Continuing:
On 08/12/15 00:53, Laszlo Ersek wrote:
On 08/03/15 07:41, Ruiyu Ni wrote:
Compare to the old BDS, the new BDS separates the UI part to a standalone
application UiApp.
QemuBootOrderLib was changed to depend on the UefiBootManagerLib.
I've covered the following files thus far
ruiyu...@intel.com
Cc: Jordan Justen jordan.l.jus...@intel.com
Cc: Laszlo Ersek ler...@redhat.com
---
.../Library/PlatformBootManagerLib/BdsPlatform.c | 1438
.../Library/PlatformBootManagerLib/BdsPlatform.h | 246
.../Library/PlatformBootManagerLib
On 08/17/15 10:24, Star Zeng wrote:
Cc: Jordan Justen jordan.l.jus...@intel.com
Cc: Laszlo Ersek ler...@redhat.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Star Zeng star.z...@intel.com
---
OvmfPkg/OvmfPkgIa32.dsc| 5 -
OvmfPkg/OvmfPkgIa32X64.dsc | 5
On 08/17/15 10:23, Star Zeng wrote:
Since Variable driver has been updated to consume the separated VarCheckLib.
Cc: Jordan Justen jordan.l.jus...@intel.com
Cc: Laszlo Ersek ler...@redhat.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Star Zeng star.z
.fdf | 5 +
6 files changed, 45 insertions(+)
Reviewed-by: Laszlo Ersek ler...@redhat.com
Please ask Siyuan, Jordan, or Ard to commit this for you.
Laszlo
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
index 4ab618d..9a6de15 100644
--- a/OvmfPkg/OvmfPkgIa32.dsc
On 08/21/15 18:44, David Van Arnem wrote:
Hello again,
I've done some analysis and here's where I'm at with measured boot with
OVMF in a QEMU guest:
I've verified that most of the relevant modules that need to be added
according to the instructions at
On 08/18/15 14:05, Ard Biesheuvel wrote:
On 17 August 2015 at 10:24, Star Zeng star.z...@intel.com wrote:
Cc: Laszlo Ersek ler...@redhat.com
Cc: Ard Biesheuvel ard.biesheu...@linaro.org
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Star Zeng star.z...@intel.com
On 08/18/15 22:04, Paolo Bonzini wrote:
On 18/08/2015 08:52, Ard Biesheuvel wrote:
Personally, I would not mind deprecating GCC44, but the biggest
question I would have is what toolchains do the latest UDK releases
claim to support.
We also have the issue that every time I ask about
On 07/30/15 13:37, David Woodhouse wrote:
On Tue, 2015-07-28 at 20:26 +0200, Laszlo Ersek wrote:
series (up to and including 3/2)
Tested-by: Laszlo Ersek ler...@redhat.com
If you did this by pulling my tree, rather than manually applying
patches â which I'm fairly sure you did â then you
On 08/04/15 05:16, Ni, Ruiyu wrote:
No.
I forgot to emphasize that I only tested the QEMU boot timeout feature after
changing the QemuBootOrderLib. I don't know how to test the boot order
feature.
This series, on the surface, seems intrusive and to have potential to
cause many
On 08/04/15 12:53, Laszlo Ersek wrote:
No matter how carefully
we review and test the new code, something will inevitably break,
This wasn't meant as lack of trust in your code; it's just that there
are many cases and corner cases in the related OVMF code, and it's quite
hard to test them all
On 08/03/15 19:35, Jordan Justen wrote:
On 2015-08-03 02:08:14, Gao, Liming wrote:
Paolo:
I think that keep the exiting syntax for WORKSPACE to be a single
path can minimize the impacts to exiting tools that assume a
single workspace.
I know you originally suggested to use WORKSPACE,
On 08/04/15 11:44, Zeng, Star wrote:
-Original Message-
From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of
Laszlo Ersek
Sent: Tuesday, August 4, 2015 5:25 PM
To: Zeng, Star; Justen, Jordan L
Cc: Paolo Bonzini; edk2-de...@ml01.01.org; Yao, Jiewen
Subject: Re
Star,
On 07/31/15 14:22, Star Zeng wrote:
This feature is added for UEFI spec that says
Stack may be marked as non-executable in identity mapped page tables.
