Re: [edk2] XHCI question

2015-06-25 Thread Tian, Feng
Thanks, Baranee I double checked code flow. When there is transaction error, the Urb->EvtTrb would not be updated and is NULL (see line 1165 of last revision in EDKII trunk XhciSched.c). Then XhcCmdTransfer() may return EFI_SUCCESS with EvtTrb == NULL. So I think it may bring exception at Xhc

[edk2] [PATCH v2 10/13] MdeModulePkg/Universal/PCD: Use safe string functions to refine code.

2015-06-25 Thread Qiu Shumin
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Qiu Shumin Reviewed-by: Star Zeng --- MdeModulePkg/Universal/PCD/Dxe/Service.c | 8 +--- MdeModulePkg/Universal/PCD/Pei/Service.c | 8 +--- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/MdeModulePkg/

[edk2] [PATCH v2 05/13] MdeModulePkg/Library/SmmCorePerformanceLib: Use safe string functions to refine code.

2015-06-25 Thread Qiu Shumin
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Qiu Shumin Reviewed-by: Star Zeng --- MdeModulePkg/Library/SmmCorePerformanceLib/SmmCorePerformanceLib.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/MdeModulePkg/Library/SmmCorePerformanceLib/SmmCo

[edk2] [PATCH v2 01/13] MdeModulePkg/Application/MemoryProfileInfo: Use safe string functions to refine code.

2015-06-25 Thread Qiu Shumin
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Qiu Shumin Reviewed-by: Star Zeng --- MdeModulePkg/Application/MemoryProfileInfo/MemoryProfileInfo.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/MdeModulePkg/Application/MemoryProfileInfo/MemoryP

[edk2] [PATCH 8/9] EdkCompatibilityPkg: Remove ZeroGuid definition in Datahub2SmbiosThunk

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the ZeroGuid defined in \Compatibility\PiSmbiosRecordOnDataHubSmbiosRecordThunk is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey ---

[edk2] [PATCH 9/9] EdkCompatibilityPkg: Remove gZeroGuid def in FrameworkHiiOnUefiHiiThunk

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the gZeroGuid defined in Compatibility/FrameworkHiiOnUefiHiiThunk is redundent. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- .../FrameworkH

[edk2] [PATCH 4/9] NetworkPkg: Remove mZeroGuid definition in IpSecDxe

2015-06-25 Thread Hao Wu
mZeroGuid is defined but not used in IpSecDxe. All the header files in IpSecDxe which expose mZeroGuid are not included externally as well. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- NetworkPkg/IpSecDxe/Ik

[edk2] [PATCH 0/9] Remove redundant ZeroGuid definitions

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in Include/Guid/ZeroGuid.h, therefore, the ZeroGuid/gZeroGuid/mZeroGuid/mTrEEZeroGuid defined in current code is redundent. Hao Wu (9): IntelFrameworkModulePkg: Remove gZeroGuid definition in DataHubDxe MdeModulePkg: Remove gZeroGuid definition in SetupBrowse

[edk2] [PATCH 1/9] IntelFrameworkModulePkg: Remove gZeroGuid definition in DataHubDxe

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the gZeroGuid defined in DataHubDxe is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- IntelFrameworkModulePkg/Universal/DataHubDxe

[edk2] [PATCH 5/9] SecurityPkg: Remove mTrEEZeroGuid definition in DxeTpm2MeasureBootLib

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the mTrEEZeroGuid defined in DxeTpm2MeasureBootLib is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- SecurityPkg/Library/DxeTpm2Me

[edk2] [PATCH 2/9] MdeModulePkg: Remove gZeroGuid definition in SetupBrowserDxe

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the gZeroGuid defined in SetupBrowserDxe is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- MdeModulePkg/Universal/SetupBrowserDxe/

[edk2] [PATCH 6/9] SecurityPkg: Remove mZeroGuid definition in DxeTpmMeasureBootLib

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the mZeroGuid defined in DxeTpmMeasureBootLib is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- SecurityPkg/Library/DxeTpmMeasureB

[edk2] [PATCH 3/9] MdeModulePkg: Remove mZeroGuid definition in Universal/Variable/RuntimeDxe

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the mZeroGuid defined in Universal/Variable/RuntimeDxe is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- MdeModulePkg/Universal/Va

[edk2] [PATCH 7/9] SecurityPkg: Remove mZeroGuid def in VariableAuthenticated/RuntimeDxe

2015-06-25 Thread Hao Wu
MdeModulePkg has defined gZeroGuid in 'Guid/ZeroGuid.h', therefore, the mZeroGuid defined in VariableAuthenticated/RuntimeDxe is redundant. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- SecurityPkg/VariableAu

[edk2] [Basetool][Ecc][patch]Fix a bug when checking copyright format

2015-06-25 Thread Chen, Hesheng
Hello Yang and all, Could you help review this patch? Thank you [Description] Fix a bug when checking copyright format Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hess Chen mailto:hesheng.c...@intel.com> > Best Regards, Chen, Hess Intel China Software Center Tel: +86

