Hi,
On 2019/1/22 3:40, Ard Biesheuvel wrote:
On Mon, 21 Jan 2019 at 14:36, Julien Grall wrote:
Hi,
On 21/01/2019 10:46, Zeng, Star wrote:
On 2019/1/18 2:59, Julien Grall wrote:
I saw the discussion at
https://lists.01.org/pipermail/edk2-devel/2019-January/035405.html. Fortunately,
it has be
Hi Jun, Haojian,
Please review the patch.
Thanks,
Meenakshi
> -Original Message-
> From: Leif Lindholm
> Sent: Thursday, January 17, 2019 4:54 PM
> To: Meenakshi Aggarwal
> Cc: ard.biesheu...@linaro.org; edk2-devel@lists.01.org; Jun Nie
> ; Haojian Zhuang
> Subject: Re: [PATCH] SD/eMM
Yes. No objections from me. Sorry for missed the previous mail.
Thanks,
Ting
-Original Message-
From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
Sent: Monday, January 21, 2019 8:41 PM
To: Gao, Liming
Cc: Wang, Jian J ; Ye, Ting ;
edk2-devel@lists.01.org; Kinney, Michael D ; Wei,
From: Grzegorz Jaszczyk
The memory controller registers are marked as secure in the latest
ARM-TF for Armada SoCs. It is available however get the DRAM
information via SiP services in the EL3, so use it instead
of accessing the registers directly.
Contributed-under: TianoCore Contribution Agreem
From: Grzegorz Jaszczyk
For upcomming patch there is need to get AP806 base, provide required
getter function for it.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Marcin Wojtas
---
Silicon/Marvell/Armada7k8k/Library/Armada7k8kSoCDescLib/Armada7k8kSoCDescLib.h
| 6 ++
Marvell firmware allows to use SiP services other than
for ComPhy handling. In order to avoid spreading the SMC
ID's definitions across many files, introduce common header
for that purpose.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Marcin Wojtas
---
Silicon/Marvell/I
Recent changes in the ARM-TF configure its runtime serices region
as protected, hence the hitherto PEI stack base address (0x41F)
violated it.
In order to fix this, extend the region which is non-accessible
by the OS to cover both the ARM-TF (0x400 - 0x420) and OPTEE
(0x440 - 0x540
Hi,
The second version of the patchset introduces the new common
header for Marvell SMC ID's, and answers other remarks
pointed out in v1 review. The details can be found in the
changelog below.
Patches are available in the github:
https://github.com/MarvellEmbeddedProcessors/edk2-open-platform/c
Reviewed-by: Chasel Chiu
> -Original Message-
> From: Ni, Ray
> Sent: Monday, January 21, 2019 11:17 PM
> To: edk2-devel@lists.01.org
> Cc: Ni, Ray ; Dong, Eric ; Chiu, Chasel
>
> Subject: [PATCH] UefiCpuPkg/MtrrLib: Fix a bug that may wrongly set memory
> <1MB to UC
>
> REF: https://
On 1/21/19 10:21 PM, Laszlo Ersek wrote:
> Hi Phil,
>
> On 01/21/19 14:26, Philippe Mathieu-Daudé wrote:
>> Hi,
>>
>> On 1/21/19 1:53 PM, Gao, Liming wrote:
>>> Thanks Ard and Laszlo. For the minor change in single patch, the patch may
>>> be sent separately with the clear subject. Or, the patch
On Mon, 21 Jan 2019 at 22:22, Ard Biesheuvel wrote:
>
> On Mon, 21 Jan 2019 at 22:15, Laszlo Ersek wrote:
> >
> > Hi Julien,
> >
> > On 01/21/19 14:36, Julien Grall wrote:
> > > Hi,
> > >
> > > On 21/01/2019 10:46, Zeng, Star wrote:
> > >> On 2019/1/18 2:59, Julien Grall wrote:
> > >> I saw the d
On Mon, 21 Jan 2019 at 22:15, Laszlo Ersek wrote:
>
> Hi Julien,
>
> On 01/21/19 14:36, Julien Grall wrote:
> > Hi,
> >
> > On 21/01/2019 10:46, Zeng, Star wrote:
> >> On 2019/1/18 2:59, Julien Grall wrote:
> >> I saw the discussion at
> >> https://lists.01.org/pipermail/edk2-devel/2019-January/03
Hi Phil,
On 01/21/19 14:26, Philippe Mathieu-Daudé wrote:
> Hi,
>
> On 1/21/19 1:53 PM, Gao, Liming wrote:
>> Thanks Ard and Laszlo. For the minor change in single patch, the patch may
>> be sent separately with the clear subject. Or, the patch set can be sent
>> again.