A PCD PcdSetNxForStack is added to turn on/off this feature, and it is
FALSE by default.
diff --git a/MdeModulePkg/MdeModulePkg.dec
On 08/04/15 10:59, Zeng, Star wrote:
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Tuesday, August 4, 2015 4:34 PM
To: Zeng, Star
Cc: edk2-de...@ml01.01.org; Yao, Jiewen; Paolo Bonzini
Subject: Re: [edk2] [PATCH] MdeModulePkg DxeIpl: Add stack NX support
On 08/04/15 14:40, Ard Biesheuvel wrote:
ARM BDS support in ArmVirtQemu has been broken since SVN r17969
(ArmPkg/BdsLib: Remove Linux loader from BdsLib) dated July 14th.
Instead of fixing this, let's get rid of the ARM BDS and LinuxLoader
altogether: they violate both the UEFI spec and the
On 08/04/15 11:21, Sharma Bhupesh wrote:
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Tuesday, August 04, 2015 2:36 PM
On 08/04/15 10:38, Sharma Bhupesh wrote:
-Original Message-
From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
Sent: Tuesday
clang-specific rules (eg. by duplicating the current rules and
restricting them with *_XCODE5_* and *_GCC4x_* respectively).
... I hope the above mishmash can be called review. :)
Reviewed-by: Laszlo Ersek ler...@redhat.com
___
edk2-devel mailing list
On 07/31/15 01:31, Andrew Fish wrote:
On Jul 30, 2015, at 4:17 PM, Laszlo Ersek ler...@redhat.com wrote:
On 07/27/15 15:52, Ard Biesheuvel wrote:
On 27 July 2015 at 15:34, Liu, Yingke D yingke.d@intel.com wrote:
Reviewed-by: Yingke Liu yingke.d@intel.com
Thank you
Committed
On 07/31/15 01:49, Ard Biesheuvel wrote:
On 31 July 2015 at 01:17, Laszlo Ersek ler...@redhat.com wrote:
On 07/27/15 15:52, Ard Biesheuvel wrote:
On 27 July 2015 at 15:34, Liu, Yingke D yingke.d@intel.com wrote:
Reviewed-by: Yingke Liu yingke.d@intel.com
Thank you
Committed as SVN
. Somlo so...@cmu.edu
Thanks
Laszlo
Laszlo Ersek (9):
OvmfPkg: SmbiosVersionLib: add plugin for detecting SMBIOS version
OvmfPkg: set SMBIOS version in DetectSmbiosVersionLib instead of
PlatformPei
ArmVirtPkg: set SMBIOS version in DetectSmbiosVersionLib instead of
QemuFwCfgToPcdDxe
Suggested-by: Jordan Justen jordan.l.jus...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
ArmVirtPkg/QemuFwCfgToPcdDxe/QemuFwCfgToPcd.inf | 4 --
ArmVirtPkg/QemuFwCfgToPcdDxe/QemuFwCfgToPcd.c | 40
ArmVirtPkg
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
ArmVirtPkg/ArmVirtQemu.dsc | 1 +
1 file changed, 1 insertion(+)
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
index 618a158..8c842c7 100644
--- a/ArmVirtPkg/ArmVirtQemu.dsc
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
@@ -237,6 +237,7
: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/Library/SmbiosVersionLib/DetectSmbiosVersionLib.inf | 1 +
OvmfPkg/Library/SmbiosVersionLib/DetectSmbiosVersionLib.c | 17
+
OvmfPkg/OvmfPkgIa32.dsc
. Somlo so...@cmu.edu
Suggested-by: Jordan Justen jordan.l.jus...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/PlatformPei/PlatformPei.inf | 2 -
OvmfPkg/PlatformPei/Platform.c | 39
OvmfPkg
patches (they are easy and the idea in them was
suggested by you (and I thank you for that)),
(2) add Wei to the poster-without-subscription whitelist, in case that
option is available in the mailing list software?
