Re: [edk2-devel] [PATCH] MdeModulePkg: Add missing sourceX for Blt

2019-09-24 Thread Wu, Hao A
> -Original Message- > From: devel@edk2.groups.io [mailto:devel@edk2.groups.io] On Behalf Of > Gao, Zhichao > Sent: Tuesday, September 17, 2019 3:00 PM > To: Ni, Ray > Cc: Gris87; devel@edk2.groups.io > Subject: Re: [edk2-devel] [PATCH] MdeModulePkg: Add missing sourceX for > Blt > > It

Re: [edk2-devel] [Patch] MdePkg Base.h: Define STATIC_ASSERT macro as empty for EBC arch

2019-09-24 Thread Michael D Kinney
Reviewed-by: Michael D Kinney > -Original Message- > From: Gao, Liming > Sent: Tuesday, September 24, 2019 5:38 PM > To: Leif Lindholm ; > devel@edk2.groups.io > Cc: Kinney, Michael D > Subject: RE: [edk2-devel] [Patch] MdePkg Base.h: Define > STATIC_ASSERT macro as empty for EBC arch

Re: [edk2-devel] [PATCH 1/1] MdeModulePkg/SdMmcPciHcDxe: Fix bus timing switch sequence

2019-09-24 Thread Wu, Hao A
> -Original Message- > From: Albecki, Mateusz > Sent: Monday, September 23, 2019 4:37 PM > To: devel@edk2.groups.io > Cc: Albecki, Mateusz; Wu, Hao A; Marcin Wojtas > Subject: [PATCH 1/1] MdeModulePkg/SdMmcPciHcDxe: Fix bus timing > switch sequence > > SD specification recommends

Re: [edk2-devel] Cancelled Event: TianoCore Design / Bug Triage - EMEA - Wednesday, 25 September 2019 #cal-cancelled

2019-09-24 Thread Stephano Cetola
No topics, so we'll cancel this week. -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#48007): https://edk2.groups.io/g/devel/message/48007 Mute This Topic: https://groups.io/mt/34283833/21656 Mute #cal-cancelled:

[edk2-devel] Cancelled Event: TianoCore Design / Bug Triage - EMEA - Wednesday, 25 September 2019 #cal-cancelled

2019-09-24 Thread devel@edk2.groups.io Calendar
BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Groups.io Inc//Groups.io Calendar//EN METHOD:CANCEL CALSCALE:GREGORIAN BEGIN:VEVENT STATUS:CANCELLED UID:calendar.15...@groups.io DTSTAMP:20190925T022431Z ORGANIZER;CN=Stephano Cetola:mailto:stephano.cet...@linux.intel.com

Re: [edk2-devel] [patch v3 0/5] Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
Hi Hao, Could you help to push this V3 patch series? Thanks, Dandan > -Original Message- > From: devel@edk2.groups.io [mailto:devel@edk2.groups.io] On Behalf Of > Dandan Bi > Sent: Tuesday, September 24, 2019 9:17 PM > To: devel@edk2.groups.io > Cc: Leif Lindholm ; Ard Biesheuvel > ;

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Liming Gao
Laszlo: >-Original Message- >From: Laszlo Ersek [mailto:ler...@redhat.com] >Sent: Wednesday, September 25, 2019 1:27 AM >To: Gao, Liming ; devel@edk2.groups.io >Cc: Andrew Fish ; Leif Lindholm ; >Kinney, Michael D >Subject: Re: [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II

Re: [edk2-devel] [Patch] MdePkg Base.h: Define STATIC_ASSERT macro as empty for EBC arch

2019-09-24 Thread Leif Lindholm
On Tue, Sep 24, 2019 at 11:05:19PM +0800, Liming Gao wrote: > EBC compiler doesn't support C11 static_assert macro. > So, define STATIC_ASSERT as empty to pass EBC arch build. > STATIC_ASSERT macro is introduced @204ae9da230ecbf0910c21acac7aa5d5e8cbb8d0 > > Cc: Michael D Kinney > Signed-off-by:

Re: [edk2-devel] [edk2-platforms][PATCH V2 00/15] Move ClevoOpenBoardPkg/N1xxWU Contents to KabylakeOpenBoardPkg

2019-09-24 Thread Sinha, Ankit
Reviewed-by: Ankit Sinha -Original Message- From: devel@edk2.groups.io On Behalf Of Kubacki, Michael A Sent: Tuesday, September 24, 2019 11:13 AM To: devel@edk2.groups.io Cc: Chiu, Chasel ; Desimone, Nathaniel L ; Sinha, Ankit ; Jeremy Soller Subject: [edk2-devel]

Re: [edk2-devel] [edk2/master PATCHv1 1/1] OvmfPkg: Make SOURCE_DEBUG_ENABLE actually need to be set to TRUE

2019-09-24 Thread Laszlo Ersek
Hi Peter, thanks for the patch. Two comments: On 09/20/19 20:45, Peter Jones wrote: > Currently some tests check the value of SOURCE_DEBUG_ENABLE, and some > tests check if it's defined or not. Additionally, in UefiPayloadPkg as > well as some other trees, we define it as FALSE in the .dsc

Re: [edk2-devel] [PATCH] MdeModulePkg: Enable/Disable S3BootScript dynamically.

