Re: [edk2-devel] Adding AArch64 support to the mu_nasm package (nasm_ext_dep.yaml)

2024-06-24 Thread Joey Vagedes via groups.io
Hi Rebecca, Switching the external dependency to the below should resolve your issue: "source": "https://pkgs.dev.azure.com/projectmu/mu/_packaging/Basetools-Binary/nuget/v3/index.json; "version": "20015.5.0" Thanks, Joey -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages

Re: [edk2-devel] [PATCH edk2-platforms 2/5] Platform,Silicon: drop redundant uses of PcdArmArchTimerFreqInHz

2024-06-20 Thread Nhi Pham via groups.io
Thanks for the cleanup. For Ampere Altra, Reviewed-by: Nhi Pham -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#119663): https://edk2.groups.io/g/devel/message/119663 Mute This Topic: https://groups.io/mt/106780877/21656 Group Owner:

[edk2-devel] [Question] What is the propose of BME DMA mitigation

2024-06-19 Thread memristor2 via groups.io
Hello everyone, I was scrolling through the UEFI HII and encountered an option which i failed to find any proper explanation about it. Could you please explain point of mitigating DMA access for PCI.Thanks --- Forwarded Message --- From: memristor2 Date: On Tuesday, June 18th, 2024 at

Re: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table

2024-06-18 Thread Chang, Abner via groups.io
.io> mailto:devel@edk2.groups.io>> 代表 Chang, Abner via groups.io 发送时间: 2024年6月18日 10:50 收件人: Chesley, Brit mailto:brit.ches...@amd.com>>; devel@edk2.groups.io<mailto:devel@edk2.groups.io> 主题: Re: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table Hi H

Re: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table

2024-06-17 Thread Chang, Abner via groups.io
? Thanks Liming 发件人: devel@edk2.groups.io<mailto:devel@edk2.groups.io> mailto:devel@edk2.groups.io>> 代表 Chang, Abner via groups.io 发送时间: 2024年6月18日 10:50 收件人: Chesley, Brit mailto:brit.ches...@amd.com>>; devel@edk2.groups.io<mailto:devel@edk2.groups.io> 主题: Re: [e

回复: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table

2024-06-17 Thread gaoliming via groups.io
Abner: Is PR for this change? Thanks Liming 发件人: devel@edk2.groups.io 代表 Chang, Abner via groups.io 发送时间: 2024年6月18日 10:50 收件人: Chesley, Brit ; devel@edk2.groups.io 主题: Re: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table Hi Hao, What is your comment

Re: [edk2-devel] [PATCH v2 1/1] MdeModulePkg: UsbBusDxe: Rebuild Descriptor Table

2024-06-17 Thread Chang, Abner via groups.io
Hi Hao, What is your comment on the response from Brit? Hoping that I didn't miss the latest conversation of this thread. Thanks Abner -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#119598):

回复: [edk2-devel] [PATCH v1 1/2] MdeModulePkg/Core/Pei: Install MigrateTempRamPpi

2024-06-14 Thread gaoliming via groups.io
Zhihao: I have no other comment for the change in MdeModulePkg. Please create pull request for it. Thanks Liming > -邮件原件- > 发件人: Li, Zhihao > 发送时间: 2024年6月11日 15:36 > 收件人: gaoliming ; devel@edk2.groups.io > 抄送: Chiu, Chasel ; Desimone, Nathaniel L > ; Duggapu, Chinni B > ; Chen, Gang

回复: [edk2-devel] [PATCH v1 1/1] MdeModulePkg: Avoid efi memory allocation for SP type

2024-06-14 Thread gaoliming via groups.io
Can you create pull request for this change? I will add my review for it. > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Dhaval Sharma > 发送时间: 2024年6月11日 12:09 > 收件人: devel@edk2.groups.io > 抄送: Liming Gao > 主题: [edk2-devel] [PATCH v1 1/1] MdeModulePkg: Avoid efi memory allocation > for SP

Re: [edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update X64/AArch64 Gop UEFI Driver

2024-06-13 Thread Tommy Huang via groups.io
day, May 31, 2024 8:20 PM > >> To: Tommy Huang ; > devel@edk2.groups.io; > >> quic_llind...@quicinc.com > >> Cc: a...@kernel.org; nathaniel.l.desim...@intel.com; > >> michael.d.kin...@intel.com; Ryan Chen ; > >> BMC-SW > >> Subject: Re: [edk2-d

Re: [edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update X64/AArch64 Gop UEFI Driver

2024-06-12 Thread Tommy Huang via groups.io
uicinc.com > Cc: a...@kernel.org; nathaniel.l.desim...@intel.com; > michael.d.kin...@intel.com; Ryan Chen ; > BMC-SW > Subject: Re: [edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update > X64/AArch64 Gop UEFI Driver > > On 5/30/2024 8:33 AM, Tommy Huang wrote>> On 5/29/2024 8:

Re: [edk2-devel] mDeviceSecurityProtocol with SPDM

2024-06-11 Thread Andrew Fish via groups.io
> On Jun 10, 2024, at 10:42 PM, Alistair Francis wrote: > > Hello, > > I'm trying to use SPDM over DOE as a EDKII_DEVICE_SECURITY_PROTOCOL > implementation. > > I'm using the DeviceSecurity fork from staging, with my own DOE > implementation [5]. > > First I load `DeviceSecurityPolicyStub`

Re: [edk2-devel] [PATCH ovmf v4 5/5] OvmfPkf: Enable AMD SEV-ES DebugVirtualization

2024-06-11 Thread Alexey Kardashevskiy via groups.io
Thanks Tom! Now, I've pushed it again to my github, https://github.com/tianocore/edk2/pull/5594 re-ran the tasks but "Review required" is still there so I assume re-posting patches won't help getting them in as I need more reviews, right? On 6/6/24 04:54, Tom Lendacky wrote: On 6/4/24

