Re: [edk2-devel] [RFC PATCH 09/11] MdeModulePkg/DxeCore: Add PCD NX policy bit for default NX state

2023-05-29 Thread Ni, Ray
1. Do we want to catch a case that platform wrongly sets BIT61 but drivers run before CpuDxe are not XIP? 2. Why BIT61 set is the "Default state"? The setting of BIT61 is a bit confusing. Is there a way to avoid adding BIT61 through code optimization? Thanks, Ray > -Original Message- >

Re: [edk2-devel] [edk2-platforms][PATCH 2/2] ManageabilityPkg: Use DEBUG_MANAGEABILITY

2023-05-29 Thread Nickle Wang via groups.io
Reviewed-by: Nickle Wang Regards, Nickle > -Original Message- > From: abner.ch...@amd.com > Sent: Tuesday, May 30, 2023 2:33 PM > To: devel@edk2.groups.io > Cc: Isaac Oram ; Abdul Lateef Attar > ; Nickle Wang ; Tinh Nguyen > > Subject: [edk2-platforms][PATCH 2/2] ManageabilityPkg: Use

Re: [edk2-devel] [edk2-platforms][PATCH 1/2] ManageabilityPkg: Replace __FUNCTION__ with __func__

2023-05-29 Thread Nickle Wang via groups.io
Reviewed-by: Nickle Wang Regards, Nickle > -Original Message- > From: abner.ch...@amd.com > Sent: Tuesday, May 30, 2023 2:33 PM > To: devel@edk2.groups.io > Cc: Isaac Oram ; Abdul Lateef Attar > ; Nickle Wang ; Tinh Nguyen > > Subject: [edk2-platforms][PATCH 1/2] ManageabilityPkg: Repl

Re: [edk2-devel] [RFC PATCH 08/11] MdeModulePkg/DxeIpl: Relocate and remap XIP capable DXE drivers

2023-05-29 Thread Ni, Ray
1. is it possible that a PE image sits in the right location but the SectionAlignment is larger than FileAlignment so each section still needs to be copied to the aligned memory location? 2. PeCoffLoaderRelocateImage() might not be called for XIP > -Original Message- > From: devel@edk2

[edk2-devel] [edk2-platforms][PATCH 1/2] ManageabilityPkg: Replace __FUNCTION__ with __func__

2023-05-29 Thread Chang, Abner via groups.io
From: Abner Chang Signed-off-by: Abner Chang Cc: Isaac Oram Cc: Abdul Lateef Attar Cc: Nickle Wang Cc: Tinh Nguyen --- .../BaseManageabilityTransportHelper.c| 36 +-- .../Common/KcsCommon.c| 12 +++ .../Dxe/ManageabilityTransportKcs.c

[edk2-devel] [edk2-platforms][PATCH 2/2] ManageabilityPkg: Use DEBUG_MANAGEABILITY

2023-05-29 Thread Chang, Abner via groups.io
From: Abner Chang Use debug print level DEBUG_MANAGEABILITY in ManageabilityPkg. Signed-off-by: Abner Chang Cc: Isaac Oram Cc: Abdul Lateef Attar Cc: Nickle Wang Cc: Tinh Nguyen --- .../Library/ManageabilityTransportHelperLib.h | 2 +- .../BaseManageabilityTransportHelper.c

Re: [edk2-devel] [RFC PATCH 07/11] MdeModulePkg/DxeCore: Execute loaded images in place if possible

2023-05-29 Thread Ni, Ray
I didn't review the existing logic carefully. Several comments: 1. Assignments of several fields are skipped when executing in place. Do they matter? a). Image->NumberOfPages b). Image->ImageBasePage 2. PeCoffLoaderRelocateImage() is called even for XIP case. But I don't think it's expec

Re: [edk2-devel] [RFC PATCH 06/11] MdeModulePkg/DxeCore: Expose memory mapped FV protocol when possible

