Thanks Yu!
Reviewed-by: Chasel Chiu
> -Original Message-
> From: Pu, Yu
> Sent: Friday, April 1, 2022 1:22 PM
> To: devel@edk2.groups.io
> Cc: Pu, Yu ; Chiu, Chasel ;
> Desimone, Nathaniel L ; Zeng, Star
>
> Subject: [PATCH v1 2/6] IntelFsp2WrapperPkg: Add CpuLib to module INFs
>
Thanks Yu!
Reviewed-by: Chasel Chiu
> -Original Message-
> From: Pu, Yu
> Sent: Friday, April 1, 2022 1:22 PM
> To: devel@edk2.groups.io
> Cc: Pu, Yu ; Chiu, Chasel ;
> Desimone, Nathaniel L ; Zeng, Star
>
> Subject: [PATCH v1 1/6] IntelFsp2Pkg: Add CpuLib to module INFs that
>
Dear Maintainers,
Could you review the patch? All checks have passed the EDK2 CI build.
https://github.com/tianocore/edk2/pull/2717
Thanks,
Heng
> -Original Message-
> From: devel@edk2.groups.io On Behalf Of Heng Luo
> Sent: Sunday, April 3, 2022 2:14 PM
> To: devel@edk2.groups.io
> Cc:
BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Groups.io Inc//Groups.io Calendar//EN
METHOD:PUBLISH
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-PUBLISHED-TTL:PT1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
LAST-MODIFIED:20220317T223602Z
From: Michael Kubacki
MU_CHANGE tags are used in a different project (Project Mu) to
highlight deviations from Tianocore. Therefore, the comments are
not needed when the changes are present in a Tianocore repository.
Cc: Jiewen Yao
Cc: Jian J Wang
Cc: Xiaoyu Lu
Cc: Guomin Jiang
Hi,
It looks like the assembler is failing. Do you have an up-to-date NASM? I
remember that some distros' NASMs aren't supported by edk2, which requires
a fairly recent one (2.15.05)
Best regards,
Pedro
On Tue, Apr 5, 2022 at 10:25 PM Ghorai, Sukumar
wrote:
> Hi,
>
> would you pl help me to
Sukumar,
The LongJump.iii is just the nasm file after it has been post processed you
should be able to look at it.
If I look at mine I see.
44: rdsspq rax
...
49:incsspq rax
Those are some funky x86 instructions maybe your nasm is too old?
This should be the required version I
From: Artem Khakimov
Add GenCrc32 python tool, add tests, switch
BinWrappers and BinPipWrappers to GenCrc32.py
Cc: Bob Feng
Cc: Olga Artemeva
Cc: Vadim Mikheev
Cc: Alexander Larionov
Signed-off-by: Artem Khakimov
---
BaseTools/BinPipWrappers/PosixLike/GenCrc32 | 41 ++--
Hi,
would you pl help me to resolve this edk2 build issue (TOT codebase)?
sghorai@sghorai-desk3:~/work/edk2-tianocore/edk2-april05/edk2$ build -p
UefiPayloadPkg/UefiPayloadPkg.dsc -a IA32 -a X64 -t GCC5 -D BOOTLOADER=COREBOOT
Build environment: Linux-5.13.0-35-generic-x86_64-with-glibc2.29
Hi,
I'm looking for feedback on a proposal for a large project. I intend to
implement S3 resume for MinPlatform (medium project) and develop closed
chassis debug over an HDMI cable as an additional project to assist the
bringup work. Commonly, serial ports in laptops are either difficult to
access
From: Ashish Kalra
Check for SEV live migration feature support, if detected
setup a new UEFI enviroment variable to indicate OVMF
support for SEV live migration.
This environment variable is created by UEFI but consumed
by the (guest) linux kernel. This is actually part of a
3-way negotiation
From: Ashish Kalra
Mark the SEC GHCB page (that is mapped as unencrypted in
ResetVector code) in the hypervisor's guest page encryption
state tracking.
Cc: Jordan Justen
Cc: Ard Biesheuvel
Signed-off-by: Ashish Kalra
---
OvmfPkg/PlatformPei/AmdSev.c | 11 +++
1 file changed, 11
From: Ashish Kalra
Make the #VC handler aware of the page encryption state
change hypercall by adding support to check KVM_HC_MAP_GPA_RANGE
hypercall and add the additional register values used by
hypercall in the GHCB.
Cc: Jordan Justen
Cc: Ard Biesheuvel
Signed-off-by: Ashish Kalra
---
From: Ashish Kalra
Invoke the hypercall API to notify hypervisor when the page's
encryption state changes.
Cc: Jordan Justen
Cc: Ard Biesheuvel
Signed-off-by: Brijesh Singh
Signed-off-by: Ashish Kalra
---
.../X64/PeiDxeVirtualMemory.c| 16
1 file
From: Ashish Kalra
Add API to issue hypercall on page encryption state change.
By default all the SEV guest memory regions are considered encrypted,
if a guest changes the encryption attribute of the page (e.g mark a
page as decrypted) then notify hypervisor. Hypervisor will need to
track the
From: Ashish Kalra
Add support to check if we are running inside KVM HVM and
KVM HVM supports SEV Live Migration feature.