>
> Since it is hard to
Hi Julien,
On 01/21/19 14:36, Julien Grall wrote:
> Hi,
>
> On 21/01/2019 10:46, Zeng, Star wrote:
>> On 2019/1/18 2:59, Julien Grall wrote:
>> I saw the discussion at
>> https://lists.01.org/pipermail/edk2-devel/2019-January/035405.html.
>> Fortunately,
>> it has been fixed.
>> So I did rebas
On Mon, 21 Jan 2019 at 14:36, Julien Grall wrote:
>
> Hi,
>
> On 21/01/2019 10:46, Zeng, Star wrote:
> > On 2019/1/18 2:59, Julien Grall wrote:
> > I saw the discussion at
> > https://lists.01.org/pipermail/edk2-devel/2019-January/035405.html.
> > Fortunately,
> > it has been fixed.
> > So I did
On Thu, 17 Jan 2019 at 12:14, Leif Lindholm wrote:
>
> On Fri, Jan 04, 2019 at 03:43:29PM +0100, Ard Biesheuvel wrote:
> > Wire up the various pieces so that the authenticated variable store
> > runs entirely in standalone MM context residing in a secure partition.
> >
> > This primarily involves
On Mon, Jan 21, 2019 at 05:57:20PM +0100, Ard Biesheuvel wrote:
> On Thu, 17 Jan 2019 at 13:18, Ard Biesheuvel
> wrote:
> >
> > On Thu, 17 Jan 2019 at 13:08, Leif Lindholm
> > wrote:
> > >
> > > On Thu, Jan 17, 2019 at 12:10:01PM +0100, Ard Biesheuvel wrote:
> > > > > >
> > > > > > ##
On Thu, 17 Jan 2019 at 13:18, Ard Biesheuvel wrote:
>
> On Thu, 17 Jan 2019 at 13:08, Leif Lindholm wrote:
> >
> > On Thu, Jan 17, 2019 at 12:10:01PM +0100, Ard Biesheuvel wrote:
> > > > >
> > > > >
> > > > > #
>
On Mon, Jan 21, 2019 at 05:47:10PM +0100, Ard Biesheuvel wrote:
> On Mon, 21 Jan 2019 at 17:46, Leif Lindholm wrote:
> >
> > On Mon, Jan 21, 2019 at 05:16:09PM +0100, Ard Biesheuvel wrote:
> > > > > > diff --git
> > > > > > a/Silicon/Socionext/SynQuacer/Drivers/Fip006Dxe/NorFlashDxe.h
> > > > >
On Mon, Jan 21, 2019 at 02:29:17PM +0100, Philippe Mathieu-Daudé wrote:
> On 1/21/19 2:07 PM, Ard Biesheuvel wrote:
> > On Mon, 21 Jan 2019 at 14:07, Leif Lindholm
> > wrote:
> >>
> >> ArmPkg/Include/IndustryStandard/ArmTrustZoneSmc.h contains definitions
> >> contradicting the SMC Calling Conven
On Mon, 21 Jan 2019 at 17:46, Leif Lindholm wrote:
>
> On Mon, Jan 21, 2019 at 05:16:09PM +0100, Ard Biesheuvel wrote:
> > > > > diff --git
> > > > > a/Silicon/Socionext/SynQuacer/Drivers/Fip006Dxe/NorFlashDxe.h
> > > > > b/Silicon/Socionext/SynQuacer/Drivers/Fip006Dxe/NorFlash.h
> > > > > simil
On Mon, Jan 21, 2019 at 05:16:09PM +0100, Ard Biesheuvel wrote:
> > > > diff --git
> > > > a/Silicon/Socionext/SynQuacer/Drivers/Fip006Dxe/NorFlashDxe.h
> > > > b/Silicon/Socionext/SynQuacer/Drivers/Fip006Dxe/NorFlash.h
> > > > similarity index 88%
> > > > rename from Silicon/Socionext/SynQuacer/
On Thu, 17 Jan 2019 at 12:27, Ard Biesheuvel wrote:
>
> On Thu, 17 Jan 2019 at 11:10, Leif Lindholm wrote:
> >
> > On Fri, Jan 04, 2019 at 03:43:31PM +0100, Ard Biesheuvel wrote:
> > > In preparation of creating a SMM version of the FIP006 NOR flash
> > > driver, refactor the existing pieces into
On Mon, Jan 21, 2019 at 04:47:31PM +0100, Marcin Wojtas wrote:
> > > -#define DRAM_REGION_SIZE_EVEN(C)(((C) >= 7) && ((C) <= 26))
> > > -#define GET_DRAM_REGION_SIZE_EVEN(C)((UINT64)1 << ((C) + 16))
> > > -#define DRAM_REGION_SIZE_ODD(C) ((C) <= 4)
> > > -#define GET_DRAM_REGION
Hi Leif,
pon., 21 sty 2019 o 12:51 Leif Lindholm napisał(a):
>
> On Mon, Jan 21, 2019 at 11:52:11AM +0100, Marcin Wojtas wrote:
> > From: Grzegorz Jaszczyk
> >
> > The memory controller registers are marked as secure in the latest
> > ARM-TF for Armada SoCs. It is available however get the DRAM
Hi Leif,
pon., 21 sty 2019 o 12:32 Leif Lindholm napisał(a):
>
> On Mon, Jan 21, 2019 at 11:52:10AM +0100, Marcin Wojtas wrote:
> > From: Grzegorz Jaszczyk
> >
> > For upcomming patch there is need to get AP806 base, provide required
> > getter function for it.