2023-05-29 Thread Ni, Ray
As I replied to patch #5, we may avoid installing the MMFV protocol. > -Original Message- > From: Ard Biesheuvel > Sent: Monday, May 29, 2023 6:17 PM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel ; Ni, Ray ; Yao, Jiewen > ; Gerd Hoffmann ; Taylor Beebe > ; Oliver Smith-Denny ; Bi, Danda

Re: [edk2-devel] [RFC PATCH 05/11] MdeModulePkg/DxeCore: Use memory mapped FV protocol to avoid image copy

2023-05-29 Thread Ni, Ray
GetFileBufferByFilePath() always returns a copy of file buffer even when the file is in a memory-mapped device. So, your patch adds a new implementation (abstracted through the new MM FV protocol) that can directly return the file location in the MMIO device. Several comments: 1. I am not sure i

Re: [edk2-devel] [RFC PATCH 04/11] MdeModulePkg/DxeCore: Avoid caching memory mapped FFS files

2023-05-29 Thread Ni, Ray
I don't know why the FFS file is cached. Without knowing the reason of caching, I cannot say it's good to remove the caching logic. I will let @Gao, Liming, @Kinney, Michael D to comment. > -Original Message- > From: Ard Biesheuvel > Sent: Monday, May 29, 2023 6:17 PM > To: devel@edk2.g

Re: [edk2-devel] [RFC PATCH 03/11] MdeModulePkg/DxeCore: Remove FreePage argument from CoreUnloadImage

2023-05-29 Thread Ni, Ray
Reviewed-by: Ray Ni > -Original Message- > From: Ard Biesheuvel > Sent: Monday, May 29, 2023 6:17 PM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel ; Ni, Ray ; Yao, Jiewen > ; Gerd Hoffmann ; Taylor Beebe > ; Oliver Smith-Denny ; Bi, Dandan > ; Gao, Liming ; Kinney, > Michael D ; Leif L

Re: [edk2-devel] [RFC PATCH 02/11] MdeModulePkg/DxeCore: Remove unused DstBuffer arg from LoadImage

2023-05-29 Thread Ni, Ray
Reviewed-by: Ray Ni One comment regarding the needing of "static". (I saw you added static" to CoreLoadPeImage in this patch😊) But let's discuss in the first patch thread. > -Original Message- > From: Ard Biesheuvel > Sent: Monday, May 29, 2023 6:17 PM > To: devel@edk2.groups.io > Cc: A

Re: [edk2-devel] [RFC PATCH 01/11] MdeModulePkg/DxeCore: Remove unused 'EntryPoint' argument to LoadImage

2023-05-29 Thread Ni, Ray
I really like the code simplification! Just 2 comments below: 1. Can you describe the calling flow explicitly in commit message: CoreLoadImage (public api) -> CoreLoadImageCommon -> CoreLoadPeImage 2. You added "static" to CoreLoadImageCommon but didn't add to CoreLoadPeImage. I think you are t

Re: [edk2-devel] [PATCH 1/1] IntelFsp2Pkg/Library/BaseFspCommonLib: Fix OVERRUN Coverity issue

2023-05-29 Thread Chiu, Chasel
Patch merged: https://github.com/tianocore/edk2/commit/48c53994e649d51a388dc414944c9a9b717a1c3c Thanks, Chasel > -Original Message- > From: Ranbir Singh > Sent: Wednesday, May 17, 2023 11:29 PM > To: devel@edk2.groups.io > Cc: Chiu, Chasel ; Desimone, Nathaniel L > ; Zeng, Star ; Ran

Re: [edk2-devel] [Patch 1/2] MdePkg/Include/IndustryStandard: Address C++ keyword collisions

2023-05-29 Thread Yao, Jiewen
Reviewed-by: Jiewen Yao > -Original Message- > From: devel@edk2.groups.io On Behalf Of Michael D > Kinney > Sent: Tuesday, May 30, 2023 1:07 AM > To: devel@edk2.groups.io > Cc: Gao, Liming ; Liu, Zhiguang > ; Oliver Smith-Denny ; > Pedro Falcato ; Pop, Aaron > > Subject: [edk2-devel] [P