[edk2] [PATCH] UefiCpuPkg S3Resume2Pei: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jaben Carsey --- UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c b/UefiCpuPkg/U

[edk2] [PATCH 2/2] PerformancePkg Dp_App: Resolve buffer size mismatch

2015-06-25 Thread Hao Wu
CHAR16 array mGaugeString[DP_GAUGE_STRING_LENGTH + 1] is pass into function GetShortPdbFileName(). However, in this function it treats the size of the input buffer as DXE_PERFORMANCE_STRING_SIZE. Though DXE_PERFORMANCE_STRING_SIZE is smaller than DP_GAUGE_STRING_LENGTH now, but this manner might i

Re: [edk2] [patch 0/2] Do TPer Reset for all encrypted drives

2015-06-25 Thread Tian, Feng
Yes, you are right. I forget removing these from AtaBus driver. -Original Message- From: Zeng, Star [mailto:star.z...@intel.com] Sent: Friday, June 26, 2015 13:16 To: edk2-devel@lists.sourceforge.net; Yao, Jiewen Subject: Re: [edk2] [patch 0/2] Do TPer Reset for all encrypted drives Also

[edk2] [PATCH 0/2] PerformancePkg Dp_App: Use safe string functions

2015-06-25 Thread Hao Wu
The first patch is to use safe string functions in Dp_App. The second patch is to resolve a buffer size mismatch problem in DpUtilities.c. Details are available in the log message in each commit. Hao Wu (2): PerformancePkg Dp_App: Use safe string functions PerformancePkg Dp_App: Resolve buffe

[edk2] [PATCH 1/2] PerformancePkg Dp_App: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jaben Carsey --- PerformancePkg/Dp_App/DpUtilities.c | 27 ++- 1 file changed, 18 insertions(+), 9 deletions(-) diff --git a/PerformancePkg/Dp_App/DpUtilities.c b/PerformancePkg/D

Re: [edk2] [patch 0/2] Do TPer Reset for all encrypted drives

2015-06-25 Thread Zeng, Star
Also need to remove #include from AtaBus.h and gEfiMemoryOverwriteControlDataGuid from AtaBusDxe.inf? Others are good to me. Thanks, Star -Original Message- From: Tian Feng [mailto:feng.t...@intel.com] Sent: Thursday, June 25, 2015 12:01 PM To: zeng.s...@intel.com; Yao, Jiewen Cc: edk2

Re: [edk2] [PATCH v2 02/24] PcAtChipsetPkg: remove PciHostBridgeDxe

2015-06-25 Thread Ni, Ruiyu
Jordan, Simply using PCD to split the code is very straightforward. Another approach is to introduce a new library class with carefully defined library APIs so that different platforms can use one common driver plus different instances of libraries. After all, abstracting is never a easy work. S

[edk2] [PATCH v2 0/2] MdePkg: Remove unsafe string functions

2015-06-25 Thread Hao Wu
Changes between PATCH v1: 1. Replace Buf = AllocateZeroPool (size) followed by Strcpy (Buf, Source) with Buf = AllocateCopyPool (size, Source) 2. Replace unnecessary usage of StrnCpyS/CatS with StrCpyS/CatS 3. The CopyMem() usage in file DevicePathFromText.c for the first patch is a mistake.

[edk2] [PATCH v2] IntelFrameworkPkg FrameworkUefiLib: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- IntelFrameworkPkg/Library/FrameworkUefiLib/UefiLibPrint.c | 8 ++-- 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/IntelFrameworkPkg/Library/Fra

[edk2] [PATCH v2 2/2] MdePkg UefiLib: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- MdePkg/Library/UefiLib/Console.c | 6 +++--- MdePkg/Library/UefiLib/UefiLibPrint.c | 8 ++-- 2 files changed, 5 insertions(+), 9 deletions(-) diff --git

[edk2] [PATCH v2 1/2] MdePkg UefiDevicePathLib: Remove unsafe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Liming Gao Reviewed-by: Jaben Carsey --- MdePkg/Library/UefiDevicePathLib/DevicePathFromText.c | 17 + 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/MdePkg/Library/UefiDev

Re: [edk2] [Patch] SourceLevelDebugPkg/DebugAgent: Add typecast to fix sign extension

2015-06-25 Thread Fan, Jeff
Scott, Thanks your detailed explain and analysis. Jeff -Original Message- From: Scott Duplichan [mailto:sc...@notabs.org] Sent: Friday, June 26, 2015 12:05 AM To: edk2-devel@lists.sourceforge.net Subject: Re: [edk2] [Patch] SourceLevelDebugPkg/DebugAgent: Add typecast to fix sign exten

[edk2] [PATCH v2 4/8] IntelFrameworkModulePkg BdsDxe: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- IntelFrameworkModulePkg/Universal/BdsDxe/FrontPage.c | 8 IntelFrameworkModulePkg/Universal/BdsDxe/MemoryTest.c | 6 +++--- 2 files changed, 7 insertions(+

