Ard,
I agree. I mentioned it in the patch summary. I will
add it to the commit log for each patch.
Thanks,
Mike
> -Original Message-
> From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
> Sent: Wednesday, April 11, 2018 11:18 PM
> To: Kinney, Michael D
> Cc: edk2-devel@lists.01.
Hi, Laszlo,
The updated patch series looks good to me.
Reviewed-by: Long Qin
Best Regards & Thanks,
LONG, Qin
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent: Wednesday, April 11, 2018 6:43 PM
To: edk2-devel@lists.01.org
Cc: Ard Biesheuvel ; Gary Ching-Pang Lin
On 12 April 2018 at 02:55, Laszlo Ersek wrote:
> PlatformHasAcpiDtDxe consumes the DynamicHii PCD called
> "gArmVirtTokenSpaceGuid.PcdForceNoAcpi". The PcdGetBool() library call
> terminates in gRT->GetVariable(), in the MdeModulePkg/Universal/PCD/Dxe
> driver. Put "gEfiVariableArchProtocolGuid" o
On 12 April 2018 at 03:01, Kinney, Michael D wrote:
> https://bugzilla.tianocore.org/show_bug.cgi?id=801
>
> Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
> This allows the platform to inform the user of progress when a
> firmware storage device is being updated with a new fir
Good suggestion. Thanks Star.
I will cover them in V2 patches.
Thanks,
Dandan
-Original Message-
From: Zeng, Star
Sent: Thursday, April 12, 2018 2:03 PM
To: Bi, Dandan ; Kinney, Michael D
; edk2-devel@lists.01.org
Cc: Dong, Eric ; Gao, Liming ; Zeng,
Star
Subject: RE: [edk2] [patch 0/
If the cases can be listed completely, then it will be better to also add them
in the comments for the two GUIDs, then consumer can easily know them.
Thanks,
Star
-Original Message-
From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Bi,
Dandan
Sent: Thursday, April 1
Reviewed-by: Star Zeng
-Original Message-
From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Jian J
Wang
Sent: Wednesday, April 11, 2018 4:39 PM
To: edk2-devel@lists.01.org
Subject: [edk2] [PATCH 0/2] add sanity check for SetMemoryAttributes
Heap Guard feature needs
Right, I checked the GCD code. Capabilities has only effect with "set"
attributes.
Regards,
Jian
> -Original Message-
> From: Zeng, Star
> Sent: Thursday, April 12, 2018 1:38 PM
> To: Wang, Jian J ; edk2-devel@lists.01.org
> Cc: Dong, Eric ; Yao, Jiewen ; Ni,
> Ruiyu ; Kinney, Michael D
Has no need to set paging capability as the code is going to clear paging
attribute.
With that refined, Reviewed-by: Star Zeng .
Thanks,
Star
-Original Message-
From: Wang, Jian J
Sent: Thursday, April 12, 2018 12:58 PM
To: edk2-devel@lists.01.org
Cc: Zeng, Star ; Dong, Eric ; Yao,
J
If we start to see UEFI drivers that are using this, then it is a spec
issue, because it means that systems which do not implement the event will
not function correctly.
Tim
-Original Message-
From: edk2-devel On Behalf Of Bi, Dandan
Sent: Wednesday, April 11, 2018 9:53 PM
To: Tim Lewis
> v2 changes:
>a. Remove redundant code and fill-up potential logic hole
>b. Code clean-up
>c. Fix error in commit log
This patch fixes an issue introduced by commit
5b91bf82c67b586b9588cbe4bbffa1588f6b5926
and
0c9f2cb10b7ddec56a3440e77219fd3ab1725e5c
This issue will only happe
There is no need to update UEFI spec, just implementation related. It has no
impact to the modules which do not care these two events.
Thanks,
Dandan
-Original Message-
From: Tim Lewis [mailto:tim.le...@insyde.com]
Sent: Thursday, April 12, 2018 11:49 AM
To: Bi, Dandan ; Kinney, Michael
This is starting to sound like something that requires a UEFI spec update.