> >
> > Contributed-under: TianoCo
On Mon, Jan 21, 2019 at 04:34:39PM +0100, Marcin Wojtas wrote:
> Hi Leif,
>
>
> pon., 21 sty 2019 o 12:26 Leif Lindholm napisał(a):
> >
> > On Mon, Jan 21, 2019 at 11:52:09AM +0100, Marcin Wojtas wrote:
> > > Recent changes in the ARM-TF configure its runtime serices region
> > > as protected, h
Hi Leif,
pon., 21 sty 2019 o 12:26 Leif Lindholm napisał(a):
>
> On Mon, Jan 21, 2019 at 11:52:09AM +0100, Marcin Wojtas wrote:
> > Recent changes in the ARM-TF configure its runtime serices region
> > as protected, hence the hitherto PEI stack base address (0x41F)
> > violated it.
> >
> > I
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1481
Today's MtrrLib contains a bug, for example:
when the original cache setting is WB for [0xF_, 0xF_8000) and,
a new request to set [0xF_, 0xF_4000) to WP,
the cache setting for [0xF_4000, 0xF_8000) is reset to UC.
The reason is wh
On Fri, 18 Jan 2019 at 16:42, Yao, Jiewen wrote:
>
> Thanks to remind me.
> I took a look at all patches.
>
> I skipped all ARM specific patches, and reviewed rest of them.
> All my feedback is provided in the individual patch.
>
> Thank you
> Yao Jiewen
>
> > -Original Message-
> > From:
On Mon, 21 Jan 2019 at 13:49, Gao, Liming wrote:
>
> Ard:
> The patches created by you recently is to support the standalone MM
> authenticated variable stack. This is likely a new feature.
>
> Could you help submit BZ for this new feature or reuse the existing BZ?
> And, update
> https://g
Hi,
On 21/01/2019 10:46, Zeng, Star wrote:
> On 2019/1/18 2:59, Julien Grall wrote:
> I saw the discussion at
> https://lists.01.org/pipermail/edk2-devel/2019-January/035405.html.
> Fortunately,
> it has been fixed.
> So I did rebase for the code.
> Repo: g...@github.com:lzeng14/edk2.git
> Bran
On 1/21/19 2:07 PM, Ard Biesheuvel wrote:
> On Mon, 21 Jan 2019 at 14:07, Leif Lindholm wrote:
>>
>> ArmPkg/Include/IndustryStandard/ArmTrustZoneSmc.h contains definitions
>> contradicting the SMC Calling Convention (ARM DEN0028B).
>>
>> It also has no users in public trees. So delete before it ca
Hi,
On 1/21/19 1:53 PM, Gao, Liming wrote:
> Thanks Ard and Laszlo. For the minor change in single patch, the patch may be
> sent separately with the clear subject. Or, the patch set can be sent again.
Since it is hard to follow technical discussion when top-posted (see
https://www.caliburn.nl/t
On Mon, 21 Jan 2019 at 14:07, Leif Lindholm wrote:
>
> ArmPkg/Include/IndustryStandard/ArmTrustZoneSmc.h contains definitions
> contradicting the SMC Calling Convention (ARM DEN0028B).
>
> It also has no users in public trees. So delete before it can cause
> damage.
>
> Contributed-under: TianoCor
ArmPkg/Include/IndustryStandard/ArmTrustZoneSmc.h contains definitions
contradicting the SMC Calling Convention (ARM DEN0028B).
It also has no users in public trees. So delete before it can cause
damage.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Leif Lindholm
---
Ar
Thanks Ard and Laszlo. For the minor change in single patch, the patch may be
sent separately with the clear subject. Or, the patch set can be sent again.
Thanks
Liming
> -Original Message-
> From: Laszlo Ersek [mailto:ler...@redhat.com]
> Sent: Saturday, January 19, 2019 9:17 AM
> To: Ar
Ard:
The patches created by you recently is to support the standalone MM
authenticated variable stack. This is likely a new feature.
