There is no new bug. So, let’s cancel this week meeting.
Thanks
Liming
发件人: devel@edk2.groups.io 代表 devel@edk2.groups.io
Calendar
发送时间: 2021年6月22日 9:30
收件人: devel@edk2.groups.io
主题: [edk2-devel] Event: TianoCore Bug Triage - APAC / NAMO - 06/22/2021
#cal-reminder
Reminder: TianoCore B
BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Groups.io Inc//Groups.io Calendar//EN
METHOD:CANCELLED
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
LAST-MODIFIED:20201011T015911Z
TZURL:http://tzurl.org/zoneinfo-outlook/America/Los_Angeles
X-LIC-LOCATION:America/Los_Angeles
BEGIN:DAYLIGHT
TZNAM
BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Groups.io Inc//Groups.io Calendar//EN
METHOD:PUBLISH
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
LAST-MODIFIED:20201011T015911Z
TZURL:http://tzurl.org/zoneinfo-outlook/America/Los_Angeles
X-LIC-LOCATION:America/Los_Angeles
BEGIN:DAYLIGHT
TZNAME:
Reviewed-by: Liming Gao
> -邮件原件-
> 发件人: devel@edk2.groups.io 代表 Kenneth
> Lautner
> 发送时间: 2021年6月22日 4:00
> 收件人: devel@edk2.groups.io
> 抄送: Jian J Wang ; Hao A Wu
> ; Zhichao Gao ; Ray Ni
> ; Liming Gao
> 主题: [edk2-devel] [PATCH v1 1/1] MdeModulePkg/BdsDxe: Update BdsEntry
> to use Vari
Sami:
This approach is good. For this patch set, Reviewed-by: Liming Gao
.
Thanks
Liming
> -邮件原件-
> 发件人: Sami Mujawar
> 发送时间: 2021年6月21日 17:57
> 收件人: gaoliming ; devel@edk2.groups.io
> 抄送: Alexei Fedorov ;
> ardb+tianoc...@kernel.org; Matteo Carlini ; Ben
> Adderson ; Steven Price ;
>
Yes this was discussed last year, sorry for the delay in follow-up, I was
changing jobs.
The problem is that the assembly code provided by OpenSSL uses "wrt
..imagebase" which is only supported by win64, not elf64. It was requested at
the time that I include the OpenSSL-provided .S files as a GC
From: Ken Lautner
Changed BdsEntry.c to use Variable Policy instead of Variable Lock
as Variable Lock will be Deprecated eventually
Cc: Jian J Wang
Cc: Hao A Wu
Cc: Zhichao Gao
Cc: Ray Ni
Cc: Liming Gao
Signed-off-by: Kenneth Lautner
Reviewed-by: Liming Gao
---
MdeModulePkg/Universal/Bd
Add a new structure for BootManagerMenu HOB in UefiPayloadPkg
Then consume the BootManagerMenuFile HOB
duntan (2):
UefiPayloadPkg: Add new structure for BootManagerMenuFile HOB
UefiPayloadPkg: consume the BootManagerMenuFile HOB
UefiPayloadPkg/Include/Guid/BootManagerMenu.h
Consume the BootManagerMenuFile HOB in PlatformBootManagerLib
This Lib is in UefiPayloadPkg
Cc: Maurice Ma
Cc: Guo Dong
Cc: Benjamin You
Signed-off-by: DunTan
---
UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c | 51
++
Add new structure for BootManagerMenuFile HOB in UefiPayloadPkg
Cc: Maurice Ma
Cc: Guo Dong
Cc: Benjamin You
Signed-off-by: DunTan
---
UefiPayloadPkg/Include/Guid/BootManagerMenu.h | 27 +++
UefiPayloadPkg/UefiPayloadPkg.dec | 3 +++
2 files changed, 30 i
Hi Pierre,
On 6/15/21 4:21 PM, PierreGondois via groups.io wrote:
> From: Pierre Gondois
>
> PCIe support has been added to the Kvmtool virtual machine
> manager. Therefore, add a PciHostBridgeUtilityLib and enable
> PCIe support for Kvmtool firmware.