Tim
-Original Message-
From: edk2-devel On Behalf Of Bi, Dandan
Sent: Wednesday, April 11, 2018 8:47 PM
To: Kinney, Michael D ; edk2-devel@lists.01.org
Cc: Bi, Dandan ; Dong, Eric ; Gao,
Liming
Subject: Re: [edk2]
Hi all,
All setup menu enter/exit cases includes:
a. UiApp entry point is called and then setup menu is shown
(enter setup menu)
b. User select Continue menu in setup menu to exit.
(exit setup menu)
c. User select Reset menu in setup
Hi Mike,
We can't move the enter/exit event signaling into the FormBrowwer SendForm()
function.
Because we can't decide whether enter/exit setup through SendForm() is called
or not. Some examples:
1. SendForm() is not called when exit setup menu and re-enter setup menu. Such
as, SendForm() i
Hi, Laszlo,
You are right. "--remote" is really incorrect here.
And thanks you so much to point out this.
Best Regards & Thanks,
LONG, Qin
-Original Message-
From: Long, Qin
Sent: Wednesday, April 11, 2018 4:39 PM
To: 'Laszlo Ersek' ; Ye, Ting
Cc: edk2-devel@lists.01.org
Subject: RE:
(https://bugzilla.tianocore.org/show_bug.cgi?id=927)
(V2 Update:
Removing the wrong "--remote" option from git submodule update
command in this commit message. Thanks Leszlo's clarification
to correct this)
Update OpenSSL version to 1.1.0h release (27-Mar-2018) to include the
fix for
This patch is to drop "--remote" option from the original suggested
submodule update command ("$ git submodule update --recursive
--remote") in HOWTO document.
"--remote" option will integrate changes from the upstream subproject
with the submodules's "current HEAD", instead of using the edk2
supe
Updating the supported OpenSSL version to 1.1.0h release.
Additional patch is to address / fix one HOWTO documentation issue
about submodule update command which used the wrong "--remote" option.
(Thanks Laszlo's catch).
Long Qin (2):
CryptoPkg/OpensslLib: Fix the documentation about submodule u
Hi, Jiewen:
I have a question about VER_REG register's content. (VT-d spec)
Does current Intel chipset support VT-d spec 2.4 ?
It seems VER_REG always display 1.0 , why?
Thanks
Best wishes,
?
?
CONFIDENTIAL NOTE:
This email contains confi
Is it more flexible (may be for further extension) to use PCD instead of
protocol for the ProgressBarForegroundColor and WatchdogSeconds policies?
Thanks,
Star
-Original Message-
From: Kinney, Michael D
Sent: Thursday, April 12, 2018 8:48 AM
To: edk2-devel@lists.01.org
Cc: Kinney, Micha
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: David Wei
---
Platform/BroxtonPlatformPkg/BiosId.env | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Platform/BroxtonPlatformPkg/BiosId.env
b/Platform/BroxtonPlatformPkg/BiosId.env
index d7e8aa6841..350fa
Reviewed-by: David Wei
Thanks,
David Wei
Intel SSG/STO/UEFI BIOS
-Original Message-
From: Kinney, Michael D
Sent: Thursday, April 12, 2018 8:48 AM
To: edk2-devel@lists.01.org
Cc: Kinney, Michael D ; Wei, David
; Guo, Mang
Subject: [Patch V2 7/9] V
Reviewed-by: Liming Gao
> -Original Message-
> From: Bi, Dandan
> Sent: Wednesday, April 11, 2018 9:27 AM
> To: edk2-devel@lists.01.org
> Cc: Gao, Liming
> Subject: [patch] MdeModulePkg/FPDT: Add error message for unsupported case
>
> We have updated performance infrastructure in previo
Reviewed-by: David Wei
Thanks,
David Wei
Intel SSG/STO/UEFI BIOS
-Original Message-
From: Kinney, Michael D
Sent: Thursday, April 12, 2018 8:48 AM
To: edk2-devel@lists.01.org
Cc: Kinney, Michael D ; Sean Brogan
; Wei, David ; Guo, Mang
Subject: [Pa
Dandan Bi,
Is it possible to move the enter/exit event signaling
into the FormBrowwer SendForm() function? The current
patch set adds these signal calls in all the places that
SendForm() is called and if one of these is missed,
a notification will be missed.
Mike
> -Original Message-
>
These changes are to support notify callbacks when enter/exit
setup menu, since some driver may need to hook setup enter/exit
points to do something.