Re: [edk2-devel] [PATCH] IntelFsp2WrapperPkg: Fix ASSERT when FSP-S/M use FFS3

2023-05-29 Thread Chiu, Chasel
Patch merged: https://github.com/tianocore/edk2/commit/69e10f02111bf7e719237f05233abff4e50016fa Thanks, Chasel > -Original Message- > From: Tan, Ming > Sent: Sunday, May 21, 2023 11:13 PM > To: devel@edk2.groups.io > Cc: Chiu, Chasel ; Duggapu, Chinni B > > Subject: [PATCH] IntelFsp

Re: [edk2-devel] [PATCH 1/1] IntelFsp2Pkg/Library/BaseFspCommonLib: Fix OVERRUN Coverity issue

2023-05-29 Thread Chiu, Chasel
That’s good suggestion Pedro! Ranbir, would you like me to modify your patch to "return 0" during merging? Thanks, Chasel > -Original Message- > From: devel@edk2.groups.io On Behalf Of Pedro > Falcato > Sent: Friday, May 19, 2023 5:29 AM > To: devel@edk2.groups.io; rsi...@ventanamicro.

[edk2-devel] Event: TianoCore Bug Triage - APAC / NAMO - Tuesday, May 30, 2023 #cal-reminder

2023-05-29 Thread Group Notification
*Reminder: TianoCore Bug Triage - APAC / NAMO* *When:* Tuesday, May 30, 2023 6:30pm to 7:30pm (UTC-07:00) America/Los Angeles *Where:* https://teams.microsoft.com/l/meetup-join/19%3ameeting_OTk1YzJhN2UtOGQwNi00NjY4LWEwMTktY2JiODRlYTY1NmY0%40thread.v2/0?context=%7b%22Tid%22%3a%2246c98d88-e344-4ed4

[edk2-devel] Now: Tools, CI, Code base construction meeting series - Monday, May 29, 2023 #cal-notice

2023-05-29 Thread Group Notification
*Tools, CI, Code base construction meeting series* *When:* Monday, May 29, 2023 4:30pm to 5:30pm (UTC-07:00) America/Los Angeles *Where:* https://github.com/tianocore/edk2/discussions/2614 View Event ( https://edk2.groups.io/g/devel/viewevent?eventid=1890536 ) *Description:* TianoCore communit

Re: [edk2-devel] failed Pr

2023-05-29 Thread Attar, AbdulLateef (Abdul Lateef) via groups.io
[AMD Official Use Only - General] Emulator PR failed, that might be the reason its not allowing to push https://github.com/tianocore/edk2/pull/4442/checks?check_run_id=13834435150 -Original Message- From: devel@edk2.groups.io On Behalf Of Ard Biesheuvel via groups.io Sent: Monday, May 2

Re: [edk2-devel] [PATCH v2 1/2] AMD/AmdMinBoardPkg: Implements PCI hotplug init protocol

2023-05-29 Thread Attar, AbdulLateef (Abdul Lateef) via groups.io
[AMD Official Use Only - General] Hi Abner, Yes, its same patch series with V2 version. Thanks AbduL -Original Message- From: Chang, Abner Sent: Friday, May 26, 2023 7:07 AM To: Attar, AbdulLateef (Abdul Lateef) ; devel@edk2.groups.io Cc: Attar, AbdulLateef (Abdul Lateef) Subje

[edk2-devel] [PATCH v1] UefiCpuPkg: Get processor extended information for SmmCpuServiceProtocol

2023-05-29 Thread Zhang, Hongbin1
Some features like RAS need to use processor extended information under smm, So add code to support it Signed-off-by: Hongbin1 Zhang Cc: Eric Dong Cc: Ray Ni Cc: Rahul Kumar Cc: Gerd Hoffmann Cc: Star Zeng Cc: Jiaxin Wu --- UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c | 2 +- 1 file changed,