2019-09-24 Thread Laszlo Ersek
On 09/24/19 07:54, Chiu, Chasel wrote: > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2212 > > Current S3BootScriptLib can only support build time opt-out I think this problem statement is wrong. In the OVMF platform anyway, PiDxeS3BootScriptLib is linked into the following two modules:

Re: [edk2-devel] [edk2-platforms][PATCH V1 1/1] edk2-platforms: Add __pycache__ to .gitignore

2019-09-24 Thread Leif Lindholm
On Tue, Sep 24, 2019 at 01:55:47PM -0700, Michael Kubacki wrote: > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2217 > > Python build is enabled for some platform code leading to .pyc files > created in __pycache__ directories. This change adds the __pycache__ > directory to a .gitignore

[edk2-devel] [edk2-platforms][PATCH V1 1/1] edk2-platforms: Add __pycache__ to .gitignore

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2217 Python build is enabled for some platform code leading to .pyc files created in __pycache__ directories. This change adds the __pycache__ directory to a .gitignore file to allow git to ignore Python cache files. Cc: Ard Biesheuvel Cc:

[edk2-devel] [PATCH 1/1] uefi-sct/SctPkg: network: missing EFIAPI

2019-09-24 Thread Heinrich Schuchardt
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2126 Avoid errors of type: ~/edk2/SctPkg/TestCase/RIVL/Protocol/Http/Http/HttpENTSTest.c:74:1: error: conflicting types for ‘HttpENTSTestMain’ 74 | HttpENTSTestMain ( | ^~~~ In file included from :

Re: [edk2-devel] [edk2-test][Patch] uefi-sct/SctPkg: Add MediaPresentSupported check

2019-09-24 Thread Heinrich Schuchardt
On 9/24/19 10:50 AM, xianhui liu wrote: REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2061 check MediaPresent while MediaPresentSupported is TRUE sync change from EFI to IHV SimpleNetworkBBTestFunction Thanks for addressing this issue. Cc: Heinrich Schuchardt %s/Cc:/Reported-by:/

Re: [edk2-devel] [RFC PATCH v2 04/44] OvmfPkg/ResetVector: Add support for a 32-bit SEV check

2019-09-24 Thread Lendacky, Thomas
On 9/24/19 8:42 AM, Laszlo Ersek wrote: > On 09/19/19 21:52, Lendacky, Thomas wrote: >> From: Tom Lendacky >> >> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 >> >> During BSP startup, the reset vector code will issue a CPUID instruction >> while in 32-bit mode. When running as an

[edk2-devel] [edk2-platforms][PATCH V2 05/15] KabylakeOpenBoardPkg: Move EcCommands.h to KabylakeRvp3 board

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 EC command details may vary across Kaby Lake boards. This change moves this set of EC commands to the KabylakeRvp3 directory since these commands are specifically used by that board at this time. Cc: Chasel Chiu Cc: Nate DeSimone Cc:

[edk2-devel] [edk2-platforms][PATCH V2 07/15] KabylakeOpenBoardPkg: Add PeiSerialPortLibSpiFlash

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 PeiSerialPortLibSpiFlash is currently used for early boot closed chassis debug on production systems such as the System 76 Galago Pro laptop. This change moves the library to KabylakeOpenBoardPkg from ClevoOpenBoardPkg since the Clevo

[edk2-devel] [edk2-platforms][PATCH V2 12/15] KabylakeOpenBoardPkg: Add board ID to Global NVS

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Adds the board ID as a field in global NVS (BDID) to allow ACPI code to take conditional actions based on the active board. Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc: Jeremy Soller Signed-off-by: Michael Kubacki ---

[edk2-devel] [edk2-platforms][PATCH V2 10/15] KabylakeOpenBoardPkg/GalagoPro3: Add modules

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Adds the modules used for System 76 Galago Pro 3 board support. This override should be removed in a future cleanup change. That is outside the scope of this change which is to move the contents from ClevoOpenBoardPkg/N1xxWU to

[edk2-devel] [edk2-platforms][PATCH V2 06/15] KabylakeOpenBoardPkg: Move flash map to board

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 The flash map currently in KabylakeOpenBoardPkg is only applicable to the KabylakeRvp3 board. This change moves the flash map to that board directory to prepare for other boards to reside in the package. Cc: Chasel Chiu Cc: Nate DeSimone

[edk2-devel] [edk2-platforms][PATCH V2 00/15] Move ClevoOpenBoardPkg/N1xxWU Contents to KabylakeOpenBoardPkg

2019-09-24 Thread Kubacki, Michael A
This patch series moves the N1xxWU board contents currently in ClevoOpenBoardPkg to KabylakeOpenBoardPkg. The actual systems being tested are System 76 Galago Pro laptops so the board itself is renamed from "N1xxWU" to"GalagoPro3". The system models supported are the galp2 (Kaby Lake) and galp3