Thank you
Laszlo
Thanks,
-Wei
On 7/31/15 13:40, Laszlo Ersek wrote:
The SMBIOS
On 07/31/15 14:22, Star Zeng wrote:
This feature is added for UEFI spec that says
Stack may be marked as non-executable in identity mapped page tables.
A PCD PcdSetNxForStack is added to turn on/off this feature, and it is
FALSE by default.
Cc: Jiewen Yao jiewen@intel.com
On 08/05/15 18:18, Andrew Fish wrote:
On Aug 5, 2015, at 8:41 AM, Laszlo Ersek ler...@redhat.com
mailto:ler...@redhat.com wrote:
On 07/31/15 14:22, Star Zeng wrote:
This feature is added for UEFI spec that says
Stack may be marked as non-executable in identity mapped page tables.
A PCD
(Sigh, I left off the list address. This should be discussed publicly.
Resending.)
Clearly, the SMBIOS patches I posted and got committed last time are not
good enough. That's because the SMBIOS 3.0 entry point is structurally
different from the prior versions (because why not). Therefore, now
(resending this one too)
On 07/30/15 19:09, Laszlo Ersek wrote:
(Sigh, I left off the list address. This should be discussed publicly.
Resending.)
Clearly, the SMBIOS patches I posted and got committed last time are not
good enough. That's because the SMBIOS 3.0 entry point is structurally
On 07/30/15 20:50, Paolo Bonzini wrote:
On 28/07/2015 20:44, Laszlo Ersek wrote:
I have a significant update for this patch. On S3 resume, the APMC_EN
bit (and other bits) are cleared in SMI_EN (which is necessary, see qemu
commit be66680e). For the trigger method to work right after S3
On 07/30/15 20:09, Andrew Fish wrote:
On Jul 30, 2015, at 9:58 AM, Laszlo Ersek ler...@redhat.com
mailto:ler...@redhat.com wrote:
On 07/30/15 17:49, Blibbet wrote:
FYI, in case any OEM's missed today's US-CERT UEFI vulnerability notice:
http://firmwaresecurity.com/2015/07/30/us-cert-bios
On 07/29/15 23:38, Jordan Justen wrote:
On 2015-07-28 12:59:46, Laszlo Ersek wrote:
Hi Jordan,
what are the rules for posting to the new list without being
subscribed?
On the old list, I think we dropped all such emails.
Currently we are rejecting them on the new list.
Paolo posted
Thanks a lot Andrew for the followup! I'll make a few comments:
On 08/10/15 23:38, Andrew Fish wrote:
On Aug 10, 2015, at 1:51 PM, Benjamin Herrenschmidt
b...@kernel.crashing.org mailto:b...@kernel.crashing.org wrote:
On Mon, 2015-08-10 at 20:14 +0200, Laszlo Ersek wrote:
On 08/10/15 18:46
On 08/11/15 01:01, Benjamin Herrenschmidt wrote:
On Tue, 2015-08-11 at 08:08 +1000, Benjamin Herrenschmidt wrote:
.../...
That means that if I want to reserve memory elsewhere in the system, I
need to either:
- Make sure that chunk of memory is not covered by a memory resource
actually (refer to 6.4.4.1 Integer constants:
hexadecimal-prefix: one of
0x 0X
)
but I find 0X terribly unreadable myself, so yeah.
For this patch:
Reviewed-by: Laszlo Ersek ler...@redhat.com
For the other two patches in the series:
Acked-by: Laszlo Ersek ler...@redhat.com
Thanks
Laszlo
On 08/11/15 05:52, Andrew Fish wrote:
On Aug 10, 2015, at 7:33 PM, Shubha Ramani shubharam...@yahoo.com wrote:
I know people were attempting to port acpidump from https://www.acpica.org/
to EDK2. Any success ? I need it desperately.