Re: [edk2-devel] INF defines section "SPEC" option - Build failure

2024-06-10 Thread ashwin.veeraiah via groups.io
I have verified that the EDK2 basetools does not process `SPEC` under the `DEFINES` section as mentioned in the documentation and it does not work. I went through the commit history of basetools around this, it looks like this has not worked pretty much ever, (I went only as far as GitHub would

Re: [edk2-devel] [PATCH] UefiPayloadPkg: Fix LoadDxeCore for payload size > 16MB

2024-06-10 Thread Lean Sheng Tan via groups.io
> Phone: *+49 234 68 94 188 <+492346894188>* > > Mobile: *+49 176 76 113842 <+4917676113842>* > > > > Registered office: Bochum > > Commercial register: Amtsgericht Bochum, HRB 17519 > > Management: Sebastian German, Eray Bazaar > > > Data pr

Re: [edk2-devel] [PATCH edk2-platforms 0/6] JadePkg and common Ampere code fixes

2024-06-06 Thread Nhi Pham via groups.io
For this series, Reviewed-by: Nhi Pham Thanks, Nhi On 6/6/2024 10:04 AM, Rebecca Cran wrote: These are a set of bug fixes I made to the Mt Jade and common Ampere code while working on updating and improving ADLINK's edk2_aadp project. Rebecca Cran (6): Silicon/Ampere: Fix capitalization

Re: [edk2-devel] [PATCH] UefiPayloadPkg: Fix LoadDxeCore for payload size > 16MB

2024-06-06 Thread Witt, Sebastian via groups.io
ile: +49 176 76 113842 Registered office: Bochum Commercial register: Amtsgericht Bochum, HRB 17519 Management: Sebastian German, Eray Bazaar Data protection information according to Art. 13 GDPR<https://9elements.com/privacy> On Mon, 3 Jun 2024 at 23:20, Witt, Sebastian via groups.i

Re: [edk2-devel] GitHub PR Code Review process now active

2024-06-05 Thread Rebecca Cran via groups.io
On 6/5/2024 4:21 PM, Michael D Kinney via groups.io wrote: * Some PRs have been merged using the "Rebase and Merge" button in the PR after all required reviews completed and all CI checks pass. Instead, the "push" label should continue to be used. There does not

Re: [edk2-devel] [PATCH ovmf v4 5/5] OvmfPkf: Enable AMD SEV-ES DebugVirtualization

2024-06-05 Thread Lendacky, Thomas via groups.io
On 6/4/24 21:09, Alexey Kardashevskiy wrote: Write the feature bit into PcdConfidentialComputingGuestAttr and enable DebugVirtualization in PEI, SEC, DXE. Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffmann Cc: Jiewen Yao Cc: Michael Roth Cc: Min Xu Cc: Tom Lendacky Signed-off-by:

Re: [edk2-devel] [PATCH ovmf v4 4/5] UefiCpuPkg: Add AMD SEV-ES features support

2024-06-05 Thread Lendacky, Thomas via groups.io
On 6/4/24 21:09, Alexey Kardashevskiy wrote: CONFIDENTIAL_COMPUTING_GUEST_ATTR is not a simple SEV level anymore and includes a feature mask since the previous commit. Fix AmdMemEncryptionAttrCheck to check the level and feature correctly and add DebugVirtualization support. Since the actual

Re: [edk2-devel] [PATCH ovmf v4 3/5] OvmfPkg: Add AMD SEV-ES DebugVirtualization feature support

2024-06-05 Thread Lendacky, Thomas via groups.io
On 6/4/24 21:09, Alexey Kardashevskiy wrote: The SEV-ES DebugVirtualization feature enables type B swapping of debug registers on #VMEXIT and makes #DB and DR7 intercepts unnecessary and unwanted. When DebugVirtualization is enabled, this stops booting if #VC for #DB or DB7 read/write occurs as

Re: [edk2-devel] [PATCH ovmf v4 1/5] MdePkg/Register/Amd: Define all bits from MSR_SEV_STATUS_REGISTER

2024-06-05 Thread Lendacky, Thomas via groups.io
On 6/4/24 21:09, Alexey Kardashevskiy wrote: For now we need DebugSwap but others are likely to be needed too. Cc: Tom Lendacky Cc: Liming Gao Cc: Michael D Kinney Cc: Zhiguang Liu Signed-off-by: Alexey Kardashevskiy Reviewed-by: Tom Lendacky --- Changes: v4: * added more from

回复: [edk2-devel] [PATCH] MdePkg: Remove non-ASCII characters from header file (BZ# 4775)

2024-06-05 Thread gaoliming via groups.io
merge it after the stable tag. Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io <mailto:devel@edk2.groups.io> mailto:devel@edk2.groups.io> > 代表 Chang, Abner via > groups.io > 发送时间: 2024年5月16日 8:50 > 收件人: Hsueh, Hong-Chih (Neo) mailto:Hong-Chih. hs...@amd.c

Re: [edk2-devel] [edk2-platforms][PATCH 1/1] Ampere/JadePkg: Add secure boot default keys initialization

2024-06-04 Thread Nhi Pham via groups.io
Could you help push my patch to Tianocore/edk2-platforms once approved, while I don't have write permission? Thanks, Nhi On 6/5/2024 11:10 AM, Rebecca Cran wrote: Reviewed-by: Rebecca Cran -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply

Re: [edk2-devel] [edk2-platforms][PATCH 1/1] Ampere/JadePkg: Add secure boot default keys initialization

2024-06-04 Thread Rebecca Cran via groups.io
Reviewed-by: Rebecca Cran -- Rebecca Cran On 6/4/2024 6:57 PM, Nhi Pham wrote: This allows to initialize secure boot with the default factory keys embedded in firmware flash image. For example, to incorporate PK, KEK, and DB default keys, specify the corresponding key files in the Jade.dsc