[edk2-devel] [edk2-platforms][PATCH V2 14/15] KabylakeOpenBoardPkg/GalagoPro3: Add build files

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 * Adds files required to build the GalagoPro3 board to the board directory. * Updates KabylakeOpenBoardPkg/OpenBoardPkg.dec to reference the new GalagoPro3 board directory. Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc:

[edk2-devel] [edk2-platforms][PATCH V2 15/15] Add GalagoPro3 board details to global build and documentation

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 * Updates maintainers for the System 76 GalagoPro3 board * Updated Readme.md with System 76 GalagoPro3 board details * Adds the ability to build the GalagoPro3 board to build.cfg Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc:

[edk2-devel] [edk2-platforms][PATCH V2 11/15] KabylakeOpenBoardPkg: Consolidate board IDs in a single file

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Moves all Kaby Lake board ID definitions into a single header file so it is easier to maintain the values and include the values into common package files that need to make decisions based on board ID. Cc: Chasel Chiu Cc: Nate DeSimone

[edk2-devel] [edk2-platforms][PATCH V2 04/15] KabylakeOpenBoardPkg: Move policy update libs to KabylakeRvp3 board

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 To prepare KabylakeOpenBoardPkg for multi-board support, the policy update libraries should be moved to the individual board directory. Prevously KabylakeOpenBoardPkg only supported the KabylakeRvp3 board and the policy update libraries were

[edk2-devel] [edk2-platforms][PATCH V2 13/15] KabylakeOpenBoardPkg/BoardAcpiDxe: Add Synaptics PS/2 mouse

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Moves the Synaptics PS/2 mouse support required for the Galago Pro 3 trackpad to function from the previous location in ClevoOpenBoardPkg/N1xxWU to the common ASL file in KabylakeOpenBoardPkg. The board ID is used to determine which PS/2

[edk2-devel] [edk2-platforms][PATCH V2 01/15] Platform/Intel: Remove N1xxWU board build option

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 The N1xxWU board contents will be moved to KabylakeOpenBoardPkg to reduce code duplication between ClevoOpenBoardPkg and KabylakeOpenBoardPkg. Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc: Jeremy Soller Signed-off-by: Michael

[edk2-devel] [edk2-platforms][PATCH V2 08/15] KabylakeOpenBoardPkg/GalagoPro3: Add headers

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Adds the Galago Pro 3 board ID header file. Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc: Jeremy Soller Signed-off-by: Michael Kubacki --- Platform/Intel/KabylakeOpenBoardPkg/GalagoPro3/Include/GalagoPro3Id.h | 13

[edk2-devel] [edk2-platforms][PATCH V2 03/15] ClevoOpenBoardPkg: Remove global files and references

2019-09-24 Thread Kubacki, Michael A
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2207 Remove references to ClevoOpenBoardPkg external to the package since the package is now removed. Cc: Chasel Chiu Cc: Nate DeSimone Cc: Ankit Sinha Cc: Jeremy Soller Signed-off-by: Michael Kubacki --- Maintainers.txt | 5

Re: [edk2-devel] [PATCH 35/35] UefiPayloadPkg/BlSupportDxe: fix ReserveResourceInGcd() calls

2019-09-24 Thread Laszlo Ersek
On 09/23/19 17:08, Philippe Mathieu-Daudé wrote: > On 9/17/19 9:49 PM, Laszlo Ersek wrote: >> The last parameter of ReserveResourceInGcd() is "ImageHandle", forwarded >> in turn to gDS->AllocateMemorySpace() or gDS->AllocateIoSpace() as "owner" >> image handle. >> >> But BlDxeEntryPoint() passes

Re: [edk2-devel] [PATCH 10/35] MdeModulePkg/PlatformVarCleanupLib: fix HiiConstructConfigHdr() call

2019-09-24 Thread Laszlo Ersek
On 09/23/19 13:45, Philippe Mathieu-Daudé wrote: > On 9/17/19 9:49 PM, Laszlo Ersek wrote: >> The HiiConstructConfigHdr() function takes the "DriverHandle" parameter in >> order to fetch the device path from it, and then turn the device path into >> PATH routing information. >> >> The

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Laszlo Ersek
Hi Liming, On 09/24/19 03:19, Liming Gao wrote: > ShellBinPkg is generated for each edk2 stable tag release. > > Cc: Andrew Fish > Cc: Laszlo Ersek > Cc: Leif Lindholm > Cc: Michael D Kinney > Signed-off-by: Liming Gao > --- > Maintainers.txt | 13 ++--- > 1 file changed, 6

[edk2-devel] [PATCH] WinHost: Add SimplePointer support

2019-09-24 Thread Marvin Häuser
From: Marvin Haeuser Catch WM mouse events and expose them via the SimplePointer protocol. Cc: Jordan Justen Cc: Andrew Fish Cc: Ray Ni Signed-off-by: Marvin Haeuser --- EmulatorPkg/Win/Host/WinGopInput.c | 25 ++-- EmulatorPkg/Win/Host/WinGopScreen.c | 41

