Hi Everyone,
I am pleased to announce that TianoCore has been accepted to participate in
GSoC 2021! Student applications will start rolling in on March 29th, so now we
need some volunteers to be mentors. Thank you to all who have volunteered!
Mentors will need to be able to commit to the
Both 1 and 2 - Reviewed-by: Jiewen Yao
> -Original Message-
> From: Xu, Min M
> Sent: Wednesday, March 10, 2021 10:56 AM
> To: devel@edk2.groups.io
> Cc: Xu, Min M ; Andrew Fish ; Laszlo
> Ersek ; Leif Lindholm ; Kinney,
> Michael D ; Yao, Jiewen
> Subject: [PATCH 0/2] Update
Register reviewers for the TDX-related files in OvmfPkg.
Cc: Andrew Fish
Cc: Laszlo Ersek
Cc: Leif Lindholm
Cc: Michael D Kinney
Cc: Jiewen Yao
Signed-off-by: Min Xu
---
Maintainers.txt | 4
1 file changed, 4 insertions(+)
diff --git a/Maintainers.txt b/Maintainers.txt
index
Register reviewers for the TDX-related and Confidential Computing related
files in OvmfPkg.
Cc: Andrew Fish
Cc: Laszlo Ersek
Cc: Leif Lindholm
Cc: Michael D Kinney
Cc: Jiewen Yao
Signed-off-by: Min Xu
Min Xu (2):
Maintainers.txt: Add reviewers for the OvmfPkg TDX-related files
Register reviewers for the Confidential Computing related modules in
OvmfPkg.
Cc: Andrew Fish
Cc: Laszlo Ersek
Cc: Leif Lindholm
Cc: Michael D Kinney
Cc: Jiewen Yao
Signed-off-by: Min Xu
---
Maintainers.txt | 3 +++
1 file changed, 3 insertions(+)
diff --git a/Maintainers.txt
Fixed replace file failure when FFS in multiple level FV and FV level over 2
Signed-off-by: GregX Yeh
Cc: Bob Feng
Cc: Liming Gao
---
BaseTools/Source/C/FMMT/FmmtLib.c | 56 ++-
1 file changed, 37 insertions(+), 19 deletions(-)
diff --git
Is this for ARM only?
> -Original Message-
> From: devel@edk2.groups.io On Behalf Of Joey
> Gouly
> Sent: Friday, January 15, 2021 10:44 PM
> To: devel@edk2.groups.io
> Cc: joey.go...@arm.com; ardb+tianoc...@kernel.org; l...@nuviainc.com;
> sami.muja...@arm.com; n...@arm.com
> Subject:
From: mliang2x
Update the pcdparser method in Dec and DSC files.
Signed-off-by: Mingyue Liang
Cc: Bob Feng
Cc: Liming Gao
Cc: Yuwei Chen
---
.../Ecc/MetaFileWorkspace/MetaFileParser.py | 464 ++
1 file changed, 265 insertions(+), 199 deletions(-)
diff --git
On 3/9/21 5:29 PM, Soumya Guptha wrote:
STABLE TAG:
edk2-stable202102 is in planning stage. Please send your feature requests soon.
you can visit here for more information -
https://github.com/tianocore/tianocore.github.io/wiki/EDK-II-Release-Planning
edk2-stable202102 has been released:
TianoCore Community Meeting Minutes
March 4, 2021
EVENTS:
UEFI Plugfest:
Currently virtual webinars are held during 2021 and this will continue to the
remainder of 2021. Webinars are listed here (https://uefi.org/events/upcoming).
If you have topics to propose, please visit uefi.org/events and
Very good suggestion. Thanks Laszlo.
For 3), Min Xu and I will be the reviewer for Intel TDX change for OVMF.
For 6), agree. Although there is some architecture difference, e.g, AMD using
PSP - a co-processor while Intel using TDX module - a new CPU execution mode,
we should align as much as
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3253
SctPrint() requires that %d refers to an UINTN parameter.
SimpleTextOutBBTestFunction_uefi.c has a lot of
StandardLib->RecordAssertion() calls where an INT32 is passed
as argument for a '%d' print code.
This leads to incorrect output
From: Andreas Sandberg
The GICv3 architecture supports up to 1020 ordinary interrupt
lines. The actual number of interrupts supported is described by the
ITLinesNumber field in the GICD_TYPER register. The total number of
implemented registers is normally calculated as
32*(ITLinesNumber+1).
From: Pierre Gondois
The Ecc tool checks the format of the include guard. This check is
currently done on all the names following the '#ifndef' statement.
It should only be done on the first include guard.
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3252
Signed-off-by: Pierre Gondois
> From: Joey Gouly
> Subject: [PATCH v2 1/1] ShellPkg: Validate that the Boot CPU is present in
> MADT
>
> The ACPI 6.3 Specification, January 2019, section 5.2.12.14 states that
> the firmware must convey each processor’s GIC information to the OS using
> the GICC structure.
>
> If a GICC
I just noticed I somehow managed to remove OptionRomPkg from the list.
I'll wait in case anyone has more remarks on the v6 and I'll send a v7
fixing this.
Sorry for the noise.