Cc: Jordan Justen
Cc: Ard Biesheuvel
Signed-off-by: Ashish Kalra
---
OvmfPkg/Include/Library/MemEncryptSevLib.h| 12
.../DxeMemEncryptSevLibInternal.c
From: Ashish Kalra
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3467
By default all the SEV guest memory regions are considered encrypted,
if a guest changes the encryption attribute of the page (e.g mark a
page as decrypted) then notify hypervisor. Hypervisor will need to
track the
Acked-by: Abner Chang
> -Original Message-
> From: devel@edk2.groups.io On Behalf Of Chao Li
> Sent: Wednesday, February 9, 2022 2:52 PM
> To: devel@edk2.groups.io
> Cc: Liming Gao ; Michael D Kinney
> ; Guomin Jiang ; Wei6
> Xu
> Subject: [edk2-devel] [staging/LoongArch RESEND PATCH
Acked-by: Abner Chang
> -Original Message-
> From: devel@edk2.groups.io On Behalf Of Chao Li
> Sent: Wednesday, February 9, 2022 2:52 PM
> To: devel@edk2.groups.io
> Cc: Ray Ni
> Subject: [edk2-devel] [staging/LoongArch RESEND PATCH v1 01/33] FatPkg: Add
> LOONGARCH64 architecture for
[Public]
Hi,
Could you please review the patch?
Thanks
AbduL
-Original Message-
From: devel@edk2.groups.io On Behalf Of Abdul Lateef
Attar via groups.io
Sent: 15 March 2022 10:16
To: devel@edk2.groups.io
Cc: Eric Dong ; Liming Gao
Subject: [edk2-devel] [edk2-platforms PATCH v1 0/1]
Hi Rebecca,
I agree this is a good way to run from command line.
With the addition of the ignore files feature in the YAML files, you
have to make sure the filenames added to files are not in the ignored
set and not in BaseTools and not from submodules.
If you are working on a specific
I have the following script for running Uncrustify locally on Linux:
../edk2/.pytool/Plugin/UncrustifyCheck/mu-uncrustify-release_extdep/Linux-x86/uncrustify
-c ../edk2/.pytool/Plugin/UncrustifyCheck/uncrustify.cfg -F files
--replace --no-backup --if-changed
Then I just echo the paths of
Thanks. I hadn't come across that view before.
--
Rebecca Cran
On 4/5/22 08:46, Michael Kubacki wrote:
It is printed in the error log. For your current PR:
https://github.com/tianocore/edk2/pull/2744
The results are printed in "Standard_Error_Output.log":
It is printed in the error log. For your current PR:
https://github.com/tianocore/edk2/pull/2744
The results are printed in "Standard_Error_Output.log":
https://dev.azure.com/tianocore/edk2-ci/_build/results?buildId=47584=ms.vss-test-web.build-test-results-tab=346168=100012=attachments
These
In my previous mail, I showed how to see the Uncrustify diff from your
server build. This mail is about local execution.
I'll start by saying that the easiest way I've found to run Uncrustify
locally is as a VS Code plugin. It works on both Linux and Windows and
it allows you to easily format
Before discussing how to see the issues locally, here's how to see them
in the pipelines. I will send a separate reply with local details.
1. Go to the build that is failing Uncrustify.
I am using this PR for your case:
https://github.com/tianocore/edk2/pull/2742
2. Click "Details"
I am
So your change in 56530dec1105f17455752675e4c90fb859c64836 didn't fix
anything, because we don't output TestSuites.xml to the console: if I
introduce a code style issue into a branch, CI still only prints the
following:
PROGRESS - --Running ArmPkg: Uncrustify Coding Standard Test NO-TARGET --
Hi,
> > I don't know if it's possible to extract it from host firmware within
> > OS context easily.
>
> Extracting from firmware updates is probably easier.
Good idea but I'll focus on the rest first because I have access to
the GOP driver for my systems.
> > According to Intel you should ask
On Tue, Apr 05, 2022 at 07:47:38AM +, Corvin Köhne wrote:
> Hi,
>
> > Where does the intel gop driver come from? Extracted from host
> > firmware?
>
> https://projectacrn.github.io/latest/tutorials/gpu-passthru.html#enable-the-gvt-d-gop-driver
>
> I don't know if it's possible to extract
Hi,
> Where does the intel gop driver come from? Extracted from host
> firmware?
https://projectacrn.github.io/latest/tutorials/gpu-passthru.html#enable-the-gvt-d-gop-driver
I don't know if it's possible to extract it from host firmware within
OS context easily. According to Intel you should
Hi,
> > First, there is no need to communicate memory regions from the
> > hypervisor to the guest. The IGD hardware has registers pointing
> > to the opregion and to stolen memory, so the guest can simply
> > allocate and initialize memory, then program the registers
> > accordingly. Same
Replace EfiResetSystemLib library with ResetSystemLib library. UEFI
ResetSystem() API is implemented in both these libraries, and the
implementation is also similar. The code for EfiResetSystemLib will be
removed from edk2. Update the platform build description files by
replacing EfiResetSystemLib
The warm reboot requests were mapped to cold reboot as the power control
module was not capable of handling the warm reboot requests. That has
changed now and power control module supports warm reboot. Accordingly,
update ArmSmcPsciResetSystemLib and to invoke the PSCI call with
parameters for
Hi Mike,
I am following up on Brijesh's email, i am running the CI tests related to my
SEV live migration patches,
which i am in process of posting.
I am running the CI tests locally and getting errors while building OvmfPkg, my
patches include two new
header files, error log is copied below.
34 matches
Mail list logo