[edk2-devel] [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider SourceX

2019-09-24 Thread Marvin Häuser
From: Marvin Haeuser Currently, SourceX is not considered in the BufferToVideo operation when the 8-bit pixel format is used. Correctly add the resulting offset to prevent image corruption. Cc: Jian J Wang Cc: Hao A Wu Signed-off-by: Marvin Haeuser ---

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Laszlo Ersek
On 09/24/19 12:41, Philippe Mathieu-Daudé wrote: > Hi Liming, > > On 9/24/19 3:19 AM, Liming Gao wrote: >> ShellBinPkg is generated for each edk2 stable tag release. >> >> Cc: Andrew Fish >> Cc: Laszlo Ersek >> Cc: Leif Lindholm >> Cc: Michael D Kinney >> Signed-off-by: Liming Gao >> --- >>

Re: [edk2-devel] [PATCH 6/7] OvmfPkg: strip trailing whitespace

2019-09-24 Thread Laszlo Ersek
On 09/20/19 12:24, Leif Lindholm wrote: > > On Fri, Sep 20, 2019 at 08:13:36AM +0200, Laszlo Ersek wrote: >> On 09/19/19 20:06, Leif Lindholm wrote: >>> Cc: Jordan Justen >>> Cc: Laszlo Ersek >>> Cc: Ard Biesheuvel >>> Cc: Anthony Perard >>> Cc: Julien Grall >>> Cc: David Woodhouse >>>

Re: [edk2-devel] [Patch] MdePkg Base.h: Define STATIC_ASSERT macro as empty for EBC arch

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 5:05 PM, Liming Gao wrote: > EBC compiler doesn't support C11 static_assert macro. > So, define STATIC_ASSERT as empty to pass EBC arch build. > STATIC_ASSERT macro is introduced @204ae9da230ecbf0910c21acac7aa5d5e8cbb8d0 > > Cc: Michael D Kinney > Signed-off-by: Liming Gao > --- >

Re: [edk2-devel] [PATCH 28/35] ShellPkg/UefiShellDriver1CommandsLib: fix parameter list typo

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > The ShellCommandRunConnect() function passes EFI_HANDLE -- (VOID*) -- > objects to ConvertAndConnectControllers(), and > ConvertAndConnectControllers() passes those to gBS->OpenProtocol(). > > Accordingly, ConvertAndConnectControllers() should specify

Re: [edk2-devel] [PATCH 13/35] MdeModulePkg: PEI Core: clean up "AprioriFile" handling in FindFileEx()

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > Clean up two issues around FindFileEx(): > > - The "AprioriFile" parameter's type differs between the function > declaration and the function definition. The correct type is > (EFI_PEI_FILE_HANDLE*). > > - "FfsFileHeader" has type

Re: [edk2-devel] [PATCH 17/35] MdePkg/DxeServicesLib: remove bogus cast

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > The HandleProtocol() boot service takes an EFI_HANDLE, not an > (EFI_HANDLE*). Remove the bogus cast in the > InternalImageHandleToFvHandle() function. > > This is a semantic cleanup; there is no change in behavior. > > Cc: Liming Gao > Cc: Michael D

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 5:17 PM, Gao, Liming wrote: >> -Original Message- >> From: Philippe Mathieu-Daudé >> Sent: Tuesday, September 24, 2019 11:13 PM >> To: Gao, Liming ; devel@edk2.groups.io; Leif Lindholm >> >> Cc: Andrew Fish ; Laszlo Ersek ; Kinney, >> Michael D >> Subject: Re: [edk2-devel]

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Liming Gao
> -Original Message- > From: Philippe Mathieu-Daudé > Sent: Tuesday, September 24, 2019 11:13 PM > To: Gao, Liming ; devel@edk2.groups.io; Leif Lindholm > > Cc: Andrew Fish ; Laszlo Ersek ; Kinney, > Michael D > Subject: Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 5:08 PM, Gao, Liming wrote: > Philipe: > >> -Original Message- >> From: devel@edk2.groups.io On Behalf Of Philippe >> Mathieu-Daudé >> Sent: Tuesday, September 24, 2019 6:41 PM >> To: devel@edk2.groups.io; Gao, Liming ; Leif Lindholm >> >> Cc: Andrew Fish ; Laszlo Ersek ;

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Liming Gao
Philipe: > -Original Message- > From: devel@edk2.groups.io On Behalf Of Philippe > Mathieu-Daudé > Sent: Tuesday, September 24, 2019 6:41 PM > To: devel@edk2.groups.io; Gao, Liming ; Leif Lindholm > > Cc: Andrew Fish ; Laszlo Ersek ; Kinney, > Michael D > Subject: Re: [edk2-devel]

[edk2-devel] [Patch] MdePkg Base.h: Define STATIC_ASSERT macro as empty for EBC arch

2019-09-24 Thread Liming Gao
EBC compiler doesn't support C11 static_assert macro. So, define STATIC_ASSERT as empty to pass EBC arch build. STATIC_ASSERT macro is introduced @204ae9da230ecbf0910c21acac7aa5d5e8cbb8d0 Cc: Michael D Kinney Signed-off-by: Liming Gao --- MdePkg/Include/Base.h | 5 - 1 file changed, 4