[edk2] [PATCH v2 2/8] IntelFrameworkModulePkg GenericBdsLib: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- IntelFrameworkModulePkg/Library/GenericBdsLib/BdsMisc.c| 14 +- .../Library/GenericBdsLib/Performance.c| 10 +- 2 files c

[edk2] [PATCH v2 0/8] IntelFrameworkModulePkg: Use safe string functions

2015-06-25 Thread Hao Wu
Changes between PATCH v1: 1. Replace Buf = AllocateZeroPool (size) followed by Strcpy (Buf, Source) with Buf = AllocateCopyPool (size, Source) 2. Replace unnecessary usage of StrnCpyS/CatS with StrCpyS/CatS 3. Correct pointer calculation mistakes in original PATCH 5/8, file BdsDxe/BootMaint/B

[edk2] [PATCH v2 8/8] IntelFrameworkModulePkg UpdateDriverDxe: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- .../Universal/FirmwareVolume/UpdateDriverDxe/ParseUpdateProfile.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/IntelFrameworkModulePk

[edk2] [PATCH v2 5/8] IntelFrameworkModulePkg BootMaint: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- .../Universal/BdsDxe/BootMaint/BootOption.c| 31 +++--- .../Universal/BdsDxe/BootMaint/FormGuid.h | 16 +++ .../Universal/Bd

[edk2] [PATCH v2 1/8] IntelFrameworkModulePkg IsaFloppyDxe: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/ComponentName.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/IntelFrameworkModulePkg/Bus/Isa/

[edk2] [PATCH v2 6/8] IntelFrameworkModulePkg BootMngr: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- .../Universal/BdsDxe/BootMngr/BootManager.c | 11 +-- 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/IntelFrameworkModulePkg

[edk2] [PATCH v2 3/8] IntelFrameworkModulePkg PeiDxeDebugLib: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- .../Library/PeiDxeDebugLibReportStatusCode/DebugLib.c| 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/IntelFrameworkModulePkg

[edk2] [PATCH v2 7/8] IntelFrameworkModulePkg DeviceMngr: Use safe string functions

2015-06-25 Thread Hao Wu
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu Reviewed-by: Jeff Fan Reviewed-by: Jaben Carsey --- .../Universal/BdsDxe/DeviceMngr/DeviceManager.c| 25 +++--- 1 file changed, 12 insertions(+), 13 deletions(-) diff --git a/IntelFrameworkModule

Re: [edk2] Minnowboard Max compiled firmware boot issue

2015-06-25 Thread Wei, David
Please check if there is any error message printed during the build. If build success, there should be a 8MB image created under "C:\MyWorkspace\Vlv2TbltDevicePkg\Stitch\". Thanks, David | SSG BIOS From: Ulysses Mckibbens [mailto:zergrusher2...@gmail.com] Sent: Friday, June 26, 2015 8:17 AM T

Re: [edk2] [PATCH 06/20] SecurityPkg VariableInfo: Delete it.

2015-06-25 Thread Zeng, Star
Good point, I am ok to update the package version. About package GUID, I never saw it has been changed since the package been created, I will leave it as is. -Original Message- From: Carsey, Jaben [mailto:jaben.car...@intel.com] Sent: Friday, June 26, 2015 1:48 AM To: edk2-devel@lists.s

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Zeng, Star
Ard, Thanks for your confirmation on ArmVirtQemu(I did not do it as I have no the environment, the result makes me more confident about the quality of patchset) and your answer to Laszlo. Laszlo, Answer your question below. > Okay -- so this means that the merged variable driver does not > *

[edk2] Minnowboard Max compiled firmware boot issue

2015-06-25 Thread Ulysses Mckibbens
Hi, I followed the build instructions for a 0.79 debug build using the make scripts in following sections 2 and 3 of this document: http://firmware.intel.com/sites/default/files/MinnowBoard_MAX-Rel_0.79-ReleaseNotes.txt It creates a 3MB image in the Vlv2TblDevicePkg\Stitch subdirectory. The flash

Re: [edk2] [PATCH v2 02/24] PcAtChipsetPkg: remove PciHostBridgeDxe

2015-06-25 Thread Laszlo Ersek
Jordan, Ray, On 06/25/15 19:14, Jordan Justen wrote: > On 2015-06-24 19:10:01, Ni, Ruiyu wrote: >> Jordan, >> I prefer to share the code across multiple platforms as well, if >> that's possible. >> >> In real world, DUET's PciHostBridgeDxe driver does something >> additionally: it gathers all opti

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Laszlo Ersek
On 06/25/15 18:19, Yao, Jiewen wrote: > Hi Ersek > That is just my thought, and I have no solid time frame at this moment, to be > honest. > If you have time to do the cleanup, please just go ahead. > I appreciate your help on that, and I will be happy to review your code > change. Okay, I'll ad

Re: [edk2] XHCI question

2015-06-25 Thread Anbazhagan, Baraneedharan
> -Original Message- > From: Tian, Feng [mailto:feng.t...@intel.com] > Sent: Wednesday, June 24, 2015 11:02 PM > To: Anbazhagan, Baraneedharan; Eric Wittmayer; > edk2-devel@lists.sourceforge.net > Cc: Tian, Feng > Subject: RE: [edk2] XHCI question > > Hi, Baranee > > Which case do you th

Re: [edk2] [PATCH 06/20] SecurityPkg VariableInfo: Delete it.