[edk2-devel] [PATCH ovmf v4 5/5] OvmfPkf: Enable AMD SEV-ES DebugVirtualization

2024-06-04 Thread Alexey Kardashevskiy via groups.io
Write the feature bit into PcdConfidentialComputingGuestAttr and enable DebugVirtualization in PEI, SEC, DXE. Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffmann Cc: Jiewen Yao Cc: Michael Roth Cc: Min Xu Cc: Tom Lendacky Signed-off-by: Alexey Kardashevskiy --- Changes: v4: *

[edk2-devel] [PATCH ovmf v4 4/5] UefiCpuPkg: Add AMD SEV-ES features support

2024-06-04 Thread Alexey Kardashevskiy via groups.io
CONFIDENTIAL_COMPUTING_GUEST_ATTR is not a simple SEV level anymore and includes a feature mask since the previous commit. Fix AmdMemEncryptionAttrCheck to check the level and feature correctly and add DebugVirtualization support. Since the actual feature flag is not set yet, this should cause

[edk2-devel] [PATCH ovmf v4 3/5] OvmfPkg: Add AMD SEV-ES DebugVirtualization feature support

2024-06-04 Thread Alexey Kardashevskiy via groups.io
The SEV-ES DebugVirtualization feature enables type B swapping of debug registers on #VMEXIT and makes #DB and DR7 intercepts unnecessary and unwanted. When DebugVirtualization is enabled, this stops booting if #VC for #DB or DB7 read/write occurs as this signals unwanted interaction from the HV.

[edk2-devel] [PATCH ovmf v4 2/5] MdePkg: Add AMD SEV features to PcdConfidentialComputingGuestAttr

2024-06-04 Thread Alexey Kardashevskiy via groups.io
PcdConfidentialComputingGuestAttr so far only contained an SEV mode bit but there are more other features which do not translate to levels such as DebugVirtualization or SecureTsc. Add the feature mask and the DebugVirtualization feature bit to the PCD. Cc: Liming Gao Cc: Michael D Kinney Cc:

[edk2-devel] [PATCH ovmf v4 1/5] MdePkg/Register/Amd: Define all bits from MSR_SEV_STATUS_REGISTER

2024-06-04 Thread Alexey Kardashevskiy via groups.io
For now we need DebugSwap but others are likely to be needed too. Cc: Tom Lendacky Cc: Liming Gao Cc: Michael D Kinney Cc: Zhiguang Liu Signed-off-by: Alexey Kardashevskiy --- Changes: v4: * added more from April/2024 APM --- MdePkg/Include/Register/Amd/Fam17Msr.h | 95 +++-

[edk2-devel] [PATCH ovmf v4 0/5] Enable AMD SEV-ES DebugVirtualization

2024-06-04 Thread Alexey Kardashevskiy via groups.io
This is to prevent #DB interception on SEV-ES VM with enabled DebugVirtualization feature. The previous conversation is here: https://edk2.groups.io/g/devel/topic/patch_ovmf_v3_0_5_enable/105863808 This is based on sha1 7772e339bdbb Chao Li "ArmVirtPkg: Enable the non-hardcode version

[edk2-devel] [edk2-platforms][PATCH 1/1] Ampere/JadePkg: Add secure boot default keys initialization

2024-06-04 Thread Nhi Pham via groups.io
This allows to initialize secure boot with the default factory keys embedded in firmware flash image. For example, to incorporate PK, KEK, and DB default keys, specify the corresponding key files in the Jade.dsc as follows: DEFINE DEFAULT_KEYS= TRUE DEFINE PK_DEFAULT_FILE =

[edk2-devel] Steps in using RamDiskDxe?

2024-06-04 Thread Lonnie Cumberland via groups.io
Hello All, I am new to working with EDK2 and have just been able to compile it up on my Ubuntu 22.04 (x64) system. Some of my initial interest is in that I am wanting to learn all about using EDK2 as well as am seeming a UEFI Ramdisk in which I was able to build up the edk2 RamDiskDxe.efi

Re: [edk2-devel] [PATCH] MdePkg: Remove non-ASCII characters from header file (BZ# 4775)

2024-06-04 Thread Hsueh, Hong-Chih (Neo) via groups.io
caution when opening attachments, clicking links, or responding. Abner: This change is good to me. Reviewed-by: Liming Gao But, this is not critical issue. So, I suggest to merge it after the stable tag. Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Chang, Abn

Re: [edk2-devel] [PATCH] CryptoPkg: Fix BaseCryptLib CrtWrapper strcpy

2024-06-04 Thread Witt, Sebastian via groups.io
h and add BZ link to > commit message? > > Edk2 has switched to github pr code review process, you can raise PR in > https://github.com/tianocore/edk2/pulls > directly. > > Regards, > Yi > > -Original Message- > From: devel@edk2.groups.io On Behalf Of Wit

回复: Re: [edk2-devel] Is DEBUG output function safe for MP case?