[edk2-devel] Upcoming Event: TianoCore Design / Bug Triage - EMEA - Wed, 09/25/2019 8:00am-9:00am #cal-reminder

2019-09-24 Thread devel@edk2.groups.io Calendar
*Reminder:* TianoCore Design / Bug Triage - EMEA *When:* Wednesday, 25 September 2019, 8:00am to 9:00am, (GMT-07:00) America/Los Angeles *Where:* https://zoom.us/j/695893389 View Event ( https://edk2.groups.io/g/devel/viewevent?eventid=503243 ) *Organizer:* Stephano Cetola

Re: [edk2-devel] [RFC PATCH v2 03/44] OvmfPkg: Add support to perform SEV-ES initialization

2019-09-24 Thread Lendacky, Thomas
On 9/24/19 6:59 AM, Laszlo Ersek wrote: > On 09/19/19 21:52, Lendacky, Thomas wrote: >> From: Tom Lendacky >> >> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 >> >> When SEV-ES is active, then SEV is also active. Add support to the SEV >> initialization function to also check for SEV-ES

Re: [edk2-devel] [RFC PATCH v2 00/44] SEV-ES guest support

2019-09-24 Thread Lendacky, Thomas
On 9/23/19 8:55 PM, Dong, Eric wrote: > Hi Tom, Hi Eric, > > Thanks for you to contribute such a big changes. Seems like this is a big > changes for current code, can you help to do a design review in TianoCore > Design Meeting? It will be helpful for us to understand the code change and >

Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1

2019-09-24 Thread Liming Gao
Mike: > -Original Message- > From: devel@edk2.groups.io On Behalf Of Michael D > Kinney > Sent: Tuesday, September 24, 2019 1:44 AM > To: Sean Brogan ; devel@edk2.groups.io; > r...@edk2.groups.io; Kinney, Michael D > > Cc: Bret Barkelew > Subject: Re: [edk2-devel] [RFC] EDK II

Re: [edk2-devel] [RFC PATCH v2 04/44] OvmfPkg/ResetVector: Add support for a 32-bit SEV check

2019-09-24 Thread Laszlo Ersek
On 09/24/19 15:42, Laszlo Ersek wrote: > On 09/19/19 21:52, Lendacky, Thomas wrote: >> +mov esp, SEV_TOP_OF_STACK > (3) Do we have an estimate how much stack we need? This would be a > constraint on PcdOvmfSecPeiTempRamSize. The limit would be nice to > document (perhaps in a comment

Re: [edk2-devel] [patch v3 3/5] MdeModulePkg/UefiBootManager: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Gao, Zhichao
Nice catch. Moving the check into the if conditional section would avoid the additional check when the status is EFI_SUCCESS. Reviewed-by: Zhichao Gao Thanks, Zhichao > -Original Message- > From: devel@edk2.groups.io [mailto:devel@edk2.groups.io] On Behalf Of > Philippe Mathieu-Daudé

Re: [edk2-devel] [RFC PATCH v2 04/44] OvmfPkg/ResetVector: Add support for a 32-bit SEV check

2019-09-24 Thread Laszlo Ersek
On 09/19/19 21:52, Lendacky, Thomas wrote: > From: Tom Lendacky > > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 > > During BSP startup, the reset vector code will issue a CPUID instruction > while in 32-bit mode. When running as an SEV-ES guest, this will trigger > a #VC exception.

Re: [edk2-devel] [patch v3 3/5] MdeModulePkg/UefiBootManager: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 3:16 PM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if the caller

Re: [edk2-devel] [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider SourceX

2019-09-24 Thread Wu, Hao A
> -Original Message- > From: Gao, Zhichao > Sent: Tuesday, September 24, 2019 9:15 PM > To: Wu, Hao A; Marvin Häuser; devel@edk2.groups.io; Ni, Ray > Cc: Wang, Jian J > Subject: RE: [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider > SourceX > > I have just viewed a same patch of

[edk2-devel] [patch v3 4/5] MdeModulePkg/PlatformDriOverride: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. This follows UEFI Spec. But if the caller of LoadImage() doesn't have the option to defer

[edk2-devel] [patch v3 5/5] ShellPkg: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. This follows UEFI Spec. But if the caller of LoadImage() doesn't have the option to defer

[edk2-devel] [patch v3 3/5] MdeModulePkg/UefiBootManager: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. This follows UEFI Spec. But if the caller of LoadImage() doesn't have the option to defer

[edk2-devel] [patch v3 2/5] MdeModulePkg/DxeCapsuleLibFmp: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. This follows UEFI Spec. But if the caller of LoadImage() doesn't have the option to defer

[edk2-devel] [patch v3 1/5] EmbeddedPkg: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. This follows UEFI Spec. But if the caller of LoadImage() doesn't have the option to defer

[edk2-devel] [patch v3 0/5] Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Dandan Bi
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1992 v2: Just enahnce the code error handling logic in patch 3. Other patches are the same and pick up the Acked-by and Reviewed-by in other patches. v2: (1) Just separate the patch in MdeModulePkg into module level, the changes in