[edk2-devel] Event: Tools, CI, Code base construction meeting series - Monday, May 29, 2023 #cal-reminder

2023-05-29 Thread Group Notification
*Reminder: Tools, CI, Code base construction meeting series* *When:* Monday, May 29, 2023 4:30pm to 5:30pm (UTC-07:00) America/Los Angeles *Where:* https://github.com/tianocore/edk2/discussions/2614 View Event ( https://edk2.groups.io/g/devel/viewevent?eventid=1890536 ) *Description:* TianoCor

[edk2-devel] [Patch 1/2] MdePkg/Include/IndustryStandard: Address C++ keyword collisions

2023-05-29 Thread Michael D Kinney
Update Tpm12.h and Tpm20.h and not use c++ reserved keywords operator and xor in C structures to support use of these include files when building with a C++ compiler. * Change operator -> Operator * Change xor -> Xor NOTE: This is a non-backwards compatible change to Tpm12.h and Tmp20.h. And cons

[edk2-devel] [Patch 2/2] SecurityPkg/Library/TpmCommandLib: Change xor to Xor

2023-05-29 Thread Michael D Kinney
Change xor to Xor to avoid C++ reserved work name collisions when building with C++ compilers. NOTE: This is a non-backwards compatible change to Tpm12.h and Tmp20.h. And consumers of these include files that access the "operator" or "xor" fields must be updated. Cc: Jiewen Yao Cc: Jian J Wang

[edk2-devel] [Patch 0/2] Address C++ keyword collisions

2023-05-29 Thread Michael D Kinney
Update Tpm12.h and Tpm20.h and not use c++ reserved keywords operator and xor in C structures to support use of these include files when building with a C++ compiler. Update SecurityPkg Tpm2CommandLib to use updated field names. * Change operator -> Operator * Change xor -> Xor NOTE: This is a

Re: [edk2-devel] Event: Tools, CI, Code base construction meeting series - Monday, May 29, 2023 #cal-reminder

2023-05-29 Thread Rebecca Cran
Since it’s Memorial Day, I guess this meeting won’t happen? On Sun, May 28, 2023, at 5:30 PM, Group Notification wrote: > *Reminder: Tools, CI, Code base construction meeting series* > > *When:* > Monday, May 29, 2023 > 4:30pm to 5:30pm > (UTC-07:00) America/Los Angeles > > *Where:* > https://gi

Re: [edk2-devel] failed Pr

2023-05-29 Thread Michael D Kinney
Hi Sean, I see the "rerun" button on the "checks" page of GitHub from my login. We have a mix of both Azure Pipelines and GitHub Actions today, so I think it is important to see the "rerun" from GitHub view for Maintainers. This github page describes the feature, but not the permissions require

Re: [edk2-devel] failed Pr

2023-05-29 Thread Rebecca Cran
I pay for a Visual Studio subscription, so I shouldn’t count towards the limit then. My GitHub email address is the same as I use here. — Rebecca On Mon, May 29, 2023, at 9:37 AM, Sean wrote: > It has changed over time and I no longer see a button on the "checks" > page of GitHub. I only see

Re: [edk2-devel] failed Pr

2023-05-29 Thread Sean
It has changed over time and I no longer see a button on the "checks" page of GitHub. I only see the button in the azure pipeline which would mean maintainers would need to be "contributors" in the azure DevOps organization/project. I have no problem with that and it looks like you can sign in

Re: [edk2-devel] failed Pr

2023-05-29 Thread Michael D Kinney
Hi Sean, Do you know what GitHub permissions are required to see the re-run button? I think it is reasonable for all Maintainers to have that available. Mike From: devel@edk2.groups.io On Behalf Of Sean Sent: Monday, May 29, 2023 8:12 AM To: devel@edk2.groups.io; a...@kernel.org; Rebecca Cran