We will signal setup enter/exit events for all setup menu
enter/exit cases.Then the module which pay attention to these
events can execute the callb
These changes are to support notify callbacks when enter/exit
setup menu, since some driver may need to hook setup enter/exit
points to do something.
We will signal setup enter/exit events for all setup menu
enter/exit cases.Then the module which pay attention to these
events can execute the callb
These changes are to support notify callbacks when enter/exit
setup menu, since some driver may need to hook setup enter/exit
points to do something.
We will signal setup enter/exit events for all setup menu
enter/exit cases.Then the module which pay attention to these
events can execute the callb
These changes are to support notify callbacks when enter/exit
setup menu, since some driver may need to hook setup enter/exit
points to do something.
We will signal setup enter/exit events for all setup menu
enter/exit cases.Then the module which pay attention to these
events can execute the callb
I have also posted a branch for review.
https://github.com/mdkinney/edk2/tree/Bug_801_DisplayUpdateProgressLib_V2
Mike
> -Original Message-
> From: Kinney, Michael D
> Sent: Wednesday, April 11, 2018 5:48 PM
> To: edk2-devel@lists.01.org
> Cc: Sean Brogan ; Zeng, Star
> ; Dong, Eric ;
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-off-by: Michael D Kinney
Contributed-under: TianoCore Contribution Agreement 1.1
-
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
This allows the platform to inform the user of progress when a
firmware storage device is being updated with a new firmware
image.
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-of
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
This allows the platform to inform the user of progress when a
firmware storage device is being updated with a new firmware
image.
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-of
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-off-by: Michael D Kinney
Contributed-under: TianoCore Contribution Agreement 1.1
-
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-off-by: Michael D Kinney
Contributed-under: TianoCore Contribution Agreement 1.1
-
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
* Add DisplayUpdateProgressLib mappings for platforms that use the
DxeCapsuleLibFmp.
* Add the PerformFlashWriteWithProgress()
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
This allows the platform to inform the user of progress when a
firmware storage device is being updated with a new firmware
image.
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Signed-of
Yeah, you're right. I'll update the log text. Thanks for catching it.
Regards,
Jian
> -Original Message-
> From: Zeng, Star
> Sent: Wednesday, April 11, 2018 4:00 PM
> To: Wang, Jian J ; edk2-devel@lists.01.org
> Cc: Dong, Eric ; Yao, Jiewen ; Ni,
> Ruiyu ; Kinney, Michael D ;
> Zeng, Sta
"ArmGicDxe.inf" currently does not document how the protocols in the
[Protocols] section are used. Such comments help us analyze behavior, so
let's add them now.
- gHardwareInterruptProtocolGuid and gHardwareInterrupt2ProtocolGuid are
always produced on the InterruptDxeInitialize() -> (GicV2DxeI
The lazy initialization of the varstore FVB makes no longer sense at this
point:
- "mNorFlashInstanceTemplate.Initialize" is NULL;
- in NorFlashCreateInstance(), we only set Instance->Initialize to
non-NULL -- namely NorFlashFvbInitialize() -- if the FVB stands for the
variable store (see "Co
Some platforms don't format a variable store template at build time;
instead they format the non-volatile varstore flash chip during boot,
dynamically. Introduce NvVarStoreFormattedLib to enable such platforms to
delay the "variable read" service drivers until the platform specific
module(s) report
PlatformHasAcpiDtDxe consumes the DynamicHii PCD called
"gArmVirtTokenSpaceGuid.PcdForceNoAcpi". The PcdGetBool() library call
terminates in gRT->GetVariable(), in the MdeModulePkg/Universal/PCD/Dxe
driver. Put "gEfiVariableArchProtocolGuid" on PlatformHasAcpiDtDxe's DEPEX
so that we not attempt th
Commit 61a7b0ec634f ("ArmPkg/Gic: force GIC driver to run before CPU arch
protocol driver", 2018-02-06) explains why CpuDxe should be dispatched
after ArmGicDxe.