Re: [edk2-devel] [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider SourceX

2019-09-24 Thread Gao, Zhichao
I have just viewed a same patch of this issue. See https://edk2.groups.io/g/devel/topic/34168097#47297. The two patches are doing the same thing. Thanks, Zhichao > -Original Message- > From: Wu, Hao A > Sent: Tuesday, September 24, 2019 9:02 PM > To: Marvin Häuser ;

Re: [edk2-devel] [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider SourceX

2019-09-24 Thread Wu, Hao A
> -Original Message- > From: Marvin Häuser [mailto:marvin.haeu...@outlook.com] > Sent: Tuesday, September 24, 2019 8:46 PM > To: devel@edk2.groups.io > Cc: Wang, Jian J; Wu, Hao A > Subject: [PATCH] MdeModulePkg/FrameBufferBltLib: Correctly consider > SourceX > > From: Marvin Haeuser >

Re: [edk2-devel] [Patch 05/10 V8] BaseTools: Enable Multiple Process AutoGen

2019-09-24 Thread dann frazier
On Mon, Sep 23, 2019 at 8:25 PM Feng, Bob C wrote: > > Hi Dann, > > Thanks for raising this issue. > > Would you provide the static_library_files.list file, so that I can have a > check? Hi Bob, Sure - it occurs to me that bugzilla might be a better place to share this material, so I've

Re: [edk2-devel] [Qemu-devel] [PATCH 1/2] q35: implement 128K SMRAM at default SMBASE address

2019-09-24 Thread Paolo Bonzini
On 20/09/19 11:28, Laszlo Ersek wrote: >> On QEMU side, we can drop black-hole approach and allocate >> dedicated SMRAM region, which explicitly gets mapped into >> RAM address space and after SMI hanlder initialization, gets >> unmapped (locked). So that SMRAM would be accessible only >> from

Re: [edk2-devel] [RFC PATCH v2 03/44] OvmfPkg: Add support to perform SEV-ES initialization

2019-09-24 Thread Laszlo Ersek
On 09/19/19 21:52, Lendacky, Thomas wrote: > From: Tom Lendacky > > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 > > When SEV-ES is active, then SEV is also active. Add support to the SEV > initialization function to also check for SEV-ES being active. If SEV-ES > is active, set the

Re: [edk2-devel] [RFC PATCH v2 02/44] OvmfPkg/MemEncryptSevLib: Add an SEV-ES guest indicator function

2019-09-24 Thread Laszlo Ersek
On 09/19/19 21:52, Lendacky, Thomas wrote: > From: Tom Lendacky > > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 > > Create a function that can be used to determine if the VM is running > as an SEV-ES guest. > > Cc: Jordan Justen > Cc: Laszlo Ersek > Cc: Ard Biesheuvel >

Re: [edk2-devel] [PATCH wave 1 02/10] OvmfPkg/IndustryStandard: increase vertical whitespace in Q35 macro defs

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 1:34 PM, Laszlo Ersek wrote: > In a subsequent patch, we'll introduce new DRAM controller macros in > "Q35MchIch9.h". Their names are too long for the currently available > vertical whitespace, so increase the latter first. > > There is no functional change in this patch ("git show -b"

Re: [edk2-devel] [PATCH wave 1 04/10] OvmfPkg/PlatformPei: factor out Q35BoardVerification()

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/24/19 1:34 PM, Laszlo Ersek wrote: > Before adding another SMM-related, and therefore Q35-only, dynamically > detectable feature, extract the current board type check from > Q35TsegMbytesInitialization() to a standalone function. > > Cc: Ard Biesheuvel > Cc: Boris Ostrovsky > Cc: Brijesh

[edk2-devel] [PATCH wave 1 08/10] OvmfPkg/SEV: don't manage the lifecycle of the SMRAM at the default SMBASE

2019-09-24 Thread Laszlo Ersek
When OVMF runs in a SEV guest, the initial SMM Save State Map is (1) allocated as EfiBootServicesData type memory in OvmfPkg/PlatformPei, function AmdSevInitialize(), for preventing unintended information sharing with the hypervisor; (2) decrypted in AmdSevDxe; (3) re-encrypted in

[edk2-devel] [PATCH wave 1 10/10] OvmfPkg/PlatformPei: detect SMRAM at default SMBASE (for real)

2019-09-24 Thread Laszlo Ersek
Now that the SMRAM at the default SMBASE is honored everywhere necessary, implement the actual detection. The (simple) steps are described in previous patch "OvmfPkg/IndustryStandard: add MCH_DEFAULT_SMBASE* register macros". Cc: Ard Biesheuvel Cc: Boris Ostrovsky Cc: Brijesh Singh Cc: Igor

[edk2-devel] [PATCH wave 1 06/10] OvmfPkg/PlatformPei: assert there's no permanent PEI RAM at default SMBASE

2019-09-24 Thread Laszlo Ersek
The permanent PEI RAM that is published on the normal boot path starts strictly above MEMFD_BASE_ADDRESS (8 MB -- see the FDF files), regardless of whether PEI decompression will be necessary on S3 resume due to SMM_REQUIRE. Therefore the normal boot permanent PEI RAM never overlaps with the SMRAM