Re: [edk2-devel] [PATCH edk2-non-osi 1/1] Platform/Qemu/Sbsa: Update TF-A binaries to enable FEAT_FGT

2023-05-29 Thread Marcin Juszkiewicz
W dniu 16.05.2023 o 12:21, Graeme Gregory pisze: On Mon, May 15, 2023 at 06:23:30PM +0200, Marcin Juszkiewicz via groups.io wrote: Update the TF-A binaries to have FEAT_FGT support. This support was merged into TF-A: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/19459 This a

Re: [edk2-devel] failed Pr

2023-05-29 Thread Sean
It has been rerun. From: devel@edk2.groups.io on behalf of Ard Biesheuvel Sent: Monday, May 29, 2023 7:44:37 AM To: Rebecca Cran Cc: devel@edk2.groups.io ; Michael Kinney ; Michael Kubacki ; Liming Gao (Byosoft address) Subject: Re: [edk2-devel] failed Pr O

Re: [edk2-devel] failed Pr

2023-05-29 Thread Ard Biesheuvel
On Mon, 29 May 2023 at 16:37, Rebecca Cran wrote: > > It looks like the agent or machine running the CI task crashed. > > "##[error]We stopped hearing from agent Azure Pipelines 18. Verify the > agent machine is running and has a healthy network connection. Anything > that terminates an agent proc

Re: [edk2-devel] [PATCH v2 2/2] AMD/AmdMinBoardkPkg: Implements PeiReportFvLib Library

2023-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - General] Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Monday, May 22, 2023 5:29 PM > To: devel@edk2.groups.io > Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang, > Abner > Subject: [PATCH v2 2/2] AMD/AmdMinBoardkPkg: Implements

Re: [edk2-devel] [PATCH v2 1/2] AMD/AmdMinBoardPkg: Implements PCI hotplug init protocol

2023-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - General] Reviewed-by: Abner Chang > -Original Message- > From: Abdul Lateef Attar > Sent: Monday, May 22, 2023 5:29 PM > To: devel@edk2.groups.io > Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang, > Abner > Subject: [PATCH v2 1/2] AMD/AmdMinBoardPkg: Implements P

Re: [edk2-devel] failed Pr

2023-05-29 Thread Rebecca Cran
It looks like the agent or machine running the CI task crashed. "##[error]We stopped hearing from agent Azure Pipelines 18. Verify the agent machine is running and has a healthy network connection. Anything that terminates an agent process, starves it for CPU, or blocks its network access can

Re: [edk2-devel] [PATCH v3 7/7] OvmfPkg/RiscVVirt: SEC: Add IO memory resource hob for platform devices

2023-05-29 Thread Ard Biesheuvel
On Sat, 27 May 2023 at 01:18, Tuan Phan wrote: > > Normally, DXE driver would add device resource to GCD before start using. > But some key resources such as uart, flash base address are being accessing > directly in some core modules. > > Those resources should be populated to HOB in SEC phase so

Re: [edk2-devel] [RFC PATCH 04/10] OvmfPkg/RiscVVirt: Remove unimplemented NxForStack configuration

2023-05-29 Thread Sunil V L
On Thu, May 25, 2023 at 04:30:35PM +0200, Ard Biesheuvel wrote: > The RISC-V version of the DXE IPL does not implement setting the stack > NX, so before switching to an implementation that will ASSERT() on the > missing support, drop the PCD setting that enables it. > > Signed-off-by: Ard Biesheuv

[edk2-devel] failed Pr

2023-05-29 Thread Ard Biesheuvel
Hello all, Regarding https://github.com/tianocore/edk2/pull/4442 could someone please explain to me: - what went wrong, - where to find the button to push to resubmit this PR to CI Thanks, Ard. -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply On

Re: [edk2-devel] PATCH [1/1] ArmPkg: Fix GicV2 BaseAddress types

2023-05-29 Thread Ard Biesheuvel
On Wed, 24 May 2023 at 12:48, Sami Mujawar wrote: > > Hi Neil, > > Thank you for this patch. > These changes look good to me. > > Reviewed-by: Sami Mujawar > I cannot apply this. Please resend this (with me on cc) using git send-email -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all m