If you look at the mailing list history
Laszlo
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Tuesday, August 4, 2015 7:10 PM
To: Ni, Ruiyu ruiyu...@intel.com
Cc: edk2-de...@ml01.01.org; David Woodhouse dw...@infradead.org
Subject: Re: [edk2] [Patch 0/3] Use new BDS and UiApp for OvmfPkg
On 08/04
On 07/31/15 20:40, Laszlo Ersek wrote:
The SMBIOS 3.x entry point is structurally different from the 2.x
variant, therefore the current code used by OvmfPkg and ArmVirtPkg
doesn't recognize an SMBIOS 3.0 entry point structure even if QEMU
exports one. This series rectifies that.
The first
the setting in CpuMp.
I will come up a patch for that.
Thanks!
Laszlo
Thanks,
Star
-Original Message-
From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Laszlo
Ersek
Sent: Thursday, August 6, 2015 12:28 AM
To: Andrew Fish
Cc: Justen, Jordan L; edk2-de...@ml01.01
On 08/05/15 18:32, Laszlo Ersek wrote:
The LineNumber parameter of the DebugAssert() function has type UINTN.
DebugAssert() passes it to AsciiSPrint() with the %d conversion specifier
at the moment, but %d would require an INT32 argument.
Fix this by casting LineNumber to UINT64, also
On 08/06/15 16:55, Paolo Bonzini wrote:
On 06/08/2015 16:31, Laszlo Ersek wrote:
kvm_cpuid:func 8001 rax 6e8 rbx 0 rcx 0 rdx 10
kvm_enter_smm:vcpu 0: leaving SMM, smbase 0x7ffc
kvm_entry:vcpu 0
kvm_exit: reason TRIPLE_FAULT rip
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
Notes:
- This patch depends on Star's
[edk2] [PATCH] UefiCpuPkg CpuDxe: Sync up the settings of Execute
Disable to APs
http://thread.gmane.org/gmane.comp.bios.edk2.devel/960
and should be applied
]
[LibraryClasses]
BaseLib
BaseMemoryLib
- BdsLib
DebugLib
DevicePathLib
MemoryAllocationLib
Reviewed-by: Laszlo Ersek ler...@redhat.com
___
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel
On 08/07/15 19:00, Andrew Fish wrote:
On Aug 7, 2015, at 5:21 AM, Laszlo Ersek ler...@redhat.com
mailto:ler...@redhat.com wrote:
On 08/07/15 03:27, Zeng, Star wrote:
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Thursday, August 6, 2015 9:43 PM
To: Zeng
On 08/07/15 03:27, Zeng, Star wrote:
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Thursday, August 6, 2015 9:43 PM
To: Zeng, Star; Paolo Bonzini
Cc: Andrew Fish; Justen, Jordan L; edk2-de...@ml01.01.org; Yao, Jiewen;
Chen Fan; Fan, Jeff
Subject: Re: [edk2
Laszlo
for the early draft patch, thanks.
Cc: Laszlo Ersek ler...@redhat.com
Cc: Jeff Fan jeff@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Star Zeng star.z...@intel.com
---
UefiCpuPkg/CpuDxe/ApStartup.c | 133
Hi.
Let's do an OVMF BoF at this year's KVM Forum too.
Paolo will present
Securing secure boot: system management mode in KVM and Tiano Core
on Thursday, August 20, in the 5:00pm - 5:30pm time slot.
Right after that, the BoF section starts at 5:30pm:
On 08/08/15 14:00, Ard Biesheuvel wrote:
This series adds support for using the Intel BDS with ArmVExpress-FVP,
and for building it with UEFI Secure Boot enabled.
Note that the former is a prerequisite of the latter, since the ARM BDS
has no GUI for enrolling certificates and enabling secure
Ping, because:
On 07/25/15 01:00, Laszlo Ersek wrote:
For a short introduction, jump to the last patch.
Past discussions (just what I could easily find):
http://thread.gmane.org/gmane.comp.bios.tianocore.devel/14243
http://thread.gmane.org/gmane.comp.bios.tianocore.devel/14243/focus=14330
)
--gc-sections
Since these are general flags, I'll defer to Leif, but you can add my
Reviewed-by: Laszlo Ersek ler...@redhat.com
___
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel
On 08/10/15 08:50, éŠč wrote:
when i used ovmf.fd in qemu manager,
then occurcs this tips:
Boot Failed. EFI DVD/CDROM
Boot Failed. EFI Floopy
i don't know what does this mean?