2024-06-03 Thread Jeff Fan via groups.io
...@byosoft.com.cn 发件人: Yoshinoya 发送时间: 2024-06-03 16:24 收件人: devel; fanjianfeng 主题: Re:回复: [edk2-devel] Is DEBUG output function safe for MP case? Hi, Jeff: If AP code use base-typed debuglib, then it's mp safe? Thanks At 2024-05-31 14:33:40, "Jeff Fan via groups.io" wrote: AP cannot ru

[edk2-devel] [PATCH] UefiPayloadPkg: Fix LoadDxeCore for payload size > 16MB

2024-06-03 Thread Witt, Sebastian via groups.io
Fix calculation of first section in FileFindSection for FILE2 headers in UefiPayloadEntry module. Signed-of-by: Sebastian Witt --- UefiPayloadPkg/UefiPayloadEntry/LoadDxeCore.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/UefiPayloadPkg/UefiPayloadEntry/LoadDxeCore.c

[edk2-devel] [PATCH] CryptoPkg: Fix BaseCryptLib CrtWrapper strcpy

2024-06-03 Thread Witt, Sebastian via groups.io
strcpy fails when strSource is closer than 4096 bytes after strDest. This is caused by an overlap check in AsciiStrCpyS: // // 5. Copying shall not take place between objects that overlap. // SAFE_STRING_CONSTRAINT_CHECK (InternalSafeStringNoAsciiStrOverlap (Destination, DestMax, (CHAR8

Re: [edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update X64/AArch64 Gop UEFI Driver

2024-05-31 Thread Nhi Pham via groups.io
On 5/30/2024 8:33 AM, Tommy Huang wrote>> On 5/29/2024 8:18 PM, Leif Lindholm via groups.io wrote: +Nhi, Could you check/verify these work fine on your systems? Yes, I can. Thanks Leif for reaching out to me. Hi Tommy Huang - Could you please create a Pull Request (PR) or share a branc

Re: [edk2-devel] Is DEBUG output function safe for MP case?

2024-05-31 Thread Andrew Fish via groups.io
for serial to detect modems. A factory updated Windows on a PC that controlled a CnC machine and the modem auto detect AT commands got sent to the CnC machine, and this told the CnC machine to start drilling holes in the CnC machine. > On May 31, 2024, at 4:59 AM, Andrew Fish via groups

Re: [edk2-devel] Is DEBUG output function safe for MP case?

2024-05-31 Thread Andrew Fish via groups.io
ime. So that should imply they deal with virtual address mapping and locks. Thanks, Andrew Fish > On May 31, 2024, at 1:33 AM, Jeff Fan via groups.io > wrote: > > AP cannot run any UEFI Service. Please make sure AP code use base-typed > DebugLib instance (Such as BaseDebugLibS

回复: [edk2-devel] Is DEBUG output function safe for MP case?

2024-05-31 Thread Jeff Fan via groups.io
AP cannot run any UEFI Service. Please make sure AP code use base-typed DebugLib instance (Such as BaseDebugLibSerialport.inf from MdePkg) fanjianf...@byosoft.com.cn 发件人: Yoshinoya 发送时间: 2024-05-31 14:22 收件人: devel@edk2.groups.io 主题: [edk2-devel] Is DEBUG output function safe for MP case?

Re: [edk2-devel] [PATCH 2/2] AmdSev: Halt on failed blob allocation

2024-05-30 Thread Lendacky, Thomas via groups.io
On 5/6/24 15:27, Tobin Feldman-Fitzthum wrote: A malicious host may be able to undermine the fw_cfg interface such that loading a blob fails. In this case rather than continuing to the next boot option, the blob verifier should halt. For non-confidential guests, the error should be non-fatal.

Re: [edk2-devel] [PATCH 1/2] AmdSev: Rework Blob Verifier

2024-05-30 Thread Lendacky, Thomas via groups.io
On 5/6/24 15:27, Tobin Feldman-Fitzthum wrote: The Blob Verifier checks boot artifacts against a hash table injected by the hypervisor and measured by hardware. Update the Blob Verifier to enter a dead loop if the artifacts do not match. There are some changes to messages from ERROR to WARN

回复: [edk2-devel] [PATCH v1 1/2] MdeModulePkg/Core/Pei: Install MigrateTempRamPpi

2024-05-29 Thread gaoliming via groups.io
Zhihao: If Fsp-T/M is not installed, are they still used in PEI boot? If they are used, I agree they should be measured. Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Li, Zhihao > 发送时间: 2024年5月29日 11:36 > 收件人: gaoliming ; devel@edk2.groups.io > 抄送: Chiu, Chasel ; Desimone,

回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-29 Thread gaoliming via groups.io
NetworkPkg: CVE-2023-45236 and > CVE-2023-45237 > > On Thu, May 23, 2024 at 10:44:52PM GMT, Doug Flick via groups.io wrote: > > > > > REF:https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores- edk-ii- > ipv6-network-stack.html > > > > This p

回复: [edk2-devel] [PATCH] MdeModulePkg: Update GCD attribute conversion to support SP attribute

2024-05-29 Thread gaoliming via groups.io
Lin: I see there is some discussion. Have you made the agreement with this change? Thanks Liming 发件人: devel@edk2.groups.io 代表 Du Lin 发送时间: 2024年5月29日 21:05 收件人: devel@edk2.groups.io 抄送: Liming Gao ; Ni, Ray ; Lin, Du 主题: Re: [edk2-devel] [PATCH] MdeModulePkg: Update GCD attribute

回复: [edk2-devel] [Patch V2 17/18] MdeModulePkg:Remove MpService2Ppi field in SMM_S3_RESUME_STATE

2024-05-29 Thread gaoliming via groups.io
Reviewed-by: Liming Gao > -邮件原件- > 发件人: Tan, Dun > 发送时间: 2024年5月28日 17:44 > 收件人: gaoliming ; devel@edk2.groups.io > 抄送: Ni, Ray ; Wang, Jian J > 主题: RE: [edk2-devel] [Patch V2 17/18] MdeModulePkg:Remove MpService2Ppi > field in SMM_S3_RESUME_STATE > > Liming, > > Sure, I think we can

Re: [edk2-devel] libspdm Breaking Builds

2024-05-29 Thread Pete Batard via groups.io
From: Pete Batard Sent: Wednesday, May 29, 2024 11:18 AM To: devel@edk2.groups.io; Yao, Jiewen ; Kinney, Michael D ; mikub...@linux.microsoft.com Subject: Re: [edk2-devel] libspdm Breaking Builds Hello all, On 2024.05.24 03:13, Yao, Jiewen via groups.io wrote: Please let us know if