2015-06-25 Thread Carsey, Jaben
Since removing a module is non-backwards compatible change to the package, shouldn't you change the package GUID (and the version)? -Jaben > -Original Message- > From: Star Zeng [mailto:star.z...@intel.com] > Sent: Thursday, June 25, 2015 2:46 AM > To: edk2-devel@lists.sourceforge.net >

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Yao, Jiewen
Hi Ersek That is just my thought, and I have no solid time frame at this moment, to be honest. If you have time to do the cleanup, please just go ahead. I appreciate your help on that, and I will be happy to review your code change. I am sorry that I did not realize that OVMF has a its own AcpiS3

Re: [edk2] [Patch] SourceLevelDebugPkg/DebugAgent: Add typecast to fix sign extension

2015-06-25 Thread Scott Duplichan
Jeff Fan [mailto:jeff@intel.com] wrote: ]Sent: Thursday, June 25, 2015 02:59 AM ]To: edk2-devel@lists.sourceforge.net ]Subject: [edk2] [Patch] SourceLevelDebugPkg/DebugAgent: Add typecast to fix sign extension ] ]OffsetHigh is 16bit value and its type is UINT32 and defined in structure. ]If i

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Laszlo Ersek
Jiewen, On 06/25/15 10:35, Yao, Jiewen wrote: > And in the future, I believe we could remove > EFI_ACPI_S3_SAVE_PROTOCOL protocol completely. (This is Framework 0.9 > defined API, not PI defined API) > > The better design might be: > 1) AcpiS3Save does not install EFI_ACPI_S3_SAVE_PROTOCOL. > 2)

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 16:29, Laszlo Ersek wrote: > On 06/25/15 14:59, Zeng, Star wrote: >> Ard & Laszlo, >> >> Variable store header is initialized by platform dsc, the merged >> variable driver will AUTOMATICALLY compare EFI_VARIABLE_GUID/ >> EFI_AUTHENTICATED_VARIABLE_GUID against >> VARIABLE_STORE

Re: [edk2] [PATCH v2] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 16:33, Laszlo Ersek wrote: > On 06/25/15 15:10, Ard Biesheuvel wrote: >> On 25 June 2015 at 14:16, Laszlo Ersek wrote: > >>> Looks good, but you're going to hate me nonetheless. Because, our >>> exchange has been too quick, and my thoughts about addressing the same >>> in OvmfP

Re: [edk2] [PATCH v2] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Laszlo Ersek
On 06/25/15 15:10, Ard Biesheuvel wrote: > On 25 June 2015 at 14:16, Laszlo Ersek wrote: >> Looks good, but you're going to hate me nonetheless. Because, our >> exchange has been too quick, and my thoughts about addressing the same >> in OvmfPkg had not matured enough until I posted my v1 review.

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Laszlo Ersek
On 06/25/15 14:59, Zeng, Star wrote: > Ard & Laszlo, > > Variable store header is initialized by platform dsc, the merged > variable driver will AUTOMATICALLY compare EFI_VARIABLE_GUID/ > EFI_AUTHENTICATED_VARIABLE_GUID against > VARIABLE_STORE_HEADER.Signature to know the format of variable > (VA

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Zeng, Star
NorFlashDxe.inf and NorFlashAuthenticatedDxe.inf may still need to be there as NorFlashDxe.inf includes NorFlashVariableDep.c to use gEfiVariableGuid to initialize variable store header and NorFlashAuthenticatedDxe.inf includes NorFlashAuthenticatedVariableDep.c to use EfiAuthenticatedVariableGu

Re: [edk2] [PATCH v2] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 14:16, Laszlo Ersek wrote: > On 06/25/15 13:00, Ard Biesheuvel wrote: >> Currently, the ArmVirtPkg platforms built with the Intel BDS fail >> to signal the end-of-DXE event 'gEfiEndOfDxeEventGroupGuid' when >> entering the BDS phase, which results in some loss of functionality,

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Zeng, Star
Ard & Laszlo, Variable store header is initialized by platform dsc, the merged variable driver will AUTOMATICALLY compare EFI_VARIABLE_GUID/ EFI_AUTHENTICATED_VARIABLE_GUID against VARIABLE_STORE_HEADER.Signature to know the format of variable (VARIABLE_HEADER or AUTHENTICATED_VARIABLE_HEADER(I