Your QEMU boot order specification (-boot ... option, or -device
...,bootindex=N properties) are incompatible
Hi Star,
On 08/06/15 11:44, Zeng, Star wrote:
Hi Laszlo,
Could you help take a try with the attached patch on your VM before I send it
for formal review?
I got your patch via your first (public) message as well -- not the one
reflected by the list software, but on the direct route. So, I
Separate followup message with the symptoms I managed to gather about
the failure on KVM.
On 08/06/15 15:42, Laszlo Ersek wrote:
Hi Star,
On 08/06/15 11:44, Zeng, Star wrote:
Hi Laszlo,
Could you help take a try with the attached patch on your VM before I
send it for formal review?
I got
-!if $(INTEL_BDS) == TRUE
#
# TianoCore logo (splash screen)
#
FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile)
{
SECTION RAW = MdeModulePkg/Logo/Logo.bmp
}
-!endif
[FV.FVMAIN_COMPACT]
FvAlignment= 16
Reviewed-by: Laszlo Ersek ler
]
[PcdsFixedAtBuild.common]
- gArmPlatformTokenSpaceGuid.PcdFirmwareVendor|XEN-UEFI
gEfiMdeModulePkgTokenSpaceGuid.PcdFirmwareVersionString|L$(FIRMWARE_VER)
gArmPlatformTokenSpaceGuid.PcdCoreCount|1
Reviewed-by: Laszlo Ersek ler
://thread.gmane.org/gmane.comp.bios.edk2.devel/759/focus=1153
Thanks!
Laszlo
Thanks,
Ray
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Wednesday, August 12, 2015 10:59 PM
To: Ni, Ruiyu ruiyu...@intel.com
Cc: Justen, Jordan L jordan.l.jus...@intel.com; edk2-de
Hi Gary,
On 08/14/15 11:03, Gary Ching-Pang Lin wrote:
This commit introdues a new build option to OvmfPkg: HTTP_BOOT_ENABLE.
When HttpBoot is enabled, a new Network boot option will show in the
boot manager menu with the device path like this:
-size=0x1
[LibraryClasses.common]
!if $(TARGET) == RELEASE
Acked-by: Laszlo Ersek ler...@redhat.com
___
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel
On 07/27/15 22:13, David Woodhouse wrote:
To be used with http://git.infradead.org/users/dwmw2/openssl.git/
checked out in CryptoPkg/Library/OpensslLib/openssl/ and on top of my
other EDK2 patches (http://git.infradead.org/users/dwmw2/edk2.git/).
Automatically generate the file list from
, Laszlo Ersek wrote:
On 07/23/15 19:31, Jordan Justen wrote:
On 2015-07-23 10:04:26, Laszlo Ersek wrote:
On 07/23/15 02:06, Jordan Justen wrote:
Okay. Based on Laszlo's request, I setup a temporary git repo to
collect up the changes that should have been committed to svn the past
week.
https
On 07/22/15 21:44, Bruce Cran wrote:
On 7/22/2015 4:18 AM, Laszlo Ersek wrote:
How about someone creates a temporary branch off the github master
branch, and applies all new patches from the list that have been
reviewed thus far? Then once SVN is back up, the patches from that git
branch
an up-to-date / fresh
basis, everyone should now consider
https://github.com/tianocore/edk2-svn-offline.git as master,
temporarily, and rebase (and keep rebasing) their work-in-progress onto
that.
Thanks
Laszlo
Thanks,
Star
-Original Message-
From: Laszlo Ersek [mailto:ler
On 07/23/15 23:14, David Woodhouse wrote:
See http://www.infradead.org/rpr.html
X-SRS-Rewrite: SMTP reverse-path rewritten from dw...@infradead.org by
twosheds.infradead.org
See http://www.infradead.org/rpr.html
On 2015-07-23 12:36:34, David Woodhouse wrote:
On Thu, 2015-07-23 at 11:50
On 07/26/15 11:40, Ard Biesheuvel wrote:
The current GIC revision detection code infers the GIC revision from
the AA64PFR0_EL1.GIC feature bit that tells us whether the GIC system
register interface is implemented in the hardware, and then proceeds
to attempt and enable it.