Re: [edk2-devel] [PATCH v2 1/1] OvmfPkg/PlatformPei: drop S3Verification()

2023-05-29 Thread Ard Biesheuvel
On Wed, 24 May 2023 at 14:29, Ard Biesheuvel wrote: > > On Wed, 24 May 2023 at 14:28, Laszlo Ersek wrote: > > > > On 5/24/23 11:11, Gerd Hoffmann wrote: > > > Not needed any more, SMM + 64-bit PEI + S3 suspend works now. While > > > being at it also remove it from Bhyve (where it is dead code).

Re: [edk2-devel] [PATCH 1/1] OvmfPkg/PciHotPlugInitDxe: Do not reserve IO ports by default.

2023-05-29 Thread Ard Biesheuvel
On Thu, 25 May 2023 at 17:47, Ard Biesheuvel wrote: > > On Tue, 16 May 2023 at 11:48, Gerd Hoffmann wrote: > > > > Flip the default for IO address space reservations for PCI(e) bridges > > and root ports with hotplug support from TRUE to FALSE. > > > > PCI(e) bridges will still get IO address spa

Re: [edk2-devel] [PATCH 0/3] OvmfPkg: gigabyte page tweaks

2023-05-29 Thread Ard Biesheuvel
On Thu, 25 May 2023 at 17:48, Ard Biesheuvel wrote: > > On Wed, 17 May 2023 at 12:24, Gerd Hoffmann wrote: > > > > > > > > Gerd Hoffmann (3): > > OvmfPkg/PlatformInitLib: check PcdUse1GPageTable > > OvmfPkg/OvmfPkgIa32X64: enable 1G pages > > OvmfPkg/MicrovmX64: enable 1G pages > > > > Acke

[edk2-devel] [RFC PATCH 11/11] ArmVirtPkg/ArmVirtQemu: Map all DRAM non-execute by default

2023-05-29 Thread Ard Biesheuvel
Now that both PEI and DXE can deal with memory being mapped non-execute by default, update the early mapping code to create non-execute mappings for all of DRAM. While at it, map the NOR flash read-only as well. Signed-off-by: Ard Biesheuvel --- ArmVirtPkg/ArmVirtQemu.dsc

[edk2-devel] [RFC PATCH 10/11] ArmVirtPkg/ArmVirtQemu: Allow CPU arch protocol DXE to execute in place

2023-05-29 Thread Ard Biesheuvel
Add ArmCpuDxe and its dependencies to the APRIORI DXE section, and use a rule override to emit the executable images in a way that permits them to execute in place from the firmware volume. This allows them to be mapped with the appropriate permissions before dispatching the DXE core. Signed-off-b

[edk2-devel] [RFC PATCH 09/11] MdeModulePkg/DxeCore: Add PCD NX policy bit for default NX state

2023-05-29 Thread Ard Biesheuvel
Introduce a new bit in the NX memory protection policy PCD mask that specifies that the platform enters DXE with all unused and all non-code regions mapped with non-execute permissions. This removes the need to do a pass over all memory regions to update their NX memory attributes. Signed-off-by:

[edk2-devel] [RFC PATCH 08/11] MdeModulePkg/DxeIpl: Relocate and remap XIP capable DXE drivers

2023-05-29 Thread Ard Biesheuvel
Before handing over to the DXE core, iterate over all known FFS files and find the ones that can execute in place. These files are then relocated in place and mapped with restricted permissions, allowing the DXE core to dispatch them without the need to perform any manipulation of the file contents

[edk2-devel] [RFC PATCH 07/11] MdeModulePkg/DxeCore: Execute loaded images in place if possible