To implement the ordering, we should use a regular protocol depex rather
than the less flexible AFTER opcode. ArmGicDxe installs
gHardwa
NorFlashFvbInitialize() calls gDS->SetMemorySpaceAttributes() to mark the
varstore flash region as uncached. This DXE service depends on the CPU
Architectural protocol, and the DXE core is allowed to return
EFI_NOT_AVAILABLE_YET if it hasn't dispatched ArmPkg/Drivers/CpuDxe
earlier. Make the depend
The RealTimeClockLib class is declared under EmbeddedPkg, so that
platforms can provide the internals for the
EmbeddedPkg/RealTimeClockRuntimeDxe driver. In turn the driver produces
the Real Time Clock Arch Protocol, without which UEFI drivers cannot be
dispatched.
The PL031RealTimeClockLib instan
The BEFORE depex opcode that we currently use to force ourselves in front
of the variable driver cannot be combined with other depex opcodes.
Replace the depex with TRUE, and signal NvVarStoreFormattedLib through the
installation of "gEdkiiNvVarStoreFormattedGuid".
Platforms that rely on NorFlashD
In spite of both ArmVirtQemu and ArmVirtQemuKernel formatting the variable
store template at build time, link NvVarStoreFormattedLib into
VariableRuntimeDxe via NULL class resolution on both platforms. This lets
us test the depexes implemented in the previous patches.
Cc: Ard Biesheuvel
Cc: Leif
In a later patch, we'll modify the depex of
"ArmPkg/Drivers/CpuDxe/CpuDxe.inf" (currently "AFTER gArmGicDxeFileGuid")
to "gHardwareInterruptProtocolGuid OR gHardwareInterrupt2ProtocolGuid".
Considering platforms that include "ArmPkg/Drivers/CpuDxe/CpuDxe.inf",
there are two classes:
(1) The platf
Repo: https://github.com/lersek/edk2.git
Branch: depex_fixes
ArmVirtQemu boots again, it just took a few more patches than I expected
:)
Some of these patches will have to be ported to edk2-platforms, I think.
Cc: Ard Biesheuvel
Cc: Leif Lindholm
Cc: Steve Capper
Cc: Supreeth Venkatesh
Th
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Use PlatformFlashWriteWithProgress() instead of PlatformFLashWrite()
so the user can be informed of the progress as a capsule is used
to update a firmware image in a firmware device.
Cc: Jiewen Yao
Signed-off-by: Michael D Kinney
Contributed-un
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Cc: Sean Brogan
Cc: David Wei
Cc: Mang Guo
Signed-off-by: Michael D Kinney
Contributed-under: TianoC
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add a new API to the PlatformFlashAccessLib that passes
in an optional Progress() function along with a start and
end percentage to call the Progress() function with.
If the Progress() function is not NULL, then it is the
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Cc: Sean Brogan
Cc: Kelly Steele
Signed-off-by: Michael D Kinney
Contributed-under: TianoCore Contribution Agreement 1.1
---
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
* Change Update_Image_Progress() to UpdateImageProcess()
* Call DisplayUpdateProgressLib from UpdateImageProgress().
* Split out
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
This allows the platform to inform the user of progress when a
firmware storage device is being updated with a new firmware
image.
Cc: Kelly Steele
Signe
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Add PerformFlashWriteWithProgress() to the PlatformFlashAccessLib.
This allows the platform to inform the user of progress when a
firmware storage device is being updated with a new firmware
image.
Cc: David Wei
Cc: Mang
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Add DisplayUpdateProgressLib instances for text consoles
and graphical consoles.
Cc: Sean Brogan
Cc: S
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from:
https://github.com/Microsoft/MS_UEFI/blob/share/MsCapsuleSupport/MsCapsuleUpdatePkg/Include/Library/DisplayUpdateProgressLib.h
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport/MsCapsuleUpdatePkg/Library/Disp
From: Michael D Kinney
https://bugzilla.tianocore.org/show_bug.cgi?id=801
Based on content from the following branch/commits:
https://github.com/Microsoft/MS_UEFI/tree/share/MsCapsuleSupport
Add the DisplayUpdateProgressLib class that is used
to inform the user of progress during updates of
fir
Reviewed-by: Feng, Bob C
-Original Message-
From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Jaben
Sent: Thursday, April 12, 2018 7:08 AM
To: edk2-devel@lists.01.org
Cc: Feng, Bob ; Gao, Liming
Subject: [edk2] [PATCH v1 4/4] BaseTools: merge towards minimum PCD MAX
Cc: Liming Gao
Cc: Yonghong Zhu
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Jaben Carsey
---
BaseTools/Source/Python/Common/DataType.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/BaseTools/Source/Python/Common/DataType.py
b/BaseTools/Source/P
Cc: Liming Gao
Cc: Yonghong Zhu
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Jaben Carsey
---
BaseTools/Source/Python/AutoGen/AutoGen.py | 26 +++---
BaseTools/Source/Python/AutoGen/GenC.py | 94
++--
BaseTo
refactor to reduce duplication
remove a duplicate function name (I presume this branch never executes
as it would have had exception)
Jaben (4):
BaseTools: remove duplicate function name
BaseTools: replace 'UINT8','UINT16','UINT32','UINT64','VOID*' with
shared constants.