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Yao, Jiewen
HI Ard Sorry for the confusing. I mean, there is no need to guarantee the order of "1) call AcpiS3->S3Save(), then 2) signal EndOfDxe". The only order requirement is "EndOfDxe before SmmReadyToLock" When I wrote this white paper, I just mean we need this those thing based on current design in

Re: [edk2] [PATCH] IntelFrameworkModulePkg/GenericBdsLib: remove AcpiS3->S3Save() call

2015-06-25 Thread Yao, Jiewen
Looks good. Thanks! Reviewed-by: Yao, Jiewen -Original Message- From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org] Sent: Thursday, June 25, 2015 5:22 PM To: edk2-devel@lists.sourceforge.net; ler...@redhat.com; Yao, Jiewen; Fan, Jeff Cc: Ard Biesheuvel Subject: [PATCH] IntelFramewo

Re: [edk2] [PATCH v2] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Laszlo Ersek
On 06/25/15 13:00, Ard Biesheuvel wrote: > Currently, the ArmVirtPkg platforms built with the Intel BDS fail > to signal the end-of-DXE event 'gEfiEndOfDxeEventGroupGuid' when > entering the BDS phase, which results in some loss of functionality, > i.e., variable reclaim in the VariableDxe drivers,

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 13:15, Laszlo Ersek wrote: > On 06/25/15 11:46, Star Zeng wrote: >> For your easy review, >> the forked code is at g...@github.com:lzeng14/edk2.git branch >> SeparateAuthVariableService. >> >> What to do: >> 1. Move TpmMeasurementLib LibraryClass from SecurityPkg to MdeModulePk

Re: [edk2] [PATCH] MdePkg: Describe submission of a patch authored by someone else

2015-06-25 Thread Laszlo Ersek
On 06/24/15 22:58, Carsey, Jaben wrote: > > >> -Original Message- >> From: Roy Franz [mailto:roy.fr...@linaro.org] >> Sent: Wednesday, June 24, 2015 12:52 PM >> To: Kinney, Michael D >> Cc: edk2-devel@lists.sourceforge.net >> Subject: Re: [edk2] [PATCH] MdePkg: Describe submission of a pa

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 11:46, Star Zeng wrote: > For your easy review, > the forked code is at g...@github.com:lzeng14/edk2.git branch > SeparateAuthVariableService. > Hello Star, This series looks like an improvement, and thanks for making it available via GitHub, that is very helpful. I do have

Re: [edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Laszlo Ersek
On 06/25/15 11:46, Star Zeng wrote: > For your easy review, > the forked code is at g...@github.com:lzeng14/edk2.git branch > SeparateAuthVariableService. > > What to do: > 1. Move TpmMeasurementLib LibraryClass from SecurityPkg to MdeModulePkg. > 2. Implement a NULL TpmMeasurementLib library ins

[edk2] [PATCH v2] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Ard Biesheuvel
Currently, the ArmVirtPkg platforms built with the Intel BDS fail to signal the end-of-DXE event 'gEfiEndOfDxeEventGroupGuid' when entering the BDS phase, which results in some loss of functionality, i.e., variable reclaim in the VariableDxe drivers, and the splitting of the memory regions that is

Re: [edk2] [PATCH] IntelFrameworkModulePkg/GenericBdsLib: remove AcpiS3->S3Save() call

2015-06-25 Thread Laszlo Ersek
On 06/25/15 12:34, Laszlo Ersek wrote: > On 06/25/15 11:22, Ard Biesheuvel wrote: >> The AcpiS3->S3Save() call needs to occur before the end-of-DXE event >> is signalled. The end-of-DXE event needs to be signalled prior to >> invoking any UEFI drivers, applications, or connecting consoles. >> >> Th

Re: [edk2] [PATCH] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 12:32, Laszlo Ersek wrote: > comments below > > On 06/25/15 10:19, Ard Biesheuvel wrote: >> Currently, the ArmVirtPkg platforms built with the Intel BDS fail >> to signal the end-of-DXE event 'gEfiEndOfDxeEventGroupGuid' when >> entering the BDS phase, which results in some loss

Re: [edk2] [PATCH] IntelFrameworkModulePkg/GenericBdsLib: remove AcpiS3->S3Save() call

2015-06-25 Thread Laszlo Ersek
On 06/25/15 12:34, Laszlo Ersek wrote: > (If this patch is deemed correct by the IntelFrameworkModulePkg > maintainers, then adopting OVMF is the right thing to do.) Adapting, not adopting. -- Monitor 25 network devices

Re: [edk2] [PATCH] IntelFrameworkModulePkg/GenericBdsLib: remove AcpiS3->S3Save() call

2015-06-25 Thread Laszlo Ersek
On 06/25/15 11:22, Ard Biesheuvel wrote: > The AcpiS3->S3Save() call needs to occur before the end-of-DXE event > is signalled. The end-of-DXE event needs to be signalled prior to > invoking any UEFI drivers, applications, or connecting consoles. > > This means the call to S3Save() that occurs in