[edk2-devel] [PATCH wave 1 04/10] OvmfPkg/PlatformPei: factor out Q35BoardVerification()

2019-09-24 Thread Laszlo Ersek
Before adding another SMM-related, and therefore Q35-only, dynamically detectable feature, extract the current board type check from Q35TsegMbytesInitialization() to a standalone function. Cc: Ard Biesheuvel Cc: Boris Ostrovsky Cc: Brijesh Singh Cc: Igor Mammedov Cc: Jiewen Yao Cc: Joao M

[edk2-devel] [PATCH wave 1 01/10] OvmfPkg: introduce PcdQ35SmramAtDefaultSmbase

2019-09-24 Thread Laszlo Ersek
For supporting VCPU hotplug with SMM enabled/required, QEMU offers the (dynamically detectable) feature called "SMRAM at default SMBASE". When the feature is enabled, the firmware can lock down the 128 KB range starting at the default SMBASE; that is, the [0x3_, 0x4_] interval. The goal is

[edk2-devel] [PATCH wave 1 09/10] OvmfPkg/SmmAccess: close and lock SMRAM at default SMBASE

2019-09-24 Thread Laszlo Ersek
During normal boot, when EFI_DXE_SMM_READY_TO_LOCK_PROTOCOL is installed by platform BDS, the SMM IPL locks SMRAM (TSEG) through EFI_SMM_ACCESS2_PROTOCOL.Lock(). See SmmIplReadyToLockEventNotify() in "MdeModulePkg/Core/PiSmmCore/PiSmmIpl.c". During S3 resume, S3Resume2Pei locks SMRAM (TSEG)

[edk2-devel] [PATCH wave 1 07/10] OvmfPkg/PlatformPei: reserve the SMRAM at the default SMBASE, if it exists

2019-09-24 Thread Laszlo Ersek
The 128KB SMRAM at the default SMBASE will be used for protecting the initial SMI handler for hot-plugged VCPUs. After platform reset, the SMRAM in question is open (and looks just like RAM). When BDS signals EFI_DXE_MM_READY_TO_LOCK_PROTOCOL (and so TSEG is locked down), we're going to lock the

[edk2-devel] [PATCH wave 1 05/10] OvmfPkg/PlatformPei: detect SMRAM at default SMBASE (skeleton)

2019-09-24 Thread Laszlo Ersek
Introduce the Q35SmramAtDefaultSmbaseInitialization() function for detecting the "SMRAM at default SMBASE" feature. For now, the function is only a skeleton, so that we can gradually build upon the result while the result is hard-coded as FALSE. The actual detection will occur in a later patch.

[edk2-devel] [PATCH wave 1 03/10] OvmfPkg/IndustryStandard: add MCH_DEFAULT_SMBASE* register macros

2019-09-24 Thread Laszlo Ersek
In Intel datasheet 316966-002 (the "q35 spec"), Table 5-1 "DRAM Controller Register Address Map (D0:F0)" leaves the byte register at config space offset 0x9C unused. On QEMU's Q35 board, for detecting the "SMRAM at default SMBASE" feature, firmware is expected to write MCH_DEFAULT_SMBASE_QUERY

[edk2-devel] [PATCH wave 1 02/10] OvmfPkg/IndustryStandard: increase vertical whitespace in Q35 macro defs

2019-09-24 Thread Laszlo Ersek
In a subsequent patch, we'll introduce new DRAM controller macros in "Q35MchIch9.h". Their names are too long for the currently available vertical whitespace, so increase the latter first. There is no functional change in this patch ("git show -b" displays nothing). Cc: Ard Biesheuvel Cc: Boris

[edk2-devel] [PATCH wave 1 00/10] support QEMU's "SMRAM at default SMBASE" feature

2019-09-24 Thread Laszlo Ersek
Ref:https://bugzilla.tianocore.org/show_bug.cgi?id=1512 Repo: https://github.com/lersek/edk2.git Branch: smram_at_default_smbase_bz_1512_wave_1 This is the firmware-side patch series for the QEMU feature that Igor is proposing in [Qemu-devel] [PATCH 0/2] q35: mch: allow to lock down

Re: [edk2-devel] [Qemu-devel] [PATCH 1/2] q35: implement 128K SMRAM at default SMBASE address

2019-09-24 Thread Igor Mammedov
On Mon, 23 Sep 2019 20:35:02 +0200 "Laszlo Ersek" wrote: > On 09/20/19 11:28, Laszlo Ersek wrote: > > On 09/20/19 10:28, Igor Mammedov wrote: > >> On Thu, 19 Sep 2019 19:02:07 +0200 > >> "Laszlo Ersek" wrote: > >> > >>> Hi Igor, > >>> > >>> (+Brijesh) > >>> > >>> long-ish pondering ahead,

Re: [edk2-devel] [PATCH 18/35] NetworkPkg/DxeNetLib: fix type typo in NetLibGetMacAddress()

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > NetLibGetSnpHandle() returns an EFI_HANDLE, not an (EFI_HANDLE*). > NetLibGetMacAddress() only uses the return value ("SnpHandle") for a > NULL-check. Fix the type of "SnpHandle". > > This patch is a no-op. > > Cc: Jiaxin Wu > Cc: Siyuan Fu >

Re: [edk2-devel] [PATCH 12/35] MdeModulePkg: stop abusing EFI_HANDLE for keystroke notify registration

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > EFI_REGISTER_KEYSTROKE_NOTIFY and EFI_UNREGISTER_KEYSTROKE_NOTIFY require > the notification handle to have type (VOID*). The notification handle has > nothing to do with the EFI_HANDLE type. > > This change is a semantic fix; functionally, it's a no-op.