>
> The patches were re-send as the devel@edk
Looks good to me.
Reviewed-by: Maurice Ma
Regards
-Maurice
> -Original Message-
> From: Patrick Rudolph
> Sent: Monday, June 21, 2021 1:10
> To: devel@edk2.groups.io
> Cc: Ma, Maurice ; Dong, Guo
> ; You, Benjamin
> Subject: [PATCH v3] UefiPayloadPkg/UefiPayloadEntry: Improve bootl
From: Ashish Kalra
Detect for KVM hypervisor and check for SEV live migration
feature support via KVM_FEATURE_CPUID, if detected setup a new
UEFI enviroment variable to indicate OVMF support for SEV
live migration.
Signed-off-by: Ashish Kalra
---
OvmfPkg/Include/Guid/MemEncryptLib.h | 20
From: Ashish Kalra
Mark the SEC GHCB page (that is mapped as unencrypted in
ResetVector code) in the hypervisor page status tracking.
Cc: Jordan Justen
Cc: Laszlo Ersek
Cc: Ard Biesheuvel
Signed-off-by: Ashish Kalra
---
OvmfPkg/PlatformPei/AmdSev.c | 10 ++
1 file changed, 10 inser
From: Brijesh Singh
By default all the SEV guest memory regions are considered encrypted,
if a guest changes the encryption attribute of the page (e.g mark a
page as decrypted) then notify hypervisor. Hypervisor will need to
track the unencrypted pages. The information will be used during
guest l
From: Ashish Kalra
Add SEV and SEV-ES hypercall abstraction library to support SEV Page
encryption/deceryption status hypercalls for SEV and SEV-ES guests.
Cc: Jordan Justen
Cc: Laszlo Ersek
Cc: Ard Biesheuvel
Signed-off-by: Ashish Kalra
---
Maintainers.txt
From: Ashish Kalra
By default all the SEV guest memory regions are considered encrypted,
if a guest changes the encryption attribute of the page (e.g mark a
page as decrypted) then notify hypervisor. Hypervisor will need to
track the unencrypted pages. The information will be used during
guest li
> -Original Message-
> From: Liu, Zhiguang
> Sent: Sunday, June 20, 2021 11:47 PM
> To: devel@edk2.groups.io
> Cc: Wang, Jian J ; Wu, Hao A ;
> Ni, Ray
> Subject: [PATCH 02/12] MdeModulePkg: Add new structure for the Universal
> Payload Serial Port Info
>
> Add Universal Payload Serial P
Hi Mike,
I agree the use of the include guard is not consistent across edk2 code and it
may be better to fix them all at once. However, if we decide to use '#pragma
once', then the edk2 coding standard specification would need to be updated
first. Similarly, the ECC tool would also need to be u
Hi,
I moved CreateTimeBasedPayload() to AuthVariableLib, but then I cannot
use it in SecureBootConfigDxe, cause AuthVariableLib does not support
DXE_DRIVER.
So:
- having that function only in AuthVariableLib does not work
- having that function only in SecureBootVariableLib, causes a lot of
change
Hi Liming,
Please find my response inline marked [SAMI].
Regards,
Sami Mujawar
On 18/06/2021, 01:49, "gaoliming" wrote:
Sami:
I agree this change. With this patch, will you update the existing
platform to use the matched version macro EFI_ACPI_IO_REMAPPING_TABLE_REV0?
[SAMI] I
Currently several DXE crash due to invalid memory resource settings.
The PciHostBridgeDxe which expects the MMCONF and PCI Aperature
to be EfiMemoryMappedIO, but currently those regions are (partly)
mapped as EfiReservedMemoryType.
coreboot and slimbootloader provide an e820 compatible memory map,
22 matches
Mail list logo