Re: [edk2-devel] libspdm Breaking Builds

2024-05-29 Thread Pete Batard via groups.io
Hello all, On 2024.05.24 03:13, Yao, Jiewen via groups.io wrote: Please let us know if the preference for libspdm submodule. (Below options) 1) Keep current libspdm official 3.3.0 release, and update to next release at the beginning of July. 2) Update libspdm immediately with the new cmocka

Re: [edk2-devel] GitHub PR Code Review process now active

2024-05-29 Thread Chang, Abner via groups.io
ches, and 'push' label" on edk2-platforms, but no > further discussions then. > > Thanks > Abner > > > -Original Message- > > From: devel@edk2.groups.io On Behalf Of Michael D > > Kinney via groups.io > > Sent: Wednesday, May 29, 2024 2:54 AM > > T

Re: [edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update X64/AArch64 Gop UEFI Driver

2024-05-29 Thread Nhi Pham via groups.io
On 5/29/2024 8:18 PM, Leif Lindholm via groups.io wrote: > +Nhi, > > Could you check/verify these work fine on your systems? Yes, I can. Thanks Leif for reaching out to me. Hi Tommy Huang - Could you please create a Pull Request (PR) or share a branch so I can easily apply and test th

Re: [edk2-devel] GitHub PR Code Review process now active

2024-05-29 Thread Chang, Abner via groups.io
-platforms, but no further discussions then. Thanks Abner > -Original Message- > From: devel@edk2.groups.io On Behalf Of Michael D > Kinney via groups.io > Sent: Wednesday, May 29, 2024 2:54 AM > To: devel@edk2.groups.io > Cc: Kinney, Michael D > Subject: [edk2-devel] Gi

Re: [edk2-devel] [edk2-platforms 2/3] AmdPlatformPkg: Implements SmmCorePlatformHookLib library

2024-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - AMD Internal Distribution Only] Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Tuesday, May 28, 2024 10:08 PM > To: devel@edk2.groups.io > Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang, > Abner ; Grimes, Paul > Subject:

Re: [edk2-devel] [edk2-platforms 3/3] AmdPlatformPkg: Adds SPI smm core platform hook

2024-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - AMD Internal Distribution Only] Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Tuesday, May 28, 2024 10:08 PM > To: devel@edk2.groups.io > Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang, > Abner ; Grimes, Paul > Subject:

Re: [edk2-devel] [edk2-platforms 1/3] AmdPlatformPkg: Removes unused gBoardBdsBootFromDevicePathProtocolGuid

2024-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - AMD Internal Distribution Only] Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Tuesday, May 28, 2024 10:08 PM > To: devel@edk2.groups.io > Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang, > Abner ; Grimes, Paul > Subject:

[edk2-devel] [edk2-platforms 2/3] AmdPlatformPkg: Implements SmmCorePlatformHookLib library

2024-05-28 Thread Abdul Lateef Attar via groups.io
Implements SmmCorePlatformHookLib library for AMD platform. Cc: Abner Chang Cc: Paul Grimes Signed-off-by: Abdul Lateef Attar --- .../AMD/AmdPlatformPkg/AmdPlatformPkg.dec | 5 + .../AMD/AmdPlatformPkg/AmdPlatformPkg.dsc | 6 + .../Library/AmdSmmCorePlatformHookLib.h | 68

[edk2-devel] [edk2-platforms 3/3] AmdPlatformPkg: Adds SPI smm core platform hook

2024-05-28 Thread Abdul Lateef Attar via groups.io
Register a smm core platform hook handler for SPI device, using AMD SmmCorePlatformHookLib library. This platform hook saves the SPI host controller state. Cc: Abner Chang Cc: Paul Grimes Signed-off-by: Abdul Lateef Attar --- .../AMD/AmdPlatformPkg/AmdPlatformPkg.dec | 3 +

[edk2-devel] [edk2-platforms 1/3] AmdPlatformPkg: Removes unused gBoardBdsBootFromDevicePathProtocolGuid

2024-05-28 Thread Abdul Lateef Attar via groups.io
Removes unused gBoardBdsBootFromDevicePathProtocolGuid protocol, and its corresponding code changes. Adds missing Pcd/SmbiosPcd.h file. Cc: Abner Chang Cc: Paul Grimes Signed-off-by: Abdul Lateef Attar --- .../AmdPlatformPkg/Include/Pcd/SmbiosPcd.h| 58

[edk2-devel] [edk2-platforms 0/3] AmdPlatformPkg: SmbiosDxe and SPI supporting libraries

2024-05-28 Thread Abdul Lateef Attar via groups.io
PR: https://github.com/tianocore/edk2-platforms/pull/148 Fix the build failure for SmbiosDxe driver by removing unused protocol. Adds PCD defines for smbios. Adds SPI supporting libraries. Cc: Abner Chang Cc: Paul Grimes Abdul Lateef Attar (3): AmdPlatformPkg: Removes unused

[edk2-devel] 回复: [PATCH v1 1/2] MdeModulePkg/Core/Pei: Install MigrateTempRamPpi

2024-05-28 Thread gaoliming via groups.io
Zhihao: Could you explain the situation that FSP-T/M is not migrated by PeiCore? Thanks Liming > -邮件原件- > 发件人: Zhihao Li > 发送时间: 2024年4月29日 11:20 > 收件人: devel@edk2.groups.io > 抄送: Chasel Chiu ; Nate DeSimone > ; Duggapu Chinni B > ; Chen Gang C ; Liming > Gao > 主题: [PATCH v1 1/2]

回复: [edk2-devel] [Patch V2 17/18] MdeModulePkg:Remove MpService2Ppi field in SMM_S3_RESUME_STATE