BaseTools: Remov
Cc: Liming Gao
Cc: Yonghong Zhu
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Jaben Carsey
---
BaseTools/Source/Python/Eot/FvImage.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/BaseTools/Source/Python/Eot/FvImage.py
b/BaseTools/Source/Pytho
we have 5 different max val or max byte for PCDs.
refactor and remove 2 methods.
we need 3, as one computes for VOID* PCDs.
Cc: Bob Feng
Cc: Liming Gao
Cc: Yonghong Zhu
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Jaben Carsey
---
BaseTools/Source/Python/Common/DataT
On Fri, Apr 06, 2018 at 03:42:10PM +0100, Supreeth Venkatesh wrote:
> This patch adds the definitions, sources, packages and library classes
> needed to compile and link MMU Library suitable for use in S-EL0.
>
> Currently, this is used only during the Standalone MM Core
> initialization and hence
Hi Supreeth,
On Fri, Apr 06, 2018 at 03:42:09PM +0100, Supreeth Venkatesh wrote:
> The Standalone MM environment runs in S-EL0 in AArch64 on ARM Standard
> Platforms. Privileged firmware e.g. ARM Trusted Firmware sets up its
> architectural context including the initial translation tables for the
On 11 April 2018 at 13:25, Laszlo Ersek wrote:
> Hi Steve,
Hi Laszlo,
[...]
> Summary:
> (1) introduce a custom GUID for "NorFlashDxe has formatted the variable
> store headers for the variable driver to read";
> (2) install the GUID in NorFlashDxe once it's done verifying and/or
> form
On 04/11/18 18:10, Ard Biesheuvel wrote:
> On 11 April 2018 at 17:34, Supreeth Venkatesh
> wrote:
>> Laszlo/Steve,
>>
>> I ran into the same problem on ArmVExpress-FVP-AArch64 while running
>> management mode.
>> I have fixed this problem in this patch by reordering driver load order here:
>> htt
On 04/06/18 16:46, Supreeth Venkatesh wrote:
> ARM CPU driver inf file recently got updated to have a depedency
> expression to load after GIC driver.
> However, there are other Arm drivers like NorFlashDxe, MM Communication
> drivers etc. which depends on ARM CPU driver for AddMemorySpace() and
>
On 04/11/18 17:34, Supreeth Venkatesh wrote:
> Laszlo/Steve,
>
> I ran into the same problem on ArmVExpress-FVP-AArch64 while running
> management mode.
> I have fixed this problem in this patch by reordering driver load
> order here:
> https://lists.01.org/pipermail/edk2-devel/2018-April/023550.ht
On 11 April 2018 at 17:34, Supreeth Venkatesh
wrote:
> Laszlo/Steve,
>
> I ran into the same problem on ArmVExpress-FVP-AArch64 while running
> management mode.
> I have fixed this problem in this patch by reordering driver load order here:
> https://lists.01.org/pipermail/edk2-devel/2018-April/0
Laszlo/Steve,
I ran into the same problem on ArmVExpress-FVP-AArch64 while running management
mode.
I have fixed this problem in this patch by reordering driver load order here:
https://lists.01.org/pipermail/edk2-devel/2018-April/023550.html
Not sure whether Leif/Ard/Laszlo agree with this.
Th
On Fri, Apr 06, 2018 at 03:42:06PM +0100, Supreeth Venkatesh wrote:
> This patch defines PCDs to describe the base address and size of
> communication buffer between normal world (uefi) and standalone MM
> environment in the secure world.