Could you help submit BZ for this new feature or reuse the existing BZ? And,
update
https://github.com/tianocore/tianocore.github.io/wiki/EDK-II-Release-Plan
On Wed, 16 Jan 2019 at 22:22, Ard Biesheuvel wrote:
>
> Add MM_STANDALONE to the list of permitted module types of various
> libraries that are required to build the standalone MM authenticated
> variable stack.
>
> In some cases, this requires the MODULE_TYPE to be modified to BASE,
> given that
On Mon, 21 Jan 2019 at 13:40, Gao, Liming wrote:
>
> Ard:
> Wang, Jian is the reviewer of CryptoPkg. I think that his review-by is
> enough.
>
OK, thanks!
> Thanks
> Liming
> > -Original Message-
> > From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
> > Sent: Monday, January 21
Ard:
Wang, Jian is the reviewer of CryptoPkg. I think that his review-by is
enough.
Thanks
Liming
> -Original Message-
> From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
> Sent: Monday, January 21, 2019 8:36 PM
> To: Wang, Jian J ; Ye, Ting
> Cc: edk2-devel@lists.01.org; Kinney
Reviewed-by: Liming Gao
> -Original Message-
> From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Ard
> Biesheuvel
> Sent: Friday, January 18, 2019 7:07 PM
> To: edk2-devel@lists.01.org
> Cc: Ye, Ting ; Gao, Liming ; Wu, Hao
> A ; Yao, Jiewen
> ; Zeng, Star ; Kinney,
On Fri, 18 Jan 2019 at 12:12, Ard Biesheuvel wrote:
>
> On Fri, 18 Jan 2019 at 08:08, Wang, Jian J wrote:
> >
> >
> >
> > Reviewed-by: Jian J Wang
> >
>
> Ting, do you have any objections to this patch?
>
Ping?
> >
> > > -Original Message-
> > > From: Ard Biesheuvel [mailto:ard.biesh
On Mon, Jan 21, 2019 at 11:52:11AM +0100, Marcin Wojtas wrote:
> From: Grzegorz Jaszczyk
>
> The memory controller registers are marked as secure in the latest
> ARM-TF for Armada SoCs. It is available however get the DRAM
> information via SiP services in the EL3, so use it instead
> of accessin
On Mon, Jan 21, 2019 at 11:52:10AM +0100, Marcin Wojtas wrote:
> From: Grzegorz Jaszczyk
>
> For upcomming patch there is need to get AP806 base, provide required
> getter function for it.
>
> Contributed-under: TianoCore Contribution Agreement 1.1
> Signed-off-by: Marcin Wojtas
> ---
>
> Sil
From: Grzegorz Jaszczyk
The memory controller registers are marked as secure in the latest
ARM-TF for Armada SoCs. It is available however get the DRAM
information via SiP services in the EL3, so use it instead
of accessing the registers directly.
Contributed-under: TianoCore Contribution Agreem
On Mon, Jan 21, 2019 at 11:52:09AM +0100, Marcin Wojtas wrote:
> Recent changes in the ARM-TF configure its runtime serices region
> as protected, hence the hitherto PEI stack base address (0x41F)
> violated it.
>
> In order to fix this, extend the region which is non-accessible
> by the OS to
From: Grzegorz Jaszczyk
For upcomming patch there is need to get AP806 base, provide required
getter function for it.
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Marcin Wojtas
---
Silicon/Marvell/Armada7k8k/Library/Armada7k8kSoCDescLib/Armada7k8kSoCDescLib.h
| 1 +
Recent changes in the ARM-TF configure its runtime serices region
as protected, hence the hitherto PEI stack base address (0x41F)
violated it.
In order to fix this, extend the region which is non-accessible
by the OS to cover both the ARM-TF (0x400 - 0x420) and OPTEE
(0x440 - 0x540
Hi,
This short patchset adjust to the latest Marvell v18.12
ARM-TF sources. They change DRAM configuration
registers to be secure, as well as extend the region,
which is non-accessible by OS. The patches avoid
the issues by shifitng PEI stack base and configuring
the memory map, using SiP services
Hi Julien,
On 2019/1/18 2:59, Julien Grall wrote:
Hi Star,
On 17/01/2019 01:26, Zeng, Star wrote:
On 2019/1/16 22:26, Julien Grall wrote:
Hi Laszlo,
On 15/01/2019 09:37, Laszlo Ersek wrote:
On 01/14/19 16:19, Star Zeng wrote:
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1323
Merge E
Hi Dandan,
On 21/01/2019 02:23, Bi, Dandan wrote:
I have committed the fix patch.
https://github.com/tianocore/edk2/commit/eb76b76218d5bac867414e2ff6dd09c6e7c700dd
Please trying the latest EDK2 master.
I have tried EDK2 master and got a guest booting with UEFI. Thank you for
merging it!
Ch
52 matches
Mail list logo