Re: [edk2] [PATCH] ArmVirtPkg: signal EndOxDxe event in PlatformBsdInit

2015-06-25 Thread Laszlo Ersek
comments below On 06/25/15 10:19, Ard Biesheuvel wrote: > Currently, the ArmVirtPkg platforms built with the Intel BDS fail > to signal the end-of-DXE event 'gEfiEndOfDxeEventGroupGuid' when > entering the BDS phase, which results in some loss of functionality, > i.e., variable reclaim in the Vari

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 12:23, Laszlo Ersek wrote: > On 06/25/15 10:27, Ard Biesheuvel wrote: >> On 25 June 2015 at 10:08, Ard Biesheuvel wrote: >>> On 25 June 2015 at 09:58, Laszlo Ersek wrote: On 06/25/15 01:31, Yao, Jiewen wrote: > Hi Ard > You are right that END_OF_DXE must be signal

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Laszlo Ersek
On 06/25/15 10:27, Ard Biesheuvel wrote: > On 25 June 2015 at 10:08, Ard Biesheuvel wrote: >> On 25 June 2015 at 09:58, Laszlo Ersek wrote: >>> On 06/25/15 01:31, Yao, Jiewen wrote: Hi Ard You are right that END_OF_DXE must be signal in Bds. My thought is that this event shoul

Re: [edk2] [PATCH v2 02/24] PcAtChipsetPkg: remove PciHostBridgeDxe

2015-06-25 Thread Laszlo Ersek
On 06/25/15 10:44, Ni, Ruiyu wrote: > Laszlo/Jordan, > It seems to generalize the code is not very much possible, or at > least not an easy task. How about we do the things in multiple steps? > So it won't block your current work. > 1. Duplicate the PciHostBridgeDxe in OvmfPkg and add these speci

[edk2] [PATCH 10/20] SecurityPkg: Implement AuthVariableLib library instance.

2015-06-25 Thread Star Zeng
What to do: 1. Implement AuthVariableLib library instance. Why to do: 1. Share code. Separate auth variable service from Auth Variable driver in SecurityPkg to AuthVariableLib. Then the AuthVariableLib could benefit and be used by different implementation of Auth Variable drivers. Contributed-und

[edk2] [PATCH 13/20] MdeModulePkg PlatDriOverrideDxe: Remove unneeded VARIABLE_HEADER reference.

2015-06-25 Thread Star Zeng
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng Reviewed-by: Jiewen Yao Reviewed-by: Liming Gao --- MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatDriOverrideLib.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/MdeModulePkg/Universal/Pl

[edk2] [PATCH 14/20] SecurityPkg EsalVariableDxeSal: Replace VARIABLE_HEADER

2015-06-25 Thread Star Zeng
with AUTHENTICATED_VARIABLE_HEADER. Cc: Jiewen Yao Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng --- .../EsalVariableDxeSal/AuthService.c | 42 ++-- .../EsalVariableDxeSal/Variable.c | 220 ++--- .../EsalVariable

[edk2] [PATCH 08/20] SecurityPkg VariablePei: Delete it.

2015-06-25 Thread Star Zeng
What to do: 1. Delete VariablePei in SecurityPkg after it merged to VariablePei in MdeModulePkg. Why to do: 1. Remove code duplication and reduce maintenance effort. The code logic of VariablePei in SecurityPkg is same with VariablePei in MdeModulePkg. Contributed-under: TianoCore Contribution A

[edk2] [PATCH 20/20] Vlv2TbltDevicePkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg when SECURE_BOOT_ENABLE = TRUE. Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg when SECURE_BOOT_ENABLE = FALSE. Cc: David Wei Cc: Tim He Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Ze

[edk2] [PATCH 15/20] Nt32Pkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg when SECURE_BOOT_ENABLE = TRUE. Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg when SECURE_BOOT_ENABLE = FALSE. Cc: Ruiyu Ni Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng --- Nt32

[edk2] [PATCH 16/20] OvmfPkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg when SECURE_BOOT_ENABLE = TRUE. Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg when SECURE_BOOT_ENABLE = FALSE. Cc: Jordan Justen Cc: Laszlo Ersek Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-b

[edk2] [PATCH 03/20] MdeModulePkg: Move authenticated variable definition from SecurityPkg.

2015-06-25 Thread Star Zeng
What to do: 1. Move authenticated variable definition from AuthenticatedVariableFormat.h to VariableFormat.h with gEfiAuthenticatedVariableGuid and AUTHENTICATED_VARIABLE_HEADER. Why to do: 1. Share code. We are moving forward to separate auth variable service from Auth Variable driver in Security

[edk2] [PATCH 09/20] MdeModulePkg: Add AuthVariableLib LibraryClass.