>
> Contributed-under: TianoCore Contribution Agreement 1.1
Hi Supreeth,
On Fri, Apr 06, 2018 at 03:42:08PM +0100, Supreeth Venkatesh wrote:
> This patch adds the Management Mode(MM) SVC return codes as specified in
> http://infocenter.arm.com/help/topic/com.arm.doc.den0060a/DEN0060A_ARM_MM_Interface_Specification.pdf.
> Also, corrects SVC ID for retrievin
I have been wondering about that <> thing myself. Thanks!
> -Original Message-
> From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of
> Laszlo Ersek
> Sent: Wednesday, April 11, 2018 2:02 AM
> To: Feng, YunhuaX ; edk2-devel@lists.01.org
> Cc: Gao, Liming
> Subject: Re:
I would like to replace all use of string constants with the ones in DataType.
I just didn't get to the rest.
> -Original Message-
> From: Zhu, Yonghong
> Sent: Tuesday, April 10, 2018 6:08 PM
> To: Carsey, Jaben ; edk2-devel@lists.01.org
> Cc: Gao, Liming ; Zhu, Yonghong
>
> Subject: R
Hi Supreeth,
CIL.
On Fri, Apr 06, 2018 at 03:42:07PM +0100, Supreeth Venkatesh wrote:
> PI v1.5 Specification Volume 4 defines Management Mode Core Interface
> and defines EFI_MM_COMMUNICATION_PROTOCOL. This protocol provides a
> means of communicating between drivers outside of MM and MMI
> hand
Hi Steve,
On 04/11/18 12:30, Steve Capper wrote:
> Hello,
> I am trying to debug a boot problem for a recent build of EDK2 in an
> Arm FVP model.
>
> I built EDK2 from the following branches:
> Edk2: a146c532c754106431b063fec9985a838afd82be
> Edk2-platforms: e74f53df8b18e4aed0c9df0942ce0c30f78a68e
In the next patches, we'll need the lengths of the
TLS_CIPHER_MAPPING.OpensslCipher string fields. These lengths can be
computed at build time; add the new field "OpensslCipherLength", and
introduce the MAP() macro for populating it.
While at it, add some horizontal whitespace to "TlsCipherMapping
Improve the performance of the TlsGetCipherMapping() function by adopting
the binary search from DhcpFindOptionFormat()
[MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Option.c].
Cc: Jiaxin Wu
Cc: Qin Long
Cc: Siyuan Fu
Cc: Ting Ye
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=915
Contribu
"InternalTlsLib.h" includes "BaseCryptLib.h", but the lib class is not
listed in the INF file.
The INF file lists a good number of lib classes, but none of the lib class
headers are included by "InternalTlsLib.h".
Synchronize & sort both lists, while removing those library classes that
aren't act
Rewrite the TlsSetCipherList() function in order to fix the following
issues:
- Any cipher identifier in CipherId that is not recognized by
TlsGetCipherMapping() will cause the function to return EFI_UNSUPPORTED.
This is a problem because CipherId is an ordered preference list, and a
caller
The structures defined in RFC 5246 are not to have any padding between
fields or at the end; use the "pack" pragma as necessary.
Cc: Jiaxin Wu
Cc: Liming Gao
Cc: Michael D Kinney
Cc: Siyuan Fu
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=915
Contributed-under: TianoCore Contribution Agr
TlsSetSessionData() shouldn't just ignore an incomplete EFI_TLS_CIPHER
element at the end of "Data":
- Generally speaking, malformed input for a security API is best rejected
explicitly.
- Specifically speaking, the size of EFI_TLS_CIPHER is 2 bytes. If
DataSize is 1 on input, then the initia
In the following patches it will be useful if the IANA CipherId lookup
returns a pointer to the whole matching IANA-to-OpenSSL mapping structure,
not just the OpenSSL cipher suite name. Rename TLS_CIPHER_PAIR and
TlsGetCipherString() to TLS_CIPHER_MAPPING and TlsGetCipherMapping()
respectively, and
Repo: https://github.com/lersek/edk2.git
Branch: tls_ciphers_v2
This is version 2 of the series posted earlier at
20180403145149.8925-1-lersek@redhat.com">http://mid.mail-archive.com/20180403145149.8925-1-lersek@redhat.com
https://lists.01.org/pipermail/edk2-devel/2018-April/023402.html
Ch
Fix the following style issues:
- "Data" is accessed through a pointer to UINT16 rather than to a pointer
to EFI_TLS_CIPHER. While technically correct, UINT16 is harder to
interpret against the UEFI spec.