2024-05-28 Thread gaoliming via groups.io
Dun: If you confirm that there is no impact on the existing module, you can remove it. Thanks Liming > -邮件原件- > 发件人: Tan, Dun > 发送时间: 2024年5月28日 17:34 > 收件人: gaoliming ; devel@edk2.groups.io > 抄送: Ni, Ray ; Wang, Jian J > 主题: RE: [edk2-devel] [Patch V2 17/18] MdeModulePkg:Remove

回复: [edk2-devel] [Patch V2 17/18] MdeModulePkg:Remove MpService2Ppi field in SMM_S3_RESUME_STATE

2024-05-28 Thread gaoliming via groups.io
Dun: To be compatible, I suggest to keep the same layout of SMM_S3_RESUME_STATE. MpService2Ppi field can be kept, but it is not used any more. Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 duntan > 发送时间: 2024年5月28日 14:35 > 收件人: devel@edk2.groups.io; Tan, Dun ; Liming Gao > >

回复: [edk2-devel] [Patch V2 01/18] MdeModulePkg: Add gEdkiiS3MtrrSettingGuid

2024-05-28 Thread gaoliming via groups.io
Reviewed-by: Liming Gao > -邮件原件- > 发件人: devel@edk2.groups.io 代表 duntan > 发送时间: 2024年5月28日 14:37 > 收件人: devel@edk2.groups.io; Tan, Dun ; Liming Gao > > 抄送: Ni, Ray ; Wu, Jiaxin > 主题: Re: [edk2-devel] [Patch V2 01/18] MdeModulePkg: Add > gEdkiiS3MtrrSettingGuid > > Hi Liming, > >

Re: [edk2-devel] [edk2-platform 0/2] AmdPlatformPkg: Fix the build failure

2024-05-27 Thread Chang, Abner via groups.io
[AMD Official Use Only - AMD Internal Distribution Only] This patch set was reviewed on GitHub PR. Hi Abdul, please go ahead to push this patch. Thanks! Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Tuesday, May 28, 2024 11:28 AM > To:

[edk2-devel] [edk2-platform 2/2] AmdPlatformPkg: Fix windows VC compilation warning

2024-05-27 Thread Abdul Lateef Attar via groups.io
Fix windows VC compilattion warning for AcpiCommon driver. Cc: Paul Grimes Cc: Abner Chang Signed-off-by: Abdul Lateef Attar --- .../AMD/AmdPlatformPkg/Universal/Acpi/AcpiCommon/PciSsdt.c| 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git

[edk2-devel] [edk2-platform 0/2] AmdPlatformPkg: Fix the build failure

2024-05-27 Thread Abdul Lateef Attar via groups.io
PR: https://github.com/tianocore/edk2-platforms/pull/146 Cc: Paul Grimes Cc: Abner Chang Abdul Lateef Attar (2): AmdPlatformPkg: Corrects file path of LogoDxe driver AmdPlatformPkg: Fix windows VC compilation warning .../Universal/Acpi/AcpiCommon/PciSsdt.c | 4 +-

[edk2-devel] [edk2-platform 1/2] AmdPlatformPkg: Corrects file path of LogoDxe driver

2024-05-27 Thread Abdul Lateef Attar via groups.io
Removes extra directory. Cc: Paul Grimes Cc: Abner Chang Signed-off-by: Abdul Lateef Attar --- .../LogoDxe/{LogoDxe => }/JpegLogo.idf| 0 .../LogoDxe/{LogoDxe => }/JpegLogoDxe.inf | 0 .../Universal/LogoDxe/{LogoDxe => }/Logo.bmp | Bin

[edk2-devel] [PATCH] ASpeed/ASpeedGopBinPkg: Update X64/AArch64 Gop UEFI Driver

2024-05-27 Thread Tommy Huang via groups.io
1.Update the X64/AArch64 UEFI GOP driver into v1.13.04. 2.Update the .inf version. 3.Fix display flick on ast2600. 4.Remove 800x600@56 from mode list. 5.Add check EDID header behavior. 6.Signed .efi files for secuity boot needing. Cc: Ard Biesheuvel Cc: Isaac Oram Cc: Nate DeSimone Cc: Leif

回复: [edk2-devel] Soft Feature Freeze starts now for edk2-stable202405

2024-05-27 Thread gaoliming via groups.io
phase. It plans to catch this stable tag. [Mike] This patch series uses ‘..’ in INF to access source files in another component. This is not legal. I am surprised this was not caught in code review. DEFINE OPENSSL_PATH= ../OpensslLib/openssl DEFINE BASE_CRYPT_PATH = ../Bas

回复: [edk2-devel] Soft Feature Freeze starts now for edk2-stable202405

2024-05-27 Thread gaoliming via groups.io
= ../OpensslLib/openssl DEFINE BASE_CRYPT_PATH = ../BaseCryptLib [Mike] I see a reference to some “platform integration” testing. Given that this patch series implements a number of crypto service APIs and is a large number of new lines of code, it would be good to know if all o

回复: [edk2-devel] [PATCH] OvmfPkg: Update VMM Hob list check to support new resource attributes

2024-05-27 Thread gaoliming via groups.io
Jiewen: If the patch is urgent to be merged, I will help add push label to merge it with current process. If the patch is not urgent, it can be merged after TianoCore Code Review is switched from email to GitHub Pull Requests on US Tuesday. Thanks Liming > -邮件原件- > 发件人:

回复: [edk2-devel] [PATCH] UefiCpuPkg/MpLib:Do not assume BSP is #0.