2015-06-25 Thread Star Zeng
What to do: 1. Add AuthVariableLib LibraryClass definitions. 2. Implement a NULL AuthVariableLib library instance. 3. Add VARIABLE_ENTRY_PROPERTY definition to VarCheck.h. 4. Add VARIABLE_ENTRY_CONSISTENCY and variable attribute combinations definitions to VariableFormat.h. Why to do: 1. Share cod

[edk2] [PATCH 18/20] ArmPlatformPkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg. Remove gVariableAuthenticatedRuntimeDxeFileGuid definition in ArmPlatformPkg.dec and use gVariableRuntimeDxeFileGuid in NorFlashAuthenticatedDxe.inf as auth Variable driver in SecurityPkg and Variable driver in MdeModulePkg have be

[edk2] [PATCH 19/20] ArmVirtPkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLib and DxeTpmMeasurementLib in SecurityPkg when SECURE_BOOT_ENABLE = TRUE. Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg when SECURE_BOOT_ENABLE = FALSE. Cc: Laszlo Ersek Cc: Ard Biesheuvel Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-

[edk2] [PATCH 04/20] SecurityPkg: Move authenticated variable definition to MdeModulePkg.

2015-06-25 Thread Star Zeng
What to do: 1. Move authenticated variable definition from AuthenticatedVariableFormat.h to VariableFormat.h with gEfiAuthenticatedVariableGuid and AUTHENTICATED_VARIABLE_HEADER. Why to do: 1. Share code. We are moving forward to separate auth variable service from Auth Variable driver in Security

[edk2] [PATCH 01/20] MdeModulePkg: Move TpmMeasurementLib LibraryClass from SecurityPkg.

2015-06-25 Thread Star Zeng
What to do: 1. Move TpmMeasurementLib LibraryClass from SecurityPkg to MdeModulePkg. 2. Implement a NULL TpmMeasurementLib library instance. Why to do: 1. Share code. We are moving forward to separate auth variable service from Auth Variable driver in SecurityPkg to AuthVariableLib. Then the AuthV

[edk2] [PATCH 17/20] EmulatorPkg: Use the merged Variable driver.

2015-06-25 Thread Star Zeng
Link AuthVariableLibNull and TpmMeasurementLibNull in MdeModulePkg. Cc: Jordan Justen Cc: Andrew Fish Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng --- EmulatorPkg/EmulatorPkg.dsc | 8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/Emu

[edk2] [PATCH 07/20] MdeModulePkg VariablePei: Merge from VariablePei in SecurityPkg.

2015-06-25 Thread Star Zeng
What to do: 1. Merge from VariablePei in SecurityPkg to VariablePei in MdeModulePkg. Why to do: 1. Remove code duplication and reduce maintenance effort. The code logic of VariablePei in SecurityPkg is same with VariablePei in MdeModulePkg. Contributed-under: TianoCore Contribution Agreement 1.0

[edk2] [PATCH 06/20] SecurityPkg VariableInfo: Delete it.

2015-06-25 Thread Star Zeng
What to do: 1. Delete VariableInfo in SecurityPkg after it merged to VariableInfo in MdeModulePkg. Why to do: 1. Remove code duplication and reduce maintenance effort. The functionality of VariableInfo in SecurityPkg has covered VariableInfo in MdeModulePkg. Contributed-under: TianoCore Contribu

[edk2] [PATCH 00/20] Separate auth variable service from Auth Variable driver.

2015-06-25 Thread Star Zeng
For your easy review, the forked code is at g...@github.com:lzeng14/edk2.git branch SeparateAuthVariableService. What to do: 1. Move TpmMeasurementLib LibraryClass from SecurityPkg to MdeModulePkg. 2. Implement a NULL TpmMeasurementLib library instance in MdeModulePkg. 3. Move authenticated varia

[edk2] [PATCH 05/20] MdeModulePkg VariableInfo: Merge from VariableInfo in SecurityPkg.

2015-06-25 Thread Star Zeng
What to do: 1. Merge VariableInfo in SecurityPkg to VariableInfo in MdeModulePkg. Why to do: 1. Remove code duplication and reduce maintenance effort. The functionality of VariableInfo in SecurityPkg has covered VariableInfo in MdeModulePkg. Contributed-under: TianoCore Contribution Agreement 1.0

[edk2] [PATCH 02/20] SecurityPkg: Move TpmMeasurementLib LibraryClass to MdeModulePkg.