On Tue, 9 Mar 2021 at 16:01, Ilias Apalodimas via groups.io
wrote:
>
> Add Sami and myself as maintainers for the new
On 03/09/21 14:06, Laszlo Ersek wrote:
> On 03/09/21 13:57, Laszlo Ersek wrote:
>> On 03/09/21 07:12, Min Xu wrote:
>>> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3249
>>>
>>> The patch series provides lib support for Intel Trust Domain Extensions
>>> (Intel TDX).
>>>
>>> Intel's Trust
Reviewed-by: Eric Dong
-Original Message-
From: Ni, Ray
Sent: Tuesday, March 9, 2021 5:09 PM
To: devel@edk2.groups.io
Cc: Dong, Eric ; Laszlo Ersek ; Kumar,
Rahul1
Subject: [PATCH v3] UefiCpuPkg/PiSmmCpu: Don't allocate Token for
SmmStartupThisAp
REF:
Add Sami and myself as maintainers for the new StandAlonemmPkg
and the relevant RPMB driver that can be used in OP-TEE
Signed-off-by: Ilias Apalodimas
---
Maintainers.txt | 15 ++-
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/Maintainers.txt b/Maintainers.txt
index
With some recent changes in OP-TEE [1] and U-Boot [2] we can compile StMM
and launch it from an OP-TEE secure partition which is mimicking SPM.
There's a number of advantages in this approach. In Arm world SPM,
currently used for dispatching StMM, and SPD used for OP-TEE, are
mutually exclusive.
A following patch is adding support for building StMM in order to run it
from OP-TEE.
OP-TEE in combination with a NS-world supplicant can use the RPMB
partition of an eMMC to store EFI variables. The supplicant
functionality is currently available in U-Boot only but can be ported
into EDK2.
Hi,
This is v6 of [1]
Changes since V5:
- Addressed coding style fixes from Pierre
- Removed redundant checks in memory allocation and block usage
- Removed unused COMPRESSION_TOOL_GUID
- Renamed the files and directories following Leif's sugestion
- Added Sami and myself as maintainers
On 03/09/21 13:57, Laszlo Ersek wrote:
> On 03/09/21 07:12, Min Xu wrote:
>> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3249
>>
>> The patch series provides lib support for Intel Trust Domain Extensions
>> (Intel TDX).
>>
>> Intel's Trust Domain Extensions (Intel TDX) refers to an Intel
On 03/09/21 07:12, Min Xu wrote:
> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3249
>
> The patch series provides lib support for Intel Trust Domain Extensions
> (Intel TDX).
>
> Intel's Trust Domain Extensions (Intel TDX) refers to an Intel technology
> that extends Virtual Machines
On 03/08/21 22:55, Kinney, Michael D wrote:
>
>
>> -Original Message-
>> From: Laszlo Ersek
>> Sent: Monday, March 8, 2021 7:38 AM
>> To: devel@edk2.groups.io; Bi, Dandan
>> Cc: Kinney, Michael D ; Liming Gao
>> ; Liu, Zhiguang
>>
>> Subject: Re: [edk2-devel] [RFC][patch] Add a new
I don't want to break the community rule but somehow "git send-email" cannot
send out the V3 patch out.
To avoid reviewers spending time reviewing v2 patch, I have to send out the v3
as attachment ASAP.
Meanwhile, I will investigate what happened to my system and avoid sending
attachments in
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3199
When Token points to mSmmStartupThisApToken, this routine is called
from SmmStartupThisAp() in non-blocking mode due to
PcdCpuSmmBlockStartupThisAp == FALSE.
In this case, caller wants to startup AP procedure in non-blocking
mode and
Patrick,
Can you please send out a new patch which modifies SmbiosDxe to consume ...?
1. A single gEfiSmbios3TableGuid HOB which contains the whole SMBIOS table
(starting with SMBIOS_TABLE_3_0_ENTRY_POINT), or
2. A single gEfiSmbiosTableGuid HOB which contains the whole SMBIOS table
(starting
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3199
When Token points to mSmmStartupThisApToken, this routine is called
from SmmStartupThisAp() in non-blocking mode due to
PcdCpuSmmBlockStartupThisAp == FALSE.
In this case, caller wants to startup AP procedure in non-blocking
mode and
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3199
When Token points to mSmmStartupThisApToken, this routine is called
from SmmStartupThisAp() in non-blocking mode due to
PcdCpuSmmBlockStartupThisAp == FALSE.
In this case, caller wants to startup AP procedure in non-blocking
mode and
Hi, Jiewen
See comments inline.
> -Original Message-
> From: Yao, Jiewen
> Sent: Tuesday, March 9, 2021 2:44 PM
> To: Xu, Min M ; devel@edk2.groups.io
> Cc: Justen, Jordan L ; Laszlo Ersek
> ; Reiland, Doug
> Subject: RE: [PATCH V3 2/3] OvmfPkg: Add PCDs for TdxLib
>
> Hi
> May I
Hi, Jiewen
See comments inline.
> -Original Message-
> From: Yao, Jiewen
> Sent: Tuesday, March 9, 2021 2:25 PM
> To: Xu, Min M ; devel@edk2.groups.io
> Cc: Liming Gao ; Liu, Zhiguang
> ; Reiland, Doug
> Subject: RE: [PATCH V3 1/3] MdePkg: Add Tdx support lib
>
> Hi Min
> Some
32 matches
Mail list logo