The library
On 07/26/15 10:23, Jordan Justen wrote:
On 2015-07-25 19:59:10, Bruce Cran wrote:
On 7/24/15 5:40 PM, Jordan Justen wrote:
Unfortunately, it looks like they are going to manage to get svn back
up and running. ;)
It looks like it's back:
On 07/25/15 01:40, Jordan Justen wrote:
On 2015-07-19 09:56:11, Jordan Justen wrote:
On 2015-07-19 04:08:50, Laszlo Ersek wrote:
On 07/19/15 12:01, Ard Biesheuvel wrote:
I'd suggest that we just promote the GitHub repository to primary
repository, and deprecate the public SVN right away.
I
for the SMM driver.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf | 13
++---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbInfo.c | 16
-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf | 2 ++
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf| 2 ++
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c | 3 +++
OvmfPkg/QemuFlashFvbServicesRuntimeDxe
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockService.h | 16
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbInfo.c| 16
OvmfPkg
-marked SMRAM.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf | 2 +
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockService.h | 15 ++
OvmfPkg
...@cn.fujitsu.com
Cc: Jordan Justen jordan.l.jus...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
Reviewed-by: Jeff Fan jeff@intel.com
---
UefiCpuPkg/CpuDxe/CpuMp.c | 11 +--
1 file changed, 1 insertion(+), 10 deletions(-)
diff --git
@intel.com
Cc: Chen Fan chen.fan.f...@cn.fujitsu.com
Cc: Jordan Justen jordan.l.jus...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
Reviewed-by: Jeff Fan jeff@intel.com
---
UefiCpuPkg/CpuDxe/CpuMp.c | 19 ++-
1
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/CpuS3DataDxe/CpuS3DataDxe.inf | 1 +
OvmfPkg/QuarkPort/CpuS3DataDxe/ProcessorConfig.c | 2 ++
OvmfPkg/OvmfPkgIa32.dsc | 2 ++
OvmfPkg/OvmfPkgIa32X64.dsc | 2 ++
OvmfPkg/OvmfPkgX64.dsc
change, but that is not the case.
Replace the arrays with single elements. The subscript zero elements
simply disappear, and the single elements take the role of the prior
subscript one elements.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
with more local
changes.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/OvmfPkgIa32.dsc| 18 +++---
OvmfPkg/OvmfPkgIa32.fdf| 12
OvmfPkg/OvmfPkgIa32X64.dsc | 18 +++---
OvmfPkg
The EFI_FW_VOL_INSTANCE.FvbDevLock member is initialized and then never
used. Remove it.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockService.h | 1 -
OvmfPkg/QemuFlashFvbServicesRuntimeDxe
in
OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/Ia32/MpFuncs.S loads these values
(identically for all APs) with the LGDT and LIDT instructions.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/CpuS3DataDxe/CpuS3DataDxe.inf
-StartupVector to mStartupVector when the Legacy BIOS
Protocol (ie. CSM) is present, and the startup vector is relocated into
the E or F segment.)
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/CpuS3DataDxe/CpuS3DataDxe.inf
of Quark_EDKII_v1.1.0/IA32FamilyCpuBasePkg here too.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/Include/Library/SocketLga775Lib.h | 185
OvmfPkg/OvmfPkg.dec | 5 +
2 files changed
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/SmmProfile.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/SmmProfile.c
b/OvmfPkg/QuarkPort
Import the following (likely nonstandard) protocol definitions:
- SMM_CPU_SYNC_PROTOCOL
- SMM_CPU_SYNC2_PROTOCOL
- EFI_SMM_CPU_SERVICE_PROTOCOL
All of these are needed by PiSmmCpuDxeSmm.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
the DXE core.)