2024-05-25 Thread gaoliming via groups.io
Ray: This PR doesn’t pass CI. Please check. Thanks Liming 发件人: devel@edk2.groups.io 代表 Ni, Ray 发送时间: 2024年5月25日 9:35 收件人: Feng, Ning ; devel@edk2.groups.io; Ni, Ray ; Gao, Liming 主题: Re: [edk2-devel] [PATCH] UefiCpuPkg/MpLib:Do not assume BSP is #0. I created PR for merge:

回复: [edk2-devel] 回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread gaoliming via groups.io
Doug: What’s impact if no EFI_HASH2_PROTOCOL? Does network boot work or not? Thanks Liming 发件人: devel@edk2.groups.io 代表 Doug Flick via groups.io 发送时间: 2024年5月25日 0:51 收件人: gaoliming ; devel@edk2.groups.io 主题: Re: [edk2-devel] 回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236

Re: [edk2-devel] 回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread Doug Flick via groups.io
To be clear, it requires EFI_RNG_PROTOCOL and EFI_HASH2_PROTOCOL. Both should be mentioned in the release notes -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#119260): https://edk2.groups.io/g/devel/message/119260 Mute This Topic:

回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread gaoliming via groups.io
Hi, all Because this patch fixes two CVE, I decide to include them in this stable tag 202405. https://github.com/tianocore/edk2/pull/5582 has been merged. Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 gaoliming via > groups.io > 发送时间: 2024年5月24日 22:51 >

回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread gaoliming via groups.io
te: > > On Fri, 24 May 2024 at 11:12, gaoliming via groups.io > > wrote: > > > > > > Ard: > > > Here is Doug PR https://github.com/tianocore/edk2/pull/5582 that > includes 20 commits. You can check them. > > > > > > > This looks

回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread gaoliming via groups.io
a...@redhat.com; Michael D Kinney > ; Andrew Fish ; > quic_llind...@quicinc.com > 主题: Re: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and > CVE-2023-45237 > > On Fri, 24 May 2024 at 09:01, gaoliming via groups.io > wrote: > > > > Ard and Gerd:

回复: [edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-24 Thread gaoliming via groups.io
Ard and Gerd: Doug updated this patch set based on your suggestion. Could you give reviewed-by or acked-by for the changes in OvmfPkg and ArmVirtPkg if you have no other comments? Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Doug Flick via > groups.io > 发送时间: 2024

回复: [edk2-devel] [PATCH v3 16/20] MdePkg/BaseRngLib AARCH64: Remove overzealous ASSERT()

2024-05-24 Thread gaoliming via groups.io
Reviewed-by: Liming Gao > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Doug Flick via > groups.io > 发送时间: 2024年5月24日 13:45 > 收件人: devel@edk2.groups.io > 抄送: Michael D Kinney ; Liming Gao > ; Zhiguang Liu > 主题: [edk2-devel] [PATCH v3 16/20] MdePkg/BaseRngLib AARCH

[edk2-devel] [PATCH v3 17/20] ArmVirtPkg/ArmVirtQemu: Permit the use of dynamic PCDs in PEI

2024-05-23 Thread Doug Flick via groups.io
From: Ard Biesheuvel Currently, only TPM2 builds enable the PCD PEIM, which is a prerequisite for being able to use dynamic PCDs already at the PEI stage. This facility will be used for other reasons too so move those pieces out of code block that are conditional on TPM2_ENABLE Cc: Ard

[edk2-devel] [PATCH v3 18/20] ArmVirtPkg: Use dynamic PCD to set the SMCCC conduit

2024-05-23 Thread Doug Flick via groups.io
From: Ard Biesheuvel On ARM systems, whether SMC or HVC instructions need to be used to issue monitor calls is typically dependent on the exception level, but there are also cases where EL1 might use SMC instructions, so there is no hard and fast rule. For ArmVirtQemu, this does depend strictly

[edk2-devel] [PATCH v3 16/20] MdePkg/BaseRngLib AARCH64: Remove overzealous ASSERT()

2024-05-23 Thread Doug Flick via groups.io
From: Ard Biesheuvel BaseRngLib on AARCH64 will discover whether or not RNDR instructions are supported, by inspecting the ISAR0 identification register, and setting a global boolean accordingly. This boolean is used in subsequent execution to decide whether or not to issue the instruction. The

[edk2-devel] [PATCH v3 15/20] ArmVirtPkg: Move PcdMonitorConduitHvc

2024-05-23 Thread Doug Flick via groups.io
This moves the PcdMonitorConduitHvc from PcdsFeatureFlag.Common to PcdsFixedAtBuild.Common This is a follow on to the previous commit: ArmPkg: Allow SMC/HVC monitor conduit to be specified at runtime ArmVirtQemu may execute at EL2, in which case monitor calls are generally made using SMC

[edk2-devel] [PATCH v3 12/20] MdePkg: Add MockHash2 Protocol for testing

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This commit adds a new MockHash2 protocol to the MdePkg. This allows the unit tests to pick up the new protocol and use it for testing. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Signed-off-by: Doug Flick [MSFT] ---

[edk2-devel] [PATCH v3 14/20] ArmPkg: Allow SMC/HVC monitor conduit to be specified at runtime

2024-05-23 Thread Doug Flick via groups.io
From: Ard Biesheuvel ArmVirtQemu may execute at EL2, in which case monitor calls are generally made using SMC instructions instead of HVC instructions. Whether or not this is the case can only be decided at runtime, and so the associated PCD needs to be settable at runtime, if the platform

[edk2-devel] [PATCH v3 13/20] NetworkPkg: Update the PxeBcDhcp6GoogleTest due to underlying changes

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This patch updates the PxeBcDhcp6GoogleTest due to the changes in the underlying code. The changes are as follows: - Random now comes from the RngLib Protocol - The TCP ISN is now generated by the hash function Cc: Saloni Kasbekar Cc: Zachary Clark-williams Signed-off-by:

