Reviewed-by: Ray Ni
-Original Message-
From: Jiang, Guomin
Sent: Monday, February 21, 2022 2:44 PM
To: devel@edk2.groups.io
Cc: Dong, Guo ; Ni, Ray ; Ma, Maurice
; You, Benjamin
Subject: [PATCH v3 1/1] UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input
parameter
REF:
Grub runs later. Then what does “conflict” mean?
From: Sean Rhodes
Sent: Monday, February 21, 2022 3:48 PM
To: Ni, Ray
Cc: devel@edk2.groups.io; Dong, Guo ; Ma, Maurice
; You, Benjamin
Subject: Re: [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable
We would prefer to keep PCD, as Esc
+ gUefiPayloadPkgTokenSpaceGuid.PcdBootSplashImage
Is this needed?
-Original Message-
From: devel@edk2.groups.io On Behalf Of Sean Rhodes
Sent: Monday, February 21, 2022 3:55 PM
To: devel@edk2.groups.io
Cc: Dong, Guo ; Rhodes, Sean ; Ni,
Ray ; Ma, Maurice ; You, Benjamin
Subject:
Thanks Ray!
@S, Ashraf Ali I think we need to return 64bit pointer in 64bit build, please
help to verify and confirm.
Thanks,
Chasel
> -Original Message-
> From: Ni, Ray
> Sent: Monday, February 14, 2022 4:27 PM
> To: devel@edk2.groups.io; S, Ashraf Ali
> Cc: Chiu, Chasel ;
Thanks for good catch, Ray!
@Desimone, Nathaniel L and @Ma, Maurice, please also share your comments for
this change.
I think we could directly change CoreStack size and implementation to support
64bits build because both FspGlobalData and SwapStack() are FSP
private/internal usage.
@S,
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
Correct the logic to handle the case that XServer not present to avoid
Segmentation fault
Guomin Jiang (2):
MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
WindowOpen will fail in some case. for example, without XServer.
Shouldn't set ModeInfo in this case to avoid the caller use it
incorrectly
Cc: Andrew Fish
Cc: Ray Ni
Signed-off-by: Guomin Jiang
---
EmulatorPkg/EmuGopDxe/GopScreen.c |
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
SetMode will fail in some case. for example, without XServer.
Should handle these case when SetMode fail.
If we don't handle it, it will Segmentation fault.
Cc: Jian J Wang
Cc: Liming Gao
Cc: Zhichao Gao
Cc: Ray Ni
Signed-off-by:
Even with MMU turned off, instruction cache can speculate
and fetch instructions. This can cause a crash if region
being executed has been modified recently. With this patch,
we ensure that instruction cache is invalidated right after
MMU has been enabled and any potentially stale instruction
BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Groups.io Inc//Groups.io Calendar//EN
METHOD:PUBLISH
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-PUBLISHED-TTL:PT1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
LAST-MODIFIED:20201011T015911Z
When building edk2 202111 with clang 14 I get the following errors:
edk2/MdeModulePkg/Include/Guid/ExtendedFirmwarePerformance.h:78:47: error:
field Guid within 'FPDT_GUID_EVENT_RECORD' is less aligned than 'EFI_GUID' (aka
'GUID') and is usually due to 'FPDT_GUID_EVENT_RECORD' being packed,
Patch merged.
PR: https://github.com/tianocore/edk2/pull/2536
Commit:
https://github.com/tianocore/edk2/pull/2536/commits/18feb439545443e8a3488b82415023601d116fe4
W dniu 21-Feb-22 o 15:57, Maciej Rabeda pisze:
Hi Heng,
Thanks for the patch.
Reviewed-by: Maciej Rabeda
W dniu 26-Jan-22 o
Greetings!
We implemented a driver that runs an EFI application on the system using the
LoadImage and StartImage functions present in the EFI_BOOT_SERVICES (gBS)
structure.
The source code of the main function that performs the load and start of the
EFI application is presented below:
/*
* EFI
Greetings!
We implemented a driver that runs an EFI application on the system using the
LoadImage and StartImage functions present in the EFI_BOOT_SERVICES (gBS)
structure.
The source code of the main function that performs the load and start of the
EFI application is presented below:
>
>
Greetings!
We implemented a driver that runs an EFI application on the system using the
LoadImage and StartImage functions present in the EFI_BOOT_SERVICES (gBS)
structure.
The source code of the main function that performs the load and start of the
EFI application is presented below:
/*
*
Hi Liming,
The said PCD is applicable for the SNP. SNP is supported on x86 64-bit
only, and most of the development is focused around Qemu/OVMF. In other
words, the Bhyve, Xen, and CloudHV do not support the SNP yet. We can
revisit it when those HV starts supporting the SNP.
thanks
Brijesh
Hi all,
Please check the Xhci log below. There's a low probability that the Xhci module
will assert during a machine startup.
[20220210_16:41:22:796]UsbHcGetHostAddrForPciAddr-forloop: Block->Buf =
0xF8B4C000, Block->BufLen = 0x1
[20220210_16:41:22:796]UsbHcGetHostAddrForPciAddr:
This is the first of cleanup for SEV MemEncryptLib. The library uses
the CPUID followed by the MSR read to determine whether SEV is enabled.
Now that we have a workarea concept, the logic can be simplified to
store the msr status in workarea and use that to build PCDs and then
later simply use
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3582
In order to probe the SEV feature the BaseMemEncryptLib and Reset vector
reads the SEV_STATUS MSR. Cache the value on the first read in the
workarea. In the next patches the value saved in the workarea will
be used by the BaseMemEncryptLib.
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3582
Improve the MemEncryptSev{Es,Snp}IsEnabled() to use the SEV_STATUS MSR
value saved in the workarea. Since workarea is valid until the PEI phase,
so, for the Dxe phase use the PcdConfidentialComputingGuestAttr to
determine which SEV
Hi Heng,
Thanks for the patch.
Reviewed-by: Maciej Rabeda
W dniu 26-Jan-22 o 06:12, Heng Luo pisze:
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3813
The size of buffer should be 3 CHAR16 for Null-terminated Unicode string.
The first char is the AKM/Cipher Suite number, the second
21 matches
Mail list logo