2023-05-29 Thread Ard Biesheuvel
In the image loader, check whether an image has already been relocated to the address from which it is being loaded. This is not something that can happen by accident, and so we can assume that this means that the image was intended to be executed in place. This removes a redundant copy of the ima

[edk2-devel] [RFC PATCH 06/11] MdeModulePkg/DxeCore: Expose memory mapped FV protocol when possible

2023-05-29 Thread Ard Biesheuvel
Expose the EDK2 specific memory mapped FV protocol in addition to the firmware volume protocol defined by PI when the underlying firmware volume block protocol informs us that the firmware volume is memory mapped. This permits the image loader to access any FFS files in the image directly, rather t

[edk2-devel] [RFC PATCH 05/11] MdeModulePkg/DxeCore: Use memory mapped FV protocol to avoid image copy

2023-05-29 Thread Ard Biesheuvel
Use the memory mapped FV protocol to obtain the existing location in memory and the size of an image being loaded from a firmware volume. This removes the need to do a memcopy of the file data. Signed-off-by: Ard Biesheuvel --- MdeModulePkg/Core/Dxe/DxeMain.h| 1 + MdeModulePkg

[edk2-devel] [RFC PATCH 04/11] MdeModulePkg/DxeCore: Avoid caching memory mapped FFS files

2023-05-29 Thread Ard Biesheuvel
If a firmware volume is memory mapped, it means we can access it contents directly, and so caching serves little purpose beyond potentially a minor performance improvement. However, given that most files are read only a single time, and dispatched from a decompressed firmware volume in DRAM, we can

[edk2-devel] [RFC PATCH 01/11] MdeModulePkg/DxeCore: Remove unused 'EntryPoint' argument to LoadImage

2023-05-29 Thread Ard Biesheuvel
CoreLoadImageCommon's only user passes NULL for its EntryPoint argument, so it has no purpose and can simply be dropped. While at it, make CoreLoadImageCommon STATIC to prevent it from being accessed from other translation units. Signed-off-by: Ard Biesheuvel --- MdeModulePkg/Core/Dxe/Image/Imag

[edk2-devel] [RFC PATCH 03/11] MdeModulePkg/DxeCore: Remove FreePage argument from CoreUnloadImage

2023-05-29 Thread Ard Biesheuvel
The FreePage argument to CoreUnloadAndCloseImage () is now always TRUE so drop it from the prototype. While at it, make the function static as it is never called from another translation unit. Signed-off-by: Ard Biesheuvel --- MdeModulePkg/Core/Dxe/Image/Image.c | 15 +++ 1 file chan

[edk2-devel] [RFC PATCH 02/11] MdeModulePkg/DxeCore: Remove unused DstBuffer arg from LoadImage

2023-05-29 Thread Ard Biesheuvel
The DstBuffer and NumberOfPages arguments to CoreLoadImageCommon () are never set by its only caller CoreLoadImage() so let's drop them from the prototype. Signed-off-by: Ard Biesheuvel --- MdeModulePkg/Core/Dxe/Image/Image.c | 174 +++- 1 file changed, 56 insertions(+), 118 dele

[edk2-devel] [RFC PATCH 00/11] Permit DXE drivers to execute in place

2023-05-29 Thread Ard Biesheuvel
TL;DR - allow DXE drivers to execute in place from the decompressed FV loaded into memory by DxeIpl so we can apply strict permissions before dispatching DXE core. Currently, executable images loaded from firmware volumes are copied at least three times: once in the firmware volume driver, once in

Re: [edk2-devel] [PATCH] RedfishPkg/RedfishPlatformConfigDxe: fix value type issue.

2023-05-29 Thread Chang, Abner via groups.io
[AMD Official Use Only - General] Reviewed-by: Abner Chang > -Original Message- > From: Nickle Wang > Sent: Monday, May 29, 2023 2:24 PM > To: devel@edk2.groups.io > Cc: Chang, Abner ; Igor Kulchytskyy > > Subject: [PATCH] RedfishPkg/RedfishPlatformConfigDxe: fix value type issue. > >