- Array subscripting is written with weird *(Pointer + Offset)
expressions, rather tha
Read the list of trusted cipher suites from fw_cfg and to store it to
EFI_TLS_CA_CERTIFICATE_VARIABLE.
The fw_cfg file is formatted by the "update-crypto-policies" utility on
the host side, so that the host settings take effect in guest HTTPS boot
as well. QEMU forwards the file intact to the firm
Hello,
I am trying to debug a boot problem for a recent build of EDK2 in an
Arm FVP model.
I built EDK2 from the following branches:
Edk2: a146c532c754106431b063fec9985a838afd82be
Edk2-platforms: e74f53df8b18e4aed0c9df0942ce0c30f78a68e2
Toolchain: Debian Stretch latest (though I have also tried L
On 04/11/18 09:57, Laszlo Ersek wrote:
> Hello Yunhua,
>
> On 04/10/18 03:09, Feng, YunhuaX wrote:
>> Free DummyFileBuffer and set DummyFileBuffer to NULL.
>>
>> Cc: Liming Gao
>> Cc: Yonghong Zhu
>> Contributed-under: TianoCore Contribution Agreement 1.1
>>
>> Signed-off-by: Yunhua Feng
>> ---
Heap Guard feature needs enough memory and paging to work. Otherwise
calling SetMemoryAttributes to change page attribute will fail. This
patch add necessary check of result of calling SetMemoryAttributes.
This can help users to debug their problem in enabling this feature.
Cc: Star Zeng
Cc: Eric
Thank you so much about this clarification, Laszlo.
The submodule maintenance (commands for update / sync) looks a little confused
to me.
Let me check more locally before the V2.
Best Regards & Thanks,
LONG, Qin
-Original Message-
From: Laszlo Ersek [mailto:ler...@redhat.com]
Sent:
Heap Guard feature needs enough memory and paging to work. Otherwise
calling SetMemoryAttributes to change page attribute will fail. This
patch add necessary check of result of calling SetMemoryAttributes.
This can help users to debug their problem in enabling this feature.
Cc: Star Zeng
Cc: Eric
Heap Guard feature needs enough memory and paging to work. Otherwise
calling SetMemoryAttributes to change page attribute will fail. This
patch add necessary check of result of calling SetMemoryAttributes.
This can help users to debug their problem in enabling this feature.
Jian J Wang (2):
MdeM
Hello Qin,
On 04/11/18 10:11, Long Qin wrote:
> (https://bugzilla.tianocore.org/show_bug.cgi?id=927)
>
> Update OpenSSL version to 1.1.0h release (27-Mar-2018) to include the
> fix for CVE-2018-0739 issue (Handling of crafted recursive ASN.1
> structures can cause a stack overflow and resulting d
(https://bugzilla.tianocore.org/show_bug.cgi?id=927)
Update OpenSSL version to 1.1.0h release (27-Mar-2018) to include the
fix for CVE-2018-0739 issue (Handling of crafted recursive ASN.1
structures can cause a stack overflow and resulting denial of service,
Refer to https://www.openssl.org/news/s
It should be exposed by 5b91bf82c67b586b9588cbe4bbffa1588f6b5926 +
0c9f2cb10b7ddec56a3440e77219fd3ab1725e5c.
With this information updated in commit log, Reviewed-by: Star Zeng
.
Thanks,
Star
-Original Message-
From: Wang, Jian J
Sent: Wednesday, April 11, 2018 3:30 PM
To: edk2-devel@l
Hello Yunhua,
On 04/10/18 03:09, Feng, YunhuaX wrote:
> Free DummyFileBuffer and set DummyFileBuffer to NULL.
>
> Cc: Liming Gao
> Cc: Yonghong Zhu
> Contributed-under: TianoCore Contribution Agreement 1.1
>
> Signed-off-by: Yunhua Feng
> ---
> BaseTools/Source/C/GenSec/GenSec.c | 3 ++-
> 1
1 - 100 of 101 matches
Mail list logo