2015-06-25 Thread Star Zeng
What to do: 1. Move TpmMeasurementLib LibraryClass from SecurityPkg to MdeModulePkg. 2. Update DxeTpmMeasurementLib.inf to include MdeModulePkg.dec. Why to do: 1. Share code. We are moving forward to separate auth variable service from Auth Variable driver in SecurityPkg to AuthVariableLib. Then t

Re: [edk2] [PATCH 04/13] MdeModulePkg/Library/PeiPerformanceLib: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
Reviewed-by: Star Zeng -Original Message- From: Qiu, Shumin Sent: Thursday, June 25, 2015 3:47 PM To: edk2-devel@lists.sourceforge.net Cc: Zeng, Star; Fan, Jeff; Gao, Liming; Ni, Ruiyu; Tian, Feng Subject: [PATCH 04/13] MdeModulePkg/Library/PeiPerformanceLib: Use safe string functions t

Re: [edk2] [PATCH 13/13] MdeModulePkg/Universal/Variable: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
Reviewed-by: Star Zeng -Original Message- From: Qiu, Shumin Sent: Thursday, June 25, 2015 3:47 PM To: edk2-devel@lists.sourceforge.net Cc: Zeng, Star; Fan, Jeff; Gao, Liming; Ni, Ruiyu; Tian, Feng Subject: [PATCH 13/13] MdeModulePkg/Universal/Variable: Use safe string functions to refin

Re: [edk2] [PATCH 10/13] MdeModulePkg/Universal/PCD: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
The logic is good to me. One minor comment below. How about save "AsciiStrSize (TokenSpaceName) + AsciiStrSize (PcdName)" to one local variable, for example: UINTN NameSize; ... NameSize = AsciiStrSize (TokenSpaceName) + AsciiStrSize (PcdName); Thanks, Star -Original Message- From: Qiu

Re: [edk2] [PATCH 02/13] MdeModulePkg/Library/DxeCorePerformanceLib: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
Reviewed-by: Star Zeng -Original Message- From: Qiu, Shumin Sent: Thursday, June 25, 2015 3:47 PM To: edk2-devel@lists.sourceforge.net Cc: Zeng, Star; Fan, Jeff; Gao, Liming; Ni, Ruiyu; Tian, Feng Subject: [PATCH 02/13] MdeModulePkg/Library/DxeCorePerformanceLib: Use safe string functio

[edk2] [PATCH] IntelFrameworkModulePkg/GenericBdsLib: remove AcpiS3->S3Save() call

2015-06-25 Thread Ard Biesheuvel
The AcpiS3->S3Save() call needs to occur before the end-of-DXE event is signalled. The end-of-DXE event needs to be signalled prior to invoking any UEFI drivers, applications, or connecting consoles. This means the call to S3Save() that occurs in BdsLibBootViaBootOption() violates the ordering con

Re: [edk2] [PATCH 05/13] MdeModulePkg/Library/SmmCorePerformanceLib: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
Please use SMM_PERFORMANCE_STRING_SIZE, but not DXE_PERFORMANCE_STRING_SIZE. Thanks, Star -Original Message- From: Qiu, Shumin Sent: Thursday, June 25, 2015 3:47 PM To: edk2-devel@lists.sourceforge.net Cc: Zeng, Star; Fan, Jeff; Gao, Liming; Ni, Ruiyu; Tian, Feng Subject: [PATCH 05/13] Md

Re: [edk2] [PATCH 12/13] MdeModulePkg/Universal/SmbiosDxe: Use safe string functions to refine code.

2015-06-25 Thread Zeng, Star
Reviewed-by: Star Zeng -Original Message- From: Qiu, Shumin Sent: Thursday, June 25, 2015 3:47 PM To: edk2-devel@lists.sourceforge.net Cc: Zeng, Star; Fan, Jeff; Gao, Liming; Ni, Ruiyu; Tian, Feng Subject: [PATCH 12/13] MdeModulePkg/Universal/SmbiosDxe: Use safe string functions to refi

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 10:51, Yao, Jiewen wrote: > The dispatch order can be determined by TPL. Event with high TPL runs first. > But, there is no guaranteed dispatch order if 2 events have same TPL. > > Would you please let me know what problem you find? > > I cannot see any interaction between S3Sav

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Yao, Jiewen
The dispatch order can be determined by TPL. Event with high TPL runs first. But, there is no guaranteed dispatch order if 2 events have same TPL. Would you please let me know what problem you find? I cannot see any interaction between S3Save and silicon driver. Also, I cannot see the problem if

Re: [edk2] [PATCH v2 02/24] PcAtChipsetPkg: remove PciHostBridgeDxe

2015-06-25 Thread Ni, Ruiyu
Laszlo/Jordan, It seems to generalize the code is not very much possible, or at least not an easy task. How about we do the things in multiple steps? So it won't block your current work. 1. Duplicate the PciHostBridgeDxe in OvmfPkg and add these special OVMF logic. 2. Review the different version

Re: [edk2] [RFC PATCH] IntelFrameworkModulePkg: signal end-of-DXE event upon platform BDS invocation

2015-06-25 Thread Ard Biesheuvel
On 25 June 2015 at 10:35, Yao, Jiewen wrote: > And in the future, I believe we could remove EFI_ACPI_S3_SAVE_PROTOCOL > protocol completely. (This is Framework 0.9 defined API, not PI defined API) > > The better design might be: > 1) AcpiS3Save does not install EFI_ACPI_S3_SAVE_PROTOCOL. > 2) Acp

  1   2   >