- In MemMapInitialization(), the start of the PCI MMIO range is not
affected.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/PlatformPei/PlatformPei.inf | 1 +
OvmfPkg/PlatformPei/MemDetect.c | 34
it controllable with a feature PCD.
Cc: Jeff Fan jeff@intel.com
Cc: Chen Fan chen.fan.f...@cn.fujitsu.com
Cc: Jordan Justen jordan.l.jus...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
UefiCpuPkg/CpuDxe/CpuDxe.inf | 6
.
- Unlike ACPI_CPU_DATA.PreSmmInitRegisterTable,
ACPI_CPU_DATA.RegisterTable is correctly stashed by PiSmmCpuDxeSmm in
SMRAM (part of the code being removed), therefore this patch has no
security impact.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler
We build this driver for X64 as well -- the comment isn't overly
important, but it shouldn't be misleading.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf | 2 +-
1 file
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf | 89
OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceSmm.c | 66 +++
2 files changed, 155
(or the user disabled it on the QEMU command
line), then this patch has no effect also.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/PlatformPei/PlatformPei.inf | 4 +++
OvmfPkg/Sec/SecMain.inf | 3 +++
OvmfPkg
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/README | 39
1 file changed, 39 insertions(+)
diff --git a/OvmfPkg/README b/OvmfPkg/README
index 147e6e0..757f429 100644
--- a/OvmfPkg/README
+++ b/OvmfPkg
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/SmmProfileInternal.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/SmmProfileInternal.h
b/OvmfPkg
-by: Paolo Bonzini pbonz...@redhat.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf | 1 -
1 file changed, 1 deletion(-)
diff --git a/OvmfPkg/QuarkPort/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
b
1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf | 63 ++
OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.c | 224
OvmfPkg/OvmfPkgIa32.dsc | 1 +
OvmfPkg/OvmfPkgIa32.fdf | 1 +
OvmfPkg
in DecompressMemFvs() that the runtime decompression will match it.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/Sec/SecMain.inf | 1 +
OvmfPkg/Sec/SecMain.c | 8 +++
OvmfPkg/DecomprScratchEnd.fdf.inc | 72
.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/SmmAccess/SmmAccessPei.inf | 70 +++
OvmfPkg/SmmAccess/SmramInternal.h | 89
OvmfPkg/SmmAccess/SmmAccessPei.c | 446
OvmfPkg/SmmAccess/SmramInternal.c | 187
: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/CpuS3DataDxe/CpuS3DataDxe.inf | 85 +++
OvmfPkg/QuarkPort/CpuS3DataDxe/Cpu.h | 57
OvmfPkg/QuarkPort/CpuS3DataDxe/MpCommon.h| 67 +
OvmfPkg/QuarkPort
michael.d.kin...@intel.com
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
Notes:
In the open source edk2 tree, no platform other than OvmfPkg uses
BaseExtractGuidedSectionLib, and OvmfPkg doesn't claim to be secure
against the described
control to
the SMRAM-hosted PiSmmCpuDxeSmm driver), in order to reinitialize CPU
states.
The ACPI_CPU_DATA.APState is never used by PiSmmCpuDxeSmm, so drop it.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/Include
,
it makes sense to set aside memory for it only if -D SMM_REQUIRE is
absent. Modify InitializeRamRegions() accordingly.
This patch completes the -D SMM_REQUIRE-related tweaking of the special
OVMF memory areas.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler
. At this
point the contents of the pflash chip / varstore are secure too against
direct access from the runtime OS.
58 OvmfPkg: README: document SMM status
Documentation (goals, usage, limitations).
Thanks
Laszlo
Laszlo Ersek (58):
OvmfPkg: PlatformPei: clear CMOS 0xF after setting mBootMode
OvmfPkg
As explained in the earlier patch, PiSmmCpuDxeSmm only depends on the
header file; import it.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek ler...@redhat.com
---
OvmfPkg/QuarkPort/Include/Library/CpuConfigLib.h | 702
OvmfPkg/OvmfPkg.dec
1 - 100 of 5714 matches
Mail list logo