > > >> b/MdeModulePkg/Core/Dxe/Gcd/Gcd.c index a06f8bb..223fcd8 100644 > > >> --- a/MdeModulePkg/Core/Dxe/Gcd/Gcd.c > > >> +++ b/MdeModulePkg/Core/Dxe/Gcd/Gcd.c > > >> @@ -4,6 +4,8 @@ > > >> are accessible to the CPU that is executing the DXE core. > > >> > > >> Copyright (c) 2006 - 2017, Intel Corporation. All rights > > >> reserved.
> > >> +Copyright (c) 2017, AMD Incorporated. All rights reserved.
> > >> + > > >> This program and the accompanying materials are licensed and made > > >> available under the terms and conditions of the BSD License which > > >> accompanies this distribution. The full text of the license may be > > found > > >> at > > >> @@ -896,6 +898,9 @@ CoreConvertSpace ( > > >> } else { > > >> Entry->Capabilities =3D Capabilities | EFI_MEMORY_RUNTIME; > > >> } > > >> + if (gGcdMemorySpaceNotify) { > > >> + gGcdMemorySpaceNotify->MemorySpaceAddNotify > > >> + (GcdMemoryType, > > BaseAddress, > > >> Length, Entry->Capabilities); > > >> + } > > >> break; > > >> case GCD_ADD_IO_OPERATION: > > >> Entry->GcdIoType =3D GcdIoType; @@ -914,6 +919,9 @@ > > >> CoreConvertSpace ( > > >> case GCD_REMOVE_MEMORY_OPERATION: > > >> Entry->GcdMemoryType =3D EfiGcdMemoryTypeNonExistent; > > >> Entry->Capabilities =3D 0; > > >> + if (gGcdMemorySpaceNotify) { > > >> + gGcdMemorySpaceNotify->MemorySpaceRemoveNotify > (BaseAddress, Length); > > >> + } > > >> break; > > >> case GCD_REMOVE_IO_OPERATION: > > >> Entry->GcdIoType =3D EfiGcdIoTypeNonExistent; diff --git > > >> a/MdeModulePkg/Include/Protocol/GcdMemorySpaceNotify.h > > >> b/MdeModulePkg/Include/Protocol/GcdMemorySpaceNotify.h > > >> new file mode 100644 > > >> index 0000000..9174957 > > >> --- /dev/null > > >> +++ b/MdeModulePkg/Include/Protocol/GcdMemorySpaceNotify.h > > >> @@ -0,0 +1,65 @@ > > >> +/** @file > > >> + This file declares the GcdMemorySpaceNotify Protocol. > > >> + > > >> + This Protocol is consumed by GCD to issue notications during > > >> + ADD/REMOVE > > >> operations. > > >> + > > >> + Copyright (c) 2017, AMD Inc. All rights reserved.
> > >> + > > >> + This program and the accompanying materials are licensed and > > >> + made available under the terms and conditions of the BSD > > >> License > > >> + which accompanies this distribution. The full text of the > > >> + license may be > > >> found at > > >> + http://opensource.org/licenses/bsd-license.php > > >> + > > >> + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS > IS" > > >> + BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, > EITHER > > >> + EXPRESS OR > > IMPLIED. > > >> + > > >> +**/ > > >> + > > >> +#ifndef __EFI_GCD_MEMORY_SPACE_NOTIFY_H__ #define > > >> +__EFI_GCD_MEMORY_SPACE_NOTIFY_H__ > > >> + > > >> +#define EFI_GCD_MEMORY_SPACE_NOTIFY_GUID \ > > >> + { \ > > >> + 0xc842db69, 0x610e, 0x401a, {0x90, 0xd0, 0x88, 0x41, 0xf1, > > >> +0xdc, 0x53, > > 0x79 > > >> } \ > > >> + } > > >> + > > >> +/** > > >> + Notify on: Add a segment of memory to GCD map. > > >> + > > >> + @param GcdMemoryType Memory type of the segment. > > >> + @param BaseAddress Base address of the segment. > > >> + @param Length Length of the segment. > > >> + @param Capabilities Alterable attributes of the segmen= t. > > >> + > > >> +**/ > > >> +typedef > > >> +VOID > > >> +(EFIAPI *GCD_ADD_MEMORY_NOTIFY) ( > > >> + IN EFI_GCD_MEMORY_TYPE GcdMemoryType, > > >> + IN EFI_PHYSICAL_ADDRESS BaseAddress, > > >> + IN UINT64 Length, > > >> + IN UINT64 Capabilities > > >> +); > > >> + > > >> +/** > > >> + Notify on: Remove a segment of memory to GCD map. > > >> + > > >> + @param BaseAddress Base address of the segment. > > >> + @param Length Length of the segment. > > >> + > > >> +**/ > > >> +typedef > > >> +VOID > > >> +(EFIAPI *GCD_REMOVE_MEMORY_NOTIFY) ( > > >> + IN EFI_PHYSICAL_ADDRESS BaseAddress, > > >> + IN UINT64 Length > > >> +); > > >> + > > >> +typedef struct { > > >> + GCD_ADD_MEMORY_NOTIFY MemorySpaceAddNotify; > > >> + GCD_REMOVE_MEMORY_NOTIFY MemorySpaceRemoveNotify; } > > >> +EFI_GCD_MEMORY_SPACE_NOTIFY_PROTOCOL; > > >> + > > >> +extern EFI_GUID gEfiGcdMemorySpaceNotifyProtocolGuid; > > >> + > > >> +#endif > > >> diff --git a/MdeModulePkg/MdeModulePkg.dec > > >> b/MdeModulePkg/MdeModulePkg.dec index ca09cbc..95f9311 100644 > > >> --- a/MdeModulePkg/MdeModulePkg.dec > > >> +++ b/MdeModulePkg/MdeModulePkg.dec > > >> @@ -546,6 +546,9 @@ > > >> ## Include/Protocol/NonDiscoverableDevice.h > > >> gEdkiiNonDiscoverableDeviceProtocolGuid =3D { 0x0d51905b, 0xb77e, > > >> 0x452a, > > {0xa2, > > >> 0xc0, 0xec, 0xa0, 0xcc, 0x8d, 0x51, 0x4a } } > > >> > > >> + ## Include/Protocol/GcdMemorySpaceNotify.h > > >> + gEfiGcdMemorySpaceNotifyProtocolGuid =3D { 0xc842db69, 0x610e, > > >> + 0x401a, > > {0x90, > > >> 0xd0, 0x88, 0x41, 0xf1, 0xdc, 0x53, 0x79 } } > > >> + > > >> # > > >> # [Error.gEfiMdeModulePkgTokenSpaceGuid] > > >> # 0x80000001 | Invalid value provided. > > >> -- > > >> 2.7.4 > > >> > > >> _______________________________________________ > > >> edk2-devel mailing list > > >> edk2-devel@lists.01.org > > >> https://lists.01.org/mailman/listinfo/edk2-devel