[edk2-devel] [PATCH v3 10/20] MdePkg: : Add MockUefiBootServicesTableLib

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This commit adds a mock library for UefiBootServicesTableLib. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Signed-off-by: Doug Flick [MSFT] --- MdePkg/Test/MdePkgHostTest.dsc | 1 +

[edk2-devel] [PATCH v3 09/20] NetworkPkg: TcpDxe: SECURITY PATCH CVE-2023-45236

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4541 REF: https://www.rfc-editor.org/rfc/rfc1948.txt REF: https://www.rfc-editor.org/rfc/rfc6528.txt REF: https://www.rfc-editor.org/rfc/rfc9293.txt Bug Overview: PixieFail Bug #8 CVE-2023-45236

[edk2-devel] [PATCH v3 11/20] MdePkg: : Adds Protocol for MockRng

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This patch adds a protocol for MockRng. This protocol is used to mock the Rng protocol for testing purposes. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Signed-off-by: Doug Flick [MSFT] --- MdePkg/Test/Mock/Include/GoogleTest/Protocol/MockRng.h | 48

[edk2-devel] [PATCH v3 08/20] NetworkPkg:: SECURITY PATCH CVE-2023-45237

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4542 Bug Overview: PixieFail Bug #9 CVE-2023-45237 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Use of a Weak PseudoRandom Number Generator Change

[edk2-devel] [PATCH v3 03/20] OvmfPkg:PlatformCI: Support virtio-rng-pci

2024-05-23 Thread Doug Flick via groups.io
This patch adds "virtio-rng-pci" to the PlatformBuildLib.py This adds Rng services to the guest VM Cc: Ard Biesheuvel Cc: Jiewen Yao Cc: Gerd Hoffmann Signed-off-by: Doug Flick [MSFT] --- OvmfPkg/PlatformCI/PlatformBuildLib.py | 2 ++ 1 file changed, 2 insertions(+) diff --git

[edk2-devel] [PATCH v3 07/20] SecurityPkg: RngDxe: Remove incorrect limitation on GetRng

2024-05-23 Thread Doug Flick via groups.io
Removed from gEfiRngAlgorithmRaw an incorrect assumption that Raw cannot return less than 256 bits. The DRNG Algorithms should always use a 256 bit seed as per nist standards however a caller is free to request less than 256 bits. > > // >// When a DRBG is used on the output of a entropy

[edk2-devel] [PATCH v3 05/20] ArmVirtPkg:PlatformCI: Support virtio-rng-pci

2024-05-23 Thread Doug Flick via groups.io
This patch adds "virtio-rng-pci" to the PlatformBuildLib.py This adds Rng services to the guest VM Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann Signed-off-by: Doug Flick [MSFT] --- ArmVirtPkg/PlatformCI/PlatformBuildLib.py | 2 ++ 1 file changed, 2 insertions(+)

[edk2-devel] [PATCH v3 06/20] ArmVirtPkg: : Add Hash2DxeCrypto to ArmVirtPkg

2024-05-23 Thread Doug Flick via groups.io
This patch adds Hash2DxeCrypto to ArmVirtPkg. The Hash2DxeCrypto is used to provide the hashing protocol services. Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann Signed-off-by: Doug Flick [MSFT] --- ArmVirtPkg/ArmVirtQemu.dsc | 5 +

[edk2-devel] [PATCH v3 04/20] OvmfPkg: : Add Hash2DxeCrypto to OvmfPkg

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This patch adds Hash2DxeCrypto to OvmfPkg. The Hash2DxeCrypto is used to provide the hashing protocol services. Cc: Ard Biesheuvel Cc: Jiewen Yao Cc: Gerd Hoffmann Signed-off-by: Doug Flick [MSFT] --- OvmfPkg/OvmfPkgIa32.dsc| 6 +- OvmfPkg/OvmfPkgIa32X64.dsc | 6

[edk2-devel] [PATCH v3 01/20] EmulatorPkg: : Add RngDxe to EmulatorPkg

2024-05-23 Thread Doug Flick via groups.io
This patch adds RngDxe to EmulatorPkg. The RngDxe is used to provide random number generation services to the UEFI firmware. Cc: Andrew Fish Cc: Ray Ni Signed-off-by: Doug Flick [MSFT] Reviewed-by: Ray Ni --- EmulatorPkg/EmulatorPkg.dsc | 7 ++- EmulatorPkg/EmulatorPkg.fdf | 6 +- 2

[edk2-devel] [PATCH v3 02/20] EmulatorPkg: : Add Hash2DxeCrypto to EmulatorPkg

2024-05-23 Thread Doug Flick via groups.io
From: Doug Flick This patch adds Hash2DxeCrypto to EmulatorPkg. The Hash2DxeCrypto is used to provide the hashing protocol services. Cc: Andrew Fish Cc: Ray Ni Signed-off-by: Doug Flick [MSFT] --- EmulatorPkg/EmulatorPkg.dsc | 9 +++-- EmulatorPkg/EmulatorPkg.fdf | 5 + 2 files

[edk2-devel] [PATCH v3 00/20] NetworkPkg: CVE-2023-45236 and CVE-2023-45237

2024-05-23 Thread Doug Flick via groups.io
REF:https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html This patch series patches the following CVEs: - CVE-2023-45236: Predictable TCP Initial Sequence Numbers - CVE-2023-45237: Use of a Weak PseudoRandom Number Generator In order to patch

[edk2-devel] [PATCH v3 18/20] ArmVirtPkg: Use dynamic PCD to set the SMCCC conduit

2024-05-23 Thread Doug Flick via groups.io
From: Ard Biesheuvel On ARM systems, whether SMC or HVC instructions need to be used to issue monitor calls is typically dependent on the exception level, but there are also cases where EL1 might use SMC instructions, so there is no hard and fast rule. For ArmVirtQemu, this does depend strictly

  1   2   3   4   5   6   7   8   9   10   >