Re: [edk2-devel] [PATCH 08/35] MdeModulePkg/UefiHiiLib: stop using EFI_HANDLE in place of EFI_HII_HANDLE

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > HiiGetHiiHandles() returns an array of EFI_HII_HANDLEs, not EFI_HANDLEs. > HiiGetString() takes an EFI_HII_HANDLE, not an EFI_HANDLE. > > This change is a no-op in practice; it's a semantic improvement. > > Cc: Dandan Bi > Cc: Eric Dong > Cc: Hao A Wu

Re: [edk2-devel] [PATCH 03/35] EmbeddedPkg/AndroidFastbootTransportTcpDxe: fix DestroyChild() call

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > - The 2nd parameter of EFI_SERVICE_BINDING_CREATE_CHILD is: > > IN OUT EFI_HANDLE *ChildHandle > > - The 2nd parameter of EFI_SERVICE_BINDING_DESTROY_CHILD is: > > IN EFI_HANDLE ChildHandle > > Fix the DestroyChild() call in

Re: [edk2-devel] [PATCH 06/35] EmulatorPkg: stop abusing EFI_HANDLE for keystroke notify registration

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > EFI_REGISTER_KEYSTROKE_NOTIFY and EFI_UNREGISTER_KEYSTROKE_NOTIFY require > the notification handle to have type (VOID*). The notification handle has > nothing to do with the EFI_HANDLE type. > > This change is a semantic fix; functionally, it's a no-op.

Re: [edk2-devel] [PATCH 07/35] MdeModulePkg: fix cast in GetModuleInfoFromHandle() calls

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/17/19 9:49 PM, Laszlo Ersek wrote: > GetModuleInfoFromHandle() takes an EFI_HANDLE -- (VOID*) -- as first > parameter, but InsertFpdtRecord() passes (EFI_HANDLE*) -- (VOID**). > (VOID**) converts silently to (VOID*), which is why the wrong cast is > masked. > > Note that the *value* that is

Re: [edk2-devel] [Patch] Maintainers.txt: Move ShellBin maintainers to EDK II Releases section

2019-09-24 Thread Philippe Mathieu-Daudé
Hi Liming, On 9/24/19 3:19 AM, Liming Gao wrote: > ShellBinPkg is generated for each edk2 stable tag release. > > Cc: Andrew Fish > Cc: Laszlo Ersek > Cc: Leif Lindholm > Cc: Michael D Kinney > Signed-off-by: Liming Gao > --- > Maintainers.txt | 13 ++--- > 1 file changed, 6

Re: [edk2-devel] [patch v2 4/5] MdeModulePkg/PlatformDriOverride: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/18/19 5:05 AM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if the caller

Re: [edk2-devel] [patch v2 2/5] MdeModulePkg/DxeCapsuleLibFmp: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/18/19 5:05 AM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if the caller

Re: [edk2-devel] [patch v2 3/5] MdeModulePkg/UefiBootManager: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
Hi Dandan, On 9/18/19 5:05 AM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if

Re: [edk2-devel] [patch v2 5/5] ShellPkg: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/18/19 5:05 AM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if the caller

Re: [edk2-devel] [patch v2 1/5] EmbeddedPkg: Unload image on EFI_SECURITY_VIOLATION

2019-09-24 Thread Philippe Mathieu-Daudé
On 9/18/19 5:05 AM, Dandan Bi wrote: > For the LoadImage() boot service, with EFI_SECURITY_VIOLATION retval, > the Image was loaded and an ImageHandle was created with a valid > EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. > This follows UEFI Spec. > > But if the caller

[edk2-devel] [edk2-test][Patch] uefi-sct/SctPkg: Add MediaPresentSupported check

2019-09-24 Thread xianhui liu
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2061 check MediaPresent while MediaPresentSupported is TRUE sync change from EFI to IHV SimpleNetworkBBTestFunction Cc: Heinrich Schuchardt Cc: Supreeth Venkatesh Cc: Eric Jin Signed-off-by: xianhui liu ---

Re: [edk2-devel] BaseTools --hash malfunction after migrate from stable201905 to stable201908

2019-09-24 Thread Steven Shi
Hi Derek, I took a look at this issue, and add back the -hash functionality in this branch: https://github.com/shijunjing/edk2/tree/hashcache_v1. The attachment is the patch based on latest edk2. The current -hash fix performance is not as good as the edk2-stable201905, because the